Cyberattacks


  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attacks against education sector slow worldwide

    The U.S. saw the highest number of education-related ransomware attacks in 2025, at 130, despite a 9% decline year over year.

    By Anna Merod • Feb. 6, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Asian government’s espionage campaign breached critical infrastructure in 37 countries

    The victims included national telecommunications firms, finance ministries and police agencies, with most targets suggesting an economic focus, Palo Alto Networks said.

    By Feb. 5, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Feb. 4, 2026
  • Two men and a woman sit on an event stage in front of a blue backdrop that displays the name of the event and its organizer
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI-ISAC inches forward under Trump administration

    The U.S. government is exploring different options for how the information-sharing organization should work, an official said.

    By Feb. 3, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • Man used a desktop and on a call
    Image attribution tooltip
    Violeta Stoimenova via Getty Images
    Image attribution tooltip
    Sponsored by Modulate

    Voice channels are the next major attack vector that security teams can’t monitor

    Deepfake voices, live fraud, zero visibility: why voice channels are the next security blind spot.

    By Mike Pappas, CEO & Co-founder, Modulate • Feb. 2, 2026
  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

    By Jan. 30, 2026
  • Jaguar Land Rover Assembly Line for at Halewood in the U.K.
    Image attribution tooltip
    Courtesy of Jaguar Land Rover
    Image attribution tooltip
    Deep Dive

    Manufacturers fortify cyber defenses in response to dramatic surge in attacks

    IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.

    By , Jan. 29, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

    By Jan. 27, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime group claims credit for voice phishing attacks

    Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.

    By Updated Jan. 27, 2026
  • Multiple padlocks encircled by white, on a blue surface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT teams aren’t equipped to stop rogue AI agents

    Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.

    By James Anderson • Jan. 22, 2026
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    LastPass warns backup request is phishing campaign in disguise

    Customers received deceptive emails over the holiday weekend claiming the company was doing maintenance.

    By Updated Jan. 23, 2026
  • A clinical operating room with two medical professionals; one seated at a robotic surgery console and the other standing next to a patient covered in blue drapes with robotic arms positioned above.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Healthcare breaches double as shadow AI, vendor risks proliferate

    A new report paints a picture of a sector with limited confidence in its defensive capabilities.

    By Jan. 13, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

    By Jan. 9, 2026
  • Cybersecurity warning with red warning symbol with binary code
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How CIOs can brace for AI-fueled cyberthreats

    Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.

    By Jen A. Miller • Jan. 8, 2026
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports fiscal Q3 sales slump following cyberattack

    The hack forced the automaker to halt production for weeks and caused disruptions across the supply chain.

    By Jan. 6, 2026
  • Doors are fitted and checked during production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. Jaguar Land Rover is relaunching certain operations following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risks grow as manufacturers turn to AI and cloud systems

    Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report.

    By Sakshi Udavant • Jan. 5, 2026
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says

    Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

    By Dec. 22, 2025
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA warns of continued threat activity linked to Brickstorm malware

    Officials provided additional evidence showing its ability to maintain persistence and evade defenses.

    By Dec. 22, 2025
  • An aerial view of a city on the water.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rockrose Development suffers security breach affecting 47,000 people

    The New York City-based firm recently found that unauthorized individuals hacked its systems and claimed to have acquired confidential information.

    By Leslie Shaver • Dec. 19, 2025
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Surge of credential-based hacking targets Palo Alto Networks GlobalProtect

    After weeks of unusual scanning activity, the same campaign took aim at Cisco SSL VPNs.

    By Dec. 18, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-linked hackers exploit insecure setting in Cisco security products

    The company urged customers to immediately reconfigure affected products.

    By Dec. 18, 2025
  • The Russian flag flies over a building on a cloudy day
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Russia-linked hackers breach critical infrastructure organizations via edge devices

    New research offers the latest evidence that vulnerable network edge equipment is a pressing concern.

    By Dec. 16, 2025
  • Pools of water are seen in an aerial photo of a wastewater treatment plant
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Pro-Russia hacktivists launching attacks that could damage OT

    The U.S. and its allies warned that defenders should take the hackers seriously, despite the attackers’ pattern of exaggerating their actual impact.

    By Dec. 10, 2025
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Initial access brokers involved in more attacks, including on critical infrastructure

    A research firm also finds nation-states aligning their cyberattacks more closely with geostrategic goals.

    By Dec. 8, 2025