Threats: Page 5


  • Exterior of the Moscone Center during the RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Companies need a wakeup call to fix chronic security shortcomings, cyber experts say

    One researcher wonders if the industry needs another Snowden-like moment to spring organizations into action.

    By May 3, 2023
  • Merck sign
    Image attribution tooltip
    Marko Georgiev / Stringer via Getty Images
    Image attribution tooltip

    Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders

    A court victory in the closely watched insurance case is expected to stabilize a turbulent market and provide some assurance for organizations amid a rise in nation-state activity.

    By May 3, 2023
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors. Explore the Trendline
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • RSA Conference 2023 banner at Moscone Center in San Francisco on April 25, 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    3 areas of generative AI the NSA is watching in cybersecurity

    Generative AI is a “technological explosion,” NSA Cybersecurity Director Rob Joyce said. While it is game changing, it hasn’t yet delivered. 

    By May 1, 2023
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Organizations are boosting resilience, getting faster at incident response

    While the number of data security incidents remained level between 2021 and 2022, companies improved recovery thanks to stronger security measures, BakerHostetler found.

    By May 1, 2023
  • Brain icon symbolizing AI in center of photo surrounded by other icons representing the potential widespread use of AI in technology
    Image attribution tooltip
    bymuratdeniz via Getty Images
    Image attribution tooltip

    Teenagers, young adults pose prevalent cyberthreat to US, Mandiant says

    The brains behind high-profile attacks last year, teenagers and young adults use sophisticated social engineering techniques for intrusions.

    By April 25, 2023
  • Computer engineer working with a computer interface in a factory.
    Image attribution tooltip
    Thinkhubstudio via Getty Images
    Image attribution tooltip

    Early warning threat information platform launched for OT

    The platform will provide a vendor-agnostic option for sharing early threat information and intelligence across industries, the group said Monday. 

    By April 24, 2023
  • Digital background depicting innovative technologies in (AI) artificial systems, neural interfaces and internet machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT to sharpen cyberthreats, but no need to panic yet

    Startling dangers, such as autonomous attack mechanisms and sophisticated malware coding, have yet to materialize. For now, the threat is more specific.

    By April 21, 2023
  • Image of water ripples on an abstract background.
    Image attribution tooltip
    Eduard Harkonen / Getty Images Plus via Getty Images
    Image attribution tooltip

    3CX attack caused by another supply chain attack, Mandiant says

    Mandiant Consulting CTO Charles Carmakal called the incident very novel and quite scary after the firm traced the attack to a previous compromise in financial trading software from Trading Technologies.

    By April 20, 2023
  • Typhoon makes landfall in Shanghai, China.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Microsoft summons weather events to name threat actors

    Under the new taxonomy, a blizzard or typhoon designation represents a nation-state actor and financially motivated threat actors fall under the family name tempest.

    By April 19, 2023
  • In this photo illustration, OpenAI's ChatGPT AI-generated answer to the question "What can AI offer to humanity?"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip
    Opinion

    ChatGPT at work: What’s the cyber risk for employers?

    The use of ChatGPT could run afoul of company policy, copyright concerns, customer confidentiality or even international privacy laws, BlackBerry’s CISO writes. Here’s what businesses should consider.  

    By Arvind Raman • April 11, 2023
  • People at work in a large warehouse full of boxes.
    Image attribution tooltip
    kupicoo via Getty Images
    Image attribution tooltip

    Leftover data lurks across the enterprise, creating a business risk

    When an organization has little visibility into the data in its possession, it becomes even more vulnerable to data leaks, breaches, and both insider and external threats. 

    By Sue Poremba • April 7, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    Palo Alto security software stung by ransomware strain

    Check Point researchers say the “Rorschach” ransomware – found during an attack on a U.S. company – may be the fastest ever seen.

    By April 4, 2023
  • The Google logo adorns the outside of their NYC office Google Building 8510 at 85 10th Ave on June 3, 2019
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Threat intelligence isn’t for everyone, Google says

    Most security professionals don’t have the time to read a 10-page threat intelligence report, let alone put those insights into action.

    By March 23, 2023
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Google Cloud joins FS-ISAC’s critical providers program to share threat intel

    The move is part of a wider industry effort to enhance supply chain security in the financial services sector.

    By March 17, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Bank failure panic fuels moment of opportunity for threat actors

    As regulators step in to operate Silicon Valley Bank, threat hunters and security executives warned organizations to look out for malicious activity.

    By March 14, 2023
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    CISA launches ransomware warning pilot for critical infrastructure providers

    The agency already warned dozens of organizations about ProxyNotShell.

    By March 14, 2023
  • Person using AI-generated chatbot
    Image attribution tooltip
    ipuwadol via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT, too. Here’s what businesses should watch

    While IT departments seek enterprise applications, cyber teams must be on the lookout for attacks using the generative AI technology.

    By Lindsey Wilkinson • Feb. 22, 2023
  • Coin stacks sitting on blue financial graph background.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Economic volatility to exacerbate cyber risk in 2023

    A potential recession could lead to delayed innovation and inadequate budgets for long-term investments, the Bipartisan Policy Center said in a report.

    By Feb. 14, 2023
  • Graphic of digital money transfer symbols overlaid on a map of the world
    Image attribution tooltip
    ArtemisDiana via Getty Images
    Image attribution tooltip

    Companies often operate in dark with little applied threat intelligence

    A report by Google Cloud’s Mandiant shows companies are making cybersecurity decisions without a full understanding of what they’re up against.

    By Feb. 13, 2023
  • Communication network concept. GUI (Graphical User Interface).
    Image attribution tooltip
    metamorworks via Getty Images
    Image attribution tooltip

    Half of executives expect an increase in cyber incidents targeting financial data: report

    A poll by Deloitte shows organizations are not well prepared to handle a rise in attacks targeting sensitive accounting and financial information.

    By Feb. 8, 2023
  • Person in hat surrounded by cameras at a press conference
    Image attribution tooltip

    Ross D. Franklin/AP

    Image attribution tooltip

    Sports betting apps fumble open source, placing users at risk

    On the cusp of Super Bowl 57, researchers from Synopsys warned popular mobile betting apps face a higher than average risk of being hacked.

    By Feb. 7, 2023
  • An image of Federal Bureau of Investigation Director Christopher Wray at a press conference.
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    Hive takedown puts ‘small dent’ in ransomware problem

    Successful law enforcement actions against ransomware can only do so much. The threat is omnipresent, lucrative and largely in the shadows.

    By Feb. 6, 2023
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Threat actors are using remote monitoring software to launch phishing attacks

    A joint warning from CISA, the NSA and MS-ISAC warns APT actors could leverage legitimate tools using help-desk themed lures to gain persistence. 

    By Jan. 26, 2023
  • A depiction of computer hardware.
    Image attribution tooltip
    solarseven via Getty Images
    Image attribution tooltip

    World Economic Forum officials warn global instability could lead to catastrophic cyber event

    A report released at the WEF said top business leaders and security experts fear heightened geopolitical tensions could result in a major attack in the next two years.

    By Jan. 19, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Threat actors lure phishing victims with phony salary bumps, bonuses

    Multiple campaigns underscore threat actors’ ability to shift tactics and target employees by exploiting current events and themes.

    By Jan. 19, 2023