Threats: Page 26


  • Open source blind trust the culprit in ethical breach of 35 companies

    Microsoft, one of the breached companies, encourages organizations to use controlled scopes, namespaces or prefixes to protect package names.

    By Samantha Schwartz • Feb. 10, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Long-term SolarWinds consequences

    SolarWinds fallout turns security eye to Microsoft Office 365

    Office 365 has been linked to incidents ranging from points of compromise to the unauthorized email access of government officials.

    By Feb. 9, 2021
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Half of phishing attacks cause ransomware infections: report

    Not only did bad actors ask for additional ransoms but more companies are also paying them. 

    By Samantha Schwartz • Feb. 8, 2021
  • SolarWinds fallout could last for years, as power industry secures vulnerable equipment: Dragos CEO

    The energy sector is experiencing a "digital transformation with a threat convergence," the CEO of security company Dragos told the U.S. Department of Energy.

    By Robert Walton • Feb. 5, 2021
  • Mimecast to cut 4% of workforce in restructuring as breach probe continues

    More than half of Mimecast's business stems from protecting Office 365, which has become a significant target for cyberattacks, Mimecast CEO Peter Bauer said.

    By Feb. 4, 2021
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Cyberattacks cost financial firms $4.7M on average last year: report

    Weak endpoints and a lack of policy enforcement are imposing extra costs on companies as home-based workers remain vulnerable.

    By Jan. 28, 2021
  • Actors behind Ryuk testing different operations, challenging attribution

    Ransomware's most prominent threat groups are forcing companies to make the malware a permanent part of their threat models. 

    By Samantha Schwartz • Jan. 26, 2021
  • Image attribution tooltip
    DESIGNECOLOGIST. [Photograph]. Retrieved from Unsplash.
    Image attribution tooltip

    Cyberthreat trends in the remote work landscape

    With more workers logging in from home, companies face new cybersecurity challenges and opportunities.

    By Jan. 25, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Cyber defense panel sees more private sector coordination following SolarWinds

    Defense and intelligence experts say federal agencies need to strengthen private sector support, intelligence sharing to prevent the next big nation-state attack. 

    By Jan. 20, 2021
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Malwarebytes attack linked to SolarWinds' nation-state actors, CEO says

    Microsoft notified the cybersecurity firm of a compromise involving Office 365 and Azure consistent with prior nation-state attacks.

    By Jan. 20, 2021
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Financial services companies embrace cloud as security concerns grow

    Equifax CISO and a study from Nutanix address how investing in cloud security helps to protect sensitive financial data.

    By Jan. 15, 2021
  • Mimecast attributes supply chain attack to SolarWinds' hackers

    The global email security provider was hit by a malicious attack that compromised a certificate used to authenticate some Microsoft 365 products. 

    By Updated Jan. 26, 2021
  • quantum internet cyber
    Image attribution tooltip
    Samoilov, Yuri, yuri.samoilov.online/. (2014). "System Lock" [Photograph]. Retrieved from Flickr.
    Image attribution tooltip

    Hackers accessed cloud services using phishing, 'pass-the-cookie' attacks, CISA says

    In one case, the agency found threat actors accessed a user's account "with proper multi-factor authentication," circumventing the favored security method. 

    By Samantha Schwartz • Jan. 14, 2021
  • Attackers used password spraying, guessing in SolarWinds hack

    As experts investigate the damage, the latest CISA update points to a constant in cybersecurity: weak passwords.

    By Samantha Schwartz • Jan. 11, 2021
  • U.S. Capitol Building
    Image attribution tooltip
    Brian Tucker/Cybersecurity Dive
    Image attribution tooltip

    With cyber bureau, State Department brings diplomacy to threat landscape

    CISOs and security experts see the federal bureau as a potential bridge to help align the government and private sector as nation-states pose increased threats. 

    By Updated Jan. 11, 2021
  • person uses a cellphone and laptop
    Image attribution tooltip
    thanyakij, bongkarn. (2019). Retrieved from Pexels.
    Image attribution tooltip

    Poor software quality cost businesses $2 trillion last year and put security at risk

    The COVID-19 pandemic played a role in the rise of operational software failure, said the Consortium for Information & Software Quality. 

    By Roberto Torres • Jan. 11, 2021
  • Fast-growing gaming industry faces rising threat of account compromise

    A report from KELA shows one million compromised accounts and thousands of leaked employee credentials in underground markets. 

    By Jan. 5, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Defending the unknown: Companies may not be getting the full story on cyberthreats

    Because of the way some data is presented, there is no way to know what vital information might be missing.

    By Sue Poremba • Jan. 4, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How one hospital is defending against ransomware

    By the time the Ryuk ransomware alert was issued, Rush Memorial Hospital had at least two risk mitigation measures: improved backup as a service and a systems engineer with an evasion plan. 

    By Samantha Schwartz • Dec. 22, 2020
  • Tracking SolarWinds cyberattack fallout, play-by-play

    As more companies are discovering impact from the SolarWinds hack, attention is turning toward far-reaching supply chain vulnerabilities. 

    By Samantha Schwartz , , Naomi Eide , Updated Jan. 4, 2021
  • CISA warns of more backdoors beyond SolarWinds Orion

    The extent of compromised data is not disclosed. What is clear? Threat actors relied on the supply chain for widespread access.

    By Samantha Schwartz • Dec. 17, 2020
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Microsoft to begin blocking binaries linked to SolarWinds cyberattack

    Microsoft Defender Antivirus will quarantine the trojan before it can begin processing, though the company said "it may not be simple to remove the product from service."

    By Samantha Schwartz • Dec. 16, 2020
  • IT execs face growing pressure to balance security with productivity

    Companies are caught between competing interests as remote workers offset digital security needs with work-life balance.

    By Dec. 14, 2020
  • Teenage girl studying with video online lesson at home family in isolation covid-19. Homeschooling and distance learning
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Federal agencies warn of heightened cyberthreats against K-12 schools

    Cyberattackers are trying to steal data and disrupt remote learning as COVID-19 continues to impact schools, the FBI, CISA and MS-ISAC said. 

    By Dec. 11, 2020
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    NSA calls out Russia-backed exploit of VMware virtual workspace platform

    Network administrators in defense and national security were warned to patch systems where bad actors can gain access to data.

    By Dec. 8, 2020