The Latest

  • An engineer repairs an electricity pole as smoke billows after overnight airstrikes on oil depots on March 8, 2026 in Tehran, Iran.
    Image attribution tooltip
    Majid Saeedi/Getty Image via Getty Images
    Image attribution tooltip

    NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat

    Hackers have disrupted critical U.S. infrastructure by targeting programmable logic controllers, the Cybersecurity and Infrastructure Security Agency warned.

  • A wireless router sits on a flat surface
    Image attribution tooltip
    Jens Domschky via Getty Images
    Image attribution tooltip

    US operation evicts Russia from hacked SOHO routers used to breach critical infrastructure

    The newly disclosed cyberattack campaign is the latest evidence of the threat end-of-life routers pose to major organizations.

    Updated April 9, 2026
  • A person walks a runway in front of the Olympic rings.
    Image attribution tooltip
    Massimo Rosi via Getty Images
    Image attribution tooltip

    Olympic Games, FIFA World Cup offer huge platforms, rich cyberattack surface

    Global sporting events have become a lucrative target for criminal actors and geopolitical statements.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA’s vulnerability scans, field support on chopping block in Trump budget

    The president is proposing to shrink the agency by nearly 900 positions.

  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data

    The stolen information could help intruders plan follow-up attacks and breach more organizations, Cisco researchers said.

  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat cluster launches extortion campaign using social engineering

    Researchers said the hackers are compromising business process outsourcers and targeting help desk support.

  • A building with large glass windows bears the Fortinet logo at the top, while a sign at ground level reads "Fortinet - 909 Kifer Road"
    Image attribution tooltip
    Courtesy of Fortinet
    Image attribution tooltip

    Critical flaw in FortiClient EMS under exploitation

    Fortinet released an emergency hotfix after security researchers discovered the vulnerability being exploited as a zero-day.

    Updated April 6, 2026
  • Hims & Hers Super Bowl ad header
    Image attribution tooltip
    Courtesy of Hims & Hers
    Image attribution tooltip

    Hims & Hers says limited data stolen in social engineering attack

    The telehealth provider said hackers gained access to a third-party customer service platform, but medical records remained secure.

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump’s FY2027 budget again targets CISA

    The White House reiterated accusations about CISA’s counter-misinformation work to justify a major proposed reduction.

  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of critical flaws in Progress ShareFile

    Attackers could chain vulnerabilities together, leading to configuration changes or remote code execution.

  • Digital cloud and network security. 3D computer hardware illustration.
    Image attribution tooltip
    solarseven
    Image attribution tooltip

    Government agencies see cyber threats as major barrier to tech improvements

    Federal leaders also see opportunities to accelerate cyber defense with AI, according to a new report, but most agencies are still only testing AI tools.

  • Walmart retail credit card swipe fees Visa Mastercard
    Image attribution tooltip
    Jessica McGowan via Getty Images
    Image attribution tooltip

    Retail and hospitality CISOs expect budget growth, new AI headaches and opportunities

    More than eight in 10 security leaders in the sector say they’ve rolled out an AI governance framework to some degree, a new survey found.

  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Critical flaw in F5 BIG-IP faces wide exploitation risk

    The company revised a security advisory as newly disclosed information heightens the potential impact.

  • a technologist holds a laptop, facing a wall of code projected on a wall
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Axios open-source library targeted in sophisticated supply chain attack

    Researchers link the compromise to a North Korean adversary and warn the impacts could be wide ranging.

  • A massive lit-up sign with the tilted blue "Hasbro" logo and cartoon images looms over a dark room.
    Image attribution tooltip
    "Hasbro booth" by Gage Skidmore is licensed under CC BY-SA 2.0
    Image attribution tooltip

    Cyberattack hits Hasbro, impacting orders and shipping

    The major U.S. toymaker and entertainment company is still working to assess if company data was stolen in the attack.

    Updated April 1, 2026
  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    Iran-linked actors target Middle Eastern city governments to undermine missile-strike responses

    The password-spraying campaign is the latest evidence that Iran is hitting back in cyberspace.

  • A banner reading "Power of Community" and "RSAC 2026 Conference" hangs over a walkway between two sets of escalators
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    ‘Missed opportunity’: US government’s absence from RSAC Conference leaves stark void

    The Trump administration’s decision to not attend the world’s biggest cybersecurity conference sent the wrong message to partners, experts said.

  • An illustration of agentic AI
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Cybersecurity risks shape AI adoption, but investment accelerates nonetheless

    Companies see cybersecurity as a top investment priority within their AI budgets, according to KPMG.

  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    Iran actors’ claims raise questions about larger cyber threat to US, allies

    Questions are being raised about the veracity and tactics of Iran-linked actors, amid claims that a large trove of Lockheed Martin data is on the market.

    Updated March 31, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Newly observed malware campaign likely combines AI and ClickFix

    Using the techniques in tandem helps hackers evade detection, a security firm said.

  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler products confirmed to be under exploitation

    Security researchers at watchTowr warn that multiple flaws are involved in the early stages of a hacking spree that could rival the 2023 CitrixBleed campaign.

    Updated March 30, 2026
  • Engineer repairs 5G cell tower.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Espionage campaign targets telecom with stealthy Linux-based backdoor

    A China-nexus actor has been able to gain long-term access in a bid to gather intel on government agencies and critical infrastructure providers.

  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity is the first line of defense, especially in an AI-fueled threat landscape

    Two new reports illustrate why companies need to do a better job of scrutinizing what their human employees and AI agents are doing.

  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker restores most manufacturing after cyberattack

    The medtech company has been working to restore manufacturing, ordering and shipping operations since it was hit by a cyberattack on March 11.

  • A towering Citrix-branded expo sign; the tagline: "Better experience"
    Image attribution tooltip

    Citrix via Flickr

    Image attribution tooltip

    Critical flaw in Citrix NetScaler raises fears of new exploitation wave

    Researchers warn that security teams need to take immediate mitigation steps before a public proof of concept is released.

    Updated March 27, 2026