The Latest

  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Asian government’s espionage campaign breached critical infrastructure in 37 countries

    The victims included national telecommunications firms, finance ministries and police agencies, with most targets suggesting an economic focus, Palo Alto Networks said.

  • Illustration of five overlapping circles with stars transitioning to a sun, clouds, and hills. Set against a purple grid background with floating geometric shapes.
    Image attribution tooltip

    Tines

    Image attribution tooltip
    Sponsored by Tines

    New research: 3 big challenges facing security teams (and how to overcome them)

    New research from Tines shows AI adoption is high, but manual workloads and burnout persist.

  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    React2Shell exploitation undergoes significant change in threat activity

    Researchers see a sudden consolidation of source IPs since late January.

    Updated Feb. 4, 2026
  • Picture of a cybersecurity lock
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in SolarWinds Web Help Desk under exploitation

    The vulnerability could allow an attacker to achieve remote code execution. 

    Updated Feb. 5, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

  • Two men sit on a stage in front of a blue backdrop bearing the logos of a conference and its sponsors
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    National cyber director solicits industry help in fixing regulations, threat information-sharing

    President Donald Trump’s chief cybersecurity adviser said a forthcoming national strategy will kick off ambitious projects.

  • Two men and a woman sit on an event stage in front of a blue backdrop that displays the name of the event and its organizer
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI-ISAC inches forward under Trump administration

    The U.S. government is exploring different options for how the information-sharing organization should work, an official said.

  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaws in Ivanti EPMM lead to fast-moving exploitation attempts

    Security researchers warn that the initial threat activity was highly targeted, as a limited number of users were impacted prior to disclosure.

  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    National cybersecurity strategies depend on public-private trust, report warns

    An influential cybersecurity think tank urged governments to consult extensively with a wide variety of business stakeholders before making ambitious plans.

  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ShinyHunters escalates tactics in extortion campaign linked to Okta environments

    Researchers are tracking multiple clusters that are using social engineering to gain access to victims.

  • Jaguar Land Rover Assembly Line for at Halewood in the U.K.
    Image attribution tooltip
    Courtesy of Jaguar Land Rover
    Image attribution tooltip
    Deep Dive

    Manufacturers fortify cyber defenses in response to dramatic surge in attacks

    IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.

  • 2026 background, symbolizing future technologies and innovations in a high-tech environment.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

    A look at the most important trends and issues in cyber this year.

  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

  • Hooded hacker sits in front of computer screens.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, security researchers warn FortiCloud SSO flaw is under attack

    The exploitation activity comes weeks after a similar authentication bypass vulnerability was found.

  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Federal pivot on software security oversight could complicate vendor strategies

    Software companies cheered the elimination of a government-wide attestation mandate. What comes next could be messy.

  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI tools break quickly, underscoring need for governance

    In a new report, the security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.

  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Corporate workers lean on shadow AI to enhance speed

    A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk.

    Updated Jan. 28, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime group claims credit for voice phishing attacks

    Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.

    Updated Jan. 27, 2026
  • CISA Director Jen Easterly speaking at RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Federal agencies abruptly pull out of RSAC after organizer hires Easterly

    The decision fits a pattern of government withdrawal from the cybersecurity community under the Trump administration.

  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    5 cybersecurity trends to watch in 2026

    Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market.

  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST is rethinking its role in analyzing software vulnerabilities

    As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.

  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Acting CISA chief defends workforce cuts, declares agency ‘back on mission’

    Lawmakers in both parties expressed concerns about CISA losing roughly a thousand employees.

  • Multiple padlocks encircled by white, on a blue surface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT teams aren’t equipped to stop rogue AI agents

    Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.

  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    LastPass warns backup request is phishing campaign in disguise

    Customers received deceptive emails over the holiday weekend claiming the company was doing maintenance.

    Updated Jan. 23, 2026