Articles about cyberattack

Healthcare attackers switch to smaller targets

While large healthcare providers have lots of juicy data to tempt cybercriminals, they are also likely to have strong defenses.

It's not too surprising then that a new report from managed detection and response provider Critical Insight shows that in the first half of this year attackers have shifted their attentions to smaller hospital systems and specialty clinics that lack the same level of security preparedness, staff size, or budget.

Continue reading

New, free tool to help enterprises assess financial risk of cyberattacks

Risk dial

A successful cyberattack can have significant costs for a business, in terms of both reputation and finances. But what's the actual cost of an attack? And if you're looking at insurance how much should you be covered for?

To help answer those questions Safe Security is announcing two industry-first assessment tools to empower organizations to make financial decisions based on their actual cyber risk.

Continue reading

Cybercriminals attack the wrong water company in bungled extortion attempt

Glass filled with drinking water

On Monday, hacker group ClOp claimed to have gained access to 5TB of data from UK water supplier Thames Water and said it could change the chemical composition of the company's water supply.

Thames Water denied the reports and said it hadn't faced a cyber attack. Today it emerges that an attack has taken place but on a different company, South Staffordshire plc, the parent company of South Staffs Water and Cambridge Water.

Continue reading

Attacks on healthcare organizations increase 90 percent

There has been a 90 percent increase in the number of healthcare organizations targeted by cyber-attacks, in comparison with the first quarter of 2022.

The latest cyber threat Landscape report from Kroll finds that while phishing continues to be the vector used for initial access, there has been a vast increase in external remote services (such as VPNs and RDP environments) being compromised, up 700 percent.

Continue reading

Stolen data used to launch more effective BEC attacks

Email attack

New research from Accenture shows that data stolen in ransomware and other cyberattacks is being weaponized in order to carry out business email compromise (BEC) attacks.

Underground forums have sets of credentials for sale for as little as $10 that provide access to genuine corporate email accounts, making malicious emails seem genuine.

Continue reading

Key things you didn't know about phishing

phishing keyboard hook

Phishing is one of the most common forms of cyberattack, fooling people into thinking they're dealing with a trusted organization in order to get them to part with credentials.

But what are the hallmarks of a phishing attack? Atlas VPN has collected some phishy statistics to find out.

Continue reading

Why security teams should prepare to slay the three-headed dragon [Q&A]

three headed dragon

Governments, utilities and other key industries are prime targets for attack including from nation state actors and cybercriminals seeking to extract a ransom.

But David Anteliz, technical director at Skybox, believes that given the increase in tensions across the world threat actors will evolve their tactics with the use of a 'three-headed dragon approach' that goes beyond the probing we have seen so far.

Continue reading

Do we need a cyber NATO to address the changing threat landscape? [Q&A]

security guards

The threat landscape facing enterprises is changing constantly. In recent months, major vulnerabilities like Log4j and malware-based threats have demonstrated the need for organizations to move quickly in order to defend themselves.

Is the best way to stay on top of the most pressing threats to harness the power of the global cybersecurity community for defense in a sort of cyber NATO? We talked to SOC Prime CEO Andrii Bezverkhyi to find out.

Continue reading

Average cost of a data breach increases by 16 percent

Thief stealing money with laptop and credit card

A new report released today by ForgeRock shows the average cost of a breach in the US has increased by 16 percent to $9.5m, making the US the costliest place in the world to recover from a breach.

It also reveals a massive 297 percent surge in breaches caused primarily by security issues associated with supply chain and third-party suppliers and representing almost 25 percent of all breaches.

Continue reading

A third of mid-sized organizations don't have a cyber-incident response plan

Incident Coordinator Pressing INCIDENT RESPONSE

The rise of ransomware and other attacks has pushed cybersecurity up the agenda of businesses, yet according to a new study 36 percent of mid-sized organizations don't have a formal incident response plan in place.

The report from Egnyte, based on a survey of 400 US executives conducted by Wakefield Research, also shows that the rise in cyberattacks has prompted organizations to increase focus on user access to critical data repositories.

Continue reading

Businesses unprepared to deal with ransomware

Ransomware

Ransomware attacks continue to impact organizations worldwide with high costs, but businesses are still largely unprepared to deal with them.

New data from Arcserve shows half of IT decision makers surveyed by Dimensional Research have been targeted by ransomware, 35 percent report their organizations were asked to pay over $100,000 in ransom payments, and 20 percent were asked to pay between $1 million to $10 million.

Continue reading

Threat of firmware attacks is a growing concern for business

encryption_padlock

New research from HP Wolf Security finds that 80 percent of IT leaders are concerned about their capacity to respond to firmware attacks.

The study shows that 67 percent of IT leaders say protecting against, detecting, and recovering from firmware attacks has become more difficult and time-consuming due to the increase in home working, with 64 percent saying the same of analyzing the security of firmware configuration.

Continue reading

Why we need to take the threat of cyberwarfare seriously [Q&A]

Cyber war

The age of what might be called the hobbyist hacker is long gone, replaced by a much more serious trend towards organized crime and nation states being behind hacking and cyberattacks.

In an era where data can be weaponized, both businesses and governments need to take the threat seriously. It's important for security teams to understand how attacks are carried out and the motivations that lie behind them.

Continue reading

Over half of organizations suffer cyberattacks in the cloud

Cloud fail

A new report reveals that 53 percent of organizations have experienced a cyberattack on their cloud infrastructure within the last 12 months.

The 2022 Cloud Security Report from Netwrix shows that was the most common type of attack, experienced by 73 percent of respondents.

Continue reading

BEC attacks get more businesslike to trick users

Holding email icon

Business email compromise attacks are up 53 percent over the last year and are increasingly trying to look more like legitimate emails in their use of language.

A new report from Armorblox shows 74 percent of BEC attacks are using language as the main attack vector.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.