Threats: Page 13


  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    The same old problems nag cybersecurity professionals

    Technical complexities abound as the perceived level of risk rises in an unrelenting fashion.

    By Aug. 17, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    How attackers are breaking into organizations

    Threat actors lean heavily on phishing attacks, vulnerabilities in software and containers, and stolen credentials, according to top cyber vendor research.

    By Aug. 15, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Critical flaws on widely used Cisco firewalls left unpatched for months

    Most of the vulnerabilities allow attackers to execute arbitrary code, Rapid7 researchers said.

    By Aug. 12, 2022
  • Chris Krebs, former director of the Cybersecurity and Infrastructure Security Agency, testifies on Capitol Hill, October 19, 2017 in Washington, DC.
    Image attribution tooltip
    Drew Angerer/Getty Images via Getty Images
    Image attribution tooltip

    Don’t count on government, tech vendors to fix security woes, former CISA chief Krebs says

    The state of cybersecurity is bad and it’s going to get worse, Chris Krebs said at Black Hat. But somehow things might eventually get better.

    By Aug. 10, 2022
  • Team of data center system administrators and IT specialists use laptop and tablet computers.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    AWS, Splunk lead open source effort to spot and curb cyberattacks

    A broad group of 18 tech companies are collaborating to establish a less cumbersome model for cybersecurity defense coordination.

    By Aug. 10, 2022
  • A sample phishing text message that targeted Cloudflare employees.
    Image attribution tooltip

    Cloudflare

    Image attribution tooltip

    Cloudflare thwarts ‘sophisticated’ phishing attack strategy that bruised Twilio

    Dissimilar responses from Cloudflare and Twilio bear important lessons in transparency, resiliency and access.

    By Aug. 9, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    The 11 most-prevalent malware strains of 2021 fuel cybercrime

    Cybercriminals remain the most prolific users of malware, wielding these top strains to deliver ransomware and steal data.

    By Aug. 5, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Ransomware defense guidance risks hang-ups under many steps

    Small and mid-sized businesses don’t typically have the resources to meet every safeguard. But every action, however small, helps.

    By Aug. 4, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Threat actors hide malware in legitimate — and high profile — applications

    Researchers from VirusTotal show how attackers use social engineering techniques to launch malicious attacks behind trusted applications.

    By Aug. 3, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Initial access brokers selling online access to unsuspecting MSPs

    The ads for initial access to MSPs follow warnings from the FBI, CISA and intelligence partners from the Five Eyes.

    By Aug. 2, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    Most cyberattacks come from ransomware, email compromise

    Attackers are scanning for vulnerabilities in unpatched systems within 15 minutes, stressing the pace and scale of the threat.

    By Aug. 1, 2022
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Threat actors shifting tactics as Microsoft blocks, unblocks and reblocks macros

    Proofpoint researchers say criminal hackers are turning to container files and Windows shortcuts to distribute malware.

    By July 29, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Mandiant red team breaches OT servers to mimic crime group techniques

    Researchers are not aware of financially motivated actors using these techniques in the wild.

    By July 27, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    New ransomware discovered using Rust, atypical encryption

    Luna’s use of platform-agnostic code allows threat actors to initiate attacks on different operating systems concurrently.

    By July 20, 2022
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    LockBit ransomware hitting network servers

    The latest tactic used to deploy the prolific malware allows threat actors to end processes, stop services and duplicate more quickly.

    By July 20, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    State-backed threat actors use Google Drive, Dropbox to launch attacks

    The Russia-linked threat actor behind the SolarWinds attack used cloud storage services to deploy malicious payloads using Cobalt Strike. 

    By July 19, 2022
  • Huawei logo depicted on side of building at company's campus in Dongguan, China.
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    US effort to rip and replace hardware made in China is ballooning in cost

    A yearslong push to remove telecom equipment deemed a national security threat continues to vex regulators.

    By July 18, 2022
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    CISA releases indicators of compromise for hard-hit VMware Horizon

    Federal authorities warn a more complex form of malware is providing advanced persistent threat actors with vast command and control capabilities.

    By July 18, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Cyber insurers split on what’s most important in a security posture assessment

    To keep up with demand, cyber insurers acknowledge the need to rethink the underwriting process, research from Panaseer shows.

    By Naomi Eide • July 15, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Threat actors favor brute force attacks to hit cloud services

    Google Cloud warned that organizations face their greatest threat due to weak passwords and vulnerable software.

    By July 12, 2022
  • Group of young business people discussing with colleagues on video conference on meeting.
    Image attribution tooltip
    vgajic via Getty Images
    Image attribution tooltip
    Opinion

    How CISOs can prepare for new and unpredictable cyberthreats

    CISOs often ask, “How do I avoid being hit by the next major cyberattack?” The problem is, that’s the wrong question.  

    By Jeremy D’Hoinne • July 11, 2022
  • A person works next to a 5G logo.
    Image attribution tooltip
    David Ramos/Getty Images via Getty Images
    Image attribution tooltip

    What to watch with 5G network security

    For wireless network carriers, 5G is a model of what’s next. But it also introduces features and services that dramatically expand the threat surface.

    By July 8, 2022
  • A representation of blockchain technology
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Hive ransomware group migrates code to Rust, accelerating data encryption

    Microsoft warns the newly discovered variant of one of the most prevalent ransomware payloads can process large amounts of data more quickly.

    By July 6, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Threat actors capitalize on red team tool capable of bypassing EDR, antivirus

    A malware sample uploaded to VirusTotal contained a malicious payload Brute Ratel C4. Upon evaluation, 56 vendors gave it a clean bill of health.

    By July 6, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Google TAG exposes hack-for-hire groups targeting activists and sensitive data

    The organizations have operated in regions across the globe, with some openly advertising their services.

    By July 5, 2022