Breaches


  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

    By Jan. 9, 2026
  • Doors are fitted and checked during production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. Jaguar Land Rover is relaunching certain operations following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risks grow as manufacturers turn to AI and cloud systems

    Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report.

    By Sakshi Udavant • Jan. 5, 2026
  • An aerial view of a city on the water.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rockrose Development suffers security breach affecting 47,000 people

    The New York City-based firm recently found that unauthorized individuals hacked its systems and claimed to have acquired confidential information.

    By Leslie Shaver • Dec. 19, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-linked hackers exploit insecure setting in Cisco security products

    The company urged customers to immediately reconfigure affected products.

    By Dec. 18, 2025
  • The Russian flag flies over a building on a cloudy day
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Russia-linked hackers breach critical infrastructure organizations via edge devices

    New research offers the latest evidence that vulnerable network edge equipment is a pressing concern.

    By Dec. 16, 2025
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks force small firms to raise prices: ITRC

    The price hikes create a hidden “cyber tax” that is helping to fuel inflation, according to the report. 

    By Alexei Alexis • Dec. 11, 2025
  • A scientist with protective eyeglasses and mask holding a red transparent pill with fingers in gloves in the pharmaceutical research laboratory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Major drug research company confirms cyberattack compromised employee and partner data

    Indiana-based Inotiv said it was still evaluating the hack’s impact on its business.

    By Dec. 8, 2025
  • The Salesforce cloud logo is pictured on the software company's headquarters in New York on Aug. 18, 2022.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Gainsight CEO promises transparency as it responds to compromise of Salesforce integration

    The company has been in regular contact with customers, and says only a handful have seen data directly impacted.

    By Updated Nov. 26, 2025
  • A logo reading "JPMorgan Chase & Co." hangs over a set of doors
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Hackers steal sensitive data from major banking industry vendor

    The incident highlights how supply-chain compromises threaten even well-defended industries.

    By Updated Nov. 24, 2025
  • Workers in a HubSpot office
    Image attribution tooltip
    Courtesy of HubSpot
    Image attribution tooltip

    Gainsight says additional applications put on hold after Salesforce customers breached

    The company said that Zendesk and Hubspot integrations have been deactivated as the probe continues.

    By Nov. 24, 2025
  • SolarWinds
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SEC drops civil fraud case against SolarWinds

    Cybersecurity and legal experts considered the case a potential precedent-setter for risk disclosure.

    By Nov. 20, 2025
  • Salesforce
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Salesforce investigating campaign targeting customer environments connected to Gainsight app

    Researchers warn that ShinyHunters has been compromising OAuth tokens to gain potential access to customer data. 

    By Updated Nov. 21, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC plan to scrap telecom cyber rules draws congressional backlash

    A prominent U.S. senator wants the commission to rethink its plans.

    By Nov. 19, 2025
  • The brown-and-gold seal of the Treasury Department is seen on the wall of its headquarters building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    US, allies sanction Russian bulletproof hosting firm

    Authorities say the company helped ransomware gangs and supported DDoS attacks.

    By Nov. 19, 2025
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    F5 expects nation-state hack to curb revenues

    The company says it could lose new deals because of the intrusion.

    By Oct. 28, 2025
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent says data breach originally began with 2024 intrusion

    The cyberattack, which affected several state agencies, has also impacted multiple insurance providers.

    By Oct. 27, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    North Korea led the world in nation-state hacking in Q2 and Q3

    Security leaders should prioritize anomalous-activity detection and zero-trust principles, a new report recommends.

    By Oct. 24, 2025
  • Artificial Intelligence digital concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security flaws afflict half of organizations

    EY suggested ways for companies to reduce AI-related hacking risks.

    By Oct. 22, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    F5 supply chain hack endangers more than 600,000 internet-connected devices

    The enterprise device vendor has patched several vulnerabilities that hackers discovered after breaching its networks.

    By Oct. 17, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Auto sector faces historic cyber threats to business continuity

    A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability.

    By Oct. 16, 2025
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Nation-state hackers breached sensitive F5 systems, stole customer data

    The federal government is scrambling to determine if any agencies have been hacked.

    By Oct. 15, 2025
  • A tech worker eviews code on a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SonicWall investigation shows hackers gained wide access to customer backup files

    The probe contradicts earlier claims that a limited set of MySonicWall customers were impacted. 

    By Oct. 10, 2025
  • Entrance to a modern glass building with a large blue cloud-shaped sign that reads “salesforce.” The text “Welcome to Salesforce Tower” is displayed on the wall below the sign.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Salesforce refuses to submit to extortion demands linked to hacking campaigns

    The company said it is aware of recent claims, but will not negotiate or pay a ransom.

    By Oct. 8, 2025
  • A stack of red lockers with a hat icon and the words "Red Hat" emblazoned in white on several of them
    Image attribution tooltip
    Courtesy of https://www.redhat.com/en/about/company-details
    Image attribution tooltip

    Hackers steal sensitive Red Hat customer data after breaching GitLab repository

    Walmart, American Express and HSBC are among the companies that have had sensitive data exposed.

    By Updated Oct. 6, 2025
  • Renault and Dacia logos outside a showroom in Crew, England on Nov. 15, 2024
    Image attribution tooltip
    Christopher Furlong via Getty Images
    Image attribution tooltip

    Renault Group confirms UK customer data stolen in third-party breach

    The incident marks the latest in a series of recent cyberattacks impacting the auto industry.

    By Oct. 3, 2025