Cyberattacks: Page 2


  • Man used a desktop and on a call
    Image attribution tooltip
    Violeta Stoimenova via Getty Images
    Image attribution tooltip
    Sponsored by Modulate

    Voice channels are the next major attack vector that security teams can’t monitor

    Deepfake voices, live fraud, zero visibility: why voice channels are the next security blind spot.

    By Mike Pappas, CEO & Co-founder, Modulate • Feb. 2, 2026
  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

    By Jan. 30, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Jaguar Land Rover Assembly Line for at Halewood in the U.K.
    Image attribution tooltip
    Courtesy of Jaguar Land Rover
    Image attribution tooltip
    Deep Dive

    Manufacturers fortify cyber defenses in response to dramatic surge in attacks

    IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.

    By , Jan. 29, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

    By Jan. 27, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime group claims credit for voice phishing attacks

    Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.

    By Updated Jan. 27, 2026
  • Multiple padlocks encircled by white, on a blue surface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT teams aren’t equipped to stop rogue AI agents

    Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.

    By James Anderson • Jan. 22, 2026
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    LastPass warns backup request is phishing campaign in disguise

    Customers received deceptive emails over the holiday weekend claiming the company was doing maintenance.

    By Updated Jan. 23, 2026
  • A clinical operating room with two medical professionals; one seated at a robotic surgery console and the other standing next to a patient covered in blue drapes with robotic arms positioned above.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Healthcare breaches double as shadow AI, vendor risks proliferate

    A new report paints a picture of a sector with limited confidence in its defensive capabilities.

    By Jan. 13, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

    By Jan. 9, 2026
  • Cybersecurity warning with red warning symbol with binary code
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How CIOs can brace for AI-fueled cyberthreats

    Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.

    By Jen A. Miller • Jan. 8, 2026
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports fiscal Q3 sales slump following cyberattack

    The hack forced the automaker to halt production for weeks and caused disruptions across the supply chain.

    By Jan. 6, 2026
  • Doors are fitted and checked during production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. Jaguar Land Rover is relaunching certain operations following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risks grow as manufacturers turn to AI and cloud systems

    Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report.

    By Sakshi Udavant • Jan. 5, 2026
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says

    Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

    By Dec. 22, 2025
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA warns of continued threat activity linked to Brickstorm malware

    Officials provided additional evidence showing its ability to maintain persistence and evade defenses.

    By Dec. 22, 2025
  • An aerial view of a city on the water.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rockrose Development suffers security breach affecting 47,000 people

    The New York City-based firm recently found that unauthorized individuals hacked its systems and claimed to have acquired confidential information.

    By Leslie Shaver • Dec. 19, 2025
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Surge of credential-based hacking targets Palo Alto Networks GlobalProtect

    After weeks of unusual scanning activity, the same campaign took aim at Cisco SSL VPNs.

    By Dec. 18, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-linked hackers exploit insecure setting in Cisco security products

    The company urged customers to immediately reconfigure affected products.

    By Dec. 18, 2025
  • The Russian flag flies over a building on a cloudy day
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Russia-linked hackers breach critical infrastructure organizations via edge devices

    New research offers the latest evidence that vulnerable network edge equipment is a pressing concern.

    By Dec. 16, 2025
  • Pools of water are seen in an aerial photo of a wastewater treatment plant
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Pro-Russia hacktivists launching attacks that could damage OT

    The U.S. and its allies warned that defenders should take the hackers seriously, despite the attackers’ pattern of exaggerating their actual impact.

    By Dec. 10, 2025
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Initial access brokers involved in more attacks, including on critical infrastructure

    A research firm also finds nation-states aligning their cyberattacks more closely with geostrategic goals.

    By Dec. 8, 2025
  • A scientist with protective eyeglasses and mask holding a red transparent pill with fingers in gloves in the pharmaceutical research laboratory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Major drug research company confirms cyberattack compromised employee and partner data

    Indiana-based Inotiv said it was still evaluating the hack’s impact on its business.

    By Dec. 8, 2025
  • Two cargo freights with the U.S. and China flags on them bumping into each other.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-nexus actor targets multiple US entities with Brickstorm malware

    Researchers outline a campaign targeting U.S. companies, and CISA warns of attacks on government services and IT firms.

    By Updated Dec. 5, 2025
  • AI assistant apps icons for OpenAI ChatGPT, Google Gemini and Anthropic Claude. are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Lawmakers question White House on strategy for countering AI-fueled hacks

    The Trump administration has said little about how it will prevent hackers from abusing AI.

    By Dec. 4, 2025
  • A smartphone screen displays several messaging apps
    Image attribution tooltip
    Chris McGrath via Getty Images
    Image attribution tooltip

    CISA urges mobile security as it warns of sophisticated spyware attacks

    The agency’s rare warning about spyware activity comes as it updated mobile security guidance to reflect evolving threats.

    By Nov. 25, 2025
  • A logo reading "JPMorgan Chase & Co." hangs over a set of doors
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Hackers steal sensitive data from major banking industry vendor

    The incident highlights how supply-chain compromises threaten even well-defended industries.

    By Updated Nov. 24, 2025