Breaches: Page 2


  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Feb. 4, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • Trendline

    Managing identity sprawl

    Cyber threat actors know the simplest way to hack into an enterprise and remain under the radar is with stolen, legitimate user credentials -- and cloud services and AI are making managing and securing digital identities more challenging than ever.

    By Cybersecurity Dive staff
  • 2026 background, symbolizing future technologies and innovations in a high-tech environment.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

    A look at the most important trends and issues in cyber this year.

    By Cybersecurity Dive Staff • Jan. 30, 2026
  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

    By Jan. 30, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

    By Jan. 27, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime group claims credit for voice phishing attacks

    Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.

    By Updated Jan. 27, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

    By Jan. 9, 2026
  • Doors are fitted and checked during production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. Jaguar Land Rover is relaunching certain operations following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risks grow as manufacturers turn to AI and cloud systems

    Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report.

    By Sakshi Udavant • Jan. 5, 2026
  • An aerial view of a city on the water.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rockrose Development suffers security breach affecting 47,000 people

    The New York City-based firm recently found that unauthorized individuals hacked its systems and claimed to have acquired confidential information.

    By Leslie Shaver • Dec. 19, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-linked hackers exploit insecure setting in Cisco security products

    The company urged customers to immediately reconfigure affected products.

    By Dec. 18, 2025
  • The Russian flag flies over a building on a cloudy day
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Russia-linked hackers breach critical infrastructure organizations via edge devices

    New research offers the latest evidence that vulnerable network edge equipment is a pressing concern.

    By Dec. 16, 2025
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks force small firms to raise prices: ITRC

    The price hikes create a hidden “cyber tax” that is helping to fuel inflation, according to the report. 

    By Alexei Alexis • Dec. 11, 2025
  • A scientist with protective eyeglasses and mask holding a red transparent pill with fingers in gloves in the pharmaceutical research laboratory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Major drug research company confirms cyberattack compromised employee and partner data

    Indiana-based Inotiv said it was still evaluating the hack’s impact on its business.

    By Dec. 8, 2025
  • The Salesforce cloud logo is pictured on the software company's headquarters in New York on Aug. 18, 2022.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Gainsight CEO promises transparency as it responds to compromise of Salesforce integration

    The company has been in regular contact with customers, and says only a handful have seen data directly impacted.

    By Updated Nov. 26, 2025
  • A logo reading "JPMorgan Chase & Co." hangs over a set of doors
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Hackers steal sensitive data from major banking industry vendor

    The incident highlights how supply-chain compromises threaten even well-defended industries.

    By Updated Nov. 24, 2025
  • Workers in a HubSpot office
    Image attribution tooltip
    Courtesy of HubSpot
    Image attribution tooltip

    Gainsight says additional applications put on hold after Salesforce customers breached

    The company said that Zendesk and Hubspot integrations have been deactivated as the probe continues.

    By Nov. 24, 2025
  • SolarWinds
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SEC drops civil fraud case against SolarWinds

    Cybersecurity and legal experts considered the case a potential precedent-setter for risk disclosure.

    By Nov. 20, 2025
  • Salesforce
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Salesforce investigating campaign targeting customer environments connected to Gainsight app

    Researchers warn that ShinyHunters has been compromising OAuth tokens to gain potential access to customer data. 

    By Updated Nov. 21, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC plan to scrap telecom cyber rules draws congressional backlash

    A prominent U.S. senator wants the commission to rethink its plans.

    By Nov. 19, 2025
  • The brown-and-gold seal of the Treasury Department is seen on the wall of its headquarters building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    US, allies sanction Russian bulletproof hosting firm

    Authorities say the company helped ransomware gangs and supported DDoS attacks.

    By Nov. 19, 2025
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    F5 expects nation-state hack to curb revenues

    The company says it could lose new deals because of the intrusion.

    By Oct. 28, 2025
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent says data breach originally began with 2024 intrusion

    The cyberattack, which affected several state agencies, has also impacted multiple insurance providers.

    By Oct. 27, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    North Korea led the world in nation-state hacking in Q2 and Q3

    Security leaders should prioritize anomalous-activity detection and zero-trust principles, a new report recommends.

    By Oct. 24, 2025
  • Artificial Intelligence digital concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security flaws afflict half of organizations

    EY suggested ways for companies to reduce AI-related hacking risks.

    By Oct. 22, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    F5 supply chain hack endangers more than 600,000 internet-connected devices

    The enterprise device vendor has patched several vulnerabilities that hackers discovered after breaching its networks.

    By Oct. 17, 2025