Cyberattacks: Page 24


  • A person standing
    Image attribution tooltip
    Erik Von Weber via Getty Images
    Image attribution tooltip
    Sponsored by Delinea

    How do I monitor privileged accounts?

    Are you monitoring your privileged accounts? Start here to shield your organization against attacks.

    By Tony Goulding • Sept. 12, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA announces RFI for critical infrastructure cyber reporting mandate

    The agency plans to publish the information request in the Federal Register on Monday and will kick off a national listening tour.

    By Sept. 9, 2022
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • A baxter spectrum infusion pump
    Image attribution tooltip

    Website of medical device sales form: https://spwindustrial.com/baxter-sigma-spectrum-infusion-pump-s-w-ver-8-with-dual-antenna-wireless-batt/?gclid=Cj0KCQjwpeaYBhDXARIsAEzItbFttwA55ImqoesvcmNYfm6od_td4SGgOeNOqFOQohCiU_ci1yN-oHsaAqiFEALw_wcB

    Image attribution tooltip

    CISA issues advisory after vulnerabilities found on Baxter infusion pumps

    The weaknesses could allow attackers to access WiFi data and make the device unavailable.

    By Nick Paul Taylor • Updated Sept. 8, 2022
  • A rendering of an empty hospital corridor with a reception desk.
    Image attribution tooltip
    Ninoon via Getty Images
    Image attribution tooltip

    Healthcare fintechs targeted by cybercriminals

    Cybersecurity professionals say healthcare payments processing firms are particularly vulnerable to information technology breaches and ransomware attacks.

    By Joe Burns • Sept. 8, 2022
  • A young male student raises his hand to answer a question in an elementary school class.
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Los Angeles school district hit by ransomware attack

    Schools reopened after the holiday weekend but many IT systems remain inaccessible. A districtwide password reset is underway.

    By Sept. 6, 2022
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Email hacking scheme leads to attempted theft of $13M from Pennsylvania school district

    Local government agencies intercepted and recovered $10.3 million in funds stolen from Chester Upland School District.

    By Anna Merod • Sept. 6, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Most organizations remain unprepared for ransomware attacks

    Too many organizations are failing to meet cybersecurity demands. Ransomware attacks abound and humans are still the weakest link.

    By Sept. 6, 2022
  • The threat actor JuiceLedger launched a supply chain attack against PyPI contributors.
    Image attribution tooltip
    Permission granted by SentinelOne
    Image attribution tooltip

    PyPI contributors targeted by JuiceLedger in latest attack against open source

    The supply chain attack represents a potential risk to organizations using open source, researchers from SentinelOne and Checkmarx say.

    By Sept. 6, 2022
  • An octopus floats, depicted in a deep blue background
    Image attribution tooltip
    TheSP4N1SH via Getty Images
    Image attribution tooltip

    Okta CEO pushes for passwordless future in wake of phishing attacks

    Customers that rely on passwords and log-in pages are putting their organizations at greater risk of attack, Todd McKinnon told analysts.

    By Sept. 2, 2022
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Okta entangled by Twilio phishing attack

    The threat actor initiated one-time password requests as they searched dozens of phone numbers linked to a single targeted organization.

    By Aug. 30, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Twilio discloses more victims as phishing attack effects cascade

    The communications and identity authentication provider said it has discovered 163 victims thus far.

    By Aug. 29, 2022
  • Woman Walking On Staircase Of Building
    Image attribution tooltip
    Ceres Van Hal / EyeEm via Getty Images
    Image attribution tooltip
    Sponsored by Delinea

    How does Privileged Access Management work?

    The model is a framework to help you set the right PAM foundation and get your organization on the PAM journey, now and in the future.

    Aug. 29, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Tips for how to safeguard against third-party attacks

    Organizations need to demand and ensure all vendors implement rigorous security measures. Sometimes the least likely tools pose the most risk. 

    By Aug. 25, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Ransomware attack surges tied to crypto spikes

    Not every ransomware attempt leads to a successful attack. But with more attempts comes more potential damage.

    By Aug. 24, 2022
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Credential stuffing hammers US businesses as account data for sale in bulk

    Media companies, retailers, restaurant groups and food delivery services are at heightened risk, the FBI said.

    By Aug. 23, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Third-party attacks spike as attackers target software connections

    Every third-party tool and partnership is a potential path for attack and an opportunity to exploit human behavior. The risks spread far and wide.

    By Aug. 22, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    LockBit ransomware group claims responsibility for Entrust attack

    The prolific ransomware gang threatened to publish data stolen during the attack.

    By Aug. 19, 2022
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp breach shines new light on digital identity, supply chain risk

    Sophisticated threat actors are targeting weak links in the email marketing space to go after vulnerable financial targets.

    By Aug. 18, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    DigitalOcean, caught in Mailchimp security incident, drops email vendor

    An attack on the email marketing firm raises questions about the continued risk of a supply chain compromise. 

    By Aug. 17, 2022
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Twilio phishing attack fallout spreads to Signal

    The vendor’s widely used two-factor authentication service became a point of potential compromise for 1,900 Signal users. One user suffered a direct hit.

    By Aug. 15, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    How attackers are breaking into organizations

    Threat actors lean heavily on phishing attacks, vulnerabilities in software and containers, and stolen credentials, according to top cyber vendor research.

    By Aug. 15, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Internal Cisco data stolen after employee hit by voice phishing attack

    Cisco identified the attacker as an initial access broker with ties to multiple cybercrime and ransomware groups.

    By Aug. 11, 2022
  • A sample phishing text message that targeted Cloudflare employees.
    Image attribution tooltip

    Cloudflare

    Image attribution tooltip

    Cloudflare thwarts ‘sophisticated’ phishing attack strategy that bruised Twilio

    Dissimilar responses from Cloudflare and Twilio bear important lessons in transparency, resiliency and access.

    By Aug. 9, 2022
  • A sample phishing text message provided by Twilio.
    Image attribution tooltip

    Twilio

    Image attribution tooltip

    Twilio employees duped by text message phishing attack

    The communications provider declined to say how many employees were duped and the amount of customers compromised.

    By Aug. 8, 2022
  • Gas pipeline with multiple valves.
    Image attribution tooltip
    insagostudio via Getty Images
    Image attribution tooltip

    Encevo stays resilient post-attack, but it’s still assessing the data damage

    The Luxembourg energy supplier’s ability to thwart a shutdown likely empowered its refusal to pay a ransom.

    By Aug. 8, 2022