Threats: Page 3


  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    SMBs, regional MSPs under fire from targeted phishing attacks

    Sophisticated cybercriminals are attacking vulnerable target rich and resource poor organizations to reach secondary victims via phishing campaigns, Proofpoint researchers warn.

    By May 24, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    BEC attacks rise as criminal hackers employ new tactics to evade detection

    Threat actors are using cybercrime as a service to grow industrial strength campaigns and leveraging residential IP addresses.

    By May 23, 2023
  • An illustration of three cartoon people in suits adding files to the cloud, shown through clouds and a computer. Explore the Trendline
    Image attribution tooltip
    TCmake_photo via Getty Images
    Image attribution tooltip
    Trendline

    Securing the cloud

    The ubiquity of the cloud has left security gaps for organizations, leaving them to navigate a complex vendor landscape and defend their technology supply chain

    By Cybersecurity Dive staff
  • Street shot of Microsoft logo outside of a building at 2015 Microsoft Build Conference on April 29, 2015 at Moscone Center in San Francisco, California.
    Image attribution tooltip
    Stephen Lam via Getty Images
    Image attribution tooltip

    Criminal actors switch tactics after Microsoft began to block macros last year

    Researchers from Proofpoint have seen a rise in HTML smuggling, PDFs and OneNote files for malware delivery since late 2022.

    By May 12, 2023
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Ransomware insurance claims jump back up

    Ransomware claims filed by U.S. clients of insurance broker Marsh spiked 77% in the first quarter, following a downward trend in 2022.

    By Alexei Alexis • May 10, 2023
  • Lucia Milică Stacy, global resident CISO at Proofpoint
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    CISO anxiety returns amid heightened concern of material cyberattacks

    A report by Proofpoint shows a brief sense of calm about cyber has slipped away amid rising fears of economic uncertainty and insider threats.

    By May 9, 2023
  • Western Digital and Wired host "A Data-Driven Future: The Future of Mobility and Transportation in 2039."
    Image attribution tooltip
    Ian Tuttle via Getty Images
    Image attribution tooltip

    Western Digital confirms customer data accessed by hackers in attack

    The company has begun notifying customers about stolen data and expects to restore its online store next week.

    By May 8, 2023
  • Exterior of the Moscone Center during the RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Companies need a wakeup call to fix chronic security shortcomings, cyber experts say

    One researcher wonders if the industry needs another Snowden-like moment to spring organizations into action.

    By May 3, 2023
  • Merck sign
    Image attribution tooltip
    Marko Georgiev / Stringer via Getty Images
    Image attribution tooltip

    Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders

    A court victory in the closely watched insurance case is expected to stabilize a turbulent market and provide some assurance for organizations amid a rise in nation-state activity.

    By May 3, 2023
  • RSA Conference 2023 banner at Moscone Center in San Francisco on April 25, 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    3 areas of generative AI the NSA is watching in cybersecurity

    Generative AI is a “technological explosion,” NSA Cybersecurity Director Rob Joyce said. While it is game changing, it hasn’t yet delivered. 

    By May 1, 2023
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Organizations are boosting resilience, getting faster at incident response

    While the number of data security incidents remained level between 2021 and 2022, companies improved recovery thanks to stronger security measures, BakerHostetler found.

    By May 1, 2023
  • Brain icon symbolizing AI in center of photo surrounded by other icons representing the potential widespread use of AI in technology
    Image attribution tooltip
    bymuratdeniz via Getty Images
    Image attribution tooltip

    Teenagers, young adults pose prevalent cyberthreat to US, Mandiant says

    The brains behind high-profile attacks last year, teenagers and young adults use sophisticated social engineering techniques for intrusions.

    By April 25, 2023
  • Computer engineer working with a computer interface in a factory.
    Image attribution tooltip
    Thinkhubstudio via Getty Images
    Image attribution tooltip

    Early warning threat information platform launched for OT

    The platform will provide a vendor-agnostic option for sharing early threat information and intelligence across industries, the group said Monday. 

    By April 24, 2023
  • Digital background depicting innovative technologies in (AI) artificial systems, neural interfaces and internet machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT to sharpen cyberthreats, but no need to panic yet

    Startling dangers, such as autonomous attack mechanisms and sophisticated malware coding, have yet to materialize. For now, the threat is more specific.

    By April 21, 2023
  • Image of water ripples on an abstract background.
    Image attribution tooltip
    Eduard Harkonen / Getty Images Plus via Getty Images
    Image attribution tooltip

    3CX attack caused by another supply chain attack, Mandiant says

    Mandiant Consulting CTO Charles Carmakal called the incident very novel and quite scary after the firm traced the attack to a previous compromise in financial trading software from Trading Technologies.

    By April 20, 2023
  • Typhoon makes landfall in Shanghai, China.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Microsoft summons weather events to name threat actors

    Under the new taxonomy, a blizzard or typhoon designation represents a nation-state actor and financially motivated threat actors fall under the family name tempest.

    By April 19, 2023
  • In this photo illustration, OpenAI's ChatGPT AI-generated answer to the question "What can AI offer to humanity?"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip
    Opinion

    ChatGPT at work: What’s the cyber risk for employers?

    The use of ChatGPT could run afoul of company policy, copyright concerns, customer confidentiality or even international privacy laws, BlackBerry’s CISO writes. Here’s what businesses should consider.  

    By Arvind Raman • April 11, 2023
  • People at work in a large warehouse full of boxes.
    Image attribution tooltip
    kupicoo via Getty Images
    Image attribution tooltip

    Leftover data lurks across the enterprise, creating a business risk

    When an organization has little visibility into the data in its possession, it becomes even more vulnerable to data leaks, breaches, and both insider and external threats. 

    By Sue Poremba • April 7, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    Palo Alto security software stung by ransomware strain

    Check Point researchers say the “Rorschach” ransomware – found during an attack on a U.S. company – may be the fastest ever seen.

    By April 4, 2023
  • The Google logo adorns the outside of their NYC office Google Building 8510 at 85 10th Ave on June 3, 2019
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Threat intelligence isn’t for everyone, Google says

    Most security professionals don’t have the time to read a 10-page threat intelligence report, let alone put those insights into action.

    By March 23, 2023
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Google Cloud joins FS-ISAC’s critical providers program to share threat intel

    The move is part of a wider industry effort to enhance supply chain security in the financial services sector.

    By March 17, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Bank failure panic fuels moment of opportunity for threat actors

    As regulators step in to operate Silicon Valley Bank, threat hunters and security executives warned organizations to look out for malicious activity.

    By March 14, 2023
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    CISA launches ransomware warning pilot for critical infrastructure providers

    The agency already warned dozens of organizations about ProxyNotShell.

    By March 14, 2023
  • Person using AI-generated chatbot
    Image attribution tooltip
    ipuwadol via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT, too. Here’s what businesses should watch

    While IT departments seek enterprise applications, cyber teams must be on the lookout for attacks using the generative AI technology.

    By Lindsey Wilkinson • Feb. 22, 2023
  • Coin stacks sitting on blue financial graph background.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Economic volatility to exacerbate cyber risk in 2023

    A potential recession could lead to delayed innovation and inadequate budgets for long-term investments, the Bipartisan Policy Center said in a report.

    By Feb. 14, 2023
  • Graphic of digital money transfer symbols overlaid on a map of the world
    Image attribution tooltip
    ArtemisDiana via Getty Images
    Image attribution tooltip

    Companies often operate in dark with little applied threat intelligence

    A report by Google Cloud’s Mandiant shows companies are making cybersecurity decisions without a full understanding of what they’re up against.

    By Feb. 13, 2023