Page 2


  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in Fortinet FortiWeb is under exploitation

    The company faces criticism as multiple researchers claim a silent patch was issued weeks before official guidance was released.

  • DOJ antitrust, Trump nominee
    Image attribution tooltip
    Yin Yang via Getty Images
    Image attribution tooltip

    US chips away at North Korean IT worker fraud

    Authorities have described Pyongyang’s revenue-generating schemes as threats to U.S. national and economic security.

  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISO pay is on the rise, even as security budgets tighten

    Companies are increasingly lavishing benefits on their top security executives, a recent report found.

  • Claude, AI startup, Anthropic
    Image attribution tooltip
    Permission granted by Anthropic
    Image attribution tooltip

    Anthropic warns state-linked actor abused its AI tool in sophisticated espionage campaign

    Researchers said a China-backed adversary conducted powerful attacks with almost no human intervention. 

    Updated Nov. 14, 2025
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    Western governments disrupt trifecta of cybercrime tools

    Authorities seized more than 1,000 servers and 20 domains in the operation.

  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Akira engaged in ransomware attacks against critical sectors

    The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.

    Updated Nov. 14, 2025
  • an exterior shot of the US capitol building
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Government funding bill temporarily revives cybersecurity information-sharing law

    The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January.

  • A person in business attire speaks while holding a card, with a blue background displaying the words "Billington Cybersecurity" in a tiled pattern.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    UK authorities propose law to set minimum cyber standards for critical sectors

    The legislation follows a wave of social engineering attacks that rocked the nation’s retail and automotive supply chains.

  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix

    Hackers use custom malware to access multiple vulnerabilities, researchers from Amazon warn.

  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies want more from their threat intelligence platforms

    Customers expect faster, more accurate and more relevant data, Recorded Future found in a new report.

  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Cisco detects new attack variant targeting vulnerable firewalls

    Hackers may be able to overload unpatched devices, the company said.

  • Data Breach Button on Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent warns of further financial fallout from cyberattack

    The company has incurred millions in expenses related to data breach notifications stemming from an attack earlier this year. 

  • Close up of a circuit board, essential for advancements in AI.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI agents worsen IT’s capacity crunch: S&P Global

    An infrastructure overhaul to support agentic systems is underway, bringing with it a new set of capacity demands and security considerations. 

  • Nevada Gov. Joe Lombardo standing in front of microphone with American and Nevada flags behind him
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    Nevada ransomware attack traced back to malware download by employee

    The state refused to pay a ransom and recovered 90% of the impacted data.

  • Sparks come off an industrial machine in a factory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks surge against IoT, mobile devices in critical infrastructure

    Manufacturing and energy firms saw some of the biggest increases in malware activity targeting connected devices.

  • In a close-up of a severely shattered monitor screen, the display contains blue and black hues with various-sized white cracks.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    SonicWall says state-linked actor behind attacks against cloud backup service

    CEO announces security and governance reforms inside the company, including the adoption of secure-by-design practices.

  • Classic architecture details of a Bank building
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In financial sector, vendors lag behind customers on cybersecurity

    Financial firms should be performing regular oversight of their vendors to avoid supply chain compromises, according to a new report.

  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers targeting Cisco IOS XE devices with BadCandy implant

    Security researchers and Australian authorities warn that exploitation activity is ongoing.

    Updated Nov. 5, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-based malware makes attacks stealthier and more adaptive

    Google says it has discovered at least five malware families that use AI to reinvent themselves and hide from defenders.

  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of flaws that allow manipulation of Microsoft Teams messages

    A report by Check Point shows hackers could forge identities and alter messages.

  • EY offices stand in 1 More London Riverside on October 1, 2018 in London, England.
    Image attribution tooltip
    Jack Taylor via Getty Images
    Image attribution tooltip

    AI risks pack a punch, but governance provides a buffer

    Enterprises strengthen governance and focus on responsible practices as more than 3 in 5 suffer AI risk-related losses of more than $1 million, EY data shows. 

  • A hand typing login and password
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity-based attacks need more attention in cloud security strategies

    Companies should lock down user accounts and scan for compromised credentials, according to a new report.

  • Open packages and debris on railroad tracks is seen through metal fencing.
    Image attribution tooltip
    Edwin Lopez/Cybersecurity Dive
    Image attribution tooltip

    Cybercrime groups team with organized crime in massive cargo theft campaigns

    Financially motivated hackers are abusing remote monitoring and access tools against trucking and freight companies, Proofpoint warns.

    Updated Nov. 3, 2025
  • The letters A and I stand on a digital background in a conceptual graphic designed to represent artificial intelligence.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Security leaders say AI can help with governance, threat detection, SOC automation

    Executives and technical leaders differ on AI priorities, according to a report from Amazon.