Strategy
-
Initial access brokers involved in more attacks, including on critical infrastructure
A research firm also finds nation-states aligning their cyberattacks more closely with geostrategic goals.
By Eric Geller • Dec. 8, 2025 -
US, allies urge critical infrastructure operators to carefully plan and oversee AI use
New guidance attempts to temper companies’ enthusiasm for the latest exciting technology.
By Eric Geller • Dec. 4, 2025 -
Explore the Trendlineâž”
Getty Images
TrendlineRisk Management
An esclation of cyber risks facing businesses and government has made cyber resilience a major priority.
By Cybersecurity Dive staff -
Lawmakers question White House on strategy for countering AI-fueled hacks
The Trump administration has said little about how it will prevent hackers from abusing AI.
By Eric Geller • Dec. 4, 2025 -
CISA eliminates pay incentives as it changes how it retains top cyber talent
Auditors had described the program as poorly managed. CISA is scrapping it in favor of another recruitment tool.
By Eric Geller • Dec. 3, 2025 -
Leading surveillance camera vendor signs CISA’s product-security pledge
Axis Communications is the first major surveillance camera maker to vow to adhere to CISA’s security guidelines.
By Eric Geller • Dec. 3, 2025 -
Senators push to renew cyber grant program for state, local governments
Security experts and local officials say the program is vital to protecting the country.
By Eric Geller • Dec. 2, 2025 -
Hackers ready threat campaign aimed at Zendesk environments
Researchers warn that hackers linked to recent social engineering attacks are targeting customer-service platforms.
By David Jones • Updated Dec. 1, 2025 -
European police dismantle cryptocurrency mixer popular with ransomware gangs
Authorities have spent years trying to cripple the ecosystem that helps hackers hide their profits.
By Eric Geller • Dec. 1, 2025 -
shutterstock.com/PeopleImages
Sponsored by ThreatLockerEmerging cybersecurity needs: What the market is telling us
Default-deny, strict controls and real-time monitoring: how to stop threats before they start.
By Yuriy Tsibere • Dec. 1, 2025 -
Deep Dive
Thanksgiving holiday weekend kicks off heightened threat environment for security teams
As workers take family time and consumers race for Black Friday discounts, hackers gain an advantage to penetrate vulnerable corporate perimeters.
By David Jones • Nov. 26, 2025 -
Microsoft tightens cloud login process to prevent common attack
Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that.
By Eric Geller • Nov. 26, 2025 -
FCC eliminates cybersecurity requirements for telecom companies
Commissioners sharply disagreed over whether the rules were appropriate and necessary.
By Eric Geller • Nov. 20, 2025 -
FCC plan to scrap telecom cyber rules draws congressional backlash
A prominent U.S. senator wants the commission to rethink its plans.
By Eric Geller • Nov. 19, 2025 -
Trump’s cyber strategy will emphasize adversary deterrence, industry partnerships
Cyberattacks on the U.S. are “becoming more aggressive every passing day,” the national cyber director says.
By Eric Geller • Nov. 18, 2025 -
Jaguar Land Rover reports major earnings impact from cyberattack
The automaker set aside hundreds of millions to help stabilize its massive international supply chain.
By David Jones • Nov. 17, 2025 -
CISA, eyeing China, plans hiring spree to rebuild its depleted ranks
The agency will also change some of its workforce policies to avoid driving away talented staff.
By Eric Geller • Updated Nov. 18, 2025 -
US chips away at North Korean IT worker fraud
Authorities have described Pyongyang’s revenue-generating schemes as threats to U.S. national and economic security.
By Eric Geller • Nov. 17, 2025 -
CISO pay is on the rise, even as security budgets tighten
Companies are increasingly lavishing benefits on their top security executives, a recent report found.
By Eric Geller • Nov. 17, 2025 -
Western governments disrupt trifecta of cybercrime tools
Authorities seized more than 1,000 servers and 20 domains in the operation.
By Eric Geller • Nov. 14, 2025 -
Government funding bill temporarily revives cybersecurity information-sharing law
The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January.
By Eric Geller • Nov. 13, 2025 -
Companies want more from their threat intelligence platforms
Customers expect faster, more accurate and more relevant data, Recorded Future found in a new report.
By Eric Geller • Nov. 12, 2025 -
Shadow AI is widespread — and executives use it the most
Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.
By Eric Geller • Nov. 12, 2025 -
AI agents worsen IT’s capacity crunch: S&P Global
An infrastructure overhaul to support agentic systems is underway, bringing with it a new set of capacity demands and security considerations.
By Lindsey Wilkinson • Nov. 10, 2025 -
Conduent warns of further financial fallout from cyberattack
The company has incurred millions in expenses related to data breach notifications stemming from an attack earlier this year.
By David Jones • Nov. 9, 2025 -
In financial sector, vendors lag behind customers on cybersecurity
Financial firms should be performing regular oversight of their vendors to avoid supply chain compromises, according to a new report.
By Eric Geller • Nov. 6, 2025