Threats: Page 16


  • Amtrak Coast Starlight Train
    Image attribution tooltip
    Laser1987 via Getty Images
    Image attribution tooltip

    Threat actors pressure OT, critical infrastructure by leaking sensitive data

    Mandiant research shows threat actors exposing highly sensitive data amid increased attacks against industrial targets.

    By Feb. 2, 2022
  • Image attribution tooltip
    Martyn Aim via Getty Images
    Image attribution tooltip

    Conflict over Ukraine raises cyber risk for US enterprises

    A diplomatic standoff with Russia threatens to drag U.S. companies and critical infrastructure into wider security crisis that could echo NotPetya. 

    By Feb. 1, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Cyberthreat trends to watch in 2022

    Cybercriminals are finding ways to manipulate corporate data, and for that problem, there really is no end in sight.

    By Sue Poremba • Jan. 31, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    3 tactics shaping ransomware mitigation in 2022

    Though businesses have become more confident in preventing ransomware attacks, confronting risk is an internal commitment.

    By Samantha Schwartz • Jan. 31, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    DHS warns local authorities, critical infrastructure providers over potential Russia threat

    As tensions rise over a possible incursion into the Ukraine, federal authorities say Russia may launch direct cyberattacks against targets in the U.S. 

    By Jan. 25, 2022
  • Image attribution tooltip
    Sam Wasson via Getty Images
    Image attribution tooltip

    Careless employees behind the majority of insider threat incidents: report

    Insider cybersecurity threats continue to rise — and it's partially due to employee apathy. 

    By Samantha Schwartz • Jan. 25, 2022
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Boards, CISOs seek alignment on OT security challenges

    CISOs at industrial companies should inform senior leadership of the unique risks and challenges of potential ransomware and supply chain attacks.

    By Jan. 24, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip
    Opinion

    It's time to focus on critical infrastructure systems security

    Cyber-physical systems running on legacy infrastructure are ideal attack surfaces for malicious actors. 

    By Katell Thielemann • Jan. 24, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Ukraine tensions raise cyberthreats against US companies, critical infrastructure

    CISA is urging companies to prepare for cyber activity as an offensive malware that can wipe hard drives clean spreads in Ukraine.

    By Jan. 21, 2022
  • The seal of the FBI
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip

    Feds want businesses to report cyberattacks — the agency doesn't matter

    The FBI's Bryan Vorndran compared a cyberattack to a house robbery: Law enforcement assists with attack response while CISA is representative of an alarm company tasked with prevention. 

    By Samantha Schwartz • Jan. 14, 2022
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Google Drive, OneDrive top cloud apps for malware delivery: report

    Netskope's findings are based on blocked malware, so the hacker's attempts to get a user to open a malicious download were initially successful. 

    By Samantha Schwartz • Jan. 12, 2022
  • A person holds a credit card in front of a laptop computer.
    Image attribution tooltip
    Poike via Getty Images
    Image attribution tooltip

    NY attorney general probes widespread credential stuffing, 17 companies affected

    The OAG worked with the impacted companies to uncover how threat actors bypassed security safeguards, which led almost all the companies to strengthen security controls.

    By Samantha Schwartz • Jan. 6, 2022
  • Image attribution tooltip
    RobertPetrovic via Getty Images
    Image attribution tooltip

    What threats 4 security professionals are watching over the holidays

    With SOCs down a few people, the time away will test processes and technology. 

    By Samantha Schwartz • Dec. 23, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip
    Opinion

    Beyond backup: Modern ransomware coercion tactics and how to detect them before it is too late

    Despite lots of ransomware advice centering on backing up files and systems, it's important to remember that precursors to ransomware can be identified and attacks disrupted, the author writes. 

    By George Glass • Dec. 9, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Is the security of legacy IT providers prompting a confidence crisis?

    Research commissioned by CrowdStrike found security professionals are losing confidence in providers like Microsoft amid the rise in supply chain attacks. Microsoft has thoughts. 

    By Dec. 8, 2021
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    A year later, Nobelium-linked threat actors still target businesses, government

    Threat actors seeking sensitive data are compromising CSPs and MSPs to go after Microsoft 365 and Azure AD environments, Mandiant found. 

    By Dec. 6, 2021
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Insurer Lloyd's slashes coverage on state-sponsored cyberattacks, reflecting battered market

    The limits for state-sponsored attack coverage comes at a time when nation-state activity and ransomware linked to foreign threat actors is surging.

    By Dec. 3, 2021
  • Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    Majority of US retailers, critical infrastructure unscathed after holiday cyber warnings

    Industry averted a major cyber incident amid warnings from the FBI and CISA, though home furnishings retailer Ikea fought to contain a sophisticated phishing attack.

    By Nov. 30, 2021
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip
    Opinion

    3 ways the cybercriminal business is changing

    Now that ransomware has been thrust into the limelight, cybercriminals are adjusting their business models. Here is what enterprises need to know.

    By Robert McArdle • Nov. 29, 2021
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    The value of threat modeling in an evolving security landscape

    The flow of information is more unpredictable than it was just a few years ago, so the threat modeling that was once used doesn't work today. 

    By Sue Poremba • Nov. 29, 2021
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    Enterprises prepare for ransomware threats during Thanksgiving

    Retail, transportation and other sectors are bracing for heightened cyber risks, placing renewed pressure on security operations. 

    By Nov. 22, 2021
  • Image attribution tooltip

    Fit Ztudio/Shutterstock

    Image attribution tooltip
    Sponsored by Druva

    Data resilience: The new frontier of modern day protection

    With data under constant stress, now is the time to shift from data protection to data resiliency.

    By Stephen Manley, CTO, Druva • Nov. 22, 2021
  • Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    ICS security investments blocked by management confusion

    Until cyber risks in operational technology are better understood — and IT and OT can overcome cultural differences — companies can stall additional investments.  

    By Samantha Schwartz • Nov. 10, 2021
  • A picture of the street sign stating "Wall Street." American flags drape over a nearby building
    Image attribution tooltip
    Kena Betancur via Getty Images
    Image attribution tooltip

    Ransomware actors attempt to toy with stock valuation, disrupt M&A, FBI says

    The agency warns that threat actors are trying to access time sensitive information in order to force targeted companies into making fast decisions on whether to pay a ransom. 

    By Nov. 3, 2021
  • Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    Most companies dealing with employee misuse of business apps: report

    Nearly half of organizations say they lack the ability to see how remote workers are using business applications that contain high-value data.

    By Nov. 2, 2021