Cyberattacks: Page 2
-
Congress wants details from White House on cyber strategy, Iran resilience measures
Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.
By Eric Geller • March 25, 2026 -
AI poised to help low-skilled hackers in the near term
The expected rise in automated cyberattacks means more work for defenders — but they can use AI to fight back.
By Eric Geller • March 23, 2026 -
Explore the Trendline➔
Getty Images
-
Lockheed Martin targeted in alleged breach by pro-Iran hacktivist
The group is demanding millions of dollars to not sell the information to U.S. adversaries.
By David Jones • March 23, 2026 -
US, allies move to dismantle four high-volume IoT botnets
The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars.
By Eric Geller • March 20, 2026 -
DOJ confirms seizure of domains linked to Iran-backed threat actor
A group connected to Iranian intelligence used the same infrastructure to claim credit for the hack of medical technology firm Stryker.
By David Jones • March 20, 2026 -
Stryker begins restoring ordering, shipping systems after cyberattack
The medtech company believes the cyberattack has been contained and is now bringing systems back online.
By Ricky Zipp • March 18, 2026 -
Telus Digital confirms hack as ShinyHunters claims credit for massive data theft
The Canadian business-process outsourcer, which counts many major businesses among its customers, still isn’t sure what the hackers stole.
By Eric Geller • March 16, 2026 -
Stryker attack raises concerns about role of device management tool
Researchers warn that Microsoft Intune may have been weaponized to wipe critical devices.
By David Jones • March 16, 2026 -
Robotics firm Intuitive Surgical says cyberattack compromised business, customer data
The company said an intruder accessed employee information, customer contact details and other records.
By Ricky Zipp • March 16, 2026 -
Stryker’s manufacturing, shipping disrupted after cyberattack
The medtech company says it's still experiencing issues with order processing, manufacturing and shipping.
By Ricky Zipp , David Jones • March 13, 2026 -
Even primitive AI-coded malware helps hackers move faster, thwart attribution
IBM researchers discovered an autonomously coded backdoor that they called unsophisticated but nonetheless ominous.
By Eric Geller • March 13, 2026 -
5 ways to protect manufacturing companies from cyberattacks
Manufacturing suffered the most cyberattacks of any industry last year. Experts have advice about hardening networks and avoiding common mistakes.
By Jeffrey Kinney • March 12, 2026 -
Stryker investigating cyberattack that caused widespread outage
The full scope of the impact on the medical equipment firm, including operational and financial effects, remains unclear.
By Ricky Zipp , David Jones • Updated March 12, 2026 -
State-linked actors targeted US networks in lead-up to Iran war
Researchers found backdoors installed on U.S. company networks in the weeks prior to the U.S. and Israeli bombing campaign.
By David Jones • March 9, 2026 -
Ransomware is now less about malware and more about impersonation
Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.
By Eric Geller • March 3, 2026 -
University of Mississippi Medical Center reopens clinics after ransomware attack
The academic medical center’s clinics can once again access patient records and are resuming normal operations more than a week after the attack.
By Emily Olsen • Updated March 2, 2026 -
UFP Technologies investigating cyberattack that impacted company data
The medical device maker warned of short-term shipment delays, but does not see a material impact.
By David Jones • Feb. 26, 2026 -
AI accelerates lateral movement in cyberattacks
New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.
By Eric Geller • Feb. 26, 2026 -
CISA orders agencies to patch Cisco devices now under attack
The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.
By Eric Geller • Feb. 25, 2026 -
China-linked hackers breached dozens of telecoms, government agencies
The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.
By Eric Geller • Feb. 25, 2026 -
In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps
CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.
By Eric Geller • Feb. 24, 2026 -
AI helps novice threat actor compromise FortiGate devices in dozens of countries
Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according to a new Amazon report.
By Eric Geller • Feb. 23, 2026 -
Identity and supply chain need more attention, risk intelligence firm says
Roughly a third of attacks now use stolen credentials, according to the company’s latest report.
By Eric Geller • Feb. 18, 2026 -
Threat groups use AI to speed up and scale cyberattacks
A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.
By David Jones • Feb. 18, 2026 -
Data-only extortion grows as ransomware gangs seek better profits
Businesses should prioritize securing one type of technology in particular, the security firm Arctic Wolf said in a new report.
By Eric Geller • Feb. 17, 2026