Threats: Page 30


  • Mimecast to cut 4% of workforce in restructuring as breach probe continues

    More than half of Mimecast's business stems from protecting Office 365, which has become a significant target for cyberattacks, Mimecast CEO Peter Bauer said.

    By Feb. 4, 2021
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Cyberattacks cost financial firms $4.7M on average last year: report

    Weak endpoints and a lack of policy enforcement are imposing extra costs on companies as home-based workers remain vulnerable.

    By Jan. 28, 2021
  • Trendline

    Managing identity sprawl

    Cyber threat actors know the simplest way to hack into an enterprise and remain under the radar is with stolen, legitimate user credentials -- and cloud services and AI are making managing and securing digital identities more challenging than ever.

    By Cybersecurity Dive staff
  • Actors behind Ryuk testing different operations, challenging attribution

    Ransomware's most prominent threat groups are forcing companies to make the malware a permanent part of their threat models. 

    By Samantha Schwartz • Jan. 26, 2021
  • Image attribution tooltip
    DESIGNECOLOGIST. [Photograph]. Retrieved from Unsplash.
    Image attribution tooltip

    Cyberthreat trends in the remote work landscape

    With more workers logging in from home, companies face new cybersecurity challenges and opportunities.

    By Jan. 25, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Cyber defense panel sees more private sector coordination following SolarWinds

    Defense and intelligence experts say federal agencies need to strengthen private sector support, intelligence sharing to prevent the next big nation-state attack. 

    By Jan. 20, 2021
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Malwarebytes attack linked to SolarWinds' nation-state actors, CEO says

    Microsoft notified the cybersecurity firm of a compromise involving Office 365 and Azure consistent with prior nation-state attacks.

    By Jan. 20, 2021
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Financial services companies embrace cloud as security concerns grow

    Equifax CISO and a study from Nutanix address how investing in cloud security helps to protect sensitive financial data.

    By Jan. 15, 2021
  • Mimecast attributes supply chain attack to SolarWinds' hackers

    The global email security provider was hit by a malicious attack that compromised a certificate used to authenticate some Microsoft 365 products. 

    By Updated Jan. 26, 2021
  • quantum internet cyber
    Image attribution tooltip
    Samoilov, Yuri, yuri.samoilov.online/. (2014). "System Lock" [Photograph]. Retrieved from Flickr.
    Image attribution tooltip

    Hackers accessed cloud services using phishing, 'pass-the-cookie' attacks, CISA says

    In one case, the agency found threat actors accessed a user's account "with proper multi-factor authentication," circumventing the favored security method. 

    By Samantha Schwartz • Jan. 14, 2021
  • Attackers used password spraying, guessing in SolarWinds hack

    As experts investigate the damage, the latest CISA update points to a constant in cybersecurity: weak passwords.

    By Samantha Schwartz • Jan. 11, 2021
  • U.S. Capitol Building
    Image attribution tooltip
    Brian Tucker/Cybersecurity Dive
    Image attribution tooltip

    With cyber bureau, State Department brings diplomacy to threat landscape

    CISOs and security experts see the federal bureau as a potential bridge to help align the government and private sector as nation-states pose increased threats. 

    By Updated Jan. 11, 2021
  • person uses a cellphone and laptop
    Image attribution tooltip
    thanyakij, bongkarn. (2019). Retrieved from Pexels.
    Image attribution tooltip

    Poor software quality cost businesses $2 trillion last year and put security at risk

    The COVID-19 pandemic played a role in the rise of operational software failure, said the Consortium for Information & Software Quality. 

    By Roberto Torres • Jan. 11, 2021
  • Fast-growing gaming industry faces rising threat of account compromise

    A report from KELA shows one million compromised accounts and thousands of leaked employee credentials in underground markets. 

    By Jan. 5, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Defending the unknown: Companies may not be getting the full story on cyberthreats

    Because of the way some data is presented, there is no way to know what vital information might be missing.

    By Sue Poremba • Jan. 4, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How one hospital is defending against ransomware

    By the time the Ryuk ransomware alert was issued, Rush Memorial Hospital had at least two risk mitigation measures: improved backup as a service and a systems engineer with an evasion plan. 

    By Samantha Schwartz • Dec. 22, 2020
  • Tracking SolarWinds cyberattack fallout, play-by-play

    As more companies are discovering impact from the SolarWinds hack, attention is turning toward far-reaching supply chain vulnerabilities. 

    By Samantha Schwartz , , Naomi Eide , Updated Jan. 4, 2021
  • CISA warns of more backdoors beyond SolarWinds Orion

    The extent of compromised data is not disclosed. What is clear? Threat actors relied on the supply chain for widespread access.

    By Samantha Schwartz • Dec. 17, 2020
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Microsoft to begin blocking binaries linked to SolarWinds cyberattack

    Microsoft Defender Antivirus will quarantine the trojan before it can begin processing, though the company said "it may not be simple to remove the product from service."

    By Samantha Schwartz • Dec. 16, 2020
  • IT execs face growing pressure to balance security with productivity

    Companies are caught between competing interests as remote workers offset digital security needs with work-life balance.

    By Dec. 14, 2020
  • Teenage girl studying with video online lesson at home family in isolation covid-19. Homeschooling and distance learning
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Federal agencies warn of heightened cyberthreats against K-12 schools

    Cyberattackers are trying to steal data and disrupt remote learning as COVID-19 continues to impact schools, the FBI, CISA and MS-ISAC said. 

    By Dec. 11, 2020
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    NSA calls out Russia-backed exploit of VMware virtual workspace platform

    Network administrators in defense and national security were warned to patch systems where bad actors can gain access to data.

    By Dec. 8, 2020
  • State of K-12 cybersecurity, from traditional IT to classroom lessons

    Panelists at the annual ed tech conference last week told educators about the importance of cybersecurity practices as schools are targeted for disruptions and unauthorized disclosures. 

    By Roger Riddell • Dec. 7, 2020
  • cyberattack, privacy, connection
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Why some industries are more secure than others

    Threats go beyond industry and target organizations depending on business size. Company size is a factor, but so is investment in cyber defense. 

    By Sue Poremba • Dec. 7, 2020
  • Kmart's reported ransomware attack highlights ongoing threat to retail

    Egregor is emerging as growing cyberthreat as the pandemic shifts holiday shopping even further toward e-commerce.

    By Dec. 4, 2020
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    NERC expands IT-focused cybersecurity program as hackers target grid operations tech

    Previously focused on utility operations IT, the Cybersecurity Risk Information Sharing Program will now include two pilots scanning for threats to operational technologies.

    By Robert Walton • Dec. 4, 2020