Threats


  • The Cisco office at Santana Row Shopping Mall in San Jose California.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Attackers exploit critical flaw in Cisco Catalyst SD-WAN Controller

    Researchers discovered the authentication bypass vulnerability while investigating a prior issue in the same service.

    By May 15, 2026
  • A person holds a smartphone with a secure padlock icon and a cyber security app on the screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    MSPs need AI to fight AI-fueled cyberthreats: Guardz

    Entry points haven’t changed, but the speed and scale of attacks have intensified, the security vendor found.

    By Kelly Teal, Channel Dive contributor • May 15, 2026
  • Trendline

    Managing identity sprawl

    Cyber threat actors know the simplest way to hack into an enterprise and remain under the radar is with stolen, legitimate user credentials -- and cloud services and AI are making managing and securing digital identities more challenging than ever.

    By Cybersecurity Dive staff
  • Foxconn's manufacturing site in the Village of Mount Pleasant, Wisconsin.
    Image attribution tooltip
    Courtesy of Foxconn
    Image attribution tooltip

    Foxconn confirms cyberattack affecting some North American facilities

    A ransomware group has claimed a major attack against the electronics manufacturer.

    By May 13, 2026
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Canvas owner reaches ‘agreement’ with threat actors after data breach

    Cybersecurity experts suggest that Instructure appears to have made a ransomware payment, which the FBI highly discourages.

    By Anna Merod • May 13, 2026
  • A banner reading "Power of Community" and "RSAC 2026 Conference" hangs over a walkway between two sets of escalators
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI and an absent government: Takeaways from RSAC 2026

    Cybersecurity professionals discussed the balance between autonomy and oversight at the recent conference.

    By May 12, 2026
  • A screenshot of a message from ShinyHunters on a laptop screen.
    Image attribution tooltip
    Permission granted by Chris Insana
    Image attribution tooltip

    Second Canvas data breach causes major disruptions for schools, colleges

    The Instructure-owned learning management system went offline on May 7 after a threat actor once again gained unauthorized access.

    By Anna Merod • May 11, 2026
  • Digital background depicting AI systems and machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    AI used to develop working zero-day exploit, researchers warn

    A report by GTIG shows threat groups are increasingly leveraging AI to scale attacks. The exploitation attempt was disclosed and patched, preventing a mass incident.

    By May 11, 2026
  • A digital depiction of a red triangle sign with an exclamation point in the center with binary code in the background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Instructure confirms cybersecurity incident

    The ed tech company that operates Canvas said information impacted by the data breach includes messages, names, email addresses and student ID numbers.

    By Anna Merod • May 8, 2026
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks warns state-linked cluster behind zero-day exploitation

    A patch for the flaw, which hackers began targeting in early April, won’t be ready for another week.

    By May 7, 2026
  • Iran-sponsored threat group behind false flag social engineering campaign

    The state-linked actor has been masquerading as a criminal ransomware group in attacks targeting U.S. organizations.

    By May 6, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST will test three major tech firms’ frontier AI models for cybersecurity risks

    After Anthropic’s announcement of Claude Mythos, agencies across the government are racing to get ahead of new AI models’ potential dangers.

    By May 6, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA urges critical infrastructure firms to ‘fortify’ before it’s too late

    As concerns mount about potential cyber sabotage by the Chinese government, the U.S. is warning operators to practice maintaining services in a degraded state.

    By Updated May 5, 2026
  • View of the White House with flowers and fountain in front.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    White House questions tech industry on defensive AI use, cybersecurity resilience

    Companies may be reluctant to answer some of the government’s questions, given the sensitive topics they address.

    By May 1, 2026
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    As email phishing evolves, malicious attachments decline and QR codes surge

    A new Microsoft report also describes the collapse of a once-dominant tool for generating phishing websites with fake CAPTCHAs.

    By May 1, 2026
  • An illustration of agentic AI
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    US and allies urge ‘careful adoption’ of AI agents

    New guidance from a coalition of Western governments underscores the difficult-to-predict risks of still-evolving agentic tools.

    By May 1, 2026
  • Chris Skipworth, Passpack, password management, operational technology, connected building systems
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US agencies promote zero-trust practices for operational technology networks

    Many zero-trust defenses work differently in industrial environments than in traditional business networks, five federal agencies said in newly published guidance.

    By April 30, 2026
  • Two people standing face to face on a plastics production line.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Fundamental tension’ undermines manufacturers’ cybersecurity

    A simple security mistake caused roughly one-quarter of all financial losses in the sector in 2025, cybersecurity insurer Resilience said.

    By April 28, 2026
  • Businessmen use Bitcoin to lure others into a trap
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    North Korea-linked actor targets Web3 execs in social-engineering campaign

    Founders and other top executives were compromised to gain access to crypto wallets.

    By April 27, 2026
  • Nick Andersen, executive assistant director for cybersecurity, speaks during the Billington Cybersecurity Summit in Washington D.C. on Sept. 11, 2025.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    US, UK authorities warn that Firestarter backdoor malware survives patching

    A federal agency was impacted by a hacking campaign that exploited flaws in Cisco devices.

    By April 27, 2026
  • A Chinese flag flutters in front of a Chinese government building, on top of which other Chinese flags are flying
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    China disguises cyberattacks with ‘covert network’ botnets, US and allies warn

    A new security advisory highlights Beijing’s stealthy techniques.

    By Updated April 23, 2026
  • Secretary of War Pete Hegseth and Chairman of the Joint Chiefs of Staff Air Force General Dan Caine (R) provide updates on the continued military operations on Iran during a press briefing on the Iran war at the Pentagon on March 19, 2026 in Arlington, Virginia. Iran-backed threat actors have targeted U.S. critical infrastructure sites in recent since the launch of the war.
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip
    Deep Dive

    Iran-nexus threat groups refine attacks against critical infrastructure

    State-sponsored and hacktivist groups have shown greater determination to damage or disable energy, water and other key sectors.

    By April 23, 2026
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Phishing — sometimes with AI’s help — topped initial-access methods in Q1, Cisco says

    Hackers can now spin up fake login pages without writing a single line of code.

    By April 22, 2026
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    CISA confirms exploitation of 3 more Cisco networking device vulnerabilities

    Cisco revealed six critical flaws in widely used products in February. The government has now seen evidence that hackers are abusing four of them.

    By April 21, 2026
  • A hand holds a magnifying glass up to a red exclamation point enclosed by a red triangle
    Image attribution tooltip
    tadamichi via Getty Images
    Image attribution tooltip

    Vulnerability exploitation surges often precede disclosure, offering possible early warnings

    Organizations can get ahead of major flaws with the right threat intelligence, according to a new report.

    By April 20, 2026
  • The words ddos attack are spelled out in red on a computer screen amid random blue text.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US joins nearly two dozen other countries in striking back against DDoS-for-hire platforms

    Authorities around the world seized more than 50 websites associated with DDoS “booter” services.

    By April 17, 2026