Threats: Page 7


  • The exterior of the U.S. Capitol on Jan. 3, 2024.
    Image attribution tooltip
    Colin Campbell/Cybersecurity Dive
    Image attribution tooltip

    Trump administration under scrutiny as it puts major round of CISA cuts on the table

    Congressional members plan to raise questions Tuesday as hundreds of critical jobs could be slashed in the coming weeks.

    By April 7, 2025
  • A man and a woman shake hands in front of a desk that has flags from the U.S. and Ukraine. The people are in front of a blue background with CISA logos.
    Image attribution tooltip
    Retrieved from Jen Easterly/CISA.
    Image attribution tooltip

    CISA, FBI warn of fast flux technique used to hide malicious servers

    Criminal and state-linked hackers use fast-changing DNS records to make it harder for defenders to detect or disrupt malicious activity.

    By April 4, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Palo Alto Networks building
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Mass login scans of PAN GlobalProtect portals surge

    Nearly 24K unique IP addresses have attempted to access portals in the last 30 days, raising concerns of imminent attacks over the past 30 days.

    By Elizabeth Montalbano, Contributing Reporter • April 2, 2025
  • risk management
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Check Point Software confirms security incident but pushes back on threat actor claims

    A malicious hacker recently offered to sell the security firm’s sensitive customer information.

    By April 2, 2025
  • 23andMe
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    FTC chief flags data privacy concerns in 23andMe bankruptcy

    The company filed for bankruptcy after financial challenges over the past few years and a massive data breach in 2023.

    By Alexei Alexis • April 2, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in CrushFTP file transfer software under attack

    Questions and confusion surround the authentication bypass vulnerability, which was privately disclosed to customers on March 21.

    By April 1, 2025
  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hacker linked to Oracle Cloud intrusion threatens to sell stolen data

    Security researchers from Trustwave SpiderLabs provided additional evidence backing up claims of a breach.

    By March 31, 2025
  • Oracle's Silicon Valley corporate headquarters in Redwood, California pictured on September 9, 2019.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat actor in Oracle Cloud breach may have gained access to production environments

    Researchers from CloudSEK are analyzing a data sample from a threat actor that claimed a massive breach involving 6 million records. 

    By March 27, 2025
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware gangs increasingly brandish EDR bypass tools

    Custom tool developed by RansomHub, dubbed “EDRKillShifter,” is used by several other rival ransomware gangs.

    By March 27, 2025
  • FCC Brendan Carr
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    FCC investigating China-linked companies over evasion of US national security measures

    The agency is cracking down on the use of prohibited technologies following a series of hacks into US telecommunications firms.

    By March 24, 2025
  • Cybersecurity Challenges in Remote Work, exploring vulnerabilities, evolving threats, employee awareness, digital transformation impacts
    Image attribution tooltip

    stock.adobe.com/peera

    Image attribution tooltip
    Sponsored by Veracode

    How ASPM gives you control over complex architectures

    ASPM gives organizations control by unifying risk data, automating threat analysis, and prioritizing vulnerabilities based on their business impact.

    By Sohail Iqbal, Chief Information Security Officer, Veracode • March 24, 2025
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    RansomHub using FakeUpdates scheme to attack government sector

    The ransomware gang is collaborating with SocGholish, an extensive malware operation that employs compromised websites and fake browser updates.

    By March 18, 2025
  • Password input field
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Black Basta uses brute-forcing tool to attack edge devices

    The ransomware gang developed an automated framework to guess weak and reused passwords on VPNs and firewalls.

    By March 17, 2025
  • Federal Communications Commission Commissioner Brendan Carr
    Image attribution tooltip
    Kevin Dietsch / Getty Images via Getty Images
    Image attribution tooltip

    FCC launches national security unit to counter state-linked threats to US telecoms

    The new council is part of an effort to thwart Salt Typhoon and other cyber espionage groups.

    By March 13, 2025
  • A bronze depiction of ancient god Medusa with snakes in her hair
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Medusa ransomware slams critical infrastructure organizations

    The ransomware-as-a-service gang tallied more than 300 victims in industries such as healthcare, manufacturing and technology.

    By March 13, 2025
  • A person types on a laptop in a dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Juniper MX routers targeted by China-nexus threat group using custom backdoors

    The devices have reached end-of-life status and need to be upgraded, as the company has issued in a security advisory.

    By March 12, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    Emerging botnet exploits TP-Link router flaw posing risk to US organizations

    Ballista’s attacks on TP-Link devices comes as U.S. lawmakers consider banning the company's products over suspected links to China.

    By Elizabeth Montalbano, Contributing Reporter • March 12, 2025
  • A digital depiction of a red triangle sign with an exclamation point in the center with binary code in the background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    82% of K-12 schools recently experienced a cyber incident

    Cybercriminals are increasingly targeting school networks through phishing and social engineering, a cybersecurity nonprofit reported.

    By Anna Merod • March 12, 2025
  • Capitol building, DC
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Former NSA cyber director warns drastic job cuts threaten national security

    Rob Joyce told lawmakers mass layoffs of federal workers will hurt the ability of the U.S. to combat malicious cyber activity from China and other adversaries.

    By March 10, 2025
  • Image of healthcare equipment
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cobalt Strike takedown effort cuts cracked versions by 80%

    Fortra, Microsoft and Health-ISAC partnership reduced unauthorized copies of red team tool over the last two years.

    By March 7, 2025
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Eleven11bot estimates revised downward as researchers point to Mirai variant

    The botnet has been involved in DDoS activity targeting telecom companies and gaming platforms.

    By March 7, 2025
  • Broadband connections
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    More than 86K IoT devices compromised by fast-growing Eleven11 botnet

    The Iran-linked botnet has a large presence in the U.S. and is targeting telecom and other firms with DDoS attacks.

    By March 4, 2025
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Massive Iran-linked botnet launches DDoS attacks against telecom, gaming platforms

    Researchers from Nokia Deepfield and GreyNoise warn the botnet has grown to more than 30,000 devices.

    By March 3, 2025
  • Rhode Island Chief Digital Officer Brian Tardiff and Gov. Dan McKee speak at a Dec. 30 press briefing on the cyberattack against the RIBridges social services database. The officials held a Jan. 10 briefing to notify thousands of recipients that breach notification letters were being mailed out.
    Image attribution tooltip
    Courtesy of Rhode Island
    Image attribution tooltip

    Critical infrastructure at state, local levels at heightened risk of cyberattacks

    State and local governments need additional resources, shared intelligence and coordination, an MS-ISAC report showed.

    By Feb. 28, 2025
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    State-linked threat groups collaborating with hacktivists, other actors to target infrastructure

    Rogue state actors are increasingly outsourcing their intel and hacking tools to attack key industries, a report by Dragos shows. 

    By Feb. 26, 2025