Breaches


  • cybersecurity hackers cyberattacks IT
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion attacks on the rise as hackers prioritize supply-chain weaknesses

    Consulting firms and manufacturing companies accounted for many of the ransomware victims posted to the dark web in 2025, Intel 471 said.

    By Feb. 11, 2026
  • Solar panels and wind turbines in a desert landscape.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Polish power grid hack offers lessons for critical infrastructure operators, CISA says

    The agency listed several steps businesses could take to prevent similar cyberattacks.

    By Feb. 10, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attacks against education sector slow worldwide

    The U.S. saw the highest number of education-related ransomware attacks in 2025, at 130, despite a 9% decline year over year.

    By Anna Merod • Feb. 6, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Asian government’s espionage campaign breached critical infrastructure in 37 countries

    The victims included national telecommunications firms, finance ministries and police agencies, with most targets suggesting an economic focus, Palo Alto Networks said.

    By Feb. 5, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Feb. 4, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • 2026 background, symbolizing future technologies and innovations in a high-tech environment.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

    A look at the most important trends and issues in cyber this year.

    By Cybersecurity Dive Staff • Jan. 30, 2026
  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

    By Jan. 30, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

    By Jan. 27, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime group claims credit for voice phishing attacks

    Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.

    By Updated Jan. 27, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

    By Jan. 9, 2026
  • Doors are fitted and checked during production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. Jaguar Land Rover is relaunching certain operations following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risks grow as manufacturers turn to AI and cloud systems

    Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report.

    By Sakshi Udavant • Jan. 5, 2026
  • An aerial view of a city on the water.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rockrose Development suffers security breach affecting 47,000 people

    The New York City-based firm recently found that unauthorized individuals hacked its systems and claimed to have acquired confidential information.

    By Leslie Shaver • Dec. 19, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-linked hackers exploit insecure setting in Cisco security products

    The company urged customers to immediately reconfigure affected products.

    By Dec. 18, 2025
  • The Russian flag flies over a building on a cloudy day
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Russia-linked hackers breach critical infrastructure organizations via edge devices

    New research offers the latest evidence that vulnerable network edge equipment is a pressing concern.

    By Dec. 16, 2025
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks force small firms to raise prices: ITRC

    The price hikes create a hidden “cyber tax” that is helping to fuel inflation, according to the report. 

    By Alexei Alexis • Dec. 11, 2025
  • A scientist with protective eyeglasses and mask holding a red transparent pill with fingers in gloves in the pharmaceutical research laboratory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Major drug research company confirms cyberattack compromised employee and partner data

    Indiana-based Inotiv said it was still evaluating the hack’s impact on its business.

    By Dec. 8, 2025
  • The Salesforce cloud logo is pictured on the software company's headquarters in New York on Aug. 18, 2022.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Gainsight CEO promises transparency as it responds to compromise of Salesforce integration

    The company has been in regular contact with customers, and says only a handful have seen data directly impacted.

    By Updated Nov. 26, 2025
  • A logo reading "JPMorgan Chase & Co." hangs over a set of doors
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Hackers steal sensitive data from major banking industry vendor

    The incident highlights how supply-chain compromises threaten even well-defended industries.

    By Updated Nov. 24, 2025
  • Workers in a HubSpot office
    Image attribution tooltip
    Courtesy of HubSpot
    Image attribution tooltip

    Gainsight says additional applications put on hold after Salesforce customers breached

    The company said that Zendesk and Hubspot integrations have been deactivated as the probe continues.

    By Nov. 24, 2025
  • SolarWinds
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SEC drops civil fraud case against SolarWinds

    Cybersecurity and legal experts considered the case a potential precedent-setter for risk disclosure.

    By Nov. 20, 2025
  • Salesforce
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Salesforce investigating campaign targeting customer environments connected to Gainsight app

    Researchers warn that ShinyHunters has been compromising OAuth tokens to gain potential access to customer data. 

    By Updated Nov. 21, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC plan to scrap telecom cyber rules draws congressional backlash

    A prominent U.S. senator wants the commission to rethink its plans.

    By Nov. 19, 2025
  • The brown-and-gold seal of the Treasury Department is seen on the wall of its headquarters building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    US, allies sanction Russian bulletproof hosting firm

    Authorities say the company helped ransomware gangs and supported DDoS attacks.

    By Nov. 19, 2025
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    F5 expects nation-state hack to curb revenues

    The company says it could lose new deals because of the intrusion.

    By Oct. 28, 2025