Threats: Page 5


  • Federal Communications Commission Commissioner Brendan Carr
    Image attribution tooltip
    Kevin Dietsch / Getty Images via Getty Images
    Image attribution tooltip

    FCC launches national security unit to counter state-linked threats to US telecoms

    The new council is part of an effort to thwart Salt Typhoon and other cyber espionage groups.

    By March 13, 2025
  • A bronze depiction of ancient god Medusa with snakes in her hair
    Image attribution tooltip
    Paul Campbell via Getty Images
    Image attribution tooltip

    Medusa ransomware slams critical infrastructure organizations

    The ransomware-as-a-service gang tallied more than 300 victims in industries such as healthcare, manufacturing and technology.

    By March 13, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A person types on a laptop in a dark room.
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip

    Juniper MX routers targeted by China-nexus threat group using custom backdoors

    The devices have reached end-of-life status and need to be upgraded, as the company has issued in a security advisory.

    By March 12, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    Emerging botnet exploits TP-Link router flaw posing risk to US organizations

    Ballista’s attacks on TP-Link devices comes as U.S. lawmakers consider banning the company's products over suspected links to China.

    By Elizabeth Montalbano, Contributing Reporter • March 12, 2025
  • A digital depiction of a red triangle sign with an exclamation point in the center with binary code in the background.
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    82% of K-12 schools recently experienced a cyber incident

    Cybercriminals are increasingly targeting school networks through phishing and social engineering, a cybersecurity nonprofit reported.

    By Anna Merod • March 12, 2025
  • Capitol building, DC
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Former NSA cyber director warns drastic job cuts threaten national security

    Rob Joyce told lawmakers mass layoffs of federal workers will hurt the ability of the U.S. to combat malicious cyber activity from China and other adversaries.

    By March 10, 2025
  • Image of healthcare equipment
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Cobalt Strike takedown effort cuts cracked versions by 80%

    Fortra, Microsoft and Health-ISAC partnership reduced unauthorized copies of red team tool over the last two years.

    By March 7, 2025
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Eleven11bot estimates revised downward as researchers point to Mirai variant

    The botnet has been involved in DDoS activity targeting telecom companies and gaming platforms.

    By March 7, 2025
  • Broadband connections
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    More than 86K IoT devices compromised by fast-growing Eleven11 botnet

    The Iran-linked botnet has a large presence in the U.S. and is targeting telecom and other firms with DDoS attacks.

    By March 4, 2025
  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Massive Iran-linked botnet launches DDoS attacks against telecom, gaming platforms

    Researchers from Nokia Deepfield and GreyNoise warn the botnet has grown to more than 30,000 devices.

    By March 3, 2025
  • Rhode Island Chief Digital Officer Brian Tardiff and Gov. Dan McKee speak at a Dec. 30 press briefing on the cyberattack against the RIBridges social services database. The officials held a Jan. 10 briefing to notify thousands of recipients that breach notification letters were being mailed out.
    Image attribution tooltip
    Courtesy of Rhode Island
    Image attribution tooltip

    Critical infrastructure at state, local levels at heightened risk of cyberattacks

    State and local governments need additional resources, shared intelligence and coordination, an MS-ISAC report showed.

    By Feb. 28, 2025
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    State-linked threat groups collaborating with hacktivists, other actors to target infrastructure

    Rogue state actors are increasingly outsourcing their intel and hacking tools to attack key industries, a report by Dragos shows. 

    By Feb. 26, 2025
  • A sign is seen at the Microsoft headquarters on July 3, 2024 in Redmond, Washington.
    Image attribution tooltip
    David Ryder via Getty Images
    Image attribution tooltip

    Microsoft Power Pages vulnerability exploited in the wild

    The high-severity privilege escalation flaw in Microsoft's website building application was disclosed and patched last week.  

    By Feb. 24, 2025
  • Broadband connections
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Cisco: Salt Typhoon used new custom malware in telecom attacks

    The China-backed hackers used compromised credentials to gain initial access to Cisco devices.

    By Updated Feb. 21, 2025
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    US authorities warn Ghost ransomware leverages older CVEs

    The China-linked threat group has targeted critical infrastructure providers in more than 70 countries.

    By Feb. 20, 2025
  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Proof-of-concept exploit released for 4 Ivanti vulnerabilities

    Critical flaws in Ivanti Endpoint Manager were initially disclosed and patched last month.

    By Updated Feb. 20, 2025
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    bin kontan / Getty Images via Getty Images
    Image attribution tooltip

    Ransomware gangs shifting tactics to evade enterprise defenses

    Threat actors adapted to improved threat detection, law enforcement actions, new Huntress research finds.

    By Feb. 12, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    Microsoft warns 3K exposed ASP.NET machine keys at risk of weaponization

    An unknown threat actor recently used an exposed key for code injection cyberattacks. 

    By Feb. 7, 2025
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    gorodenkoff/iStock via Getty Images
    Image attribution tooltip

    Suspected botnet targets edge devices using brute force attacks

    Researchers warn of a surge in attempted logins targeting devices from SonicWall, Palo Alto Networks and others.

    By Feb. 7, 2025
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Hackers deployed web shells, exploited public-facing applications in Q4

    A Cisco Talos report also indicated a sharp increase in remote access tools being leveraged in ransomware. 

    By Feb. 6, 2025
  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    State-linked hackers deploy macOS malware in fake job interview campaign

    Actors linked to North Korea bypassed Apple security using malware called FlexibleFerret.

    By Robert Wright, Contributing Reporter • Feb. 4, 2025
  • Front of Hewlett Packard Enterprise's campus in Houston.
    Image attribution tooltip
    Courtesy of HPE
    Image attribution tooltip

    HPE probes hacker claim involving trove of sensitive company data

    The vendor said it has no immediate evidence of operational impacts or compromised customer data.

    By Jan. 21, 2025
  • Statue of Alexander Hamilton.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Treasury Department issues sanctions linked to cyber intrusions, telecom attacks

    The Office of Foreign Assets Control took measures against a state-linked hacker and a Shanghai-based cybersecurity firm in response to the recent attacks against critical infrastructure in the U.S.

    By Jan. 21, 2025
  • A Starbucks worker holds a beverage.
    Image attribution tooltip
    Courtesy of Starbucks
    Image attribution tooltip

    Blue Yonder investigating Clop ransomware threat linked to exploited Cleo CVEs

    The financially-motivated hacker was previously linked to the mass exploitation of critical vulnerabilities in MOVEit file-transfer software.

    By Jan. 17, 2025
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyberattacks, tech disruption rank as top threats to business growth

    Two in five executives view data breaches and leaks as the most financially burdensome man-made threats, a Chubb study found.

    By Alexei Alexis • Jan. 10, 2025