Cyberattacks: Page 2
-
Sponsored by Modulate
Voice channels are the next major attack vector that security teams can’t monitor
Deepfake voices, live fraud, zero visibility: why voice channels are the next security blind spot.
By Mike Pappas, CEO & Co-founder, Modulate • Feb. 2, 2026 -
Cisco sees vulnerability exploitation top phishing in Q4
The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.
By Eric Geller • Jan. 30, 2026 -
Explore the Trendline➔
Getty Images
-
Deep Dive
Manufacturers fortify cyber defenses in response to dramatic surge in attacks
IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.
By Eric Geller , David Jones • Jan. 29, 2026 -
Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority
A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.
By Eric Geller • Jan. 27, 2026 -
Cybercrime group claims credit for voice phishing attacks
Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.
By David Jones • Updated Jan. 27, 2026 -
IT teams aren’t equipped to stop rogue AI agents
Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.
By James Anderson • Jan. 22, 2026 -
LastPass warns backup request is phishing campaign in disguise
Customers received deceptive emails over the holiday weekend claiming the company was doing maintenance.
By David Jones • Updated Jan. 23, 2026 -
Healthcare breaches double as shadow AI, vendor risks proliferate
A new report paints a picture of a sector with limited confidence in its defensive capabilities.
By Eric Geller • Jan. 13, 2026 -
Telecom sector sees steady rise in ransomware attacks
A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.
By Eric Geller • Jan. 9, 2026 -
How CIOs can brace for AI-fueled cyberthreats
Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.
By Jen A. Miller • Jan. 8, 2026 -
Jaguar Land Rover reports fiscal Q3 sales slump following cyberattack
The hack forced the automaker to halt production for weeks and caused disruptions across the supply chain.
By David Jones • Jan. 6, 2026 -
Cyber risks grow as manufacturers turn to AI and cloud systems
Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report.
By Sakshi Udavant • Jan. 5, 2026 -
AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says
Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.
By Eric Geller • Dec. 22, 2025 -
CISA warns of continued threat activity linked to Brickstorm malware
Officials provided additional evidence showing its ability to maintain persistence and evade defenses.
By David Jones • Dec. 22, 2025 -
Rockrose Development suffers security breach affecting 47,000 people
The New York City-based firm recently found that unauthorized individuals hacked its systems and claimed to have acquired confidential information.
By Leslie Shaver • Dec. 19, 2025 -
Surge of credential-based hacking targets Palo Alto Networks GlobalProtect
After weeks of unusual scanning activity, the same campaign took aim at Cisco SSL VPNs.
By David Jones • Dec. 18, 2025 -
China-linked hackers exploit insecure setting in Cisco security products
The company urged customers to immediately reconfigure affected products.
By Eric Geller • Dec. 18, 2025 -
Russia-linked hackers breach critical infrastructure organizations via edge devices
New research offers the latest evidence that vulnerable network edge equipment is a pressing concern.
By Eric Geller • Dec. 16, 2025 -
Pro-Russia hacktivists launching attacks that could damage OT
The U.S. and its allies warned that defenders should take the hackers seriously, despite the attackers’ pattern of exaggerating their actual impact.
By Eric Geller • Dec. 10, 2025 -
Initial access brokers involved in more attacks, including on critical infrastructure
A research firm also finds nation-states aligning their cyberattacks more closely with geostrategic goals.
By Eric Geller • Dec. 8, 2025 -
Major drug research company confirms cyberattack compromised employee and partner data
Indiana-based Inotiv said it was still evaluating the hack’s impact on its business.
By Eric Geller • Dec. 8, 2025 -
China-nexus actor targets multiple US entities with Brickstorm malware
Researchers outline a campaign targeting U.S. companies, and CISA warns of attacks on government services and IT firms.
By David Jones • Updated Dec. 5, 2025 -
Lawmakers question White House on strategy for countering AI-fueled hacks
The Trump administration has said little about how it will prevent hackers from abusing AI.
By Eric Geller • Dec. 4, 2025 -
CISA urges mobile security as it warns of sophisticated spyware attacks
The agency’s rare warning about spyware activity comes as it updated mobile security guidance to reflect evolving threats.
By Eric Geller • Nov. 25, 2025 -
Hackers steal sensitive data from major banking industry vendor
The incident highlights how supply-chain compromises threaten even well-defended industries.
By Eric Geller • Updated Nov. 24, 2025