Threats: Page 12


  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    Viasat network cyberattack linked to newly discovered Russian wiper

    SentinelOne researchers said the malware, dubbed AcidRain, is behind the February attack on the satellite communications provider

    By April 1, 2022
  • Image attribution tooltip
    Permission granted by Code42
    Image attribution tooltip

    Cyber extortion surges 78% as 'ransomware as a service' spreads

    Most companies require at least a month to recover from a ransomware attack, Palo Alto Networks found.

    By Jim Tyson • March 29, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Nation-state threat actors remain steps ahead of defenders

    IT security leaders reveal significant gaps in their ability to identify and mitigate sophisticated attacks. 

    By March 28, 2022
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    White House warns US of possible Russian cyberattack linked to Ukraine invasion

    The broad warnings come after federal authorities convened more than 100 critical infrastructure organizations to share classified cyberthreat information.

    By March 21, 2022
  • Smart phone showing multiple payment apps.
    Image attribution tooltip

    Vaidik Trivedi

    Image attribution tooltip

    Payments industry makes a tempting target for hackers

    The industry should remain on high alert, though Russia's war on Ukraine has not caused a major uptick in cyberattacks. 

    By Jonathan Berr , Caitlin Mullen , Lynne Marek • March 21, 2022
  • Cell phone or mobile service tower in forested area of West Virginia providing broadband service
    Image attribution tooltip
    BackyardProduction via Getty Images
    Image attribution tooltip
    Opinion

    Telecoms are essential to everyone's cybersecurity challenges

    Communications systems are accessible almost anywhere, at any time by both friend and foe alike.

    By Jason Atwell • March 21, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    Cyberthreats grow as US, NATO countries press Russia sanctions

    The FBI and CISA warned of potential new threats against satellite communications providers.

    By March 18, 2022
  • Image attribution tooltip
    Carsten Koall via Getty Images
    Image attribution tooltip

    Russian state-sponsored actors target PrintNightmare, MFA settings

    ESET researchers are separately warning about new data wiping malware.

    By March 16, 2022
  • Image attribution tooltip

    NicoElNino / Canva

    Image attribution tooltip
    Sponsored by Enzoic

    The threat from within: How to address the employee element in password security

    There are numerous sides to the password problem, but here are a few common issues to know.

    March 7, 2022
  • Sponsored by Keeper Security

    IT and tech firms hit hard by cyberattacks

      Lack of cybersecurity awareness among employees, especially regarding password security, also contributes to organizations' inability to comprehensively secure their networks.  

    March 7, 2022
  • Image attribution tooltip
    Paul O''Driscoll via Getty Images
    Image attribution tooltip
    Opinion

    Would a cyberattack on a NATO country trigger Article 5?

    Few nations have sophisticated cyber capabilities and for operational security reasons, they are closely guarded, rarely shared, and carefully used.

    By Mark Laity • March 2, 2022
  • Image attribution tooltip
    Chris McGrath via Getty Images
    Image attribution tooltip

    New wiper, worm attacks emerge in Ukraine targeting government and industry

    CISA shared indicators of compromise Thursday, months after the malware strains emerged. 

    By Updated April 29, 2022
  • Image attribution tooltip
    Jon Cherry via Getty Images
    Image attribution tooltip

    K-12 cyber risks complicated with Russia invasion of Ukraine

    One security expert tracked an uptick in threat actors scanning networks for vulnerabilities and looking for anyone to exploit.

    By Anna Merod • March 1, 2022
  • DHS, homeland security
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by spainter_vfx via Getty Images
    Image attribution tooltip

    DHS to lead federal response to Russia-Ukraine crisis

    Cyberattacks in Ukraine continue as Russian troops enter Kyiv.

    By Feb. 25, 2022
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Botnets, data wiping malware spread as Ukraine incursion begins

    A new variant of Cyclops Blink is now targeting Asus routers. 

    By Updated March 18, 2022
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Rail transit vulnerable to cyberattacks, experts say

    Transit networks are a target of criminal and state actors intent on disrupting operations.

    By Dan Zukowski • Feb. 23, 2022
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Officials warn of asymmetric cyberattacks as Ukraine conflict simmers

    The alarms come amid DDoS attacks against targets in Ukraine. 

    By Feb. 16, 2022
  • Amtrak Coast Starlight Train
    Image attribution tooltip
    Laser1987 via Getty Images
    Image attribution tooltip

    Threat actors pressure OT, critical infrastructure by leaking sensitive data

    Mandiant research shows threat actors exposing highly sensitive data amid increased attacks against industrial targets.

    By Feb. 2, 2022
  • Image attribution tooltip
    Martyn Aim via Getty Images
    Image attribution tooltip

    Conflict over Ukraine raises cyber risk for US enterprises

    A diplomatic standoff with Russia threatens to drag U.S. companies and critical infrastructure into wider security crisis that could echo NotPetya. 

    By Feb. 1, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Cyberthreat trends to watch in 2022

    Cybercriminals are finding ways to manipulate corporate data, and for that problem, there really is no end in sight.

    By Sue Poremba • Jan. 31, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    3 tactics shaping ransomware mitigation in 2022

    Though businesses have become more confident in preventing ransomware attacks, confronting risk is an internal commitment.

    By Samantha Schwartz • Jan. 31, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    DHS warns local authorities, critical infrastructure providers over potential Russia threat

    As tensions rise over a possible incursion into the Ukraine, federal authorities say Russia may launch direct cyberattacks against targets in the U.S. 

    By Jan. 25, 2022
  • Image attribution tooltip
    Sam Wasson via Getty Images
    Image attribution tooltip

    Careless employees behind the majority of insider threat incidents: report

    Insider cybersecurity threats continue to rise — and it's partially due to employee apathy. 

    By Samantha Schwartz • Jan. 25, 2022
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Boards, CISOs seek alignment on OT security challenges

    CISOs at industrial companies should inform senior leadership of the unique risks and challenges of potential ransomware and supply chain attacks.

    By Jan. 24, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip
    Opinion

    It's time to focus on critical infrastructure systems security

    Cyber-physical systems running on legacy infrastructure are ideal attack surfaces for malicious actors. 

    By Katell Thielemann • Jan. 24, 2022