Threats: Page 21


  • Hands on a keyboard
    Image attribution tooltip
    skynesher/E+ via Getty Images
    Image attribution tooltip

    Protect the keys to the kingdom: Email cyberattacks open doors to core assets

    Any type of cyberattack is bad news for an organization, but when email servers are breached, cybercriminals have ready access to a company's most sensitive assets. 

    By Sue Poremba • April 16, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Enterprise security leaders fear rising AI use among threat actors: report

    Some experts are urging companies to incorporate AI into their cyber defense strategies, while others view the threat of AI as overhyped marketing.

    By April 9, 2021
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies missing security in rushed cloud adoptions

    While misconfigurations are likely unknown today, they have the potential to become critical vulnerabilities.

    By Samantha Schwartz • April 6, 2021
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    2020 was a record year for K-12 cybersecurity incidents

    U.S. schools faced 408 publicized incidents — an 18% increase over 2019, according to the K-12 Cybersecurity Resource Center. 

    By Roger Riddell • April 1, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Shift online exposed and expanded college cybersecurity vulnerabilities

    Ransomware attacks doubled from 2019 to 2020, according to one report, and experts say the increased use of virtual tools opened up new threats.

    By Sue Poremba • March 31, 2021
  • To combat open source insecurity, companies need tech and leadership

    With software dependencies commonplace, it's up to industry to clear a path to greater supply chain security in software.

    By Samantha Schwartz • March 26, 2021
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Babuk ransomware group emerges with new claims against US companies

    The threat actor emerges amid heightened ransomware concerns following the Microsoft Exchange server attacks.

    By March 26, 2021
  • Operational threat intelligence leans on facts, less anecdotal evidence

    Digesting threat intelligence looks different in IT environments than OT.

    By Samantha Schwartz • March 25, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Threat data sharing considered critical to defense amid rise in sophisticated attacks: report

    A Ponemon Institute study shows the value of actionable data as lawmakers and the Biden administration work to encourage intelligence sharing. 

    By March 24, 2021
  • As cyber insurers quantify risk, security spending provides little info

    Quantifying risk appetite, an assessment insurance premiums are based on, is an imperfect science for providers and customers.

    By Samantha Schwartz • March 24, 2021
  • 70% of malicious DNS traffic in tech is cryptomining, phishing: Cisco

    Researchers suggested tech employees were unfamiliar with company policies, triggering cryptomining blocks in Cisco Umbrella. 

    By Samantha Schwartz • March 23, 2021
  • SolarWinds threat actors accessing Microsoft 365 by altering permissions

    Mandiant observed a threat actor linked to the SolarWinds campaign using a stealthy approach to read email in targeted mailboxes.

    By March 22, 2021
  • Microsoft deploys more updates to contain Exchange server fallout

    The FBI and CISA are warning of additional threats from nation states and threat actors as patching and security updates leave many vulnerable companies exposed. 

    By March 12, 2021
  • DearCry ransomware latching onto Exchange hack, Microsoft says

    Patching is the only answer — for now.

    By Samantha Schwartz • March 12, 2021
  • What's in your software? Federal initiative targets frequently overlooked electric utility vulnerabilities

    Software supply chain issues are the subject of a new collaboration between the electric power sector and federal government.

    By Robert Walton • March 11, 2021
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Enterprises scramble to secure Microsoft Exchange as cybercriminals rush in

    Researchers fear, more than two months after the threat was discovered, criminal hackers have had plenty of time to loot data or plant undetected seeds of compromise.

    By March 10, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    55% of healthcare breaches feature ransomware: report

    The healthcare industry is a favored target by cybercriminals: Hospitals cannot tolerate downtime or put off emergency patient care.

    By Samantha Schwartz • March 10, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How do companies assess risk? It's a system-by-system question

    Every piece of technology is vulnerable to threat actors, but each organization and cybersecurity team decides which software and technology adds risk to its business operations.

    By Sue Poremba • March 9, 2021
  • Microsoft Exchange server compromise escalates as mitigation efforts fall short

    Officials warn that patching may not fix compromised systems, while tens of thousands of customers are potentially at risk.

    By March 8, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    3 new malware strains show persistence, sophistication of SolarWinds actor

    The malware strains, identified by Microsoft, were used in targeted, late-stage attacks to compromise a select number of companies last year. 

    By March 5, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Malicious email campaigns target business platforms following remote work surge

    Phishing attacks are more becoming targeted, less frequent and use PII to harvest credentials.

    By March 4, 2021
  • What makes ransomware a constant enterprise pain point

    Threat groups mimic and manipulate the tactics, techniques and procedures of other groups, making ransomware attacks more difficult to prevent. 

    By Samantha Schwartz • March 3, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Exploited Microsoft Exchange campaign hits hundreds of organizations, researchers find

    The nation-state campaign, which Microsoft has linked to China, have targeted on-premises Exchange server vulnerabilities to steal U.S. enterprise data. 

    By March 3, 2021
  • Capitol Hill
    Image attribution tooltip
    The image by Андрей Бобровский is licensed under CC BY 3.0
    Image attribution tooltip

    SolarWinds missed early security warnings

    Lawmakers scrutinized SolarWinds' security practices, including its use of "solarwinds123" as a password, a lapse blamed on a former intern. 

    By March 1, 2021
  • The outside of a Target location in Martinsburg, Virginia
    Image attribution tooltip
    Courtesy of Target
    Image attribution tooltip

    How Target bridges communication gaps between threat intel analysis, detection teams

    The WAVE matrix, a tool the retailer built in-house, is transferable to smaller teams with employees covering multiple security domains.

    By Samantha Schwartz • Feb. 25, 2021