Cyberattacks: Page 4


  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA: 3 Ivanti endpoint vulnerabilities exploited in the wild

    Researchers last month published a proof-of-concept exploit for the critical flaws in Endpoint Manager.

    By March 11, 2025
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Critical PHP vulnerability under widespread cyberattack

    Telemetry data shows spikes in exploits of CVE-2024-4577 across several countries in recent months.

    By March 10, 2025
  • Image of healthcare equipment
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Cobalt Strike takedown effort cuts cracked versions by 80%

    Fortra, Microsoft and Health-ISAC partnership reduced unauthorized copies of red team tool over the last two years.

    By March 7, 2025
  • Technician services a cloud server.
    Image attribution tooltip
    anandaBGD via Getty Images
    Image attribution tooltip

    37K+ VMware ESXi instances vulnerable to critical zero-day

    Some customers have been unable to download the patches for three VMware zero-day vulnerabilities due to an issue with the Broadcom Support Portal.

    By March 6, 2025
  • Technician in server hub doing face palm gesture, trying to protect hardware from hacker stealing information
    Image attribution tooltip
    Dragos Condrea via Getty Images
    Image attribution tooltip

    Cyberattacks targeting IT vendors intensify, causing bigger losses

    Ransomware criminals are on the hunt for prime targets that can yield bigger payouts, according to cyber risk management firm Resilience.

    By Alexei Alexis • March 6, 2025
  • A sign is posted in front of a Broadcom office on December 12, 2024 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Broadcom urges customers to patch 3 zero-day VMware flaws

    Cyberattackers with administrative access are actively exploiting vulnerabilities in ESXi, Workstation and Fusion products.

    By Elizabeth Montalbano, Contributing Reporter • March 5, 2025
  • Broadband connections
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    More than 86K IoT devices compromised by fast-growing Eleven11 botnet

    The Iran-linked botnet has a large presence in the U.S. and is targeting telecom and other firms with DDoS attacks.

    By March 4, 2025
  • legal role in data incident or breach
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Rubrik discloses server breach, compromise of ‘access information’

    The data security and backup vendor said it found no evidence that the stolen data was used by cyber threat actors.

    By March 4, 2025
  • words zero day highlighted in code
    Image attribution tooltip
    JUN LI via Getty Images
    Image attribution tooltip

    Microsoft-signed driver used in ransomware attacks

    Threat actors are exploiting a privilege escalation flaw in Paragon Partition Manager for “bring your own vulnerable driver” (BYOVD) attacks.

    By March 3, 2025
  • The St. Louis cityscape of buildings, bridges and Gateway Arch are shown from afar.
    Image attribution tooltip
    Art Wager via Getty Images
    Image attribution tooltip

    Lee Enterprises investigating ransomware claim, data leak threat

    The newspaper chain previously confirmed the attack would likely have a material impact on its financial condition.

    By March 3, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Leaked ransomware chat logs reveal Black Basta’s targeted CVEs

    Cybercrime group focused on Microsoft vulnerabilities as well as flaws in network edge devices and communications software.

    By Feb. 27, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign

    GreyNoise observed exploitation of CVE-2018-0171, which Cisco Talos researchers said was used in a recent attack by the China-backed threat group.

    By Feb. 25, 2025
  • password to access personal user data, cybersecurity concept
    Image attribution tooltip

    stock.adobe.com/Song_about_summer

    Image attribution tooltip
    Sponsored by Palo Alto Networks

    Is your browser ground zero for cyber-attacks?

    Organizations must not overlook web browser threats – or the new technologies that can defeat them.

    By Anupam Upadhyaya, Vice President Product Management – Prisma SASE at Palo Alto Networks • Feb. 24, 2025
  • Data Breach Button on Computer Keyboard
    Image attribution tooltip
    GOCMEN via Getty Images
    Image attribution tooltip

    Tech investment firm Insight Partners discloses data breach

    The company holds equity in several major technology companies, including Wiz and Kaseya.

    By Feb. 19, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Lee Enterprises says cyberattack will likely have material impact

    The newspaper chain said attackers encrypted critical applications and impacted billing, payments and print distribution.

    By Feb. 18, 2025
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Phishing campaign targets Microsoft device-code authentication flows

    Russian state-sponsored hackers have attacked enterprises and government agencies in North America and overseas.

    By Feb. 18, 2025
  • Telecom network above a city
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    China-backed hackers continue cyberattacks on telecom companies

    Salt Typhoon threat actors compromised Cisco edge devices by exploiting older vulnerabilities.

    By Feb. 13, 2025
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    bin kontan / Getty Images via Getty Images
    Image attribution tooltip

    Ransomware gangs shifting tactics to evade enterprise defenses

    Threat actors adapted to improved threat detection, law enforcement actions, new Huntress research finds.

    By Feb. 12, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Lee Enterprises investigating cyberattack that disrupted operations across multiple news outlets

    The company, a major U.S. newspaper chain, has been working with forensic specialists to fully restore services and determine the cause.

    By Feb. 11, 2025
  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    VeraCore zero-day vulnerabilities exploited in supply chain attacks

    Cybercriminals maintained access to one victim organization for more than four years.

    By Feb. 11, 2025
  • A large sign sits out front of construction technology firm Trimble's headquarters in Westminster, Colorado. The sign reads "Trimble", and a large building looms in the background.
    Image attribution tooltip
    Courtesy of Trimble
    Image attribution tooltip

    CISA warns of hackers targeting vulnerability in Trimble Cityworks to conduct RCE

    The software is widely used in projects by local governments, utilities, airports and other facilities.

    By Feb. 10, 2025
  • HPE, Juniper, Cisco, DOJ
    Image attribution tooltip
    JHVEPhoto via Getty Images
    Image attribution tooltip

    HPE issues breach notifications for 2023 Midnight Blizzard attack

    Russian state-sponsored hackers compromised the tech giant's Office 365 email environment.

    By Feb. 10, 2025
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    gorodenkoff/iStock via Getty Images
    Image attribution tooltip

    Suspected botnet targets edge devices using brute force attacks

    Researchers warn of a surge in attempted logins targeting devices from SonicWall, Palo Alto Networks and others.

    By Feb. 7, 2025
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Hackers deployed web shells, exploited public-facing applications in Q4

    A Cisco Talos report also indicated a sharp increase in remote access tools being leveraged in ransomware. 

    By Feb. 6, 2025
  • DeepSeek logo in front of China's flag.
    Image attribution tooltip
    Anthony Kwan/Getty Images via Getty Images
    Image attribution tooltip

    DeepSeek surge hits companies, posing security risks

    The Trump administration is scrutinizing the AI app, Italy and Taiwan have banned it, and companies have blocked it.

    By Alexei Alexis • Feb. 5, 2025