The Latest

  • A clinical operating room with two medical professionals; one seated at a robotic surgery console and the other standing next to a patient covered in blue drapes with robotic arms positioned above.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Healthcare breaches double as shadow AI, vendor risks proliferate

    A new report paints a picture of a sector with limited confidence in its defensive capabilities.

  • Business person uses software tool to help with tracking business performance.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of hedge funds boosted cybersecurity spending in 2025

    About half of firms suffered a breach, and a large percentage cited third-party risks.

  • A digital map of the globe
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Executives worry most about cyber-enabled fraud, geopolitics and AI

    The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.

  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    Critical vulnerability found in n8n workflow automation platform

    The open-source platform is widely used across enterprise environments, leaving thousands of instances at risk.

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    CISA’s 7 biggest challenges in 2026

    From infrastructure protection to improving morale, the cybersecurity agency has a lot on its plate — and it still lacks a leader.

  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s forecasts growing AI threats, regulatory friction for 2026

    The U.S. and the EU continue to pursue starkly different regulatory agendas, the research firm noted.

  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST asks public for help securing AI agents

    The agency is interested in case studies showing how best to protect agents from hackers.

  • Cybersecurity warning with red warning symbol with binary code
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How CIOs can brace for AI-fueled cyberthreats

    Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.

  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports fiscal Q3 sales slump following cyberattack

    The hack forced the automaker to halt production for weeks and caused disruptions across the supply chain.

  • Arup derauded by AI deepfake
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fraud attacks expected to ramp up in AI ‘perfect storm’

    2026 is poised to be “the year of impersonation attacks” amid an explosion of AI-powered tools, a fraud prevention expert said.

  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC IoT labeling program loses lead company after China probe

    It’s unclear if the FCC will seek to continue the program, which originated during the previous administration.

    Updated Jan. 6, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risky shadow AI use remains widespread

    A new report offers fresh evidence for why enterprises should prioritize AI governance policies.

  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Thousands of firewalls at risk as legacy flaw in Fortinet faces renewed threat

    The company in December warned of recent attacks targeting a 2020 vulnerability.

    Updated Jan. 5, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA loses key employee behind early ransomware warnings

    The future of a program that has helped prevent an estimated $9 billion in economic damages is now unclear.

  • Doors are fitted and checked during production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. Jaguar Land Rover is relaunching certain operations following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risks grow as manufacturers turn to AI and cloud systems

    Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report.

  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST and MITRE partner to test AI defense technology for critical infrastructure

    Experts said the new partnership should focus on making AI-based systems more reliable.

  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    WatchGuard warns critical flaw in Firebox devices facing exploitation

    The company said the threat activity is part of a larger campaign against edge devices and internet-exposed infrastructure.

    Updated Dec. 23, 2025
  • The ServiceNow headquarters campus in Santa Clara, California on Feb. 21, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ServiceNow to buy Armis for $7.75B

    The combination yields a major player in cyber-physical security and exposure management. 

  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA warns of continued threat activity linked to Brickstorm malware

    Officials provided additional evidence showing its ability to maintain persistence and evade defenses.

  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says

    Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

  • Senator Tom Cotton stares sternly into the distance
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    Top lawmaker asks White House to address open-source software risks

    The Senate Intelligence Committee’s chairman voiced concern about foreign adversaries tampering with code.

  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-linked hackers exploit insecure setting in Cisco security products

    The company urged customers to immediately reconfigure affected products.

  • The Microsoft logo is pictures on the technology company's headquarters in Redmond, Washington, on July 3, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    State-linked and criminal hackers use device code phishing against M365 users

    Russia-linked groups have attacked multiple sectors in recent months.

  • An aerial view of a city on the water.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rockrose Development suffers security breach affecting 47,000 people

    The New York City-based firm recently found that unauthorized individuals hacked its systems and claimed to have acquired confidential information.