Cyberattacks | News, how-tos, features, reviews, and videos

optus store provided by optus media centre
Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

Top 5 attack surface challenges related to security operations

The growing attack surface is extending the security/software developer gap, increasing vulnerabilities, and slowing security investigations.

A conceptual representation of accessing username and password credentials.

Uber links cyberattack to LAPSUS$, says sensitive user data remains protected

Attacker likely bought employee account credentials on the dark web and then escalated privileges to access internal tools.

global meeting conference international business

International cooperation is key to fighting threat actors and cybercrime

Western intelligence and national security leaders emphasize the importance of collaborating to better prepare and respond to cybersecurity threats.

Uber headquarters

Uber responding to “cybersecurity incident” following reports of significant data breach

Uber says it is in contact with law enforcement following reports of a significant data beach of its network.

CIO | Middle East  >  Iran  >  Flag

US government indicts Iranian nationals for ransomware and other cybercrimes

The Department of Justice and FBI claim three Iranian citizens conducted a global cybercrime operation while separately the US Treasury sanctions Iran.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia’s cyber future connected at the waist to Soviet military industrial complex

New research raises questions about whether Russia's cyber warefare operations are up to modern day challenges.

CSO: Have you met these hackers? [slide 04]

Iranian cyberspies use multi-persona impersonation in phishing threads

Iran-sponsored groups use fake personas of real people to add credibility to phishing emails designed to deliver malware through remote template injection.

intro cyber attack maps

U.S. government offensive cybersecurity actions tied to defensive demands

Current and former U.S. government officials explain the country's "defense forward" and offensive cybersecurity policies and their risks.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The 12 biggest data breach fines, penalties, and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $4.4 billion and counting.

trojan horse malware virus binary by v graphix getty

North Korean state-sponsored hacker group Lazarus adds new RAT to its malware toolset

Lazarus has used the new remote access Trojan in campaigns that exploit the Log4Shell vulnerability and target energy companies.

Data breach  >  open padlock allowing illicit streaming data collection

TikTok denies breach after hackers claim billions of user records stolen

TikTok says that data samples are publicly accessible information and not a result of compromise of their systems, networks, or database.

Networking cables viewed through a magnifying lens reveal a data breach.

Samsung reports second data breach in 6 months

Samsung claims no consumer devices were affected by the breach, in which customers’ contact information, dates of birth and product registration details were leaked.

cryptojacking / cryptocurrency attack

Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger

The Nitrokod cryptocurrency mining campaign goes to great lengths to avoid detection and can remain active for years.

Cover image for how much data does facebook use article

Facebook agrees to settle class action lawsuit related to Cambridge Analytica data breach

The four-year-old lawsuit claimed Facebook allowed the British political consulting firm access to private data of over 80 million users.

Security threat   >   One endpoint on a network has been compromised.

Password manager LastPass reveals intrusion into development system

The company states that user data remains secure and it continues to investigate the incident.

A laptop sits on the surface of a stormy sea. [disaster recovery / crisis management]

WannaCry explained: A perfect ransomware storm

WannaCry is a virulent ransomware attack that was designed by a North Korean hacker gang and takes advantage of a Windows vulnerability that remains unpatched on too many computers.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia-linked cyberattacks on Ukraine: A timeline

Cyber incidents are playing a central role in the Russia-Ukraine conflict. Here's how events are unfolding along with unanswered questions.

Digitization of United States currency  >   Digital transactions

What is the cost of a data breach?

The cost of a data breach is not easy to define, but as more and more organizations fall victim to attacks and exposures, the financial repercussions are becoming clearer.

Load More