The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars.
Related Articles
All CyberSecurityDive →Cisco: Salt Typhoon used new custom malware in telecom attacks
Table of Contents Dive Brief: Dive Insight: Defending Against Salt Typhoon Dive Brief: In research published Thursday on Salt Typhoon’s hacking campaign against telecom carriers,…
Operational impacts top list of vendor risk worries, study finds
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Operational risk is the most…
CISA taps Karen Evans as executive assistant director for cybersecurity
Dive Brief: The Cybersecurity and Infrastructure Security Agency confirmed that Karen Evans was named executive assistant director for cybersecurity under the Department of Homeland Security. …
CISOs view hybrid environments as best way to manage risk, compliance
Hybrid infrastructure that includes a mix of public/private cloud environments, on-premises workloads and air-gapped systems are preferred by security leaders as a way to boost…
United Natural Foods says cyberattack will reduce quarterly earnings
Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Food supplier United Natural Foods…
Stryker restores most manufacturing after cyberattack
The medtech company has been working to restore manufacturing, ordering and shipping operations since it was hit by a cyberattack on March 11. Source link

