Threats


  • Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images

    Feds want businesses to report cyberattacks — the agency doesn't matter

    The FBI's Bryan Vorndran compared a cyberattack to a house robbery: Law enforcement assists with attack response while CISA is representative of an alarm company tasked with prevention. 

    By Jan. 14, 2022
  • Image attribution tooltip
    da-kuk via Getty Images

    Google Drive, OneDrive top cloud apps for malware delivery: report

    Netskope's findings are based on blocked malware, so the hacker's attempts to get a user to open a malicious download were initially successful. 

    By Jan. 12, 2022
  • Image attribution tooltip
    Poike via Getty Images

    NY attorney general probes widespread credential stuffing, 17 companies affected

    The OAG worked with the impacted companies to uncover how threat actors bypassed security safeguards, which led almost all the companies to strengthen security controls.

    By Jan. 6, 2022
  • Image attribution tooltip
    RobertPetrovic via Getty Images

    What threats 4 security professionals are watching over the holidays

    With SOCs down a few people, the time away will test processes and technology. 

    By Dec. 23, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Opinion

    Beyond backup: Modern ransomware coercion tactics and how to detect them before it is too late

    Despite lots of ransomware advice centering on backing up files and systems, it's important to remember that precursors to ransomware can be identified and attacks disrupted, the author writes. 

    By George Glass • Dec. 9, 2021
  • Image attribution tooltip
    Traitov/iStock/Getty via Getty Images

    Is the security of legacy IT providers prompting a confidence crisis?

    Research commissioned by CrowdStrike found security professionals are losing confidence in providers like Microsoft amid the rise in supply chain attacks. Microsoft has thoughts. 

    By Dec. 8, 2021
  • Image attribution tooltip
    DKosig via Getty Images

    A year later, Nobelium-linked threat actors still target businesses, government

    Threat actors seeking sensitive data are compromising CSPs and MSPs to go after Microsoft 365 and Azure AD environments, Mandiant found. 

    By Dec. 6, 2021
  • Image attribution tooltip
    DKosig via Getty Images

    Insurer Lloyd's slashes coverage on state-sponsored cyberattacks, reflecting battered market

    The limits for state-sponsored attack coverage comes at a time when nation-state activity and ransomware linked to foreign threat actors is surging.

    By Dec. 3, 2021
  • Image attribution tooltip
    Brandon Bell via Getty Images

    Majority of US retailers, critical infrastructure unscathed after holiday cyber warnings

    Industry averted a major cyber incident amid warnings from the FBI and CISA, though home furnishings retailer Ikea fought to contain a sophisticated phishing attack.

    By Nov. 30, 2021
  • Image attribution tooltip
    sefa ozel via Getty Images
    Opinion

    3 ways the cybercriminal business is changing

    Now that ransomware has been thrust into the limelight, cybercriminals are adjusting their business models. Here is what enterprises need to know.

    By Robert McArdle • Nov. 29, 2021
  • Image attribution tooltip
    DKosig via Getty Images

    The value of threat modeling in an evolving security landscape

    The flow of information is more unpredictable than it was just a few years ago, so the threat modeling that was once used doesn't work today. 

    By Sue Poremba • Nov. 29, 2021
  • Image attribution tooltip
    vchal via Getty Images

    Enterprises prepare for ransomware threats during Thanksgiving

    Retail, transportation and other sectors are bracing for heightened cyber risks, placing renewed pressure on security operations. 

    By Nov. 22, 2021
  • Image attribution tooltip

    Fit Ztudio/Shutterstock

    Sponsored by Druva

    Data resilience: The new frontier of modern day protection

    With data under constant stress, now is the time to shift from data protection to data resiliency.

    By Stephen Manley, CTO, Druva • Nov. 22, 2021
  • Image attribution tooltip
    Scott Olson via Getty Images

    ICS security investments blocked by management confusion

    Until cyber risks in operational technology are better understood — and IT and OT can overcome cultural differences — companies can stall additional investments.  

    By Nov. 10, 2021
  • Image attribution tooltip
    Kena Betancur via Getty Images

    Ransomware actors attempt to toy with stock valuation, disrupt M&A, FBI says

    The agency warns that threat actors are trying to access time sensitive information in order to force targeted companies into making fast decisions on whether to pay a ransom. 

    By Nov. 3, 2021
  • Image attribution tooltip
    Spencer Platt via Getty Images

    Most companies dealing with employee misuse of business apps: report

    Nearly half of organizations say they lack the ability to see how remote workers are using business applications that contain high-value data.

    By Nov. 2, 2021
  • Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Deep Dive

    Hackers could crash the US power grid, but money, not sabotage, is their focus

    For now, the capability remains in the hands of nation-state actors. But "sophistication can ultimately be bought," Edison Electric Institute's Scott Aaronson said.

    By Robert Walton • Nov. 2, 2021
  • Image attribution tooltip
    Joe Raedle via Getty Images

    SolarWinds threat actor targets cloud services, Microsoft 365 mailboxes

    The threat actor is using a tactic called EWS impersonation to target mailboxes in Microsoft 365 and is also using cloud service providers to target end users, Mandiant researchers said. 

    By Nov. 1, 2021
  • Image attribution tooltip
    Dan Kitwood / Staff via Getty Images

    Identity crisis: Why ransomware groups rebrand — and disappear

    Criminals are not known for telling the truth, but what they say is usually the only explanation for a disappearance. Even if it is a lie.

    By Oct. 28, 2021
  • Image attribution tooltip
    "SEC" by SEC is licensed under CC BY 2.0

    Cyberattacks spur demand for cyber insurance: Moody's

    "This is a critical area that we're challenged with," Securities and Exchange Commission Chair Gary Gensler said, describing the agency’s sharper focus on cyber risk.

    By Jim Tyson • Oct. 22, 2021
  • Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images

    Federal agencies warn of ransomware targeting water, wastewater treatment plants

    Months after the attack on a Florida water treatment plant, the FBI, CISA and other agencies are concerned about a new round of threats to vulnerable municipal sites.

    By Oct. 18, 2021
  • Image attribution tooltip
    Dan Kitwood/Getty Images News via Getty Images

    2021 ransomware bitcoin activity eclipses last year, Treasury finds

    The number of suspicious activity report transactions is already up 30% over 2020 numbers and the agency has tracked billions of dollars in outgoing bitcoin payments potentially linked to ransomware.

    By Oct. 18, 2021
  • Image attribution tooltip
    sestovic/E+/Getty via Getty Images

    Cybersecurity tool sprawl leading to burnout, false positives: report

    Security operations teams are wasting time on false alerts due to managing a high number of tools that don't interact well with each other, Trend Micro found.

    By Oct. 13, 2021
  • Image attribution tooltip
    Carl Court via Getty Images

    Insider threat environment faces challenges amid changing corporate landscape

    As remote work becomes permanent and employee turnover rises, companies face additional challenges in protecting sensitive data, according to a panel discussion at Mandiant Cyber Defense Summit.

    By Oct. 6, 2021
  • Image attribution tooltip

    Markus Spiske

    NIST urges supply chain to include cyber in risk management

    Industries that rely heavily on technology are the best at incorporating cyber in their supply chain risk management plans, according to NIST's Jon Boyens.

    By Oct. 5, 2021