Threats: Page 2


  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    HHS warns industry about resurfaced ransomware group after attack on cancer center

    In a cybersecurity notification, the department warned the sector about TimisoaraHackerTeam, or THT, after an attack on a U.S. cancer center that “significantly reduced” its capability to treat patients.

    By Emily Olsen • June 21, 2023
  • Swarm of barracuda
    Image attribution tooltip
    armiblue/Getty Images Plus via Getty Images
    Image attribution tooltip

    Barracuda ESG devices actively exploited in broad, ongoing espionage campaign

    The campaign is the broadest by a China-nexus actor since the mass exploitation of Microsoft Exchange in 2021, Mandiant researchers said.

    By Updated June 15, 2023
  • Brightly colored digital lock with central computer processor and futuristic circuit board. Explore the Trendline
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    High-profile cybersecurity incidents and a rush to adopt new technologies illustrate the tumultuousness of 2023 so far.

    By Cybersecurity Dive staff
  • A signage of Microsoft is seen on March 13, 2020 in New York City.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft review of Azure outage shows spike in HTTP requests as researchers blame DDoS

    The Azure incident followed a series of outages in Outlook, OneDrive and other services last week. An alleged hacktivist group claimed responsibility for DDoS attacks.

    By June 14, 2023
  • The Microsoft logo is displayed outside the Microsoft Technology Center near Times Square.
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Microsoft says Azure disrupted after a week of repeated service outages

    The vendor is still investigating claims of DDoS attacks by a hacktivist group called Anonymous Sudan, after OneDrive, Outlook and other services were disrupted.

    By June 12, 2023
  • A logo sits illuminated outside the Microsoft pavilion on the opening day of the World Mobile Congress at the Fira Gran Via Complex on February 22, 2016 in Barcelona, Spain.
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Microsoft investigating threat actor claims following multiple outages in 365, OneDrive

    A hacktivist group known as Anonymous Sudan has claimed to be involved in DDoS attacks.

    By June 9, 2023
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    Cyber insurance market is stabilizing as growth remains certain, Moody’s says

    Escalating price increases have moderated as the business has become profitable. Insurance firms are placing tight controls regarding cyber hygiene practices.

    By June 8, 2023
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    Cybercriminals target C-suite, family members with sophisticated attacks

    A study by BlackCloak and Ponemon shows senior executives are being targeted for IP theft, doxxing and extortion, often through home office networks.

    By June 5, 2023
  • Gas turbine electric power plant in blue hour.
    Image attribution tooltip
    Thossaphol via Getty Images
    Image attribution tooltip

    Moody’s cites credit risk from state-backed cyber intrusions into US critical infrastructure

    Key sectors could face short-term revenue impacts and long-term reputational harm and litigation risk, the credit ratings service said.

    By May 31, 2023
  • sand dunes on the florida coast
    Image attribution tooltip
    Mariakray via Getty Images
    Image attribution tooltip

    Ahead of summer holiday weekends, IT security leaders brace for deliberate cyber mischief

    Recent history shows holiday weekends and vacations provide an attack surface bonanza for threat actors.

    By May 26, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    SMBs, regional MSPs under fire from targeted phishing attacks

    Sophisticated cybercriminals are attacking vulnerable target rich and resource poor organizations to reach secondary victims via phishing campaigns, Proofpoint researchers warn.

    By May 24, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    BEC attacks rise as criminal hackers employ new tactics to evade detection

    Threat actors are using cybercrime as a service to grow industrial strength campaigns and leveraging residential IP addresses.

    By May 23, 2023
  • Street shot of Microsoft logo outside of a building at 2015 Microsoft Build Conference on April 29, 2015 at Moscone Center in San Francisco, California.
    Image attribution tooltip
    Stephen Lam via Getty Images
    Image attribution tooltip

    Criminal actors switch tactics after Microsoft began to block macros last year

    Researchers from Proofpoint have seen a rise in HTML smuggling, PDFs and OneNote files for malware delivery since late 2022.

    By May 12, 2023
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Ransomware insurance claims jump back up

    Ransomware claims filed by U.S. clients of insurance broker Marsh spiked 77% in the first quarter, following a downward trend in 2022.

    By Alexei Alexis • May 10, 2023
  • Lucia Milică Stacy, global resident CISO at Proofpoint
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    CISO anxiety returns amid heightened concern of material cyberattacks

    A report by Proofpoint shows a brief sense of calm about cyber has slipped away amid rising fears of economic uncertainty and insider threats.

    By May 9, 2023
  • Western Digital and Wired host "A Data-Driven Future: The Future of Mobility and Transportation in 2039."
    Image attribution tooltip
    Ian Tuttle via Getty Images
    Image attribution tooltip

    Western Digital confirms customer data accessed by hackers in attack

    The company has begun notifying customers about stolen data and expects to restore its online store next week.

    By May 8, 2023
  • Exterior of the Moscone Center during the RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Companies need a wakeup call to fix chronic security shortcomings, cyber experts say

    One researcher wonders if the industry needs another Snowden-like moment to spring organizations into action.

    By May 3, 2023
  • Merck sign
    Image attribution tooltip
    Marko Georgiev / Stringer via Getty Images
    Image attribution tooltip

    Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders

    A court victory in the closely watched insurance case is expected to stabilize a turbulent market and provide some assurance for organizations amid a rise in nation-state activity.

    By May 3, 2023
  • RSA Conference 2023 banner at Moscone Center in San Francisco on April 25, 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    3 areas of generative AI the NSA is watching in cybersecurity

    Generative AI is a “technological explosion,” NSA Cybersecurity Director Rob Joyce said. While it is game changing, it hasn’t yet delivered. 

    By May 1, 2023
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Organizations are boosting resilience, getting faster at incident response

    While the number of data security incidents remained level between 2021 and 2022, companies improved recovery thanks to stronger security measures, BakerHostetler found.

    By May 1, 2023
  • Brain icon symbolizing AI in center of photo surrounded by other icons representing the potential widespread use of AI in technology
    Image attribution tooltip
    bymuratdeniz via Getty Images
    Image attribution tooltip

    Teenagers, young adults pose prevalent cyberthreat to US, Mandiant says

    The brains behind high-profile attacks last year, teenagers and young adults use sophisticated social engineering techniques for intrusions.

    By April 25, 2023
  • Computer engineer working with a computer interface in a factory.
    Image attribution tooltip
    Thinkhubstudio via Getty Images
    Image attribution tooltip

    Early warning threat information platform launched for OT

    The platform will provide a vendor-agnostic option for sharing early threat information and intelligence across industries, the group said Monday. 

    By April 24, 2023
  • Digital background depicting innovative technologies in (AI) artificial systems, neural interfaces and internet machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT to sharpen cyberthreats, but no need to panic yet

    Startling dangers, such as autonomous attack mechanisms and sophisticated malware coding, have yet to materialize. For now, the threat is more specific.

    By April 21, 2023
  • Image of water ripples on an abstract background.
    Image attribution tooltip
    Eduard Harkonen / Getty Images Plus via Getty Images
    Image attribution tooltip

    3CX attack caused by another supply chain attack, Mandiant says

    Mandiant Consulting CTO Charles Carmakal called the incident very novel and quite scary after the firm traced the attack to a previous compromise in financial trading software from Trading Technologies.

    By April 20, 2023
  • Typhoon makes landfall in Shanghai, China.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Microsoft summons weather events to name threat actors

    Under the new taxonomy, a blizzard or typhoon designation represents a nation-state actor and financially motivated threat actors fall under the family name tempest.

    By April 19, 2023
  • In this photo illustration, OpenAI's ChatGPT AI-generated answer to the question "What can AI offer to humanity?"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip
    Opinion

    ChatGPT at work: What’s the cyber risk for employers?

    The use of ChatGPT could run afoul of company policy, copyright concerns, customer confidentiality or even international privacy laws, BlackBerry’s CISO writes. Here’s what businesses should consider.  

    By Arvind Raman • April 11, 2023