Threats: Page 17
-
Tips for how to safeguard against third-party attacks
Organizations need to demand and ensure all vendors implement rigorous security measures. Sometimes the least likely tools pose the most risk.
By Matt Kapko • Aug. 25, 2022 -
Ransomware attack surges tied to crypto spikes
Not every ransomware attempt leads to a successful attack. But with more attempts comes more potential damage.
By Matt Kapko • Aug. 24, 2022 -
Explore the Trendlineâž”
Getty Images
TrendlineRisk Management
An esclation of cyber risks facing businesses and government has made cyber resilience a major priority.
By Cybersecurity Dive staff -
Credential stuffing hammers US businesses as account data for sale in bulk
Media companies, retailers, restaurant groups and food delivery services are at heightened risk, the FBI said.
By Matt Kapko • Aug. 23, 2022 -
LockBit ransomware group claims responsibility for Entrust attack
The prolific ransomware gang threatened to publish data stolen during the attack.
By Matt Kapko • Aug. 19, 2022 -
Mailchimp breach shines new light on digital identity, supply chain risk
Sophisticated threat actors are targeting weak links in the email marketing space to go after vulnerable financial targets.
By David Jones • Aug. 18, 2022 -
The same old problems nag cybersecurity professionals
Technical complexities abound as the perceived level of risk rises in an unrelenting fashion.
By Matt Kapko • Aug. 17, 2022 -
How attackers are breaking into organizations
Threat actors lean heavily on phishing attacks, vulnerabilities in software and containers, and stolen credentials, according to top cyber vendor research.
By Matt Kapko • Aug. 15, 2022 -
Critical flaws on widely used Cisco firewalls left unpatched for months
Most of the vulnerabilities allow attackers to execute arbitrary code, Rapid7 researchers said.
By David Jones • Aug. 12, 2022 -
Don’t count on government, tech vendors to fix security woes, former CISA chief Krebs says
The state of cybersecurity is bad and it’s going to get worse, Chris Krebs said at Black Hat. But somehow things might eventually get better.
By Matt Kapko • Aug. 10, 2022 -
AWS, Splunk lead open source effort to spot and curb cyberattacks
A broad group of 18 tech companies are collaborating to establish a less cumbersome model for cybersecurity defense coordination.
By Matt Kapko • Aug. 10, 2022 -
Cloudflare thwarts ‘sophisticated’ phishing attack strategy that bruised Twilio
Dissimilar responses from Cloudflare and Twilio bear important lessons in transparency, resiliency and access.
By Matt Kapko • Aug. 9, 2022 -
The 11 most-prevalent malware strains of 2021 fuel cybercrime
Cybercriminals remain the most prolific users of malware, wielding these top strains to deliver ransomware and steal data.
By Matt Kapko • Aug. 5, 2022 -
Ransomware defense guidance risks hang-ups under many steps
Small and mid-sized businesses don’t typically have the resources to meet every safeguard. But every action, however small, helps.
By Matt Kapko • Aug. 4, 2022 -
Threat actors hide malware in legitimate — and high profile — applications
Researchers from VirusTotal show how attackers use social engineering techniques to launch malicious attacks behind trusted applications.
By David Jones • Aug. 3, 2022 -
Initial access brokers selling online access to unsuspecting MSPs
The ads for initial access to MSPs follow warnings from the FBI, CISA and intelligence partners from the Five Eyes.
By David Jones • Aug. 2, 2022 -
Most cyberattacks come from ransomware, email compromise
Attackers are scanning for vulnerabilities in unpatched systems within 15 minutes, stressing the pace and scale of the threat.
By Matt Kapko • Aug. 1, 2022 -
Threat actors shifting tactics as Microsoft blocks, unblocks and reblocks macros
Proofpoint researchers say criminal hackers are turning to container files and Windows shortcuts to distribute malware.
By David Jones • July 29, 2022 -
Mandiant red team breaches OT servers to mimic crime group techniques
Researchers are not aware of financially motivated actors using these techniques in the wild.
By David Jones • July 27, 2022 -
New ransomware discovered using Rust, atypical encryption
Luna’s use of platform-agnostic code allows threat actors to initiate attacks on different operating systems concurrently.
By Matt Kapko • July 20, 2022 -
LockBit ransomware hitting network servers
The latest tactic used to deploy the prolific malware allows threat actors to end processes, stop services and duplicate more quickly.
By Matt Kapko • July 20, 2022 -
State-backed threat actors use Google Drive, Dropbox to launch attacks
The Russia-linked threat actor behind the SolarWinds attack used cloud storage services to deploy malicious payloads using Cobalt Strike.
By David Jones • July 19, 2022 -
US effort to rip and replace hardware made in China is ballooning in cost
A yearslong push to remove telecom equipment deemed a national security threat continues to vex regulators.
By Matt Kapko • July 18, 2022 -
CISA releases indicators of compromise for hard-hit VMware Horizon
Federal authorities warn a more complex form of malware is providing advanced persistent threat actors with vast command and control capabilities.
By Matt Kapko • July 18, 2022 -
Cyber insurers split on what’s most important in a security posture assessment
To keep up with demand, cyber insurers acknowledge the need to rethink the underwriting process, research from Panaseer shows.
By Naomi Eide • July 15, 2022 -
Threat actors favor brute force attacks to hit cloud services
Google Cloud warned that organizations face their greatest threat due to weak passwords and vulnerable software.
By Matt Kapko • July 12, 2022