Cyberattacks


  • The word "Netgear" is spelled out in large purple letters attached to a metal bar hanging from a ceiling
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    FCC exempts Netgear from foreign router ban

    The commission did not explain its action beyond citing a Defense Department determination.

    By April 15, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker warns of earnings fallout from March cyberattack

    The medtech company was targeted in a wiper attack linked to an Iran-sponsored threat group.

    By April 10, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Industrial control equipment, including programmable logic controllers, are seen mounted to a wall
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Nearly 4K industrial control devices vulnerable to Iran-linked hacking campaign

    A research firm tallied the internet-exposed devices Iran is targeting and recommended mitigations for any infrastructure operator using them.

    By April 10, 2026
  • An engineer repairs an electricity pole as smoke billows after overnight airstrikes on oil depots on March 8, 2026 in Tehran, Iran.
    Image attribution tooltip
    Majid Saeedi/Getty Image via Getty Images
    Image attribution tooltip

    NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat

    Hackers have disrupted critical U.S. infrastructure by targeting programmable logic controllers, the Cybersecurity and Infrastructure Security Agency warned.

    By Robert Walton • April 9, 2026
  • A wireless router sits on a flat surface
    Image attribution tooltip
    Jens Domschky via Getty Images
    Image attribution tooltip

    US operation evicts Russia from hacked SOHO routers used to breach critical infrastructure

    The newly disclosed cyberattack campaign is the latest evidence of the threat end-of-life routers pose to major organizations.

    By Updated April 9, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    Iran-linked hackers target water, energy in US, FBI and CISA warn

    Nation-state actors have exploited flaws in industrial programmable logic controllers, leading to disruption and financial losses.

    By April 8, 2026
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data

    The stolen information could help intruders plan follow-up attacks and breach more organizations, Cisco researchers said.

    By April 7, 2026
  • Hims & Hers Super Bowl ad header
    Image attribution tooltip
    Courtesy of Hims & Hers
    Image attribution tooltip

    Hims & Hers says limited data stolen in social engineering attack

    The telehealth provider said hackers gained access to a third-party customer service platform, but medical records remained secure.

    By April 6, 2026
  • A massive lit-up sign with the tilted blue "Hasbro" logo and cartoon images looms over a dark room.
    Image attribution tooltip
    "Hasbro booth" by Gage Skidmore is licensed under CC BY-SA 2.0
    Image attribution tooltip

    Cyberattack hits Hasbro, impacting orders and shipping

    The major U.S. toymaker and entertainment company is still working to assess if company data was stolen in the attack.

    By Updated April 1, 2026
  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    Iran-linked actors target Middle Eastern city governments to undermine missile-strike responses

    The password-spraying campaign is the latest evidence that Iran is hitting back in cyberspace.

    By April 1, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Newly observed malware campaign likely combines AI and ClickFix

    Using the techniques in tandem helps hackers evade detection, a security firm said.

    By March 30, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker restores most manufacturing after cyberattack

    The medtech company has been working to restore manufacturing, ordering and shipping operations since it was hit by a cyberattack on March 11.

    By Ricky Zipp • March 30, 2026
  • Shot of two young businessmen using a computer during a late night in a modern office
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Sponsored by Zurich Resilience Solutions

    Why user behavior is the primary entry point for cyberattacks

    Human error still drives 60% of breaches — here’s why attackers keep targeting users.

    March 30, 2026
  • A woman typing on a laptop, surrounded by a large, looming crab claw. The scene conveys a feeling of pressure and urgency in a workplace setting.
    Image attribution tooltip
    Permission granted by 1Password
    Image attribution tooltip
    Sponsored by 1Password

    How OpenClaw’s agent skills become an attack surface

    OpenClaw and similar AI agent ecosystems, present pressing security risks.

    March 30, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity is the first line of defense, especially in an AI-fueled threat landscape

    Two new reports illustrate why companies need to do a better job of scrutinizing what their human employees and AI agents are doing.

    By March 27, 2026
  • Four men sit on a stage in front of an audience. Behind them, a blue backdrop displays a logo reading "RSAC 2026 Conference."
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    ‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats

    Experts said companies rushing to buy AI services risk letting their existing, still-vital defensive measures deteriorate.

    By March 25, 2026
  • A pile of rubble with an Iranian flag stuck in it is shown.
    Image attribution tooltip
    Majid Saeedi / Stringer via Getty Images
    Image attribution tooltip

    Iran-linked ransomware operation targeted US healthcare provider

    The Pay2Key group may have shifted its aims from extortion to destruction.

    By March 25, 2026
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Congress wants details from White House on cyber strategy, Iran resilience measures

    Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.

    By March 25, 2026
  • Header image for "Financial Industry is Third-Most Targeted By Hackers"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    AI poised to help low-skilled hackers in the near term

    The expected rise in automated cyberattacks means more work for defenders — but they can use AI to fight back.

    By March 23, 2026
  • Image attribution tooltip
    Kevin Moloney via Getty Images
    Image attribution tooltip

    Lockheed Martin targeted in alleged breach by pro-Iran hacktivist

    The group is demanding millions of dollars to not sell the information to U.S. adversaries.

    By March 23, 2026
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    US, allies move to dismantle four high-volume IoT botnets

    The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars.

    By March 20, 2026
  • antitrust enforcement
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    DOJ confirms seizure of domains linked to Iran-backed threat actor

    A group connected to Iranian intelligence used the same infrastructure to claim credit for the hack of medical technology firm Stryker. 

    By March 20, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker begins restoring ordering, shipping systems after cyberattack

    The medtech company believes the cyberattack has been contained and is now bringing systems back online.

    By Ricky Zipp • March 18, 2026
  • A closeup photo shows the top floors of an office building that bears the name "TELUS" in purple alongside the company's green-and-purple logo
    Image attribution tooltip
    Marvin Samuel Tolentino Pineda/iStock via Getty Images
    Image attribution tooltip

    Telus Digital confirms hack as ShinyHunters claims credit for massive data theft

    The Canadian business-process outsourcer, which counts many major businesses among its customers, still isn’t sure what the hackers stole.

    By March 16, 2026
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Stryker attack raises concerns about role of device management tool

    Researchers warn that Microsoft Intune may have been weaponized to wipe critical devices.

    By March 16, 2026