Threats: Page 17


  • Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    Most companies dealing with employee misuse of business apps: report

    Nearly half of organizations say they lack the ability to see how remote workers are using business applications that contain high-value data.

    By Nov. 2, 2021
  • Three pathways for hackers to crash the US power grid
    Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    Hackers could crash the US power grid, but money, not sabotage, is their focus

    For now, the capability remains in the hands of nation-state actors. But "sophistication can ultimately be bought," Edison Electric Institute's Scott Aaronson said.

    By Robert Walton • Nov. 2, 2021
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    SolarWinds threat actor targets cloud services, Microsoft 365 mailboxes

    The threat actor is using a tactic called EWS impersonation to target mailboxes in Microsoft 365 and is also using cloud service providers to target end users, Mandiant researchers said. 

    By Nov. 1, 2021
  • Image attribution tooltip
    Dan Kitwood / Staff via Getty Images
    Image attribution tooltip

    Identity crisis: Why ransomware groups rebrand — and disappear

    Criminals are not known for telling the truth, but what they say is usually the only explanation for a disappearance. Even if it is a lie.

    By Samantha Schwartz • Oct. 28, 2021
  • SEC
    Image attribution tooltip
    "SEC" by SEC is licensed under CC BY 2.0
    Image attribution tooltip

    Cyberattacks spur demand for cyber insurance: Moody's

    "This is a critical area that we're challenged with," Securities and Exchange Commission Chair Gary Gensler said, describing the agency’s sharper focus on cyber risk.

    By Jim Tyson • Oct. 22, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Federal agencies warn of ransomware targeting water, wastewater treatment plants

    Months after the attack on a Florida water treatment plant, the FBI, CISA and other agencies are concerned about a new round of threats to vulnerable municipal sites.

    By Oct. 18, 2021
  • Image attribution tooltip
    Dan Kitwood/Getty Images News via Getty Images
    Image attribution tooltip

    2021 ransomware bitcoin activity eclipses last year, Treasury finds

    The number of suspicious activity report transactions is already up 30% over 2020 numbers and the agency has tracked billions of dollars in outgoing bitcoin payments potentially linked to ransomware.

    By Samantha Schwartz • Oct. 18, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Cybersecurity tool sprawl leading to burnout, false positives: report

    Security operations teams are wasting time on false alerts due to managing a high number of tools that don't interact well with each other, Trend Micro found.

    By Oct. 13, 2021
  • Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Insider threat environment faces challenges amid changing corporate landscape

    As remote work becomes permanent and employee turnover rises, companies face additional challenges in protecting sensitive data, according to a panel discussion at Mandiant Cyber Defense Summit.

    By Oct. 6, 2021
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    NIST urges supply chain to include cyber in risk management

    Industries that rely heavily on technology are the best at incorporating cyber in their supply chain risk management plans, according to NIST's Jon Boyens.

    By Samantha Schwartz • Oct. 5, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    REvil, DarkSide highlight surge in Q2 ransomware attacks: report

    The government sector saw more ransomware attacks, while financial services companies faced increased threats in the cloud, according to McAfee Enterprise research.

    By Oct. 4, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    With remote work, any employee could be an insider threat. How is CISA mitigating the risk?

    CISA released a self-assessment tool which organizations can use to generate reports on their tolerance and capabilities for preventing insider threats. 

    By Samantha Schwartz • Sept. 30, 2021
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip
    Deep Dive

    Microsoft, under attack from threat actors, positions itself as cyber guardian

    The pandemic created more business opportunity, but malicious actors dogged the company's technology stack. Now, the very same products touted as security defense tools are under fire. 

    By Sept. 29, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft warns of new credential-stealing backdoor from SolarWinds threat actor

    The newly identified malware, called FoggyWeb, has been observed since April and is used to steal from compromised AD FS servers. 

    By Sept. 28, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Ransomware compromises customer data in farm co-op attack

    A Minnesota-based co-op became the second agricultural firm in recent days to be the target of ransomware, just weeks after the FBI and CISA warned of a wider threat to the industry.

    By Updated Sept. 24, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    After 400 attacks, feds warn of Conti ransomware

    Nearly a year after U.S. security agencies warned the healthcare sector about Ryuk, the same threat actors are reemerging as a risk to businesses.

    By Samantha Schwartz • Sept. 23, 2021
  • A Black person types on a laptop
    Image attribution tooltip

    Photo by cottonbro from Pexels

    Image attribution tooltip

    Enterprises plan major investments as remote work escalates security risk: report

    Companies face significant challenges in managing security as the work-from-home model moves from an emergency stopgap to a more permanent environment. 

    By Sept. 22, 2021
  • Treasury Secreatry Janet Yellen peers behind her glasses on Capitol Hill.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Treasury sanctions crypto exchange Suex in push to thwart ransomware

    While more legal measures await international cybercrime, the government is sending interim messages to ransomware gangs.

    By Samantha Schwartz • Sept. 22, 2021
  • Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Fortinet credential drop linked to fissure in ransomware group

    Researchers linked a new ransomware syndicate called Groove to the Fortinet VPN credential dump, following a rift involving affiliates of Babuk.

    By Sept. 10, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Ransomware capitalizes on holiday weekends. Feds urge vigilance over Labor Day

    The FBI and CISA implored companies and agencies to backup data and use proactive threat-hunting measures to mitigate any potential attacks. 

    By Sept. 1, 2021
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    What's at stake in a credential stuffing attack

    Attackers gain a network foothold by using stolen credentials under the guise of an authenticated trusted employee or third party.

    By Sue Poremba • Sept. 1, 2021
  • Image attribution tooltip
    gopixa via Getty Images
    Image attribution tooltip
    Opinion

    Time to be less dramatic about ransomware

    Security is an aspect of normal operations. Proactive, broad measures can mitigate the risk of whatever threat is currently present or yet to come.

    By Patricia Muoio • Aug. 31, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Facility management worried about OT cybersecurity, but few plan to fix it

    Seven in 10 managers are concerned about having adequate levels of cybersecurity, but only one-third are planning new investments, Honeywell found.

    By Aug. 27, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    More threats target Linux, a foundation for the cloud, report finds

    As enterprises embrace cloud, malicious actors are finding sophisticated methods to threaten users for computing power and data theft. 

    By Aug. 25, 2021
  • Image attribution tooltip
    Amilcar Orfali / Stringer via Getty Images
    Image attribution tooltip

    Insider risk surges as resignations mount

    Millions of U.S. workers are walking away from existing jobs, increasing the risk to corporate data and, in many cases, source code.

    By Aug. 13, 2021