The Latest

  • A gas-fired power plant with smokestacks overlooks a road.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Canadian authorities warn of hacktivists targeting exposed ICS devices

    Hackers have manipulated critical components at water utilities, oil and gas facilities, and agricultural sites in recent weeks.

    Updated Oct. 31, 2025
  • With cyberattacks becoming more frequent, now is the time for CFOs to shore up their cybersecurity programs and strategies.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI adoption outpaces corporate governance, security controls

    Security and business leaders warn that companies are accelerating their use of agentic AI beyond the ability to maintain proper guardrails. 

  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    F5 expects nation-state hack to curb revenues

    The company says it could lose new deals because of the intrusion.

  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Google probes exploitation of critical Windows service CVE

    Researchers have traced the threat activity to a newly identified hacker, while separate evidence points to more than one variant.

  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent says data breach originally began with 2024 intrusion

    The cyberattack, which affected several state agencies, has also impacted multiple insurance providers.

  • The United Nations logo is seen on a fence.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    UN member states sign cybercrime agreement despite industry, activist opposition

    Critics say the new convention is ripe for abuse by authoritarian countries.

  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers exploiting critical vulnerability in Windows Server Update Service

    Microsoft has issued an out-of-band update and is urging users to immediately apply the patch.

    Updated Oct. 27, 2025
  • security operations center analysts monitoring cyber threats
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to prepare for and respond to today’s evolving threat landscape

    With the emergence of AI, security operations teams must navigate a fast-moving generation of cyber threats.

  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    North Korea led the world in nation-state hacking in Q2 and Q3

    Security leaders should prioritize anomalous-activity detection and zero-trust principles, a new report recommends.

  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of critical flaws in TP-Link routers

    No active exploitation has been spotted, but the vendor and researchers advise users to apply updates immediately. 

  • The Canary Wharf business district including global financial institutions Citigroup Inc., State Street Corp., Barclays Plc, HSBC Holdings Plc and the commercial office block No. 1 Canada Square, on the Isle of Dogs seen on June 22, 2023 in London, England.
    Image attribution tooltip
    Dan Kitwood / Staff via Getty Images
    Image attribution tooltip

    Financial services tech leaders tackle agentic AI governance

    Operating in a risk-averse industry, IT decision-makers are helping their businesses adapt to emerging threats without derailing momentum.

  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Burned-out security leaders view AI as double-edged sword

    As companies face cybersecurity skills gaps and broader attack surfaces, they’re warily turning to AI-powered automation.

  • A gartner analyst gives a keynote speech in front of thousands of attendees.
    Image attribution tooltip
    Permission granted by Gartner
    Image attribution tooltip

    Climbing costs, skills loss and other AI warnings for CIOs

    Amid seismic change for IT leaders, enterprises need to curate survival kits to mitigate reliability and cost challenges, Gartner analysts said. 

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA’s international, industry and academic partnerships slashed

    The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.

  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover attack cost British economy $2.5 billion

    The Cyber Monitoring Centre warned that losses could rise further if the company's production isn't back to pre-incident levels by January.

  • Artificial Intelligence digital concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security flaws afflict half of organizations

    EY suggested ways for companies to reduce AI-related hacking risks.

  • Humanoid robot works in a call center.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Social engineering gains ground as preferred method of initial access

    Senior executives and high-net-worth individuals are increasingly at risk as hackers use deepfakes, voice cloning and other tactics for targeted attacks. 

    Updated Oct. 21, 2025
  • Ransomware Data Breach Protection Cyber Security Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-fueled automation helps ransomware-as-a-service groups stand out from the crowd

    Ransomware gangs that offer their affiliates customization and automation are growing faster than those that don’t, a new report finds.

  • Individuals work on computers.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Why security awareness training doesn’t work — and how to fix it

    Companies have built their security strategies around phishing simulations and educational webinars, tactics that research shows are ineffective.

  • A large sign reading "Black Hat" sits in the carpeted foyer of a convention center
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Top cybersecurity conferences to attend in 2026

    Security experts will come together to hear about the latest risk management strategies, novel hacking techniques, cyber governance and the technologies enterprises need to defend their networks.

  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    F5 supply chain hack endangers more than 600,000 internet-connected devices

    The enterprise device vendor has patched several vulnerabilities that hackers discovered after breaching its networks.

  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 500 companies designate specialist roles to bolster security operations teams

    Four in 10 companies have created deputy CISO roles as regulatory concerns require greater board engagement.

  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Auto sector faces historic cyber threats to business continuity

    A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability.

  • legal role in data incident or breach
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Many IT leaders click phishing links, and some don’t report them

    A new survey shines light on the security practices and AI fears of IT leaders and their subordinates.

  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Nation-state hackers breached sensitive F5 systems, stole customer data

    The federal government is scrambling to determine if any agencies have been hacked.