Threats: Page 14


  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers using TrueBot malware for phishing attacks in US, Canada, officials warn

    Threat actors have been leveraging a known vulnerability in Netwrix Auditor to exfiltrate data from targeted entities since May.

    By July 7, 2023
  • Petro-Canada has more than 1,500 retail locations across the nation of Canada.
    Image attribution tooltip
    Courtesy of Suncor
    Image attribution tooltip

    Petro-Canada reports service restoration after suspected Suncor breach

    The gas station chain restored card payments, but hasn’t shared specific details about the disruption. The industry has been under threat from state-linked actors. 

    By June 29, 2023
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI linked to new crop of business email scams

    Businesses can no longer count on bad spelling and grammar to red-flag problem emails: Fraudsters are using AI to craft well-written email messages at scale.

    By Alexei Alexis • June 29, 2023
  • Rubrik and Microsoft will partner on an agreement to speed incident response using AI and natural language processing.
    Image attribution tooltip
    Permission granted by Rubrik
    Image attribution tooltip

    Rubrik, Microsoft partner to leverage generative AI for faster incident response

    The collaboration will integrate Rubrik Security Cloud with Microsoft Sentinel and Azure OpenAI Service.

    By June 28, 2023
  • An empty classroom shows rows of desks with one desk the focus of the camera's lens. On the desk is a notebook and pencil.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How are states supporting K-12 cybersecurity amid growing threats?

    As state efforts slowly ramp up to help struggling districts, they alone can’t completely remedy cybersecurity risks, one ed tech expert said.

    By Anna Merod • June 23, 2023
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    HHS warns industry about resurfaced ransomware group after attack on cancer center

    In a cybersecurity notification, the department warned the sector about TimisoaraHackerTeam, or THT, after an attack on a U.S. cancer center that “significantly reduced” its capability to treat patients.

    By Emily Olsen • June 21, 2023
  • Swarm of barracuda
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Barracuda ESG devices actively exploited in broad, ongoing espionage campaign

    The campaign is the broadest by a China-nexus actor since the mass exploitation of Microsoft Exchange in 2021, Mandiant researchers said.

    By Updated June 15, 2023
  • A signage of Microsoft is seen on March 13, 2020 in New York City.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft review of Azure outage shows spike in HTTP requests as researchers blame DDoS

    The Azure incident followed a series of outages in Outlook, OneDrive and other services last week. An alleged hacktivist group claimed responsibility for DDoS attacks.

    By June 14, 2023
  • The Microsoft logo is displayed outside the Microsoft Technology Center near Times Square.
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Microsoft says Azure disrupted after a week of repeated service outages

    The vendor is still investigating claims of DDoS attacks by a hacktivist group called Anonymous Sudan, after OneDrive, Outlook and other services were disrupted.

    By June 12, 2023
  • A logo sits illuminated outside the Microsoft pavilion on the opening day of the World Mobile Congress at the Fira Gran Via Complex on February 22, 2016 in Barcelona, Spain.
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Microsoft investigating threat actor claims following multiple outages in 365, OneDrive

    A hacktivist group known as Anonymous Sudan has claimed to be involved in DDoS attacks.

    By June 9, 2023
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber insurance market is stabilizing as growth remains certain, Moody’s says

    Escalating price increases have moderated as the business has become profitable. Insurance firms are placing tight controls regarding cyber hygiene practices.

    By June 8, 2023
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercriminals target C-suite, family members with sophisticated attacks

    A study by BlackCloak and Ponemon shows senior executives are being targeted for IP theft, doxxing and extortion, often through home office networks.

    By June 5, 2023
  • Gas turbine electric power plant in blue hour.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s cites credit risk from state-backed cyber intrusions into US critical infrastructure

    Key sectors could face short-term revenue impacts and long-term reputational harm and litigation risk, the credit ratings service said.

    By May 31, 2023
  • sand dunes on the florida coast
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ahead of summer holiday weekends, IT security leaders brace for deliberate cyber mischief

    Recent history shows holiday weekends and vacations provide an attack surface bonanza for threat actors.

    By May 26, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SMBs, regional MSPs under fire from targeted phishing attacks

    Sophisticated cybercriminals are attacking vulnerable target rich and resource poor organizations to reach secondary victims via phishing campaigns, Proofpoint researchers warn.

    By May 24, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    BEC attacks rise as criminal hackers employ new tactics to evade detection

    Threat actors are using cybercrime as a service to grow industrial strength campaigns and leveraging residential IP addresses.

    By May 23, 2023
  • Street shot of Microsoft logo outside of a building at 2015 Microsoft Build Conference on April 29, 2015 at Moscone Center in San Francisco, California.
    Image attribution tooltip
    Stephen Lam via Getty Images
    Image attribution tooltip

    Criminal actors switch tactics after Microsoft began to block macros last year

    Researchers from Proofpoint have seen a rise in HTML smuggling, PDFs and OneNote files for malware delivery since late 2022.

    By May 12, 2023
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware insurance claims jump back up

    Ransomware claims filed by U.S. clients of insurance broker Marsh spiked 77% in the first quarter, following a downward trend in 2022.

    By Alexei Alexis • May 10, 2023
  • Lucia Milică Stacy, global resident CISO at Proofpoint
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    CISO anxiety returns amid heightened concern of material cyberattacks

    A report by Proofpoint shows a brief sense of calm about cyber has slipped away amid rising fears of economic uncertainty and insider threats.

    By May 9, 2023
  • Western Digital and Wired host "A Data-Driven Future: The Future of Mobility and Transportation in 2039."
    Image attribution tooltip
    Ian Tuttle via Getty Images
    Image attribution tooltip

    Western Digital confirms customer data accessed by hackers in attack

    The company has begun notifying customers about stolen data and expects to restore its online store next week.

    By May 8, 2023
  • Exterior of the Moscone Center during the RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Companies need a wakeup call to fix chronic security shortcomings, cyber experts say

    One researcher wonders if the industry needs another Snowden-like moment to spring organizations into action.

    By May 3, 2023
  • Merck sign
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders

    A court victory in the closely watched insurance case is expected to stabilize a turbulent market and provide some assurance for organizations amid a rise in nation-state activity.

    By May 3, 2023
  • RSA Conference 2023 banner at Moscone Center in San Francisco on April 25, 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    3 areas of generative AI the NSA is watching in cybersecurity

    Generative AI is a “technological explosion,” NSA Cybersecurity Director Rob Joyce said. While it is game changing, it hasn’t yet delivered. 

    By May 1, 2023
  • A man faces multiple computer screens.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Organizations are boosting resilience, getting faster at incident response

    While the number of data security incidents remained level between 2021 and 2022, companies improved recovery thanks to stronger security measures, BakerHostetler found.

    By May 1, 2023
  • Brain icon symbolizing AI in center of photo surrounded by other icons representing the potential widespread use of AI in technology
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Teenagers, young adults pose prevalent cyberthreat to US, Mandiant says

    The brains behind high-profile attacks last year, teenagers and young adults use sophisticated social engineering techniques for intrusions.

    By April 25, 2023