Cyberattacks: Page 43


  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Malwarebytes attack linked to SolarWinds' nation-state actors, CEO says

    Microsoft notified the cybersecurity firm of a compromise involving Office 365 and Azure consistent with prior nation-state attacks.

    By Jan. 20, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Symantec spots 4th malware related to SolarWinds hack

    Raindrop took on the role of the memory-only dropper Teardrop for organizations of greater interest to the hackers.

    By Samantha Schwartz • Jan. 19, 2021
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Mimecast attributes supply chain attack to SolarWinds' hackers

    The global email security provider was hit by a malicious attack that compromised a certificate used to authenticate some Microsoft 365 products. 

    By Updated Jan. 26, 2021
  • quantum internet cyber
    Image attribution tooltip
    Samoilov, Yuri, yuri.samoilov.online/. (2014). "System Lock" [Photograph]. Retrieved from Flickr.
    Image attribution tooltip

    Hackers accessed cloud services using phishing, 'pass-the-cookie' attacks, CISA says

    In one case, the agency found threat actors accessed a user's account "with proper multi-factor authentication," circumventing the favored security method. 

    By Samantha Schwartz • Jan. 14, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SolarWinds initially hacked in September 2019, 3rd malware found

    In a new timeline, SolarWinds said hackers likely began testing the malicious code months before the backdoor was deployed.

    By Samantha Schwartz • Jan. 12, 2021
  • Attackers used password spraying, guessing in SolarWinds hack

    As experts investigate the damage, the latest CISA update points to a constant in cybersecurity: weak passwords.

    By Samantha Schwartz • Jan. 11, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Chris Krebs, Alex Stamos join SolarWinds for hack cleanup

    SolarWinds has tapped two high-profile and outspoken security experts to guide its efforts to evolve into a more secure software development company.

    By Samantha Schwartz • Jan. 8, 2021
  • Report: Officials investigating possible role of SolarWinds' vendor in compromise

    The investigation is centered around whether JetBrains' software development tools are a conduit for compromise. The company has said it is unaware of the investigation. 

    By Samantha Schwartz • Jan. 7, 2021
  • SolarWinds attack leads to renewed focus on IT relationships with corporate boards

    Corporate governance and cybersecurity experts say IT officials need to clearly and regularly communicate potential risks and liabilities ahead of the next crisis. 

    By Jan. 7, 2021
  • Federal task force says Russia likely actor behind SolarWinds attack

    As investigations continue, agencies are working to preserve private-sector trust.

    By , Samantha Schwartz • Jan. 5, 2021
  • Jen Ryder, a nurse in St. Louis, prepares to administer a COVID-19 vaccine on Monday, Dec. 14. Hospitals across the country started to receive the first doses Monday.
    Image attribution tooltip

    Samantha Liss, Healthcare Dive

    Image attribution tooltip

    Healthcare cyberattacks spiked 45% since November, report finds

    While most ransomware has a broad sector target, Check Point found Ryuk is tailored toward targets in the healthcare industry.

    By Samantha Schwartz • Jan. 5, 2021
  • Fast-growing gaming industry faces rising threat of account compromise

    A report from KELA shows one million compromised accounts and thousands of leaked employee credentials in underground markets. 

    By Jan. 5, 2021
  • Full impact of SolarWinds attack begins to emerge across tech sector, federal agencies

    Several leading technology companies and other organizations are evaluating the impact of the SolarWinds breach and other recent nation-state attacks. 

    By Dec. 23, 2020
  • Joe Biden
    Image attribution tooltip
    Retrieved from Gage Skidmore/Flickr.
    Image attribution tooltip

    Biden says US must treat cyberattacks with same 'seriousness of purpose' as weapons

    As the president-elect prepares to take office in January, his administration faces one of the largest hacks on federal agencies. 

    By Samantha Schwartz • Dec. 23, 2020
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SolarWinds breach reminds companies to be proactive in managing trust, disclosure

    Legal and forensics experts warn CISOs about supply chain monitoring and transparency amid fallout from historic attack. 

    By Dec. 22, 2020
  • new orleans
    Image attribution tooltip
    Williams, Antrell. (2015). "New Orleans Skyline" [Photograph]. Retrieved from Flickr.
    Image attribution tooltip

    New Orleans leaders share lessons from 2019 cyberattack

    CIO Kimberly LaGrue said early preparations were key to preventing disaster and recovering without paying a ransom to the hackers.

    By Chris Teale • Dec. 21, 2020
  • Tracking SolarWinds cyberattack fallout, play-by-play

    As more companies are discovering impact from the SolarWinds hack, attention is turning toward far-reaching supply chain vulnerabilities. 

    By Samantha Schwartz , , Naomi Eide , Updated Jan. 4, 2021
  • CISA warns of more backdoors beyond SolarWinds Orion

    The extent of compromised data is not disclosed. What is clear? Threat actors relied on the supply chain for widespread access.

    By Samantha Schwartz • Dec. 17, 2020
  • Federal agencies fall short on cybersecurity, undermining standards

    The SolarWinds hack could change how industry coordinates response to future cyberattacks.

    By Samantha Schwartz • Dec. 17, 2020
  • Feds require banks to report cyberattacks within 36 hours

    The rule, taking effect May 1, requires bank technology vendors to immediately notify customers if an incident disrupted services four hours or more.

    By Dan Ennis • Updated Nov. 19, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    FireEye killswitch stops SolarWinds hack

    After identifying the supply chain attack against SolarWinds, the security firm partnered with Microsoft and GoDaddy to block malware from further operation.

    By Dec. 16, 2020
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Microsoft to begin blocking binaries linked to SolarWinds cyberattack

    Microsoft Defender Antivirus will quarantine the trojan before it can begin processing, though the company said "it may not be simple to remove the product from service."

    By Samantha Schwartz • Dec. 16, 2020
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SolarWinds Orion vulnerability: What security teams need to know

    As SolarWinds and investigators seek answers on the extent of the Orion vulnerability's impact, experts say the attack raises broader questions about readiness.

    By Dec. 15, 2020
  • SolarWinds Orion flaw linked to government cyberattacks

    The Cybersecurity and Infrastructure Agency called on all federal civilian agencies to review their networks for evidence of compromise and to disconnect or power off SolarWinds Orion products immediately. 

    By Dec. 14, 2020
  • Teenage girl studying with video online lesson at home family in isolation covid-19. Homeschooling and distance learning
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Federal agencies warn of heightened cyberthreats against K-12 schools

    Cyberattackers are trying to steal data and disrupt remote learning as COVID-19 continues to impact schools, the FBI, CISA and MS-ISAC said. 

    By Dec. 11, 2020