Threats: Page 8


  • A sign is seen at the Microsoft headquarters on July 3, 2024 in Redmond, Washington.
    Image attribution tooltip
    David Ryder via Getty Images
    Image attribution tooltip

    Microsoft Power Pages vulnerability exploited in the wild

    The high-severity privilege escalation flaw in Microsoft's website building application was disclosed and patched last week.  

    By Feb. 24, 2025
  • Broadband connections
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cisco: Salt Typhoon used new custom malware in telecom attacks

    The China-backed hackers used compromised credentials to gain initial access to Cisco devices.

    By Updated Feb. 21, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US authorities warn Ghost ransomware leverages older CVEs

    The China-linked threat group has targeted critical infrastructure providers in more than 70 countries.

    By Feb. 20, 2025
  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Proof-of-concept exploit released for 4 Ivanti vulnerabilities

    Critical flaws in Ivanti Endpoint Manager were initially disclosed and patched last month.

    By Updated Feb. 20, 2025
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware gangs shifting tactics to evade enterprise defenses

    Threat actors adapted to improved threat detection, law enforcement actions, new Huntress research finds.

    By Feb. 12, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft warns 3K exposed ASP.NET machine keys at risk of weaponization

    An unknown threat actor recently used an exposed key for code injection cyberattacks. 

    By Feb. 7, 2025
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Suspected botnet targets edge devices using brute force attacks

    Researchers warn of a surge in attempted logins targeting devices from SonicWall, Palo Alto Networks and others.

    By Feb. 7, 2025
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers deployed web shells, exploited public-facing applications in Q4

    A Cisco Talos report also indicated a sharp increase in remote access tools being leveraged in ransomware. 

    By Feb. 6, 2025
  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    State-linked hackers deploy macOS malware in fake job interview campaign

    Actors linked to North Korea bypassed Apple security using malware called FlexibleFerret.

    By Robert Wright, Contributing Reporter • Feb. 4, 2025
  • Front of Hewlett Packard Enterprise's campus in Houston.
    Image attribution tooltip
    Courtesy of HPE
    Image attribution tooltip

    HPE probes hacker claim involving trove of sensitive company data

    The vendor said it has no immediate evidence of operational impacts or compromised customer data.

    By Jan. 21, 2025
  • Statue of Alexander Hamilton.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Treasury Department issues sanctions linked to cyber intrusions, telecom attacks

    The Office of Foreign Assets Control took measures against a state-linked hacker and a Shanghai-based cybersecurity firm in response to the recent attacks against critical infrastructure in the U.S.

    By Jan. 21, 2025
  • A Starbucks worker holds a beverage.
    Image attribution tooltip
    Courtesy of Starbucks
    Image attribution tooltip

    Blue Yonder investigating Clop ransomware threat linked to exploited Cleo CVEs

    The financially-motivated hacker was previously linked to the mass exploitation of critical vulnerabilities in MOVEit file-transfer software.

    By Jan. 17, 2025
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks, tech disruption rank as top threats to business growth

    Two in five executives view data breaches and leaks as the most financially burdensome man-made threats, a Chubb study found.

    By Alexei Alexis • Jan. 10, 2025
  • FBI Director Chris Wray announces a major operation to disrupt a state-linked botnet, during a speech the Aspen Cyber Summit, Sept. 18, 2024.
    Image attribution tooltip
    Permission granted by Aspen Cyber Summit, Laurence Genon
    Image attribution tooltip

    US Treasury office sanctions firm connected to state-sponsored Flax Typhoon threat group

    A Beijing-based cybersecurity company, Integrity Technology Group Inc., is linked to years of exploitation activity targeting U.S. critical infrastructure.

    By Jan. 6, 2025
  • View of Rhode Island statehouse
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rhode Island officials warn residents as ransomware group threatens social services data leak

    The personal data of hundreds of thousands of vulnerable residents is at risk after a threat group attacked a state social services database.

    By Dec. 18, 2024
  • African engineer are analyzing problems with robotic arms in manufacturing with tablets
    Image attribution tooltip
    Permission granted by Imprivata
    Image attribution tooltip
    Sponsored by Imprivata

    Frontline workforce tech predictions for 2025: A new era of efficiency and security

    2025 Predictions: Boosting frontline efficiency with passwordless tech and identity and access management innovations

    By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber • Dec. 9, 2024
  • A person wearing jeans and a sweater holds a credit card over a laptop, with a blurry holiday tree in the background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    FBI, CISA warn of heightened risk of BEC attacks during holiday season

    Authorities encouraged prompt reporting, which can help recover stolen payments.

    By Nov. 27, 2024
  • 3 People voting at individual voting booths at a voting station outside of a brick building.
    Image attribution tooltip

    Canva

    Image attribution tooltip
    Sponsored by Center for Internet Security

    Countering multidimensional threats: lessons learned from the 2024 election

    In 2024, election officials and law enforcement shared intelligence closely to counter complex threats.

    Nov. 18, 2024
  • password to access personal user data, cybersecurity concept
    Image attribution tooltip

    stock.adobe.com/Song_about_summer

    Image attribution tooltip
    Sponsored by Imprivata

    The company you keep: your most trusted vendor could be your biggest security risk

    Your trusted vendor might be your biggest security risk. Learn how to mitigate third-party threats.

    By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber, Imprivata • Nov. 11, 2024
  • Phone in hand with 'pay' button showing
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI increases fraud risk, fintechs say

    Financial firms monitor for fraud by looking for unusual activity, but an artificial intelligence model can be trained to transact like a real person.

    By Patrick Cooley • Nov. 5, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Enterprise executives cite AI-assisted attacks as top emerging risk, Gartner finds

    The analyst firm’s survey underscores growing concern about potential, yet unrealized, scenarios involving AI’s potential role in attacks.

    By Nov. 4, 2024
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Iran-linked attackers hit critical infrastructure with brute force

    CISA and the FBI warn healthcare, government, IT and other sectors of password spraying and multifactor authentication push bombing.

    By Oct. 17, 2024
  • New York Gov. Kathy Hochul at a podium.
    Image attribution tooltip
    (2024). "Pausing Congestion Pricing to Address Affordability and the Cost of Living in New York" [Video]. Retrieved from Governor Kathy Hochul/Youtube.
    Image attribution tooltip

    State CISOs up against a growing threat environment with minimal funding, report finds

    A report by Deloitte and NASCIO warns that states do not have the resources necessary to fight state-backed and criminal threat groups.

    By Oct. 2, 2024
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Phishing remains cloud intrusion tactic of choice for threat groups

    The long-lasting effectiveness and success of phishing campaigns underscores the most central challenge in cybersecurity — people are the weakest link.

    By Oct. 2, 2024
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    CISA again raises alarm on hacktivist threat to water utilities

    The alert comes just days after an attack against a water treatment facility in Kansas.

    By Sept. 26, 2024