The Latest

  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    Industry to NIST: Keep agentic AI standards flexible and voluntary

    The business community said security guidance should reflect the nascency and diversity of the field.

  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    US entities face heightened cyber risk related to Iran war

    The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks.

  • Two men wearing suits sit in white chairs on a stage
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump administration will test infrastructure cybersecurity approaches in pilot program

    The government can’t rely on a “universal solution” to the challenges facing vital services, a top White House official said.

  • A sign that says "Government Accountability Office" and shows the GAO's seal sits in front of the agency's headquarters
    Image attribution tooltip
    Retrieved from GAO.
    Image attribution tooltip

    Conflicting definitions and timelines cause cybersecurity regulation morass, industry reps say

    A recent Government Accountability Office report highlights businesses’ frustrations with the way the government currently oversees cybersecurity.

  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    State-linked actors targeted US networks in lead-up to Iran war

    Researchers found backdoors installed on U.S. company networks in the weeks prior to the U.S. and Israeli bombing campaign.

  • President Donald Trump addresses reporters at the White House on March 3, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump’s new cybersecurity strategy makes promises but lacks details

    In a document released Friday, the administration vowed to increase the government’s use of AI for rapid cyber defense.

  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Nearly half of exploited zero-day flaws target enterprise-grade technology

    A report by Google Threat Intelligence Group warns that AI will be used to speed and scale attacks in 2026.

  • The exterior of the Department Health and Human Services headquarters.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    HHS adds cybersecurity guidance to healthcare sector self-assessment tool

    Organizations can now use the online platform to test their readiness for digital security crises.

  • Plankey’s nomination as CISA director now in jeopardy

    News that Sean Plankey has left his post at DHS comes amid rising risks to U.S. critical infrastructure from Iran-linked hackers and worries over a weakened CISA.

    Updated March 5, 2026
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft, Europol disrupt global phishing platform Tycoon 2FA

    The service helped cybercriminals bypass multifactor authentication and led to business email compromise and ransomware.

  • CrowdStrike CEO George Kurtz
    Image attribution tooltip
    Courtesy of CrowdStrike
    Image attribution tooltip

    CrowdStrike reports record quarter amid investor concerns about AI impact

    CEO George Kurtz told investors the cybersecurity firm is well positioned to compete against legacy providers.

  • Digital security systems for facilities
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Iran-nexus hackers target flaws in surveillance cameras

    The threat activity echoes prior exploitation during the Israeli war with Hamas, a precursor to attacks against critical sectors in the U.S.

    Updated March 6, 2026
  • A woman wearing a hijab and sunglasses waves an Iranian flag
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Pro-Russia actors team with Iran-linked hackers in attacks

    The groups formed a loose alliance in recent days, targeting critical infrastructure in the Middle East and the U.S. 

    Updated March 3, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware is now less about malware and more about impersonation

    Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

  • Iranians protest against attacks on Iran by Israel and the United States on February 28, 2026 in Tehran, Iran. Iran launched a wave of missiles at Israel and regional U.S. military sites in response to today's attacks, in which the U.S. and Israel struck a series of locations across the country.
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Iran-linked hackers raise threat level against US, allies

    Security researchers warn that hacktivists and state-linked groups are using DDoS, phishing and other tactics against critical infrastructure.

    Updated March 2, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    University of Mississippi Medical Center reopens clinics after ransomware attack

    The academic medical center’s clinics can once again access patient records and are resuming normal operations more than a week after the attack.

    Updated March 2, 2026
  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Trump administration removes controversial acting CISA director

    The new agency chief, Nick Andersen, has significantly more senior cybersecurity leadership experience, which has given some demoralized employees hope.

    Updated Feb. 27, 2026
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Resurge’ malware can remain undetected on devices

    CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.

    Updated Feb. 27, 2026
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UFP Technologies investigating cyberattack that impacted company data

    The medical device maker warned of short-term shipment delays, but does not see a material impact.

  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    AI accelerates lateral movement in cyberattacks

    New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.

  • A hand typing login and password
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Software vulnerabilities are being weaponized faster than ever

    A report by VulnCheck shows threat groups are exploiting a small percentage of critical flaws well before security teams can mitigate.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders agencies to patch Cisco devices now under attack

    The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.

  • A Chinese flag flutters in front of a Chinese government building, on top of which other Chinese flags are flying
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    China-linked hackers breached dozens of telecoms, government agencies

    The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.

  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Threat groups move at record speeds, as AI helps scale attacks

    A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.