Threats: Page 25


  • As cyber insurers quantify risk, security spending provides little info

    Quantifying risk appetite, an assessment insurance premiums are based on, is an imperfect science for providers and customers.

    By Samantha Schwartz • March 24, 2021
  • 70% of malicious DNS traffic in tech is cryptomining, phishing: Cisco

    Researchers suggested tech employees were unfamiliar with company policies, triggering cryptomining blocks in Cisco Umbrella. 

    By Samantha Schwartz • March 23, 2021
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • SolarWinds threat actors accessing Microsoft 365 by altering permissions

    Mandiant observed a threat actor linked to the SolarWinds campaign using a stealthy approach to read email in targeted mailboxes.

    By March 22, 2021
  • Microsoft deploys more updates to contain Exchange server fallout

    The FBI and CISA are warning of additional threats from nation states and threat actors as patching and security updates leave many vulnerable companies exposed. 

    By March 12, 2021
  • DearCry ransomware latching onto Exchange hack, Microsoft says

    Patching is the only answer — for now.

    By Samantha Schwartz • March 12, 2021
  • What's in your software? Federal initiative targets frequently overlooked electric utility vulnerabilities

    Software supply chain issues are the subject of a new collaboration between the electric power sector and federal government.

    By Robert Walton • March 11, 2021
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Enterprises scramble to secure Microsoft Exchange as cybercriminals rush in

    Researchers fear, more than two months after the threat was discovered, criminal hackers have had plenty of time to loot data or plant undetected seeds of compromise.

    By March 10, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    55% of healthcare breaches feature ransomware: report

    The healthcare industry is a favored target by cybercriminals: Hospitals cannot tolerate downtime or put off emergency patient care.

    By Samantha Schwartz • March 10, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How do companies assess risk? It's a system-by-system question

    Every piece of technology is vulnerable to threat actors, but each organization and cybersecurity team decides which software and technology adds risk to its business operations.

    By Sue Poremba • March 9, 2021
  • Microsoft Exchange server compromise escalates as mitigation efforts fall short

    Officials warn that patching may not fix compromised systems, while tens of thousands of customers are potentially at risk.

    By March 8, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    3 new malware strains show persistence, sophistication of SolarWinds actor

    The malware strains, identified by Microsoft, were used in targeted, late-stage attacks to compromise a select number of companies last year. 

    By March 5, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Malicious email campaigns target business platforms following remote work surge

    Phishing attacks are more becoming targeted, less frequent and use PII to harvest credentials.

    By March 4, 2021
  • What makes ransomware a constant enterprise pain point

    Threat groups mimic and manipulate the tactics, techniques and procedures of other groups, making ransomware attacks more difficult to prevent. 

    By Samantha Schwartz • March 3, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Exploited Microsoft Exchange campaign hits hundreds of organizations, researchers find

    The nation-state campaign, which Microsoft has linked to China, have targeted on-premises Exchange server vulnerabilities to steal U.S. enterprise data. 

    By March 3, 2021
  • Capitol Hill
    Image attribution tooltip
    The image by Андрей Бобровский is licensed under CC BY 3.0
    Image attribution tooltip

    SolarWinds missed early security warnings

    Lawmakers scrutinized SolarWinds' security practices, including its use of "solarwinds123" as a password, a lapse blamed on a former intern. 

    By March 1, 2021
  • The outside of a Target location in Martinsburg, Virginia
    Image attribution tooltip
    Courtesy of Target
    Image attribution tooltip

    How Target bridges communication gaps between threat intel analysis, detection teams

    The WAVE matrix, a tool the retailer built in-house, is transferable to smaller teams with employees covering multiple security domains.

    By Samantha Schwartz • Feb. 25, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cloud is a haven for malware, Netskope finds

    Phishing and malware pushed companies to focus on protecting endpoints and assessing cloud storage security, especially in a remote work environment.

    By Samantha Schwartz • Feb. 24, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Apple faces malware threats as it makes an enterprise push

    Apple made recent inroads with corporate customers and is detailing extensive security upgrades as a way of attracting the enterprise. Through it all, new techniques test the company's defenses.

    By Feb. 23, 2021
  • college student sits and a table studying
    Image attribution tooltip
    An, Min. Retrieved from Pexels.
    Image attribution tooltip

    Universities, companies battle the same cyberthreats, toppled by sophisticated actors

    BlueVoyant research shows top U.S. schools have major weaknesses defending against the most common threats: ransomware and data breaches.

    By Samantha Schwartz • Feb. 23, 2021
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Microsoft says it was not a SolarWinds attack vector, after completing internal probe

    The company confirmed limited amounts of source code for Azure, Exchange and Intune were downloaded.

    By Feb. 19, 2021
  • disinformation, data breach, data manipulation
    Image attribution tooltip
    Adeline Kon for Cybersecurity Dive/Cybersecurity Dive
    Image attribution tooltip

    How can data manipulation impact the bottom line?

    Factoring disinformation into a threat model can allow a company to combat lies and protect its reputation.

    By Samantha Schwartz • Feb. 17, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware, poor security drove spike in healthcare breaches in 2020

    A rise in ransomware and phishing attacks led to a 55% increase in healthcare breaches last year, according to Bitglass.

    By Feb. 17, 2021
  • One-third of analysts ignore security alerts, survey finds

    With an ever-increasing number of alerts, identifying what to ignore is an impossible mission without scalable technology.

    By Samantha Schwartz • Feb. 16, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Organizations running SolarWinds Orion online drops 25% since December: report

    A report by RiskRecon shows only 8% of entities operating on the internet actually upgraded to later versions based on SolarWinds security recommendations.

    By Feb. 12, 2021
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Software supply chain hacks highlight an ugly truth: The build process is broken

    Software makers are coming to terms with security gaps they knew existed as the fallout from the SolarWinds hack continues.

    By Samantha Schwartz • Feb. 11, 2021