Cyberattacks


  • A screenshot of a message from ShinyHunters on a laptop screen.
    Image attribution tooltip
    Permission granted by Chris Insana
    Image attribution tooltip

    Second Canvas data breach causes major disruptions for schools, colleges

    The Instructure-owned learning management system went offline on May 7 after a threat actor once again gained unauthorized access.

    By Anna Merod • May 11, 2026
  • A person with a tablet
    Image attribution tooltip
    Marco VDM/SHI via Getty Images
    Image attribution tooltip
    Sponsored by SHI

    Identity is the new perimeter as rapid NHI proliferation threatens visibility and control

    NHIs are linked to diverse assets across the enterprise technology ecosystem, creating a highly fragmented architecture and making it challenging for security teams to maintain visibility and control.

    May 11, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • A digital depiction of a red triangle sign with an exclamation point in the center with binary code in the background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Instructure confirms cybersecurity incident

    The ed tech company that operates Canvas said information impacted by the data breach includes messages, names, email addresses and student ID numbers.

    By Anna Merod • May 8, 2026
  • Claude, AI startup, Anthropic
    Image attribution tooltip
    Permission granted by Anthropic
    Image attribution tooltip

    Anthropic’s Claude used in attempted compromise of Mexican water utility

    Researchers warn the incident highlights how AI tools can help untrained threat actors develop complex cyberattack capabilities.

    By May 8, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses hide vast majority of ransomware attacks, report finds

    The security firm BlackFog said the number of disclosed incidents it tracked in Q1 was roughly one-tenth of the number of undisclosed incidents.

    By May 7, 2026
  • A woman typing on a laptop, surrounded by a large, looming crab claw. The scene conveys a feeling of pressure and urgency in a workplace setting.
    Image attribution tooltip
    Permission granted by 1Password
    Image attribution tooltip
    Sponsored by 1Password

    How OpenClaw’s agent skills become an attack surface

    OpenClaw and similar AI agent ecosystems, present pressing security risks.

    May 4, 2026
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    As email phishing evolves, malicious attachments decline and QR codes surge

    A new Microsoft report also describes the collapse of a once-dominant tool for generating phishing websites with fake CAPTCHAs.

    By May 1, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog

    Russia has used one of the flaws, security experts said, while North Korea has used the other.

    By April 29, 2026
  • Two people standing face to face on a plastics production line.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Fundamental tension’ undermines manufacturers’ cybersecurity

    A simple security mistake caused roughly one-quarter of all financial losses in the sector in 2025, cybersecurity insurer Resilience said.

    By April 28, 2026
  • Businessmen use Bitcoin to lure others into a trap
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    North Korea-linked actor targets Web3 execs in social-engineering campaign

    Founders and other top executives were compromised to gain access to crypto wallets.

    By April 27, 2026
  • An energy meter displaying usage in kilowatt-hours is seen next to a brick wall
    Image attribution tooltip
    pkline via Getty Images
    Image attribution tooltip

    Major critical infrastructure supplier reports cyberattack

    Itron, which makes devices that measure energy and water use, said its operations were continuing, despite the intrusion.

    By April 27, 2026
  • Nick Andersen, executive assistant director for cybersecurity, speaks during the Billington Cybersecurity Summit in Washington D.C. on Sept. 11, 2025.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    US, UK authorities warn that Firestarter backdoor malware survives patching

    A federal agency was impacted by a hacking campaign that exploited flaws in Cisco devices.

    By April 27, 2026
  • A Chinese flag flutters in front of a Chinese government building, on top of which other Chinese flags are flying
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    China disguises cyberattacks with ‘covert network’ botnets, US and allies warn

    A new security advisory highlights Beijing’s stealthy techniques.

    By Updated April 23, 2026
  • Secretary of War Pete Hegseth and Chairman of the Joint Chiefs of Staff Air Force General Dan Caine (R) provide updates on the continued military operations on Iran during a press briefing on the Iran war at the Pentagon on March 19, 2026 in Arlington, Virginia. Iran-backed threat actors have targeted U.S. critical infrastructure sites in recent since the launch of the war.
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip
    Deep Dive

    Iran-nexus threat groups refine attacks against critical infrastructure

    State-sponsored and hacktivist groups have shown greater determination to damage or disable energy, water and other key sectors.

    By April 23, 2026
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Phishing — sometimes with AI’s help — topped initial-access methods in Q1, Cisco says

    Hackers can now spin up fake login pages without writing a single line of code.

    By April 22, 2026
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges security teams to view environments following axios compromise

    A suspected North Korea-linked actor is behind a supply chain attack on the widely used library.

    By April 21, 2026
  • Two businessmen in suits stand outside a modern glass building. One is explaining something on a tablet. They appear engaged and focused.
    Image attribution tooltip
    Jacob Wackerhausen via Getty Images
    Image attribution tooltip
    Sponsored by Zurich Resilience Solutions

    Beyond IT: Cybersecurity is a strategic business risk

    Why cybersecurity now demands C-suite attention and accountability.

    April 20, 2026
  • The words ddos attack are spelled out in red on a computer screen amid random blue text.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US joins nearly two dozen other countries in striking back against DDoS-for-hire platforms

    Authorities around the world seized more than 50 websites associated with DDoS “booter” services.

    By April 17, 2026
  • The word "Netgear" is spelled out in large purple letters attached to a metal bar hanging from a ceiling
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    FCC exempts Netgear from foreign router ban

    The commission did not explain its action beyond citing a Defense Department determination.

    By April 15, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker warns of earnings fallout from March cyberattack

    The medtech company was targeted in a wiper attack linked to an Iran-sponsored threat group.

    By April 10, 2026
  • Industrial control equipment, including programmable logic controllers, are seen mounted to a wall
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Nearly 4K industrial control devices vulnerable to Iran-linked hacking campaign

    A research firm tallied the internet-exposed devices Iran is targeting and recommended mitigations for any infrastructure operator using them.

    By April 10, 2026
  • An engineer repairs an electricity pole as smoke billows after overnight airstrikes on oil depots on March 8, 2026 in Tehran, Iran.
    Image attribution tooltip
    Majid Saeedi/Getty Image via Getty Images
    Image attribution tooltip

    NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat

    Hackers have disrupted critical U.S. infrastructure by targeting programmable logic controllers, the Cybersecurity and Infrastructure Security Agency warned.

    By Robert Walton • April 9, 2026
  • A wireless router sits on a flat surface
    Image attribution tooltip
    Jens Domschky via Getty Images
    Image attribution tooltip

    US operation evicts Russia from hacked SOHO routers used to breach critical infrastructure

    The newly disclosed cyberattack campaign is the latest evidence of the threat end-of-life routers pose to major organizations.

    By Updated April 9, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    Iran-linked hackers target water, energy in US, FBI and CISA warn

    Nation-state actors have exploited flaws in industrial programmable logic controllers, leading to disruption and financial losses.

    By April 8, 2026
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data

    The stolen information could help intruders plan follow-up attacks and breach more organizations, Cisco researchers said.

    By April 7, 2026