The Latest

  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    West Pharmaceutical starts restoring operations after ransomware attack

    The company confirmed data was stolen and encrypted by the attackers.

  • Foxconn's manufacturing site in the Village of Mount Pleasant, Wisconsin.
    Image attribution tooltip
    Courtesy of Foxconn
    Image attribution tooltip

    Foxconn confirms cyberattack affecting some North American facilities

    A ransomware group has claimed a major attack against the electronics manufacturer.

  • A digital depiction of a red triangle sign with an exclamation point in the center with binary code in the background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Instructure confirms cybersecurity incident

    The ed tech company that operates Canvas said information impacted by the data breach includes messages, names, email addresses and student ID numbers.

  • Sam Altman speaks in a conference setting
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    OpenAI launches Daybreak to combat cyber threats

    The cybersecurity initiative uses AI to detect software vulnerabilities, partnering with Cloudflare, Cisco and CrowdStrike to counter threats.

  • A banner reading "Power of Community" and "RSAC 2026 Conference" hangs over a walkway between two sets of escalators
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI and an absent government: Takeaways from RSAC 2026

    Cybersecurity professionals discussed the balance between autonomy and oversight at the recent conference.

  • Artificial intelligence technology AI symbol digital concept 3d illustration
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity takes center stage as a leading factor in enterprise cyberattacks

    A new report shows two-thirds of ransomware attacks began with an identity-related breach.

  • Electrical transmission towers and their power lines loom over trees at dusk
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip
    Deep Dive

    New cybersecurity industry coalition aims to lead US critical infrastructure protection

    The new Alliance for Critical Infrastructure’s biggest goal: changing how the nation plans for a major cybersecurity crisis.

  • Claude, AI startup, Anthropic
    Image attribution tooltip
    Permission granted by Anthropic
    Image attribution tooltip

    Anthropic’s Claude used in attempted compromise of Mexican water utility

    Researchers warn the incident highlights how AI tools can help untrained threat actors develop complex cyberattack capabilities.

  • Digital background depicting AI systems and machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    AI used to develop working zero-day exploit, researchers warn

    A report by GTIG shows threat groups are increasingly leveraging AI to scale attacks. The exploitation attempt was disclosed and patched, preventing a mass incident.

  • A screenshot of a message from ShinyHunters on a laptop screen.
    Image attribution tooltip
    Permission granted by Chris Insana
    Image attribution tooltip

    Second Canvas data breach causes major disruptions for schools, colleges

    The Instructure-owned learning management system went offline on May 7 after a threat actor once again gained unauthorized access.

  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks warns state-linked cluster behind zero-day exploitation

    A patch for the flaw, which hackers began targeting in early April, won’t be ready for another week.

  • Iran-sponsored threat group behind false flag social engineering campaign

    The state-linked actor has been masquerading as a criminal ransomware group in attacks targeting U.S. organizations.

  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses hide vast majority of ransomware attacks, report finds

    The security firm BlackFog said the number of disclosed incidents it tracked in Q1 was roughly one-tenth of the number of undisclosed incidents.

  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST will test three major tech firms’ frontier AI models for cybersecurity risks

    After Anthropic’s announcement of Claude Mythos, agencies across the government are racing to get ahead of new AI models’ potential dangers.

  • A smartly-dressed businessman is resting in his office in front of his computer.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses eager but unprepared for AI to transform their security strategies

    Meanwhile, a new report found, companies are neglecting other basic security tools.

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA urges critical infrastructure firms to ‘fortify’ before it’s too late

    As concerns mount about potential cyber sabotage by the Chinese government, the U.S. is warning operators to practice maintaining services in a degraded state.

    Updated May 5, 2026
  • Digital background depicting AI systems and machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Trellix investigating breach of source code repository

    The cybersecurity company said there is no immediate evidence of code being exploited or released.

  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    New MOVEit vulnerabilities prompt urgent patch warning

    Progress Software warned customers to immediately upgrade the file-transfer tool to fix the serious flaws.

  • a worker looking at a screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in cPanel leads to widespread exploitation

    Researchers warn that threat activity continues to surge, including brute force attacks and ransomware.

  • View of the White House with flowers and fountain in front.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    White House questions tech industry on defensive AI use, cybersecurity resilience

    Companies may be reluctant to answer some of the government’s questions, given the sensitive topics they address.

  • An illustration of agentic AI
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    US and allies urge ‘careful adoption’ of AI agents

    New guidance from a coalition of Western governments underscores the difficult-to-predict risks of still-evolving agentic tools.

  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    As email phishing evolves, malicious attachments decline and QR codes surge

    A new Microsoft report also describes the collapse of a once-dominant tool for generating phishing websites with fake CAPTCHAs.

  • Chris Skipworth, Passpack, password management, operational technology, connected building systems
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US agencies promote zero-trust practices for operational technology networks

    Many zero-trust defenses work differently in industrial environments than in traditional business networks, five federal agencies said in newly published guidance.

  • a digital padlock illustration with the letters AI
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    State CISOs losing confidence in ability to manage cyber risks

    Deloitte-NASCIO study shows AI, budget pressures are forcing states to make tough decisions.

  • PwC logo at NYC headquarters.
    Image attribution tooltip
    Spencer Platt/Staff via Getty Images
    Image attribution tooltip

    PwC partners with Google Cloud to take on the managed security market

    The professional services firm is stepping up its managed security ambitions with a Google Cloud-powered service that leans on agentic AI. The target market is companies that have outgrown DIY security.