Home
About
Blog
Contact Us
Matt Kapko
Home
/
Matt Kapko, Author at
Matt Kapko
Mandiant spots advanced exploit activity in Ivanti devices
By
Matt Kapko
|
15
Apr, 24
|
Dive Brief: Ivanti Connect Secure devices were exploited and compromised
What’s going on with the National Vulnerability Database?
By
Matt Kapko
|
15
Apr, 24
|
The National Vulnerability Database is so overwhelmed with a steadily
Cybersecurity jobs pay well, but gender disparities persist
By
Matt Kapko
|
15
Apr, 24
|
Dive Brief: Average annual salaries in the cybersecurity sector are
Federal agencies caught sharing credentials with Microsoft over email
By
Matt Kapko
|
14
Apr, 24
|
The Russia-linked hackers behind the attack on Microsoft’s internal systems
Top 5 behaviors of successful CISOs: Gartner
By
Matt Kapko
|
5
Sep, 23
|
Top-performing CISOs regularly practice five key behaviors that level up
MOVEit attack victim count surpasses 1,000 organizations
By
Matt Kapko
|
28
Aug, 23
|
The blast radius from the mass exploit of a zero-day
Ransoming Linux and ESXi systems is getting easier
By
Matt Kapko
|
25
Aug, 23
|
Ransomware threat actors are widening the pool of potential targets
For security to benefit from AI, companies need to shore up their data
By
Matt Kapko
|
24
Aug, 23
|
Artificial intelligence is showing up in new ways across almost
Ransomware attack dwell times fall, pressuring companies to quickly respond
By
Matt Kapko
|
23
Aug, 23
|
Dive Brief: The median dwell time for ransomware attacks fell
MOVEit attack spree makes Clop summer’s most prolific ransomware group
By
Matt Kapko
|
22
Aug, 23
|
Clop was responsible for one-third of all ransomware attacks in
Cuba ransomware group exploits Veeam to hit critical infrastructure
By
Matt Kapko
|
21
Aug, 23
|
Dive Brief: A critical infrastructure organization in the U.S. was
Cyber authorities have a plan to defend remote monitoring tools
By
Matt Kapko
|
18
Aug, 23
|
Cyber authorities are working to mitigate threats to remote monitoring
Security basics aren’t so basic — they’re hard
By
Matt Kapko
|
17
Aug, 23
|
The basics of cybersecurity, it turns out, aren’t so basic.
AWS customers’ most common security mistake
By
Matt Kapko
|
16
Aug, 23
|
It's easy to make mistakes and misconfigure settings in the
How disjoined threat intelligence limits companies — and what to do about it
By
Matt Kapko
|
15
Aug, 23
|
Threat intelligence is more abundant than ever. The information defenders
Dallas to pay vendors $8.6M for their ransomware recovery services
By
Matt Kapko
|
14
Aug, 23
|
The initial cleanup from a May ransomware attack that took
Why Walden thinks this national cybersecurity strategy will work
By
Matt Kapko
|
11
Aug, 23
|
LAS VEGAS — The first national cybersecurity strategy was released
4 ways organizations can take back the advantage from attackers
By
Matt Kapko
|
10
Aug, 23
|
LAS VEGAS – Kelly Shortridge is on a mission —
The MOVEit spree is as bad — or worse — than you think it is
By
Matt Kapko
|
8
Aug, 23
|
The mass exploit of a zero-day vulnerability in MOVEit has
Threat actors abuse valid accounts using manual tactics, CrowdStrike says
By
Matt Kapko
|
8
Aug, 23
|
Dive Brief: Threat actors are spurning the rise of automation
Ransomware attack on Prospect Medical Holdings impacts hospitals across 4 states
By
Matt Kapko
|
7
Aug, 23
|
A ransomware attack against Prospect Medical Holdings disrupted healthcare services
Inside the most-commonly exploited CVEs of 2022
By
Matt Kapko
|
4
Aug, 23
|
Dive Brief: Half of the 12 most-commonly exploited vulnerabilities in
Poor access management besets most cloud compromises, Google says
By
Matt Kapko
|
3
Aug, 23
|
Listen to the article 2 min This audio is auto-generated.
Hot Topic hit by automated credential stuffing attack spree
By
Matt Kapko
|
2
Aug, 23
|
The U.S. retail chain Hot Topic was hit by 12
Tempur Sealy responding to cyberattack that disrupted operations
By
Matt Kapko
|
1
Aug, 23
|
Mattress maker Tempur Sealy is responding to a cyberattack that
Valid account credentials are behind most cyber intrusions, CISA finds
By
Matt Kapko
|
28
Jul, 23
|
Valid account credentials are at the root of most successful
Mandiant finds no evidence of data or cryptocurrency theft in JumpCloud attack
By
Matt Kapko
|
26
Jul, 23
|
One of the JumpCloud customers compromised by last month’s cyberattack
To execute the national cyber strategy, it’s going to take the whole US government
By
Matt Kapko
|
25
Jul, 23
|
Editor's note: Cybersecurity Dive broke the 69 initiatives out of
Investigations are causing data breach costs to skyrocket, IBM finds
By
Matt Kapko
|
24
Jul, 23
|
Dive Brief: Data breach costs hit a new high this
JumpCloud cyberattack hits up to 5 customers, 10 devices
By
Matt Kapko
|
21
Jul, 23
|
Dive Brief: JumpCloud confirmed the impact of a cyberattack last
US government plays catchup on phishing-resistant MFA
By
Matt Kapko
|
20
Jul, 23
|
Federal agencies and cyber authorities are trying to advance a
GoTo, parent company to LastPass, names new CISO
By
Matt Kapko
|
19
Jul, 23
|
Dive Brief: GoTo, the remote IT management and services provider,
Estée Lauder takes down some systems following cyberattack
By
Matt Kapko
|
19
Jul, 23
|
Estée Lauder took some of its systems down as a
UKG agrees to pay up to $6M in lawsuit tied to 2021 breach
By
Matt Kapko
|
18
Jul, 23
|
Dive Brief: UKG reached an agreement to settle a class-action
Cyberattack compromised JumpCloud customer environments
By
Matt Kapko
|
17
Jul, 23
|
A spear-phishing attack allowed an unnamed nation-state sponsored threat actor
White House shares the 69 initiatives slated to shore up national cybersecurity
By
Matt Kapko
|
14
Jul, 23
|
The Biden administration released its implementation plan for the national
MOVEit mass exploit timeline: How the file-transfer service attacks entangled victims
By
Matt Kapko
|
14
Jul, 23
|
May 28 Progress received a call over Memorial Day weekend