Russian state-sponsored cyberattackers gained network access to a non-governmental organization by exploiting default multi-factor authentication (MFA) protocols and PrintNightmare, a known security vulnerability.
The cybersecurity threats posed by Russia have been top of mind since prior to the Russian invasion of Ukraine. From critical infrastructure shutdowns to ransomware, what implications does the conflict hold for cybersecurity?
The 2021 Annual Threat Monitor from NCC Group catalogues and analyzes major cybersecurity incidents that occurred in the past year, including ransomware, data breaches and nation-state cyberattacks.
The Department of Homeland Security sent a memo warning of a potential Russian cyberattack on U.S. entities as the situation with Ukraine escalates. Cybersecurity experts weigh in on how enterprise security leaders should prepare.
Enterprise security executives generally don’t plan for nation-state-level cyberattacks on their businesses. That may change going forward, when analyzing new trends in hacking and cybersecurity.
HP Wolf Security released the findings of a global survey of 1,100 IT Decision Makers (ITDMs), examining their concerns around rising Nation State attacks: 72% of respondents said they worry that nation-state tools, techniques, and procedures (TTP) could filter through to the dark net and be used to attack their business.
Risk professionals take note. Experts say the greatest cybersecurity risks to local governments and their "smart city" programs are emergency alert systems, video surveillance devices and traffic signals - a greater risk than breaches of open data, water consumption and gunshot detection technologies and more.
Silicon Valley company FireEye, who is often on the front lines of defending companies and critical infrastructure from cyberattacks, has been breached by hackers.
A Russian ransomware group whose leaders were indicted by the Justice Department in December is retaliating against the U.S. government, many of America’s largest companies and a major news organization, identifying employees working from home during the pandemic and attempting to get inside their networks with malware intended to cripple their operations, reports The New York Times.
Lookout researchers have uncovered a long-running surveillance campaign tied to Syrian nation-state actors, which recently started using the novel coronavirus as its newest lure to entice its targets to download malware. This campaign appears to have been active since the start of January 2018, and targets Arabic-speaking users, likely in Syria and the surrounding region.