-
2023 saw more cloud-based intrusions and data breach-based extortion. Cyber extortion and ransomware, plus election-related disinformation, are likely to be key concerns in 2024, too.
-
After a malware attack last week, the city of Coeur d'Alene's website is back online. The malicious code was first discovered Feb. 11, and affected systems were taken offline as the city worked to secure and restore services.
-
After a Kansas drinking water treatment facility was compromised through remote access on a former employee's cellphone in 2019, the state is launching a tool to assess the cybersecurity of the agencies in charge of keeping drinking water safe.
More Stories
-
A malware attack on the Office of the Colorado State Public Defender has forced it to shut down its computer network. Public defenders are blocked from their work computers and electronic court dockets and filings.
-
A new report from U.S. News reveals that around 61 percent of survey respondents had their personal data breached at some point. Another 44 percent reported that they had this happen multiple times.
-
The Scotland County Board of Commissioners is staying tightlipped about the details surrounding a Dec. 18 cyber incident that cybersecurity officials are still working to get under control.
-
The city of Huber Heights, Ohio, is still in a state of emergency nearly two months after a cyber attack took down multiple government systems and functions. All city services are functional, though additional work is still underway.
-
Artificial intelligence has created a new frontline in the perpetual war between white-hat and black-hat hackers. The technology has the potential to tip the scale for those able to harness its power.
-
An investigation into a malware attack against Tarrant Appraisal District computers found that no taxpayer information was compromised. Officials say two pieces of malware failed upon launch.
-
Here’s what happens when you scan one of those ubiquitous two-dimensional black-and-white patterns, and why the FTC urges you to use caution.
-
Three weeks after a cyber attack took down multiple city of Huber Heights, Ohio, government systems and functions, officials have still not determined what, if any, resident personal data has been released by the hackers.
-
A sophisticated foreign cyber attack disrupted courts across the state last month, jeopardizing sensitive information, the Kansas Supreme Court said this week. Officials are still evaluating the data the criminals stole.
-
Long Beach, Calif., continues to grapple with a Nov. 14 network security incident. It declared a local emergency on Nov. 17 and on Nov. 22 announced the restoration of a few services.
-
County officials say that there is no evidence that resident data was stolen in the October cyber attack. The nature and scope of the attack, and any possible impacts to county data, are still being investigated.
-
Schools faced off against ransomware, banking Trojans, cryptominers and other threats, while citing limited cyber funding. This year, more schools struggled with threat detection and incident response management.
-
The City Council will meet at noon today to decide whether to ratify the city manager’s push for emergency powers to help the city respond to a cyber incident that struck its systems Tuesday.
-
The state’s plan addresses how current and anticipated initiatives support its larger goals of building resilience, preparedness and unification across cybersecurity efforts. The strategy takes a holistic approach across sectors.
-
Officials say the group, called Volt Typhoon, has inserted malware deep in the systems of numerous water and electric utilities that serve military installations in the United States and abroad.
-
The special group tapped by Gov. John Bel Edwards' administration in 2019 to respond to cyber attacks has been in a state of near constant activation. The costs to the state and local government agencies have spiraled in that time, state data shows.
-
The proposed voluntary program would let companies feature labels on consumer products that clear certain cybersecurity criteria, helping consumers identify and select items that are less prone to cyber attack.
-
The attack highlights risks around holiday weekend attacks, targeted software supply chains and the growing popularity of data-theft-based extortion. Still, zero-day exploits comprise only a small slice of extortion attacks.