Cyberattacks: Page 2
-
Rubrik discloses server breach, compromise of ‘access information’
The data security and backup vendor said it found no evidence that the stolen data was used by cyber threat actors.
By Rob Wright • March 4, 2025 -
Microsoft-signed driver used in ransomware attacks
Threat actors are exploiting a privilege escalation flaw in Paragon Partition Manager for “bring your own vulnerable driver” (BYOVD) attacks.
By Rob Wright • March 3, 2025 -
Lee Enterprises investigating ransomware claim, data leak threat
The newspaper chain previously confirmed the attack would likely have a material impact on its financial condition.
By David Jones • March 3, 2025 -
Leaked ransomware chat logs reveal Black Basta’s targeted CVEs
Cybercrime group focused on Microsoft vulnerabilities as well as flaws in network edge devices and communications software.
By Rob Wright • Feb. 27, 2025 -
Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign
GreyNoise observed exploitation of CVE-2018-0171, which Cisco Talos researchers said was used in a recent attack by the China-backed threat group.
By Rob Wright • Feb. 25, 2025 -
stock.adobe.com/Song_about_summer
Sponsored by Palo Alto NetworksIs your browser ground zero for cyber-attacks?
Organizations must not overlook web browser threats – or the new technologies that can defeat them.
By Anupam Upadhyaya, Vice President Product Management – Prisma SASE at Palo Alto Networks • Feb. 24, 2025 -
Tech investment firm Insight Partners discloses data breach
The company holds equity in several major technology companies, including Wiz and Kaseya.
By Rob Wright • Feb. 19, 2025 -
Lee Enterprises says cyberattack will likely have material impact
The newspaper chain said attackers encrypted critical applications and impacted billing, payments and print distribution.
By David Jones • Feb. 18, 2025 -
Phishing campaign targets Microsoft device-code authentication flows
Russian state-sponsored hackers have attacked enterprises and government agencies in North America and overseas.
By Rob Wright • Feb. 18, 2025 -
China-backed hackers continue cyberattacks on telecom companies
Salt Typhoon threat actors compromised Cisco edge devices by exploiting older vulnerabilities.
By Rob Wright • Feb. 13, 2025 -
Ransomware gangs shifting tactics to evade enterprise defenses
Threat actors adapted to improved threat detection, law enforcement actions, new Huntress research finds.
By Rob Wright • Feb. 12, 2025 -
Lee Enterprises investigating cyberattack that disrupted operations across multiple news outlets
The company, a major U.S. newspaper chain, has been working with forensic specialists to fully restore services and determine the cause.
By David Jones • Feb. 11, 2025 -
VeraCore zero-day vulnerabilities exploited in supply chain attacks
Cybercriminals maintained access to one victim organization for more than four years.
By Rob Wright • Feb. 11, 2025 -
CISA warns of hackers targeting vulnerability in Trimble Cityworks to conduct RCE
The software is widely used in projects by local governments, utilities, airports and other facilities.
By David Jones • Feb. 10, 2025 -
HPE issues breach notifications for 2023 Midnight Blizzard attack
Russian state-sponsored hackers compromised the tech giant's Office 365 email environment.
By Rob Wright • Feb. 10, 2025 -
Suspected botnet targets edge devices using brute force attacks
Researchers warn of a surge in attempted logins targeting devices from SonicWall, Palo Alto Networks and others.
By David Jones • Feb. 7, 2025 -
Hackers deployed web shells, exploited public-facing applications in Q4
A Cisco Talos report also indicated a sharp increase in remote access tools being leveraged in ransomware.
By David Jones • Feb. 6, 2025 -
DeepSeek surge hits companies, posing security risks
The Trump administration is scrutinizing the AI app, Italy and Taiwan have banned it, and companies have blocked it.
By Alexei Alexis • Feb. 5, 2025 -
Ransomware payments fell 35% in 2024
Cyberattacks using ransomware spiked in the second half of the year, but fewer victims paid up.
By Rob Wright • Feb. 5, 2025 -
Deloitte pays $5M in connection with breach of Rhode Island benefits site
The company agreed to cover expenses related to recovery from the December cyberattack.
By David Jones • Feb. 5, 2025 -
State-linked hackers deploy macOS malware in fake job interview campaign
Actors linked to North Korea bypassed Apple security using malware called FlexibleFerret.
By Robert Wright, Contributing Reporter • Feb. 4, 2025 -
SonicWall SMA 1000 series appliances left exposed on the internet
The company last week confirmed attackers are actively exploiting a critical vulnerability in the devices.
By David Jones • Jan. 28, 2025 -
Deep Dive
Network security tool defects are endemic, eroding enterprise defense
When malicious hackers exploit vulnerabilities in firewalls, VPNs and routers, it’s not the vendors that get hit — it’s their customers.
By Matt Kapko • Jan. 28, 2025 -
Procter & Gamble operations unhindered by Blue Yonder disruption
The consumer goods company built an in-house solution to keep orders moving as its transportation management system provider navigated a ransomware attack.
By Kelly Stroh • Jan. 28, 2025 -
UnitedHealth hikes number of Change cyberattack breach victims to 190M
The new estimate nearly doubles the company’s previous report of 100 million affected individuals, already the largest healthcare data breach ever reported to federal regulators.
By Emily Olsen • Jan. 27, 2025