https://www.cybersecuritydive.com/news/hackers-threat-campaign-zendesk-environments/806666/
Researchers warn that hackers linked to recent social engineering attacks are targeting customer-service platforms.
cybersecurity divehackersreadythreatcampaign
https://www.cybersecuritydive.com/news/ciso-compensation-report/805676/
Companies are increasingly lavishing benefits on their top security executives, a recent report found.
cisopayriseevensecurity
https://www.cybersecuritydive.com/news/cryptocurrency-mixer-europe-shut-down-germany-switzerland/806653/
Authorities have spent years trying to cripple the ecosystem that helps hackers hide their profits.
europeanpolicedismantlecryptocurrencymixer
https://www.cybersecuritydive.com/news/social-engineering-preferred-initial-access/803363/
Senior executives and high-net-worth individuals are increasingly at risk as hackers use deepfakes, voice cloning and other tactics for targeted attacks.
social engineeringinitial accessgainsgroundpreferred
https://www.cybersecuritydive.com/news/fidelity-national-financial-operations-cyberattack/701370/
The company, one of the largest title insurance firms in the U.S., is still assessing whether the attack will have a material impact on its business.
cybersecurity divefidelitynationalfinancialrestoring
https://www.cybersecuritydive.com/news/state-local-cybersecurity-grant-program-senators-introduce-reauthorization/806784/
Security experts and local officials say the program is vital to protecting the country.
grant programsenatorspushrenewcyber
https://www.cybersecuritydive.com/news/trust-ciso-forrester-customers/609817/
Customers are more likely to forgive a particular brand for putting data at risk if they trust the company, Forrester research shows.
trustbecomingcisopriorityboosts
https://www.cybersecuritydive.com/news/mgm-caesars-attacks-social-engineering/693956/
Multiple threat groups have employed the same criminal tool kit to target vulnerable systems.
social engineeringmgmcaesarsattacksraise
https://www.cybersecuritydive.com/news/masimo-cyberattack-fulfilling-orders/749076/
The maker of patient monitoring devices said the incident will not have a material effect on its updated financial outlook.
sayscyberattackpreventfulfillingorders
https://www.cybersecuritydive.com/news/react-issues-new-patches-after-security-researchers-flag-additional-flaws/807776/
Researchers warn that critical infrastructure providers and government sites are being targeted by state-linked attackers.
security researchersreactissuesnewpatches
https://www.cybersecuritydive.com/news/early-warning-cyber-threat-operational-technology/648401/
The platform will provide a vendor-agnostic option for sharing early threat information and intelligence across industries, the group said Monday.
ot cybersecurityearlywarningthreatinformation
https://www.cybersecuritydive.com/news/fraud-attacks-expected-ramp-up-amid-ai-perfect-storm/808960/
2026 is poised to be “the year of impersonation attacks” amid an explosion of AI-powered tools, a fraud prevention expert said.
fraudattacksexpectedrampai
https://www.cybersecuritydive.com/news/cisa-second-beyondtrust-cve-exploited/737288/
Federal authorities are still working with the company to investigate a hack of Treasury Department workstations, but have not yet explained the CVEs’...
cisaaddssecondbeyondtrustcve
https://www.cybersecuritydive.com/news/uk-authorities-law-cyber-standards-critical-sectors/805416/
The legislation follows a wave of social engineering attacks that rocked the nation’s retail and automotive supply chains.
ukauthoritiesproposelawset
https://www.cybersecuritydive.com/news/battery-energy-storage-systems-risk-cyberattack/807675/
Experts warn that state-linked threat groups are actively searching for ways to disrupt the industry amid growing power demand in the U.S.
battery energy storagegrid scalesystemsfaceheightened
https://www.utilitydive.com/news/experts-raise-concerns-about-cybersecurity-and-energy-storage-batteries-hackers/744170/
Energy storage and other new distributed energy resources could be particularly vulnerable to cyberattack, according to a panel hosted by the Clean Energy...
energy storage systemsexpertsraiseconcernscybersecurity
https://www.cybersecuritydive.com/news/security-breach-hack-rockrose-development/808362/
The New York City-based firm recently found that unauthorized individuals hacked its systems and claimed to have acquired confidential information.
security breachdevelopmentsufferspeoplecybersecurity
https://www.cybersecuritydive.com/news/critical-flaw-in-aws-console-risked-compromise-of-build-environment/809745/
The CodeBreach vulnerability could have enabled a massive supply chain attack, researchers warn.
build environmentcriticalflawawsconsole
https://www.cybersecuritydive.com/news/cisos-hybrid-environments-manage-risk-cloud/807902/
Security leaders are also focused on the convergence of IT and operational technology as business continuity becomes a major concern.
hybrid environmentsmanage riskcisosviewbest
https://www.cybersecuritydive.com/news/ai-threats-security-tools-prepared-lenovo-study/760633/
IT defenders think many of their security tools aren’t ready for AI-powered cyberattacks, according to a new report.
ai attacksevolvingrapidmodeladoption
https://www.cybersecuritydive.com/news/jcdc-energy-water-open-source-cybersecurity-industrial/641406/
The Joint Cyber Defense Collaborative dedicated its 2023 agenda to particularly vulnerable sectors and open source use in industrial systems.
publicprivatecybercollaborativefocus
https://www.cybersecuritydive.com/news/ivanti-critical-cves-exploits/727632/
Hackers are exploiting the vulnerability in tandem with a previously disclosed CVE, to bypass authentication measures and take control of an affected system.
cloud serviceattackersexploitsecondivanti
https://www.cybersecuritydive.com/news/fortinet-threat-activity-older-vulnerabilities/745155/
Researchers discovered a technique that allows threat actors to maintain read-only access to vulnerable FortiGate devices after they are patched.
cybersecurity divefortinetwarnsthreatactivity
https://www.bitdefender.com/en-us/blog/businessinsights/2024-cybersecurity-predictions-for-ai-a-technical-deep-dive
Welcome to our 2024 Cybersecurity Forecast Series! This is the second of our four expert blogs where we unveil key predictions for AI advancements, discuss...
deep divecybersecuritypredictionsaitechnical
https://www.cybersecuritydive.com/news/ceos-cisos-ai-cybersecurity-us-uk/809981/
A new report also found that American executives are more bullish on AI's potential than their British counterparts.
ceoscisossecurityvaluerisks
https://www.cybersecuritydive.com/news/sonicwall-state-linked-actor-attacks-cloud-backup/804867/
CEO announces security and governance reforms inside the company, including the adoption of secure-by-design practices.
cloud backupsonicwallsaysstatelinked
https://www.cybersecuritydive.com/news/apt-microsoft-365-mandiant/604597/
Nation states are combining old techniques with newer methods to establish persistence and steal valuable data from organizations.
cybersecurity diveaptactorstargetmicrosoft
https://www.cybersecuritydive.com/news/sap-netweaver-exploitation-second-wave/747661/
Researchers are tracking hundreds of cases around the world and warning that the risk is more serious than previously known.
sapexploitationenterssecondwave
https://www.cybersecuritydive.com/news/open-source-security-tom-cotton-letter-white-house/808379/
The Senate Intelligence Committee’s chairman voiced concern about foreign adversaries tampering with code.
open source softwarewhite housetoplawmakerasks
https://www.cybersecuritydive.com/news/att-verizon-salt-typhoon/736680/
Two of the largest telecom providers in the U.S. said the China-government sponsored threat group is no longer embedded in their networks.
salt typhoonampverizonsayevicted
https://www.cybersecuritydive.com/news/cisa-senior-official-departures/748992/
Most of the leaders of the agency’s operating divisions and regional offices have left or will leave this month amid the Trump administration’s aggressive...
cisalosesnearlytopofficials
https://www.medtechdive.com/news/fda-ecri-device-group-keep-up-drumbeat-on-cybersecurity-risks/538635/
The agency is launching a cybersecurity playbook for healthcare providers and said it will publish a "significant update" to its 2014...
cybersecurity risksfdadevicegroupkeep
https://www.cybersecuritydive.com/news/cisa-edge-devices-binding-operational-directive/811539/
The government is worried about hackers accessing systems through insecure and poorly monitored routers, firewalls and similar equipment at the network...
network edgecisaordersfedsdisconnect
https://www.cybersecuritydive.com/news/doj-north-korea-remote-worker-crackdown/805689/
Authorities have described Pyongyang’s revenue-generating schemes as threats to U.S. national and economic security.
north koreanuschipsawayworker
https://www.cybersecuritydive.com/news/cisa-extend-funding-cve/745531/
The information security industry feared a lapse would lead to industrywide exposures of software vulnerabilities.
mitrecveprogramregainsfunding
https://www.cybersecuritydive.com/news/clorox-warns-shortages-cyberattack/694030/
The household product maker said the incident damaged IT systems and will have a material effect on its fiscal Q1 performance.
cloroxwarnsproductmonthcyberattack
https://www.cybersecuritydive.com/news/linux-cves-open-source/728310/
Attackers can use the chained vulnerabilities to execute remote commands after a user initiates a print job.
quartetlinuxcvesdrawsexploit
https://www.cybersecuritydive.com/news/cyber-security-outlook/739015/
Threat actors are exploiting known weak points and enterprises’ dependency across the tech stack. It’s making cybersecurity professionals’ jobs harder...
cybersecurityoutlookdive
https://www.cybersecuritydive.com/news/log4j-threats-2022/616616/
As industry returns from the holiday break, organizations are assessing potential security threats from Log4j, ranging from coin miners to hands-on-keyboard...
activityexpectedplaywellcybersecurity
https://www.cybersecuritydive.com/news/nist-input-control-overlays-securing-ai/757909/
The federal agency plans to develop guidance to organizations about various AI use cases.
securing ainistseeksinputcontrol
https://www.cybersecuritydive.com/news/cisa-nsa-guidelines-secure-software-developer/631139/
The guidelines from CISA and the NSA come amid a growing movement to “shift left” and evaluate software security earlier in the development cycle.
fedspushdeveloperstakelead
https://www.paymentsdive.com/news/visa-investment-cybersecurity-threats-fraud-scams/709878/
“We are all in an arms race to protect this ecosystem, to protect the network,” Visa CEO Ryan McInerney said at an investor conference last week.
payments divevisaspendsbattlingcybersecurity
https://www.cybersecuritydive.com/news/russian-hacktivists-critical-infrastructure-remote-access-advisory/807493/
The U.S. and its allies warned that defenders should take the hackers seriously, despite the attackers’ pattern of exaggerating their actual impact.
ot cybersecurityprorussiahacktivistslaunching
https://www.cybersecuritydive.com/news/suffolk-county-ignored-threat-warnings/727352/
A special report blames county officials for ignoring FBI warnings during the 2022 attack and an overall failure of IT and security leadership.
suffolk countyransomware attacklinkedlackplanning
https://www.cybersecuritydive.com/news/tenable-ceo-microsoft-vulnerabilities/625371/
Amit Yoran claims Microsoft failed to acknowledge a critical vulnerability in Azure until Tenable said it would go public.
tenableceocallsmicrosoftlack
https://www.cybersecuritydive.com/news/critical-infrastructure-cybersecurity-federal-support-risk/753686/
A plan to transfer cybersecurity and resilience responsibilities to states could have major unintended consequences.
critical infrastructurefederalcybersupportraises
https://www.cybersecuritydive.com/news/hackers-power-grid-nation-state/609093/
For now, the capability remains in the hands of nation-state actors. But "sophistication can ultimately be bought," Edison Electric...
power gridhackerscouldcrashus
https://www.cybersecuritydive.com/news/shadow-ai-employee-trust-upguard/805280/
Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.
shadowaiwidespreadexecutivesuse
https://www.cybersecuritydive.com/news/surveillance-camera-axis-signs-cisa-security-pledge/806907/
Axis Communications is the first major surveillance camera maker to vow to adhere to CISA’s security guidelines.
surveillance cameraproduct securityleadingvendorsigns
https://www.cybersecuritydive.com/news/cyber-security-trends-outlook-2024/706189/
A steady stream of threats and new regulations have executives tiptoeing around how to best detail security incidents.
aheadcybersecuritydive
https://www.cybersecuritydive.com/news/log4j-apache-update-emergency-directive/611801/
CISA warned civilian agencies to immediately patch systems before Christmas break as researchers see an increase in malicious activity targeting organizations...
federalauthoritiesbracelongholiday
https://www.cybersecuritydive.com/news/fbi-warns-campaigns-salesforce-instances/760129/
The threat groups, identified as UNC6040 and UNC6395, have used different tactics to gain access to data.
cybersecurity divefbiwarnscampaignstargeting
https://www.medtechdive.com/news/eu-group-offers-guidance-on-meeting-mdrs-cybersecurity-standards/569906/
The document says it's important to reference the International Medical Device Regulators Forum's cybersecurity guidance, and policies...
group offerseuguidancemeetingmdr
https://www.cybersecuritydive.com/news/fcc-cyber-trust-mark-ul-investigation-delay/758507/
Internet of Things device makers are eager to participate, but the commission’s concerns about its lead administrator have halted progress of the U.S. Cyber...
iot securitycertification programfccinvestigationcould
https://www.cfodive.com/news/cfo-clues-esg-disclosure-sec-policy-cybersecurity-attorney/598500/
As the Securities and Exchange Commission builds investor protections on sustainable investing, CFOs can look to the agency's approach to...
sectacticspointesgapproach
https://www.cybersecuritydive.com/news/cmmc-defense-contractors-preparedness-survey/761538/
A new survey illustrates the defense industrial base’s fragmented security posture.
cmmccomingcontractorsstilllong
https://www.cybersecuritydive.com/news/ms-chairman-mandatory-disclosure-material-cyberattacks/752584/
The chairman testified before British lawmakers following a major social-engineering attack on the department-store chain.
ampchairmancallsmandatorydisclosure
https://www.cybersecuritydive.com/news/white-house-SolarWinds-response/594934/
The SolarWinds attack has opened a deeper conversation about the role of the federal government in coordinating cybersecurity policy and sharing...
white housetapsleadsolarwindsgovernment
https://www.cybersecuritydive.com/news/colonial-pipeline-ransomware-recovery/600129/
While the company has not disclosed the attack vector, one expert said its quick recovery could be a post-breach success story.
colonial pipelineransomware attackbeginsfueldelivery
https://www.cfodive.com/news/chrevon-repeal-creates-new-wrinkle-for-us-cybersecurity-efforts/720409/
The Supreme Court decision could have major ramifications for federal agencies that rely on old laws to tackle digital-era policy challenges, legal...
chevronrulingaddsnewwrinkle
https://www.cybersecuritydive.com/news/jpmorgan-chase-ciso--software-supply-chain-security/746476/
In an open letter, Patrick Opet said third-party vendors need to embrace secure development practices over speed to market.
supply chain securityjpmorgan chasecisowarnssoftware
https://www.cybersecuritydive.com/news/sec-cybersecurity-disclosure-financial/645333/
The changes would require broker-dealers and other entities to adopt written plans to minimize risk and promptly disclose major incidents.
secproposesdisclosurerulesfinancial
https://www.cybersecuritydive.com/news/cyber-risks-executives-world-economic-forum-report/809350/
The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.
executivesworrycyberenabledfraud
https://www.cybersecuritydive.com/news/cfos-cisos-clash-cybersecurity-spending-expel/810091/
Four in 10 finance leaders said quantified risk reduction would make it easier to justify a cybersecurity spending hike.
cybersecurity spendingcfoscisosclashthreats
https://www.medtechdive.com/news/cybersecurity-priorities-laid-out-by-key-house-panel/543942/
The House Energy and Commerce Committee issued a report outlining six strategies for strengthening the nation's defenses against cybersecurity...
medtech divecybersecurityprioritieslaidkey
https://www.cybersecuritydive.com/news/sinclair-ransomware-attack-costs-insurance/619926/
The group overhauled its internal security policies and named a board-level subcommittee as part of its ongoing attack recovery.
insurance policysinclairlossesmountransomware
https://www.cybersecuritydive.com/news/cisco-china-cyberattacks-asyncos-configuration/808258/
The company urged customers to immediately reconfigure affected products.
cisco securitychinalinkedhackersexploit
https://www.cybersecuritydive.com/news/palo-alto-networks-firewall-exploitation/740193/
The flaw, when chained together with a prior vulnerability, can allow an attacker to gain access to unpatched firewalls.
palo alto networkswarnsfirewallvulnerabilityactive
https://www.cybersecuritydive.com/news/infosec-reporting-structure-CEO-CISO/602201/
About 93% of IT security professionals don't report directly to their CEO, while a majority do not provide security updates to their boards of...
direct accessinfosecstilllackceo
https://www.cybersecuritydive.com/news/financial-majority-cyber-threat-activity/746128/
Stolen credentials are becoming a more prevalent form of initial access, a report from Mandiant shows.
financialgainstilldrivesmajority
https://www.cybersecuritydive.com/news/scattered-spider-expands-tactics-recent-hacks/753220/
Microsoft researchers warn they are seeing changing patterns as the cybercrime group has started trying to hack airlines and other industries after targeting...
scattered spiderexpandsrostertacticsrecent
https://www.cybersecuritydive.com/news/fcc-eliminates-telecom-cybersecurity-requirements/806052/
Commissioners sharply disagreed over whether the rules were appropriate and necessary.
fcceliminatescybersecurityrequirementstelecom
https://www.cybersecuritydive.com/news/cisa-warns-malware-targeting-ivanti-zero-day/743967/
CVE-2025-0282, a critical vulnerability that affects Ivanti’s Connect Secure, Policy Secure and ZTA Gateway products, was disclosed and patched in January.
zero daycisawarnsnewmalware
https://www.cybersecuritydive.com/news/cyberattacks-container-supply-chain/602141/
Bad actors are finding novel methods of attacking cloud-native environments, raising new security challenges for developers.
supply chainscybersecurity diveattackscontainergrow
https://www.cybersecuritydive.com/news/SMB-incident-response-cyber-insurance-hikes/626887/
Limited resources, staffing and executive awareness can hamper attack response capabilities.
midsizedcompaniesgrappleresponse
https://www.cybersecuritydive.com/news/china-actor-us-entities-brickstorm-malware/807166/
Researchers outline a campaign targeting U.S. companies, and CISA warns of attacks on government services and IT firms.
chinanexusactortargetsmultiple
https://www.cybersecuritydive.com/news/ransomware-peaked-2023-enforcement-decrease/807291/
U.S. Treasury report shows drop in threat activity in the wake of aggressive takedown efforts.
law enforcementransomwarepeakedprioractions
https://www.cybersecuritydive.com/news/cybersecurity-awareness-training-research-flaws/803201/
Companies have built their security strategies around phishing simulations and educational webinars, tactics that research shows are ineffective.
security awareness trainingwork
https://www.cybersecuritydive.com/news/servicenow-to-buy-armis-for-775b/808623/
The combination yields a major player in cyber-physical security and exposure management.
cybersecurity diveservicenowbuyarmis
https://www.cybersecuritydive.com/news/sec-delay-final-rule-incident-disclosure/653250/
The agency was seeking prompt reporting of material cyber breaches and attacks, but faced a range of concerns from stakeholders.
final rulesecdelayscyberincident
https://www.cybersecuritydive.com/news/auto-sector-cyber-threats-business-continuity/802974/
A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and...
cyber threatsbusiness continuityautosectorfaces
https://www.cybersecuritydive.com/spons/emerging-cybersecurity-needs-what-the-market-is-telling-us-1/806375/
Default-deny, strict controls and real-time monitoring: how to stop threats before they start.
emergingcybersecurityneedsmarkettelling
https://www.cybersecuritydive.com/news/cleo-exploited-flaw-file-transfer-software/735664/
Researchers confirmed a new zero-day vulnerability is separate from a flaw originally disclosed in October. A notorious ransomware group linked itself to the...
file transfercleoreleasescveactively
https://www.cybersecuritydive.com/spons/the-new-frontline-how-ai-and-automation-are-securing-the-supply-chain/807541/
In today’s digital economy, trust isn’t a given, it’s engineered across the entire supply chain.
newfrontlineaiautomationsecuring
https://www.cybersecuritydive.com/news/ransomware-attack-Ireland-toshiba/600211/
"We are seeing more broad based cyber incidents from our adversaries who are growing more aggressive," said Brandon Wales, CISA acting...
health serviceransomwarefearsescalateirish
https://www.cybersecuritydive.com/spons/ai-driven-dynamic-endpoint-security-is-redefining-trust/805390/
Network perimeters are gone. Modern security solutions must be proactive, dynamic and intelligent.
endpoint securitycybersecurity diveaidrivendynamic
https://www.cybersecuritydive.com/news/operational-technology-security-international-guidance/809851/
A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.
operational technologyusalliescollaboratesecurity