Cyberattacks: Page 35


  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    The fallout when OT companies lack confidence in IT security barriers

    While a controlled pipeline closure is preferred over one carried out by nefarious groups, the decision is up for debate in the security community.

    By Samantha Schwartz • May 14, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Ransomware fears escalate as Irish health service, Toshiba unit targeted

    "We are seeing more broad based cyber incidents from our adversaries who are growing more aggressive," said Brandon Wales, CISA acting director. 

    By May 14, 2021
  • a software developer writes code while using an external monitor in an office setting Explore the Trendline
    Image attribution tooltip
    Nattakorn Maneerat via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company
    Image attribution tooltip

    Colonial Pipeline begins fuel delivery relaunch after ransomware attack

    While the company has not disclosed the attack vector, one expert said its quick recovery could be a post-breach success story. 

    By May 13, 2021
  • Image attribution tooltip
    Michael M. Santiago via Getty Images via Getty Images
    Image attribution tooltip

    Colonial Pipeline hack highlights grid disruption risks even with IT-focused cyberattack

    While the risk of malware migrating from IT to OT may be minimal, if it were to happen, the effects could be devastating, experts said. 

    By Robert Walton • May 13, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Colonial Pipeline disconnects OT systems to silo ransomware IT threat

    Anxiety is rising among corporate security officials concerned about the impact of ransomware among critical infrastructure providers.

    By May 12, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA left in the dark during Colonial Pipeline's initial response

    With an agency mandate to share threat information with critical infrastructure, notification delays can stall industry response.

    By Samantha Schwartz • May 12, 2021
  • Image attribution tooltip
    Tim Boyle/Staff via Getty Images
    Image attribution tooltip

    Colonial Pipeline attack embodies security risk to nation's critical infrastructure

    Security experts warned for years about attacks against critical infrastructure, but one analyst called this the most brazen yet.

    By Updated May 10, 2021
  • Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Cryptocurrency fuels ransomware payments. Without regulation, it could get worse

    The rapid ascent of crypto, like other emerging technologies before it, has far outpaced the federal government's ability to regulate it.

    By Samantha Schwartz • May 7, 2021
  • Robots assemble Ford vehicles at the Chicago Assembly Plant on June 24, 2019 in Chicago, Illinois.
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Targeted industrial control systems add cautionary flag to cyber defense strategies

    A Defend Forward strategy used in the IT space may not translate well in the OT environment, according to panelists at the Hack the Capitol conference. 

    By May 6, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Passwordstate customers targeted with new round of phishing attacks

    The phishing email is asking customers to download a modified hotfix file, called Moserware.zip, from a content delivery network not controlled by Click Studios. 

    By April 29, 2021
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Cyberattack on Passwordstate tests confidence in password managers

    The supply chain attack is raising questions about how best to deploy and secure the tools as corporations face heightened threats across the globe.

    By April 27, 2021
  • Closeup side view of group of mid 20's mobile application developers testing the code and fixing the issues.
    Image attribution tooltip
    gilaxia via Getty Images
    Image attribution tooltip

    Codecov hack — likened to SolarWinds — targets software supply chain

    Third-party actors were able to linger inside the software-testing firm’s environment for months, exfiltrating customer data.

    By Updated April 30, 2021
  • Capitol Hill in Washington, D.C.
    Image attribution tooltip
    Permission granted by E.A. Crunden
    Image attribution tooltip
    Long-term SolarWinds consequences

    SolarWinds juggles stakeholders involved in response, recovery to level out business

    Reputation, risk issues and cross-sector cooperation demand a cohesive plan to ensure recovery and repair. It also helps to know the federal response.

    By Samantha Schwartz • April 22, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    25% of utilities exposed to SolarWinds hack amid growing ICS vulnerabilities, analysts say

    Security experts warn it may be too soon to tell whether follow-on activity has occurred.

    By Robert Walton • April 16, 2021
  • Image attribution tooltip
    Depositphotos
    Image attribution tooltip

    How IT can support security in the event of a cyberattack

    CIOs and CISOs operate as separate jobs leading different departments, but with work that overlaps. Who leads what in the event of an attack can become muddled. 

    By Jen A. Miller • April 13, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Payments industry faces potential 'destructive attacks,' Biden cybersecurity official warns

    Ransomware and infrastructure attacks are the biggest threats to the industry, a Biden administration cybersecurity official told the American Transaction Processors Coalition. 

    By Lynne Marek • April 9, 2021
  • 'Advanced cyberconflict' is nearing, researchers say

    Enterprises represent 35% of nation-state targets, whereas government or regulatory agencies are 12% of targets, according to the report.

    By Samantha Schwartz • April 8, 2021
  • A still of COVID-19 vaccine vials from Johnson & Johnson going through production
    Image attribution tooltip
    Permission granted by Johnson & Johnson
    Image attribution tooltip
    Deep Dive

    4 tools to fight fraud, counterfeits and cyberattacks in the COVID-19 vaccine supply chain

    Visibility technologies and real-time data provide one version of the truth in a rapidly built supply chain.

    By Deborah Abrams Kaplan • April 7, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Ransomware wins make threat actors push aside other malware

    While the FBI encourages a relationship with a victim organization, some businesses are hard pressed to involve law enforcement when fines could follow an attack.

    By Samantha Schwartz • April 7, 2021
  • Image attribution tooltip
    Daphne Howland/Cybersecurity Dive
    Image attribution tooltip

    Why SMBs miss out on the white-glove cyber insurance advantage

    Insurance companies spend less time with SMBs evaluating individual risk profiles, weakening a piece of the global cyber economy.

    By Samantha Schwartz • April 5, 2021
  • Molson Coors incident shines a light on industrial cyberattack vulnerabilities

    The international brewery continues to face delays and financial impacts amid a wave of attacks against manufacturing.

    By March 30, 2021
  • Cybersecurity spending is up but so are breaches

    Healthcare, media, entertainment and gaming experienced the greatest growth in breaches last year, coinciding with a "big shift" toward digital transformation, Canalys found.

    By Samantha Schwartz • March 30, 2021
  • Security leaders: Expect more insider data leaks, threats in 2021

    The rise stems from a lack of accurate insight from data loss prevention and cloud access security broker technologies.

    By March 29, 2021
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Babuk ransomware group emerges with new claims against US companies

    The threat actor emerges amid heightened ransomware concerns following the Microsoft Exchange server attacks.

    By March 26, 2021
  • Remote work gives rise to more executive credential theft

    Threat actors are increasingly using social engineering to cultivate vulnerable end users and compromise networks, according to a CyberArk report.

    By March 25, 2021