Threats: Page 14


  • A bronze depiction of ancient god Medusa with snakes in her hair on a teal background.
    Image attribution tooltip
    Paul Campbell via Getty Images
    Image attribution tooltip

    Federal authorities warn MedusaLocker ransomware targeting remote desktop vulnerabilities

    The ransomware as a service group began targeting healthcare and other industries in 2019. In recent months, activity has surged once again.

    By July 1, 2022
  • Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Cash-strapped Main Street organizations face global cyberthreats

    A House subcommittee hearing in Michigan helped show the persistent risks faced by local schools, government agencies and Main Street businesses.

    By June 29, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Is your remote IT job candidate legit?

    Organizations are seeing a rise in deepfakes and stolen identities during the job application process, the FBI said.

    By Naomi Eide • June 29, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Ransomware groups shift tactics and objectives

    Malware can play a major or nonexistent role in ransomware attacks. Threat actors are often only in it for the money.

    By June 15, 2022
  • An aerial view on a sunny morning of several of San Francisco's most well known architectural landmarks. A backdrop of the skyscrapers and Bay Bridge behind them.
    Image attribution tooltip
    DianeBentleyRaymond via Getty Images
    Image attribution tooltip

    5 takeaways from the RSA Conference

    The event tried to pick up where it left off 28 months ago. Can defenders keep up with the accelerated pace and scale of the cyber threat?

    By June 13, 2022
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    America's cyber chiefs have a long to-do list

    The federal government wants to lead by example and communicate the urgency of the moment. First, it needs to get its security affairs in order. 

    By June 9, 2022
  • A group of demonstrators hold U.S. and Ukrainian flags as they march in support of Ukraine in its war against Russia.
    Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Threat hunters minimize Russia's cyber prowess

    U.S. organizations have a lot to learn from Ukrainian cyber defenders’ sophisticated resiliency during hostile conditions.

    By June 9, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Food supplier cyber risk spreads 1 year after JBS attack

    Ransomware attacks target common vulnerabilities like legacy OT systems and equipment that lacks modern security tools.

    By June 2, 2022
  • FBI Director Christopher Ray speaking at the annual Boston Conference on Cyber Security
    Image attribution tooltip

    Lee Pellegrini, Boston College

    Image attribution tooltip

    Russia, backed by ransomware gangs, actively targeting US, FBI director says

    The FBI is laser focused on preventing a destructive attack, FBI Director Christopher Wray said. The agency previously, helped to disrupt a 2021 Iran-backed attack on Boston Children’s Hospital. 

    By June 2, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Conti ransomware gang grows brash and flames out. What's next?

    The group's reported demise is likely a diversion. Members of the group still pose a significant ransom and data extortion threat to enterprises.

    By May 31, 2022
  • Futuristic city VR wire frame with group of people. This is entirely 3D generated image.
    Image attribution tooltip
    gremlin via Getty Images
    Image attribution tooltip

    Persistent vulnerabilities put VMware on the defense

    Recent flaws earned the company CISA's 10th emergency directive, the latest in a series of potential high-impact flaws for enterprise users.

    By May 27, 2022
  • High voltage towers in the dusk of the evening
    Image attribution tooltip
    yangphoto via Getty Images
    Image attribution tooltip

    Cybersecurity threat extends to utility credit ratings: Fitch

    Electric utilities, up against growing cyberthreats and poor security practices, "could result in negative rating actions," Fitch Ratings said.

    By Robert Walton • May 26, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Google Cloud positions itself as a 'standalone security brand'

    The platform reinforced its bid to become an all-inclusive security provider with forthcoming services for open source software and zero-trust architecture.

    By May 24, 2022
  • A Ukrainian flag is raised above a protest crowd
    Image attribution tooltip

    Photo by Mathias P.R. Reding from Pexels

    Image attribution tooltip

    Russian disinformation campaigns disrupt Ukraine narrative

    State-linked, foreign groups use social media and phishing to manipulate Ukraine citizens and western allies.

    By May 24, 2022
  • Lucia Milică Stacy, global resident CISO at Proofpoint
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    CISOs say they're at less risk of a substantial cyberattack

    A modest confidence boost and more deliberate security strategies follow two years of pandemic-induced chaos, a Proofpoint-sponsored survey found.

    By May 17, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    Enterprises rarely follow advice to never pay ransoms

    Ransomware foists a difficult choice on executives and very few leave business operations in limbo to test a best practice.

    By May 16, 2022
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    Emotet reemerges as top malware in circulation

    The botnet’s activity surged 2,823% between Q4 2021 and Q1 2022, displaying a more recent shift in targets, HP Wolf Security analysts said.

    By May 12, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    US, allies blame Russia for Viasat cyberattack

    The Five Eyes and other EU authorities linked Russia to a series of web defacement, DDoS and destructive wiper attacks in the weeks leading up to the Ukraine invasion.

    By May 11, 2022
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    SEO-savvy threat actors drive surge in malware downloads

    Cybercriminals flooded Google and Bing with malicious PDF files that contain commonly searched keywords, resulting in a 450% annualized increase in phishing downloads.

    By May 10, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Threat actor launches email attacks to lift corporate M&A secrets, Mandiant says

    The suspected threat actor, UNC3524, lurks in victim environments for at least 18 months.

    By May 5, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Ukraine cyberthreat activity ramps up against critical infrastructure, governments

    Researchers say state-linked and criminal activity has risen in recent weeks.

    By May 4, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Familiar names top 2021's most-exploited vulnerabilities list

    Top ransomware operators, including Hive and Conti, are exploiting flawed systems to launch new attacks, researchers warn.

    By May 2, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Ransomware attacks, payouts soared worldwide in 2021: report

    More organizations are paying ransoms as attacks grow in sophistication.

    By April 27, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Emotet botnet tests new techniques after global crackdown

    The once prolific botnet, returning from "spring break," is preparing a new high-volume campaign, Proofpoint researchers said. 

    By April 26, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    HHS warns providers of 'exceptionally aggressive' ransomware group

    The Hive group practices double extortion — demanding payment to free data it has encrypted while also threatening to release the unencrypted data publicly.

    By Shannon Muchmore • April 25, 2022