Cyberattacks: Page 4


  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Salesloft platform integration restored after probe reveals monthslong GitHub account compromise

    An investigation by Mandiant found the attack began months ago, leading to a major supply chain attack.

    By Sept. 8, 2025
  • a software developer inspects code on a screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of zero-day vulnerability in SiteCore products

    Mandiant said it was able to disarm a ViewState deserialization attack leveraging exposed ASP.NET keys.

    By Updated Sept. 4, 2025
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Vegetables sit on grocery store shelves
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip
    Deep Dive

    How the newest ISAC aims to help food and agriculture firms thwart cyberattacks

    Food industry executives used to shrug off ransomware and cyber-espionage risks. A threat intel group is helping to change that, but its reach remains unclear.

    By Sept. 4, 2025
  • Inside Cloudflare’s offices in San Francisco, California.
    Image attribution tooltip
    Permission granted by Cloudflare
    Image attribution tooltip

    Cloudflare, Proofpoint say hackers gained access to Salesforce instances in attack spree

    The breaches are part of hundreds of potential supply chain attacks linked to Salesloft Drift.

    By Sept. 3, 2025
  • Beige and blue modern office building with large windows and the “paloalto networks” logo in black and red near the top corners.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Palo Alto Networks, Zscaler customers impacted by supply chain attacks

    A hacking campaign using credentials linked to Salesloft Drift has impacted a growing number of companies, including downstream customers of leading cybersecurity firms.

    By Sept. 2, 2025
  • Entrance greeting sign on the highway border between Nevada and Arizona
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Federal, state officials investigating ransomware attack targeting Nevada

    The Sunday attack disrupted key services across the state and led to the theft of some data.

    By Updated Aug. 29, 2025
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    US, allies warn China-linked actors still targeting critical infrastructure

    An advisory from 13 countries says state-backed hackers continue trying to breach telecommunications systems and other vital networks.

    By Aug. 27, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    Hackers steal data from Salesforce instances in widespread campaign

    Google researchers say the hackers abused a third-party tool in an attack spree designed to harvest credentials.

    By Updated Aug. 29, 2025
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Credential harvesting campaign targets ScreenConnect cloud administrators

    Researchers warn that attackers are using compromised Amazon email accounts in spear-phishing attacks that may lead to ransomware infections.

    By Aug. 25, 2025
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations

    The intrusions have exploited a vulnerability in Cisco’s networking equipment software.

    By Aug. 20, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Pharmaceutical firm Inotiv investigating ransomware attack that disrupted operations

    The company says it doesn’t yet know if the incident will have a material impact.

    By Aug. 20, 2025
  • An aerial view of the Workday building
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Hackers target Workday in social engineering attack

    Researchers cite increasing evidence of collaboration between Scattered Spider and the cybercrime group ShinyHunters in the campaign.

    By Aug. 19, 2025
  • Generic java programming code written on black.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Developers knowingly push vulnerable code, despite growing breach risk

    Only three in 10 respondents said their application security programs were highly mature.

    By Aug. 15, 2025
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler flaws lead to critical infrastructure breaches

    Dutch authorities said hackers penetrated several critical infrastructure providers, in a warning sign for vulnerable organizations elsewhere.

    By Updated Aug. 12, 2025
  • Six men stand on a stage. Three men hold an oversized $4 million check made out to "Team Atlanta," while two of the other men flank this trio and pose for a photo with them. The sixth person stands off to the side and applauds.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    DARPA touts value of AI-powered vulnerability detection as it announces competition winners

    The U.S. military research agency hopes to foster a new ecosystem of autonomous vulnerability remediation.

    By Aug. 8, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SonicWall says recent attack wave involved previously disclosed flaw, not zero-day

    The company said it had linked recent hacks to customers’ use of legacy credentials when migrating from Gen 6 to Gen 7 firewalls.

    By Aug. 7, 2025
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SonicWall investigating possible zero-day related to firewall attacks

    Researchers recently warned about a surge in Akira ransomware attacks linked to a potential SonicWall vulnerability.

    By Aug. 5, 2025
  • AI Artificial Intelligence Security, Digital Information Protected Secured Lock
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI is helping hackers automate and customize cyberattacks

    CrowdStrike’s annual cyber-threat-hunting report reveals the double threat that AI poses to many businesses.

    By Aug. 4, 2025
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware spike linked to potential zero-day flaw in SonicWall devices

    Researchers say hackers using the Akira ransomware strain may be exploiting the vulnerability en masse.

    By Updated Aug. 4, 2025
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware gangs capitalize on law enforcement takedowns of competitors

    After authorities dismantled LockBit and RansomHub, other groups rushed in to snatch up their affiliates, according to a new report that highlights a cybercrime ecosystem in flux.

    By July 31, 2025
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    What we know about the cybercrime group Scattered Spider

    The notorious hacker collective has attracted the attention of government authorities in several nations around the globe. 

    By July 30, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

    By July 30, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    FBI, CISA warn about Scattered Spider’s evolving tactics

    International authorities are pursuing the group following the arrests of four suspects in a series of attacks targeting British retailers.

    By July 29, 2025
  • Cyber Security Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attacks against oil and gas firms surge

    Manufacturing remains the No. 1 ransomware target, new data from Zscaler shows.

    By July 29, 2025
  • Image depicting the digital landscape
    Image attribution tooltip
    Permission granted by ThreatLocker
    Image attribution tooltip
    Sponsored by ThreatLocker

    Emerging cybersecurity needs: What the market is telling us

    Default-deny, strict controls, and real-time monitoring: how to stop threats before they start.

    By Yuriy Tsibere, Product Manager and Business Analyst, ThreatLocker • July 28, 2025