Threats


  • Group of employees at a table
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Average insider cyberthreat cost spikes 40% in 4 years

    Outsmarting insiders is a “go-to tactic” for many cyberattackers looking to steal credentials and gain access to critical data, the Ponemon Institute found.

    By Alexei Alexis • Sept. 22, 2023
  • Chatbot conversation. Person using online customer service with chat bot to get support. Artificial intelligence and CRM software automation technology. Virtual assistant on internet.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    AI is entering the enterprise application security tool stack

    Reports from Gartner and Rackspace show a broad enterprise appetite to weave AI into the tool stack, especially across application security.

    By Sept. 20, 2023
  • Brightly colored digital lock with central computer processor and futuristic circuit board. Explore the Trendline
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    High-profile cybersecurity incidents and a rush to adopt new technologies illustrate the tumultuousness of 2023 so far.

    By Cybersecurity Dive staff
  • FBI Director Chris Wray addresses the 2023 mWISE Conference from Mandiant.
    Image attribution tooltip
    Courtesy of Mandiant
    Image attribution tooltip

    FBI director urges private sector to work with the agency on cyber threats

    Christopher Wray told attendees at Mandiant’s mWISE 2023 private sector assistance contributed to the success of several recent operations.

    By Sept. 19, 2023
  • Sand slipping through hands cupped together.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip
    Deep Dive

    Security has an underlying defect: passwords and authentication

    Cyberattacks are fueled by the shortcomings of business authentication controls. Bad things happen when access falls apart and credentials land in the wrong hands.

    By Sept. 18, 2023
  • Closeup of a hotel bed and nightstand with a lamp
    Image attribution tooltip
    Hohenhaus via Getty Images
    Image attribution tooltip

    Generative AI, contactless tech make hotels vulnerable to cyberattacks

    Guest and worker turnover, as well as new technology adoption, make the hospitality industry an appealing target for cybercriminals, according to Trustwave SpiderLabs.

    By Noelle Mateer • Sept. 8, 2023
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Ransoming Linux and ESXi systems is getting easier

    Threat actors are using memory-safe languages to release payloads for Windows, Linux and ESXi simultaneously, SentinelOne researchers warn.

    By Aug. 24, 2023
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip

    Barracuda ESG zero-day exploit still under way after patches fail

    The FBI said users need to isolate and replace affected appliances as threat actors continue to target the remote command injection vulnerability.

    By Aug. 24, 2023
  • Image attribution tooltip
    Getty Images / Staff via Getty Images
    Image attribution tooltip

    Hackers target Pentagon contract site via compromised routers

    Research from Black Lotus Labs says the new activity aligns with recent state-linked campaigns, including Volt Typhoon.

    By Aug. 23, 2023
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    How disjoined threat intelligence limits companies — and what to do about it

    There’s no shortage of research on attackers, but for many CISOs, turning those insights into action is a difficult endeavor.

    By Aug. 15, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Valid account credentials are behind most cyber intrusions, CISA finds

    The success rate of these techniques underscores the staying power of the most common methods threat actors use to gain initial access to targeted systems.

    By July 28, 2023
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    TSA revises security directives for oil and gas pipelines to test resilience

    The updated requirements come amid heightened threats and security incidents, including the recent attack against Suncor Energy in Canada.

    By July 27, 2023
  • Activision
    Image attribution tooltip
    jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft attackers may have data access beyond Outlook, researchers warn

    Microsoft is pushing back on claims by Wiz that compromised private encryption keys may have exposed SharePoint, Teams and OneDrive data to an APT actor.

    By July 21, 2023
  • cybersecurity cfos evaluate and prioritize data protection
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    DDoS attacks, growing more sophisticated, surged in Q2

    One of the more serious incidents used a Mirai-variant botnet to unleash an ACK flood DDoS attack that peaked at 1.4 terabits per second, Cloudflare found.

    By July 19, 2023
  • Microsoft logo on buidling
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Microsoft offers free security logs amid backlash from State Department hack

    Federal officials and rivals blasted the company for charging customers for additional security features.

    By July 19, 2023
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    gorodenkoff/iStock via Getty Images
    Image attribution tooltip

    White House unveils consumer labeling program to strengthen IoT security

    The voluntary program is designed to protect millions of consumers and remote workers amid increased threat activity against smart home and IoT devices.

    By July 18, 2023
  • CFOs play a key role in advocating for preventative cybersecurity actions that help reduce the cost of cyber risks.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Rockwell Automation, Honeywell warned of critical vulnerabilities in industrial products

    Authorities and researchers warn that attackers could exploit the vulnerabilities for remote takeover and potentially destructive activity.

    By July 14, 2023
  • A building showing in the sun with a sign out front that says U.S. State Department.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Microsoft warns China-linked APT actor hacked US agency, other email accounts

    U.S. officials alerted Microsoft about what emerged as a targeted, monthlong hacking campaign.

    By July 12, 2023
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    RomCom uses Word documents in new phishing campaign, Microsoft warns

    The hackers are known to use trojanized versions of legitimate software from Adobe, SolarWinds, KeePass and others.

    By July 12, 2023
  • Digital binary code on dark green background.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    JumpCloud abruptly initiates mass API key reset

    The company did not specify the nature of the incident, but the sudden decision to reset all API keys could indicate something is amiss, one expert said.

    By July 10, 2023
  • Telecom network above a city
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Threat group testing more sophisticated DDoS hacks, authorities warn

    Hacktivists behind the attacks on Microsoft OneDrive and Azure are claiming recent test disruptions at Stripe, Reddit and EFTPS.  

    By July 10, 2023
  • Person working on servers in a server room.
    Image attribution tooltip
    baranozdemir via Getty Images
    Image attribution tooltip
    Sponsored by Elastic

    Forecasts and recommendations: Elastic 2023 Global Threat Report Spring

    This report summarizes threat trends, forecasts and recommendations based on analysis of millions of real-world telemetry events shared by users around the world.

    By Devon Kerr • July 10, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Hackers using TrueBot malware for phishing attacks in US, Canada, officials warn

    Threat actors have been leveraging a known vulnerability in Netwrix Auditor to exfiltrate data from targeted entities since May.

    By July 7, 2023
  • Petro-Canada has more than 1,500 retail locations across the nation of Canada.
    Image attribution tooltip
    Courtesy of Suncor
    Image attribution tooltip

    Petro-Canada reports service restoration after suspected Suncor breach

    The gas station chain restored card payments, but hasn’t shared specific details about the disruption. The industry has been under threat from state-linked actors. 

    By June 29, 2023
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    AI linked to new crop of business email scams

    Businesses can no longer count on bad spelling and grammar to red-flag problem emails: Fraudsters are using AI to craft well-written email messages at scale.

    By Alexei Alexis • June 29, 2023
  • Rubrik and Microsoft will partner on an agreement to speed incident response using AI and natural language processing.
    Image attribution tooltip
    Permission granted by Rubrik
    Image attribution tooltip

    Rubrik, Microsoft partner to leverage generative AI for faster incident response

    The collaboration will integrate Rubrik Security Cloud with Microsoft Sentinel and Azure OpenAI Service.

    By June 28, 2023