Cyberattacks


  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations

    The intrusions have exploited a vulnerability in Cisco’s networking equipment software.

    By Aug. 20, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Pharmaceutical firm Inotiv investigating ransomware attack that disrupted operations

    The company says it doesn’t yet know if the incident will have a material impact.

    By Aug. 20, 2025
  • a software developer writes code while using an external monitor in an office setting Explore the Trendlineâž”
    Image attribution tooltip
    Nattakorn Maneerat via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • An aerial view of the Workday building
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Hackers target Workday in social engineering attack

    Researchers cite increasing evidence of collaboration between Scattered Spider and the cybercrime group ShinyHunters in the campaign.

    By Aug. 19, 2025
  • Generic java programming code written on black.
    Image attribution tooltip
    funky-data via Getty Images
    Image attribution tooltip

    Developers knowingly push vulnerable code, despite growing breach risk

    Only three in 10 respondents said their application security programs were highly mature.

    By Aug. 15, 2025
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler flaws lead to critical infrastructure breaches

    Dutch authorities said hackers penetrated several critical infrastructure providers, in a warning sign for vulnerable organizations elsewhere.

    By Updated Aug. 12, 2025
  • Six men stand on a stage. Three men hold an oversized $4 million check made out to "Team Atlanta," while two of the other men flank this trio and pose for a photo with them. The sixth person stands off to the side and applauds.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    DARPA touts value of AI-powered vulnerability detection as it announces competition winners

    The U.S. military research agency hopes to foster a new ecosystem of autonomous vulnerability remediation.

    By Aug. 8, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    SonicWall says recent attack wave involved previously disclosed flaw, not zero-day

    The company said it had linked recent hacks to customers’ use of legacy credentials when migrating from Gen 6 to Gen 7 firewalls.

    By Aug. 7, 2025
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    SonicWall investigating possible zero-day related to firewall attacks

    Researchers recently warned about a surge in Akira ransomware attacks linked to a potential SonicWall vulnerability.

    By Aug. 5, 2025
  • AI Artificial Intelligence Security, Digital Information Protected Secured Lock
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    AI is helping hackers automate and customize cyberattacks

    CrowdStrike’s annual cyber-threat-hunting report reveals the double threat that AI poses to many businesses.

    By Aug. 4, 2025
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Ransomware spike linked to potential zero-day flaw in SonicWall devices

    Researchers say hackers using the Akira ransomware strain may be exploiting the vulnerability en masse.

    By Updated Aug. 4, 2025
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Ransomware gangs capitalize on law enforcement takedowns of competitors

    After authorities dismantled LockBit and RansomHub, other groups rushed in to snatch up their affiliates, according to a new report that highlights a cybercrime ecosystem in flux.

    By July 31, 2025
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    What we know about the cybercrime group Scattered Spider

    The notorious hacker collective has attracted the attention of government authorities in several nations around the globe. 

    By July 30, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

    By July 30, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    FBI, CISA warn about Scattered Spider’s evolving tactics

    International authorities are pursuing the group following the arrests of four suspects in a series of attacks targeting British retailers.

    By July 29, 2025
  • Cyber Security Ransomware
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks against oil and gas firms surge

    Manufacturing remains the No. 1 ransomware target, new data from Zscaler shows.

    By July 29, 2025
  • Image depicting the digital landscape
    Image attribution tooltip
    Permission granted by ThreatLocker
    Image attribution tooltip
    Sponsored by ThreatLocker

    Emerging cybersecurity needs: What the market is telling us

    Default-deny, strict controls, and real-time monitoring: how to stop threats before they start.

    By Yuriy Tsibere, Product Manager and Business Analyst, ThreatLocker • July 28, 2025
  • The Department of Energy (DOE) sign is seen at its headquarters, the James Forrestal Building, nicknamed the Little Pentagon, in Washington, DC.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    What we know about the Microsoft SharePoint attacks

    State-linked hackers and ransomware groups are targeting SharePoint customers across the globe.

    By July 24, 2025
  • Bottles of Clorox bleach on a supermarket shelf.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Clorox files $380 million suit blaming Cognizant for 2023 cyberattack

    The attack, linked to Scattered Spider, disrupted production of household cleaners and other goods.

    By July 23, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    SharePoint hacking campaign affects hundreds of systems worldwide

    CISA is responding to potential compromises at federal agencies and various state and local entities.

    By Updated July 23, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft sees China-backed nation-state hackers among adversaries targeting SharePoint

    The company urged customers to apply security updates as security researchers warn of escalating attacks.

    By July 22, 2025
  • legal role in data incident or breach
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks in education jump 23% year over year

    Education was the fourth-most-targeted sector during the first half of 2025, according to a report from Comparitech.

    By Briana Mendez-Padilla • July 22, 2025
  • Aerial view of the Jack H. Wilson Water Treatment Plant in Little Rock, Arkansas.
    Image attribution tooltip
    Permission granted by Central Arkansas Water
    Image attribution tooltip
    Deep Dive

    Dwindling federal cyber support for critical infrastructure raises alarms

    A plan to transfer cybersecurity and resilience responsibilities to states could have major unintended consequences.

    By July 22, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Khanchit Khirisutchalual via Getty Images
    Image attribution tooltip

    AI-powered attacks rise as CISOs prioritize AI security risks

    Security executives are concerned about flaws in AI agents but also eager to see them replace humans in some roles, according to a new report.

    By July 17, 2025
  • A white tractor-trailer in front of a red brick building.
    Image attribution tooltip
    Sam Silverstein/Cybersecurity Dive
    Image attribution tooltip

    UNFI expects cyberattack to cost it at least $350 million in sales

    Operations at the grocery distributor, whose customers include Whole Foods, have largely returned to normal, the company said.

    By Sam Silverstein • July 16, 2025
  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Threat actor targets end-of-life SonicWall SMA 100 appliances in ongoing campaign

    The hacker has deployed a backdoor to modify the boot process and has exploited several different vulnerabilities during the attack spree.

    By July 16, 2025