Page 2


  • he Hawaiian Airlines logo is displayed at a check-in area at Los Angeles International Airport (LAX) on December 4, 2023 in Los Angeles, California.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Scattered Spider appears to pivot toward aviation sector

    A cyberattack on Hawaiian Airlines carries some hallmarks of the notorious cybercrime group.

    Updated June 27, 2025
  • A towering Citrix-branded expo sign; the tagline: "Better experience"
    Image attribution tooltip

    Citrix via Flickr

    Image attribution tooltip

    Hackers exploiting critical Citrix Netscaler flaw, researchers say

    After confirming exploitation of a separate zero-day flaw, Cloud Software Group promises to be transparent.

  • Brain Artificial Intelligence Chip
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    AI security issues dominate corporate worries, spending

    Two reports illustrate how business leaders are thinking about and budgeting for generative AI.

  • Grocery store cooler with empty space.
    Image attribution tooltip
    Sam Silverstein/Cybersecurity Dive
    Image attribution tooltip

    United Natural Foods says cyberattack will reduce quarterly earnings

    The company, which supplies Whole Foods and other grocery stores nationwide, had to disable electronic ordering systems while responding to the attack earlier this month.

  • A screen showing a technical error message in an airport hallway
    Image attribution tooltip
    Jack Taylor via Getty Images
    Image attribution tooltip

    Microsoft to make Windows more resilient following 2024 IT outage

    The company has been working with security partners to make sure future software updates don’t lead to operational disruptions for customers.

    Updated June 26, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    ‘Suspended animation’: US government upheaval has frayed partnerships with critical infrastructure

    Recent federal cuts, reorganizations and other disruptions have alarmed industry leaders, who say the government is a less reliable partner even as cyber threats increase.

  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Critical vulnerability in Citrix Netscaler raises specter of exploitation wave

    Threat researchers warn the flaw could open up a flood of attacks that rival the 2023 CitrixBleed crisis. 

    Updated June 25, 2025
  • piece of paper saying insurance policy
    Image attribution tooltip
    Mohamad Faizal Bin Ramli via Getty Images
    Image attribution tooltip

    Cyber insurance premiums drop for first time, report finds

    Despite a decline in both premiums and prices, the market continues to be profitable.

  • regenerative agriculture
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Federal officials, critical infrastructure leaders remain on guard for Iran-linked hacks

    Amid an uneasy truce, security teams in the U.S. said they have not seen any credible or specific threats.

  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    bin kontan / Getty Images via Getty Images
    Image attribution tooltip

    Fewer ransomware attacks encrypting data, report finds

    Hackers are increasingly performing extortion-only attacks.

  • Steelmaker Nucor restores operations, confirms limited data breach

    The steel products giant said it does not expect the cyberattack to have a material impact on its operations.

  • Chairman of the Joint Chiefs of Staff Air Force Gen. Dan Caine discusses the mission details of a strike on Iran during a news conference at the Pentagon on June 22, 2025 in Arlington, Virginia. U.S. President Donald Trump gave an address to the nation last night after three Iranian nuclear facilities were struck by the U.S. military.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    DHS warns of heightened cyber threat as US enters Iran conflict

    Federal officials are warning that pro-Iran hacktivists or state-linked actors may target poorly secured U.S. networks.

  • Aflac duck at awards ceremony
    Image attribution tooltip
    John Lamparski/WireImage via Getty Images
    Image attribution tooltip

    Aflac discloses cyber intrusion linked to wider crime spree targeting insurance industry

    The breach marks the latest in a series of recent attacks linked to cybercrime group Scattered Spider.

    Updated June 20, 2025
  • Amy Herzog on stage speaking during a conference
    Image attribution tooltip
    Permission granted by AWS
    Image attribution tooltip

    AWS CISO stumps for security as an AI enabler

    AI’s rapid development underscores the need for secure foundations, Amy Herzog said Tuesday during the company’s annual cybersecurity conference.

  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Researchers urge vigilance as Veeam releases patch to address critical flaw

    The patch for a previously disclosed vulnerability in the company’s backup software did not offer adequate protection, according to researchers.

  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    Critical Zyxel vulnerability under active exploitation after long period of quiet

    Researchers say a sudden burst of activity could be linked to a Mirai botnet variant.

  • An attendee passes an AWS logo on a escalator at the AWS re:Invent 2024 conference hosted at in Las Vegas on December 3, 2024.
    Image attribution tooltip
    Noah Berger / Stringer via Getty Images
    Image attribution tooltip

    Cloud storage buckets leaking secret data despite security improvements

    New data from Tenable highlighted significant improvements in the number of businesses with publicly exposed and critically vulnerable buckets storing sensitive data.

  • New cars J.D. Power
    Image attribution tooltip
    Shaunl via Getty Images
    Image attribution tooltip

    FTC reminds car dealers to protect customer data

    The commission described how recently updated federal regulations affect dealerships — and their vendors.

    Updated June 17, 2025
  • Businessman with protective hands gesture and insurance icons.
    Image attribution tooltip
    Galeanu Mihai via Getty Images
    Image attribution tooltip

    Threat group linked to UK, US retail attacks now targeting insurance industry

    The warning from Google researchers follows a recent incident at Erie Insurance, although the perpetrators of that attack have not been identified.

  • Fire and smoke arise after an attack on the Shahran oil depot in Tehran, Iran on June 15, 2025.
    Image attribution tooltip
    Stringer via Getty Images
    Image attribution tooltip

    US critical infrastructure could become casualty of Iran-Israel conflict

    Researchers warn that Iran-aligned threat groups could soon target U.S. companies and individuals in cyber espionage or sabotage attacks.

  • an executive in business attire
    Image attribution tooltip
    simon2579 via Getty Images
    Image attribution tooltip

    Cyberattacks top list of global business concerns, Kroll finds

    Many companies feel unprepared to comply with global privacy and security rules, according to the advisory firm’s annual business sentiment survey.

  • SEC seal outside Washington D.C. building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    SEC scraps proposed cybersecurity rules for investment advisers, market participants

    The commission offered no rationale for removing rules that would have imposed security requirements on financial services providers.

    Updated June 16, 2025
  • Remote software
    Image attribution tooltip
    Courtesy of Remote
    Image attribution tooltip

    CISA warns of supply chain risks as ransomware attacks exploit SimpleHelp flaws

    The latest confirmed cyber intrusion hit a utility billing software provider and its customers.

  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Software vulnerabilities pile up at government agencies, research finds

    A Veracode report reveals that government networks have accumulated years of unresolved security flaws, putting them at serious risk of exploitation.

  • Microsoft CEO Satya Nadella speaks during the OpenAI DevDay event on November 06, 2023 in San Francisco, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Critical flaw in Microsoft Copilot could have allowed zero-click attack

    Researchers said the vulnerability, dubbed “EchoLeak,” could allow a hacker to access data without any specific user interaction.

    Updated June 11, 2025