Publicly naming a hacking group can affect everything from retaliation to insurance coverage.
Related Articles
All CyberSecurityDive →Identity and supply chain need more attention, risk intelligence firm says
Dive Brief: Businesses need to pay attention to identity security and third-party risk management to avoid falling prey to hackers whose techniques have evolved, the…
Judge approves AT&T’s $177M data breach settlement
Dive Brief: A federal district court judge has given preliminary approval to a proposed $177 million settlement between AT&T and plaintiffs who sued the company…
Critical PHP vulnerability under widespread cyberattack
Dive Brief: CVE-2024-4577, a critical argument-injection vulnerability that affects PHP installations in Windows systems, has come under widespread exploitation in several countries such as the…
CISA updates cybersecurity benchmarks for critical infrastructure organizations
Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. The Cybersecurity and Infrastructure Security Agency has…
Critical Zyxel vulnerability under active exploitation after long period of quiet
Hackers are exploiting a critical vulnerability in Zyxel’s Internet Key Exchange packet decoder, GreyNoise researchers warned on Monday. The vulnerability, tracked as CVE-2023-28771, powered a…
Ivanti EPMM exploitation widespread as governments, others targeted
European authorities are investigating multiple cybrattacks linked to critical flaws in Ivanti Endpoint Manager Mobile as threat groups step up exploitation activity. Ivanti last week…

