Page 2


  • Humanoid robot works in a call center.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Social engineering gains ground as preferred method of initial access

    Senior executives and high-net-worth individuals are increasingly at risk as hackers use deepfakes, voice cloning and other tactics for targeted attacks. 

    Updated Oct. 21, 2025
  • Ransomware Data Breach Protection Cyber Security Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-fueled automation helps ransomware-as-a-service groups stand out from the crowd

    Ransomware gangs that offer their affiliates customization and automation are growing faster than those that don’t, a new report finds.

  • Individuals work on computers.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Why security awareness training doesn’t work — and how to fix it

    Companies have built their security strategies around phishing simulations and educational webinars, tactics that research shows are ineffective.

  • A large sign reading "Black Hat" sits in the carpeted foyer of a convention center
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Top cybersecurity conferences to attend in 2026

    Security experts will come together to hear about the latest risk management strategies, novel hacking techniques, cyber governance and the technologies enterprises need to defend their networks.

  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    F5 supply chain hack endangers more than 600,000 internet-connected devices

    The enterprise device vendor has patched several vulnerabilities that hackers discovered after breaching its networks.

  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 500 companies designate specialist roles to bolster security operations teams

    Four in 10 companies have created deputy CISO roles as regulatory concerns require greater board engagement.

  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Auto sector faces historic cyber threats to business continuity

    A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability.

  • legal role in data incident or breach
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Many IT leaders click phishing links, and some don’t report them

    A new survey shines light on the security practices and AI fears of IT leaders and their subordinates.

  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Nation-state hackers breached sensitive F5 systems, stole customer data

    The federal government is scrambling to determine if any agencies have been hacked.

  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    CISA’s latest cuts reignite concerns among Democratic lawmakers

    A congressman on a key subcommittee suggests that shrinking CISA leaves Americans exposed to mounting cyber threats.

  • an exterior shot of a corporate boardroom as a meeting takes place
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 100 firms accelerate disclosures linked to AI, cybersecurity risk

    Companies are concerned about deepfakes and unauthorized AI tools, and board committees are increasing their oversight responsibilities.

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Layoffs, reassignments further deplete CISA

    Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets.

  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SonicWall SSLVPN devices compromised using valid credentials

    More than 100 SonicWall SSLVPN accounts have been impacted, according to Huntress.

  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Oracle E-Business Suite exploitation traced back as early as July

    Researchers say an extortion campaign linked to the Clop ransomware group used a series of chained vulnerabilities and sophisticated malware.

  • A tech worker eviews code on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SonicWall investigation shows hackers gained wide access to customer backup files

    The probe contradicts earlier claims that a limited set of MySonicWall customers were impacted. 

  • Bills on a table
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risk a growing priority among insurance and asset management firms

    A report by Moody’s shows an emphasis on board-level oversight and spending in order to boost cyber resilience.

  • Stacks of american one hundred dollar bills.
    Image attribution tooltip
    aluxum via Getty Images
    Image attribution tooltip

    Risk mitigation budgets swell as enterprise AI adoption grows

    Governing AI comes at a cost, with most organizations increasing oversight investments in the next financial year, according to OneTrust data.

  • Entrance to a modern glass building with a large blue cloud-shaped sign that reads “salesforce.” The text “Welcome to Salesforce Tower” is displayed on the wall below the sign.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Salesforce refuses to submit to extortion demands linked to hacking campaigns

    The company said it is aware of recent claims, but will not negotiate or pay a ransom.

  • Businessman touching an artificial intelligence-themed brain
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI fuels social engineering but isn’t yet revolutionizing hacking

    AI tools are still too computationally intense for cybercriminals to rely on, according to a new report.

  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Public disclosures of AI risk surge among S&P 500 companies

    A report by The Conference Board shows companies are flagging concerns about cyber and reputational risk as they increase deployment.

  • Artificial intelligence and machine learning concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses fear AI exposes them to more attacks

    More than half of companies have already faced AI-powered phishing attacks, a new survey finds.

  • A stack of red lockers with a hat icon and the words "Red Hat" emblazoned in white on several of them
    Image attribution tooltip
    Courtesy of https://www.redhat.com/en/about/company-details
    Image attribution tooltip

    Hackers steal sensitive Red Hat customer data after breaching GitLab repository

    Walmart, American Express and HSBC are among the companies that have had sensitive data exposed.

    Updated Oct. 6, 2025
  • Oracle corporation sign hanging on the top of the building in Brisbane.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion campaign targeting Oracle E-Business Suite customers linked to zero-day

    Mandiant researchers said Clop ransomware is indeed linked to a series of emails threatening to release stolen data. 

  • Oracle's Silicon Valley corporate headquarters in Redwood City, California picture on Oct. 26, 2019.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Oracle investigating extortion emails targeting E-Business Suite customers

    Hackers claiming links to Clop ransomware could be exploiting vulnerabilities disclosed in a July critical patch update.

  • Renault and Dacia logos outside a showroom in Crew, England on Nov. 15, 2024
    Image attribution tooltip
    Christopher Furlong via Getty Images
    Image attribution tooltip

    Renault Group confirms UK customer data stolen in third-party breach

    The incident marks the latest in a series of recent cyberattacks impacting the auto industry.