The Latest

  • Digital security systems for facilities
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Iran-nexus hackers target flaws in surveillance cameras

    The threat activity echoes prior exploitation during the Israeli war with Hamas, a precursor to attacks against critical sectors in the U.S.

    Updated 14 hours ago
  • A woman wearing a hijab and sunglasses waves an Iranian flag
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Pro-Russia actors team with Iran-linked hackers in attacks

    The groups formed a loose alliance in recent days, targeting critical infrastructure in the Middle East and the U.S. 

    Updated March 3, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware is now less about malware and more about impersonation

    Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

  • Iranians protest against attacks on Iran by Israel and the United States on February 28, 2026 in Tehran, Iran. Iran launched a wave of missiles at Israel and regional U.S. military sites in response to today's attacks, in which the U.S. and Israel struck a series of locations across the country.
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Iran-linked hackers raise threat level against US, allies

    Security researchers warn that hacktivists and state-linked groups are using DDoS, phishing and other tactics against critical infrastructure.

    Updated March 2, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    University of Mississippi Medical Center reopens clinics after ransomware attack

    The academic medical center’s clinics can once again access patient records and are resuming normal operations more than a week after the attack.

    Updated March 2, 2026
  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Trump administration removes controversial acting CISA director

    The new agency chief, Nick Andersen, has significantly more senior cybersecurity leadership experience, which has given some demoralized employees hope.

    Updated Feb. 27, 2026
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Resurge’ malware can remain undetected on devices

    CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.

    Updated Feb. 27, 2026
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UFP Technologies investigating cyberattack that impacted company data

    The medical device maker warned of short-term shipment delays, but does not see a material impact.

  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    AI accelerates lateral movement in cyberattacks

    New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.

  • A hand typing login and password
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Software vulnerabilities are being weaponized faster than ever

    A report by VulnCheck shows threat groups are exploiting a small percentage of critical flaws well before security teams can mitigate.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders agencies to patch Cisco devices now under attack

    The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.

  • A Chinese flag flutters in front of a Chinese government building, on top of which other Chinese flags are flying
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    China-linked hackers breached dozens of telecoms, government agencies

    The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.

  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Threat groups move at record speeds, as AI helps scale attacks

    A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.

  • agentic AI business functions operations payments IT investment
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps

    CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.

  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI helps novice threat actor compromise FortiGate devices in dozens of countries

    Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according to a new Amazon report.

  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers target vulnerabilities in Roundcube Webmail

    CISA has added the flaws, one of which is considered critical, to its Known Exploited Vulnerabilities catalog.

  • United States Treasury Department
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US Treasury Department offers secure AI advice to financial services firms

    The agency developed the resources in partnership with financial executives and other regulators.

  • A depiction of computer hardware.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    BeyondTrust Remote Support exploitation ramps up with backdoors, remote tools

    Researchers warn that thousands of instances may still be vulnerable to exploitation activity.

    Updated Feb. 20, 2026
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks CEO sees AI as demand driver, not a threat

    During a quarterly investor call, Nikesh Arora addressed growing concerns in the investment community that AI could hurt demand for cybersecurity.

    Updated Feb. 19, 2026
  • A laptop's screen shows the website of an AI service
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    AI’s ‘connective tissue’ is woefully insecure, Cisco warns

    In a new report, the company also said businesses should beware of the “SolarWinds of AI.”

  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups use AI to speed up and scale cyberattacks

    A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.

  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity and supply chain need more attention, risk intelligence firm says

    Roughly a third of attacks now use stolen credentials, according to the company’s latest report.

  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers exploit zero-day flaw in Dell RecoverPoint for Virtual Machines

    Threat actors linked to China have deployed a novel backdoor, according to researchers.

    Updated Feb. 18, 2026
  • A man pushes his bike through debris and destroyed Russian military vehicles on a street on April 06, 2022 in Bucha, Ukraine.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Newly identified hacking groups provide access to OT environments

    A state-linked adversary has begun to pivot from the Ukraine war with new attacks targeting Europe and the U.S.