Cyberattacks: Page 2


  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Congress wants details from White House on cyber strategy, Iran resilience measures

    Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.

    By March 25, 2026
  • Header image for "Financial Industry is Third-Most Targeted By Hackers"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    AI poised to help low-skilled hackers in the near term

    The expected rise in automated cyberattacks means more work for defenders — but they can use AI to fight back.

    By March 23, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Kevin Moloney via Getty Images
    Image attribution tooltip

    Lockheed Martin targeted in alleged breach by pro-Iran hacktivist

    The group is demanding millions of dollars to not sell the information to U.S. adversaries.

    By March 23, 2026
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    US, allies move to dismantle four high-volume IoT botnets

    The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars.

    By March 20, 2026
  • antitrust enforcement
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    DOJ confirms seizure of domains linked to Iran-backed threat actor

    A group connected to Iranian intelligence used the same infrastructure to claim credit for the hack of medical technology firm Stryker. 

    By March 20, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker begins restoring ordering, shipping systems after cyberattack

    The medtech company believes the cyberattack has been contained and is now bringing systems back online.

    By Ricky Zipp • March 18, 2026
  • A closeup photo shows the top floors of an office building that bears the name "TELUS" in purple alongside the company's green-and-purple logo
    Image attribution tooltip
    Marvin Samuel Tolentino Pineda/iStock via Getty Images
    Image attribution tooltip

    Telus Digital confirms hack as ShinyHunters claims credit for massive data theft

    The Canadian business-process outsourcer, which counts many major businesses among its customers, still isn’t sure what the hackers stole.

    By March 16, 2026
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Stryker attack raises concerns about role of device management tool

    Researchers warn that Microsoft Intune may have been weaponized to wipe critical devices.

    By March 16, 2026
  • A modern office building with large reflective glass windows is shown behind a wide driveway and landscaped entrance. In the foreground, a white and orange monument sign reads "Intuitive Surgical" with the number "1020" vertically on the side.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Robotics firm Intuitive Surgical says cyberattack compromised business, customer data

    The company said an intruder accessed employee information, customer contact details and other records.

    By Ricky Zipp • March 16, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker’s manufacturing, shipping disrupted after cyberattack

    The medtech company says it's still experiencing issues with order processing, manufacturing and shipping. 

    By Ricky Zipp , March 13, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Even primitive AI-coded malware helps hackers move faster, thwart attribution

    IBM researchers discovered an autonomously coded backdoor that they called unsophisticated but nonetheless ominous.

    By March 13, 2026
  • A worker uses Hexagon's design and engieering technology on his computer.
    Image attribution tooltip
    Courtesy of Hexagon
    Image attribution tooltip

    5 ways to protect manufacturing companies from cyberattacks

    Manufacturing suffered the most cyberattacks of any industry last year. Experts have advice about hardening networks and avoiding common mistakes.

    By Jeffrey Kinney • March 12, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker investigating cyberattack that caused widespread outage

    The full scope of the impact on the medical equipment firm, including operational and financial effects, remains unclear.

    By Ricky Zipp , Updated March 12, 2026
  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    State-linked actors targeted US networks in lead-up to Iran war

    Researchers found backdoors installed on U.S. company networks in the weeks prior to the U.S. and Israeli bombing campaign.

    By March 9, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware is now less about malware and more about impersonation

    Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

    By March 3, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    University of Mississippi Medical Center reopens clinics after ransomware attack

    The academic medical center’s clinics can once again access patient records and are resuming normal operations more than a week after the attack.

    By Emily Olsen • Updated March 2, 2026
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UFP Technologies investigating cyberattack that impacted company data

    The medical device maker warned of short-term shipment delays, but does not see a material impact.

    By Feb. 26, 2026
  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    AI accelerates lateral movement in cyberattacks

    New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.

    By Feb. 26, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders agencies to patch Cisco devices now under attack

    The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.

    By Feb. 25, 2026
  • A Chinese flag flutters in front of a Chinese government building, on top of which other Chinese flags are flying
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    China-linked hackers breached dozens of telecoms, government agencies

    The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.

    By Feb. 25, 2026
  • agentic AI business functions operations payments IT investment
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps

    CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.

    By Feb. 24, 2026
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI helps novice threat actor compromise FortiGate devices in dozens of countries

    Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according to a new Amazon report.

    By Feb. 23, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity and supply chain need more attention, risk intelligence firm says

    Roughly a third of attacks now use stolen credentials, according to the company’s latest report.

    By Feb. 18, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups use AI to speed up and scale cyberattacks

    A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.

    By Feb. 18, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Data-only extortion grows as ransomware gangs seek better profits

    Businesses should prioritize securing one type of technology in particular, the security firm Arctic Wolf said in a new report.

    By Feb. 17, 2026