Breaches: Page 2


  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to patch Cisco flaws used in multiple agency hacks

    One U.S. official called the ongoing cyberattack campaign “very sophisticated.”

    By Sept. 25, 2025
  • A Chinese flag flutters in front of a Chinese government building, on top of which other Chinese flags are flying
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    China-linked groups are using stealthy malware to hack software suppliers

    Google, which disclosed the campaign, said it was one of the most significant supply-chain hacks in recent memory.

    By Sept. 24, 2025
  • Stressed IT professional works late at night in a datacenter.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Many ‘material’ cybersecurity breaches go unreported: VikingCloud

    The research also found that cyberattacks have escalated both in frequency and severity in the past year, with AI serving as a primary driver behind the surge.

    By Alexei Alexis • Sept. 23, 2025
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SonicWall customers warned about brute force attacks against cloud backup service

    Hackers have gained access to key information that could help exploit firewalls.

    By Sept. 23, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover to extend production pause into October following cyberattack

    Meanwhile, Stellantis said hackers gained access to some customer information in a third-party data breach.

    By Sept. 23, 2025
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UK arrests 2 more alleged Scattered Spider hackers over London transit system breach

    Authorities say one of the suspects also hacked several U.S. healthcare firms.

    By Sept. 18, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft disrupts global phishing campaign that led to widespread credential theft

    Officials say the operation led to ransomware and BEC attacks on U.S. hospitals and healthcare organizations.

    By Sept. 17, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover extends production delay following cyberattack

    A hacker group linked to multiple social-engineering attacks has claimed credit for the intrusion.

    By Sept. 16, 2025
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Schools are getting better at navigating ransomware attacks, Sophos finds

    In 2025, 67% of global lower education providers said they stopped an attack before their stolen data was encrypted, the cybersecurity company reported.

    By Anna Merod • Sept. 16, 2025
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Salesloft platform integration restored after probe reveals monthslong GitHub account compromise

    An investigation by Mandiant found the attack began months ago, leading to a major supply chain attack.

    By Sept. 8, 2025
  • Inside Cloudflare’s offices in San Francisco, California.
    Image attribution tooltip
    Permission granted by Cloudflare
    Image attribution tooltip

    Cloudflare, Proofpoint say hackers gained access to Salesforce instances in attack spree

    The breaches are part of hundreds of potential supply chain attacks linked to Salesloft Drift.

    By Sept. 3, 2025
  • Beige and blue modern office building with large windows and the “paloalto networks” logo in black and red near the top corners.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Palo Alto Networks, Zscaler customers impacted by supply chain attacks

    A hacking campaign using credentials linked to Salesloft Drift has impacted a growing number of companies, including downstream customers of leading cybersecurity firms.

    By Sept. 2, 2025
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    US, allies warn China-linked actors still targeting critical infrastructure

    An advisory from 13 countries says state-backed hackers continue trying to breach telecommunications systems and other vital networks.

    By Aug. 27, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    Hackers steal data from Salesforce instances in widespread campaign

    Google researchers say the hackers abused a third-party tool in an attack spree designed to harvest credentials.

    By Updated Aug. 29, 2025
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations

    The intrusions have exploited a vulnerability in Cisco’s networking equipment software.

    By Aug. 20, 2025
  • An aerial view of the Workday building
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Hackers target Workday in social engineering attack

    Researchers cite increasing evidence of collaboration between Scattered Spider and the cybercrime group ShinyHunters in the campaign.

    By Aug. 19, 2025
  • Generic java programming code written on black.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Developers knowingly push vulnerable code, despite growing breach risk

    Only three in 10 respondents said their application security programs were highly mature.

    By Aug. 15, 2025
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler flaws lead to critical infrastructure breaches

    Dutch authorities said hackers penetrated several critical infrastructure providers, in a warning sign for vulnerable organizations elsewhere.

    By Updated Aug. 12, 2025
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Financially motivated cluster a key player in ToolShell exploitation

    Researchers from Palo Alto Networks detail ransomware deployment and malicious backdoors in a campaign against Microsoft SharePoint users.

    By Aug. 8, 2025
  • AI Artificial Intelligence Security, Digital Information Protected Secured Lock
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI is helping hackers automate and customize cyberattacks

    CrowdStrike’s annual cyber-threat-hunting report reveals the double threat that AI poses to many businesses.

    By Aug. 4, 2025
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware gangs capitalize on law enforcement takedowns of competitors

    After authorities dismantled LockBit and RansomHub, other groups rushed in to snatch up their affiliates, according to a new report that highlights a cybercrime ecosystem in flux.

    By July 31, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

    By July 30, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    FBI, CISA warn about Scattered Spider’s evolving tactics

    International authorities are pursuing the group following the arrests of four suspects in a series of attacks targeting British retailers.

    By July 29, 2025
  • Cyber Security Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attacks against oil and gas firms surge

    Manufacturing remains the No. 1 ransomware target, new data from Zscaler shows.

    By July 29, 2025
  • The logo of Allianz stands on two office buildings.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Allianz Life discloses massive data breach linked to supply-chain attack

    The intrusion comes amid a wave of recent social-engineering attacks targeting the insurance sector and other industries.

    By July 28, 2025