Cyberattacks: Page 40


  • Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    What to consider before paying a ransom

    Amid rampant attacks, businesses have a choice: pay or suffer.

    By Samantha Schwartz • June 7, 2021
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images
    Image attribution tooltip

    Phishing attack against US government, NGOs shakes assumptions on containment

    As federal authorities flex new, aggressive steps to deter malicious activity, analysts warn that an evolving threat actor may challenge industry's ability to trust anything. 

    By June 2, 2021
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • A JBS meatpacking plant in Greeley, Colorado.
    Image attribution tooltip
    Matthew Stockman/Getty via Getty Images
    Image attribution tooltip

    White House steps in as JBS ransomware interrupts consumer supply chain

    The FBI attributed the attack to Russia-based REvil, and JBS is on schedule to restore operations Thursday.

    By Samantha Schwartz • Updated June 3, 2021
  • Image attribution tooltip
    Getty Images / Staff via Getty Images
    Image attribution tooltip

    APT actors ramp up cyber campaign targeting Pulse Secure VPNs

    Mandiant researchers have identified four new malware families in an ongoing campaign targeting several key sectors, including the U.S. defense industry.

    By May 28, 2021
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company
    Image attribution tooltip

    TSA directive will add teeth to pipeline security oversight

    The Transportation Security Administration will require companies to appoint a cybersecurity coordinator, and report confirmed and potential security incidents to CISA.

    By Samantha Schwartz • May 27, 2021
  • Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Pinning ransomware gangs is a game of 'whack-a-mole'

    Dismantling international criminal enterprises takes a combination of law enforcement, intelligence and allies. But gangs rebrand to evade detection.

    By Samantha Schwartz • May 26, 2021
  • Image attribution tooltip
    Dan Kitwood/Getty Images News via Getty Images
    Image attribution tooltip

    CNA Financial's reported $40M ransom payment likely a record

    The company, among the top-10 cyber insurance firms, had a cyber insurance policy, but losses could exceed its coverage.

    By Samantha Schwartz • May 21, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip
    Long-term SolarWinds consequences

    SolarWinds CEO extends hack timeline, rethinks intern blame

    Investigators established the timeline after stumbling upon code that showed the attackers were embedded in the system since the beginning of 2019.

    By May 20, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    WannaCry lesson still echoes: Patch

    The EternalBlue leak and unpatched Windows 7 operating systems created the perfect storm.

    By Samantha Schwartz • May 17, 2021
  • Fuel holding tanks are seen in an overhead view
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    The fallout when OT companies lack confidence in IT security barriers

    While a controlled pipeline closure is preferred over one carried out by nefarious groups, the decision is up for debate in the security community.

    By Samantha Schwartz • May 14, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware fears escalate as Irish health service, Toshiba unit targeted

    "We are seeing more broad based cyber incidents from our adversaries who are growing more aggressive," said Brandon Wales, CISA acting director. 

    By May 14, 2021
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company
    Image attribution tooltip

    Colonial Pipeline begins fuel delivery relaunch after ransomware attack

    While the company has not disclosed the attack vector, one expert said its quick recovery could be a post-breach success story. 

    By May 13, 2021
  • Image attribution tooltip
    Michael M. Santiago via Getty Images via Getty Images
    Image attribution tooltip

    Colonial Pipeline hack highlights grid disruption risks even with IT-focused cyberattack

    While the risk of malware migrating from IT to OT may be minimal, if it were to happen, the effects could be devastating, experts said. 

    By Robert Walton • May 13, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Colonial Pipeline disconnects OT systems to silo ransomware IT threat

    Anxiety is rising among corporate security officials concerned about the impact of ransomware among critical infrastructure providers.

    By May 12, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA left in the dark during Colonial Pipeline's initial response

    With an agency mandate to share threat information with critical infrastructure, notification delays can stall industry response.

    By Samantha Schwartz • May 12, 2021
  • Image attribution tooltip
    Tim Boyle/Staff via Getty Images
    Image attribution tooltip

    Colonial Pipeline attack embodies security risk to nation's critical infrastructure

    Security experts warned for years about attacks against critical infrastructure, but one analyst called this the most brazen yet.

    By Updated May 10, 2021
  • Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Cryptocurrency fuels ransomware payments. Without regulation, it could get worse

    The rapid ascent of crypto, like other emerging technologies before it, has far outpaced the federal government's ability to regulate it.

    By Samantha Schwartz • May 7, 2021
  • Robots assemble Ford vehicles at the Chicago Assembly Plant on June 24, 2019 in Chicago, Illinois.
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Targeted industrial control systems add cautionary flag to cyber defense strategies

    A Defend Forward strategy used in the IT space may not translate well in the OT environment, according to panelists at the Hack the Capitol conference. 

    By May 6, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Passwordstate customers targeted with new round of phishing attacks

    The phishing email is asking customers to download a modified hotfix file, called Moserware.zip, from a content delivery network not controlled by Click Studios. 

    By April 29, 2021
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Cyberattack on Passwordstate tests confidence in password managers

    The supply chain attack is raising questions about how best to deploy and secure the tools as corporations face heightened threats across the globe.

    By April 27, 2021
  • Closeup side view of group of mid 20's mobile application developers testing the code and fixing the issues.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Codecov hack — likened to SolarWinds — targets software supply chain

    Third-party actors were able to linger inside the software-testing firm’s environment for months, exfiltrating customer data.

    By Updated April 30, 2021
  • Capitol Hill in Washington, D.C.
    Image attribution tooltip
    Permission granted by E.A. Crunden
    Image attribution tooltip
    Long-term SolarWinds consequences

    SolarWinds juggles stakeholders involved in response, recovery to level out business

    Reputation, risk issues and cross-sector cooperation demand a cohesive plan to ensure recovery and repair. It also helps to know the federal response.

    By Samantha Schwartz • April 22, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    25% of utilities exposed to SolarWinds hack amid growing ICS vulnerabilities, analysts say

    Security experts warn it may be too soon to tell whether follow-on activity has occurred.

    By Robert Walton • April 16, 2021
  • Image attribution tooltip
    Depositphotos
    Image attribution tooltip

    How IT can support security in the event of a cyberattack

    CIOs and CISOs operate as separate jobs leading different departments, but with work that overlaps. Who leads what in the event of an attack can become muddled. 

    By Jen A. Miller • April 13, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Payments industry faces potential 'destructive attacks,' Biden cybersecurity official warns

    Ransomware and infrastructure attacks are the biggest threats to the industry, a Biden administration cybersecurity official told the American Transaction Processors Coalition. 

    By Lynne Marek • April 9, 2021