The Latest

  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip
    Deep Dive

    FCC investigation could derail its own IoT security certification program

    Internet of Things device makers are eager to participate, but the commission’s concerns about its lead administrator have halted progress of the U.S. Cyber Trust Mark program.

  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    US, allies warn China-linked actors still targeting critical infrastructure

    An advisory from 13 countries says state-backed hackers continue trying to breach telecommunications systems and other vital networks.

  • Entrance greeting sign on the highway border between Nevada and Arizona
    Image attribution tooltip
    Pgiam via Getty Images
    Image attribution tooltip

    Federal, state officials investigating ransomware attack targeting Nevada

    The Sunday attack disrupted key services across the state and led to the theft of some data.

    Updated Aug. 29, 2025
  • Ransomware Data Breach Protection Cyber Security Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    NetScaler warns hackers are exploiting zero-day vulnerability

    The company is urging customers to patch their devices immediately, saying the flaw could lead to denial of service or remote code execution.

  • An artificial intelligence processor unit
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Safety-critical industries wary about using AI for cybersecurity

    Finance, tech and professional services are among the sectors with the widest adoption of AI-based security tools, according to a new report.

  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    Hackers steal data from Salesforce instances in widespread campaign

    Google researchers say the hackers abused a third-party tool in an attack spree designed to harvest credentials.

    Updated Aug. 29, 2025
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Execs worry about unknown identity-security weaknesses

    Credential theft attacks prove that companies need to do better, but business leaders cited many reasons for slow progress.

  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    CISOs grow more concerned about risk of material cyberattack

    A report by Proofpoint shows growing anxiety among security leaders about their companies’ cyber readiness.

  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Credential harvesting campaign targets ScreenConnect cloud administrators

    Researchers warn that attackers are using compromised Amazon email accounts in spear-phishing attacks that may lead to ransomware infections.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA updates SBOM recommendations

    The document is primarily meant for federal agencies, but CISA hopes businesses will also use it to push vendors for software bills of materials.

  • In a close-up of a severely shattered monitor screen, the display contains blue and black hues with various-sized white cracks.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    China-nexus hacker Silk Typhoon targeting cloud environments

    The state-linked espionage group has exploited zero-day flaws in Commvault and Citrix Netscaler, researchers say.

  • World image
    Image attribution tooltip
    Faruk Ibrahim Alpagut via Getty Images
    Image attribution tooltip

    US charges Oregon man in vast botnet-for-hire operation

    Federal prosecutors called Rapper Bot one of the most powerful DDoS botnets in history.

  • Magnifying glass with business report on financial advisor desk.
    Image attribution tooltip
    utah778 via Getty Images
    Image attribution tooltip

    Cyber, AI drive software spending to double-digit growth through 2029

    Cloud security and identity and access management tool purchases insulated the market from tariff-induced economic shocks, according to Forrester.

  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations

    The intrusions have exploited a vulnerability in Cisco’s networking equipment software.

  • An aerial view of the Workday building
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Hackers target Workday in social engineering attack

    Researchers cite increasing evidence of collaboration between Scattered Spider and the cybercrime group ShinyHunters in the campaign.

  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Pharmaceutical firm Inotiv investigating ransomware attack that disrupted operations

    The company says it doesn’t yet know if the incident will have a material impact.

  • Beige and blue modern office building with large windows and the “paloalto networks” logo in black and red near the top corners.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Palo Alto Networks shares surge after company releases strong annual forecast

    The cybersecurity firm said its “platformization” strategy is beginning to pay dividends as more large customers consolidate their spending on its offerings.

  • Brightly colored digital lock with central computer processor and futuristic circuit board.
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Businesses focus on AI, cloud, despite cyber defense oversights

    Recent surveys found enterprises are enthusiastically adopting AI, even as they neglect basic cybersecurity measures.

  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    NIST seeks input on control overlays for securing AI systems

    The federal agency plans to develop guidance to organizations about various AI use cases.

  • Generic java programming code written on black.
    Image attribution tooltip
    funky-data via Getty Images
    Image attribution tooltip

    Developers knowingly push vulnerable code, despite growing breach risk

    Only three in 10 respondents said their application security programs were highly mature.

  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    Cybersecurity ranks among top three risks to manufacturing sector

    Most companies are planning major AI investments to address growing threats to OT systems.

  • An aerial view shows large pools of water at a wastewater treatment plant
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Water sector expands partnership with volunteer hackers

    As threats to critical infrastructure grow and government funding stagnates, operators are turning to civic-minded volunteers from the cybersecurity industry.

  • Three men sit on chairs on a stage. One man gestures with his hands while the other two look at him.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump administration cyber cuts eroding private sector’s trust, confidence

    A report by Swimlane shows companies are reducing cybersecurity spending and security teams are experiencing increasing pressure.

    Updated Aug. 14, 2025
  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    White House urged to revamp cyber regulations

    A leading trade group said the Trump administration should rein in a major pending cybersecurity rule as well as embrace AI-based cyber defenses.

  • IT expert using digital tablet to operate network servers.
    Image attribution tooltip
    baranozdemir via Getty Images
    Image attribution tooltip

    US agencies, international allies issue guidance on OT asset inventorying

    The guidance includes specific examples for three critical infrastructure sectors that held workshops with CISA.