Threats


  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    FBI seeks public tips about Salt Typhoon

    The bureau’s public alert follows months of conversations with the telecom industry about the far-reaching cyber espionage campaign by a Chinese nation-state threat actor.

    By April 28, 2025
  • An SAP logo is seen on a building in Frankfurt, Germany, on September 1, 2024.
    Image attribution tooltip
    Victor Golmer via Getty Images
    Image attribution tooltip

    Critical vulnerability in SAP NetWeaver under threat of active exploitation

    Attackers have been observed dropping webshell backdoors and researchers warn the application is popular among government agencies.

    By Updated April 25, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    gorodenkoff/iStock via Getty Images
    Image attribution tooltip

    Threat groups exploit resurgent vulnerabilities

    VPNs, routers and firewalls are being targeted via older CVEs, new GreyNoise research shows.

    By April 24, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    BEC scams, investment fraud accounted for biggest cybercrime losses in 2024

    Americans lost $16.6 billion to cyber fraud last year, according to an FBI report, with phishing, spoofing and extortion topping the list of complaints.

    By April 23, 2025
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Financial gain still drives majority of cyber threat activity

    Stolen credentials are becoming a more prevalent form of initial access, a report from Mandiant shows.

    By April 23, 2025
  • Exterior of Stop & Shop supermarket
    Image attribution tooltip
    Sam Silverstein/Cybersecurity Dive
    Image attribution tooltip

    Ahold Delhaize confirms data stolen after threat group claims credit for November attack

    A highly active threat group says it will release stolen information, months after an attack disrupted e-commerce operations at the grocer’s U.S. business.

    By , Sam Silverstein • April 17, 2025
  • Capitol building, DC
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Bill extends cyber threat info-sharing between public, private sector

    The Cybersecurity Information Sharing Act of 2015, set to expire in September, “moved the needle.”

    By Elizabeth Montalbano, Contributing Reporter • April 16, 2025
  • Person using multiple devices.
    Image attribution tooltip
    AntonioGuillem/Getty Images Plus via Getty Images
    Image attribution tooltip

    Remote access tools most frequently targeted as ransomware entry points

    Supply chain risk via third-party vendors increased sharply last year, according to a report by At-Bay.

    By April 11, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    jeenah Moon via Getty Images
    Image attribution tooltip

    Windows CLFS zero-day exploited in ransomware attacks

    A threat actor tracked as Storm-2460 has used PipeMagic malware to facilitate the attacks.

    By April 9, 2025
  • Photograph depicts a security scanner extracting virus from a string of binary code.
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Over 5K Ivanti VPNs vulnerable to critical bug under attack

    China-linked threat actors last month began exploiting CVE-2025-22457, a critical stack buffer-overflow flaw.

    By April 8, 2025
  • The exterior of the U.S. Capitol on Jan. 3, 2024.
    Image attribution tooltip
    Colin Campbell/Cybersecurity Dive
    Image attribution tooltip

    Trump administration under scrutiny as it puts major round of CISA cuts on the table

    Congressional members plan to raise questions Tuesday as hundreds of critical jobs could be slashed in the coming weeks.

    By April 7, 2025
  • A man and a woman shake hands in front of a desk that has flags from the U.S. and Ukraine. The people are in front of a blue background with CISA logos.
    Image attribution tooltip
    Retrieved from Jen Easterly/CISA.
    Image attribution tooltip

    CISA, FBI warn of fast flux technique used to hide malicious servers

    Criminal and state-linked hackers use fast-changing DNS records to make it harder for defenders to detect or disrupt malicious activity.

    By April 4, 2025
  • Palo Alto Networks building
    Image attribution tooltip
    Sundry Photographer via Getty Images
    Image attribution tooltip

    Mass login scans of PAN GlobalProtect portals surge

    Nearly 24K unique IP addresses have attempted to access portals in the last 30 days, raising concerns of imminent attacks over the past 30 days.

    By Elizabeth Montalbano, Contributing Reporter • April 2, 2025
  • risk management
    Image attribution tooltip
    Parradee Kietsirikul via Getty Images
    Image attribution tooltip

    Check Point Software confirms security incident but pushes back on threat actor claims

    A malicious hacker recently offered to sell the security firm’s sensitive customer information.

    By April 2, 2025
  • 23andMe
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    FTC chief flags data privacy concerns in 23andMe bankruptcy

    The company filed for bankruptcy after financial challenges over the past few years and a massive data breach in 2023.

    By Alexei Alexis • April 2, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    WhataWin/Getty Images via Getty Images
    Image attribution tooltip

    Critical vulnerability in CrushFTP file transfer software under attack

    Questions and confusion surround the authentication bypass vulnerability, which was privately disclosed to customers on March 21.

    By April 1, 2025
  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Hacker linked to Oracle Cloud intrusion threatens to sell stolen data

    Security researchers from Trustwave SpiderLabs provided additional evidence backing up claims of a breach.

    By March 31, 2025
  • Oracle's Silicon Valley corporate headquarters in Redwood, California pictured on September 9, 2019.
    Image attribution tooltip
    Sundry Photography via Getty Images
    Image attribution tooltip

    Threat actor in Oracle Cloud breach may have gained access to production environments

    Researchers from CloudSEK are analyzing a data sample from a threat actor that claimed a massive breach involving 6 million records. 

    By March 27, 2025
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    bin kontan / Getty Images via Getty Images
    Image attribution tooltip

    Ransomware gangs increasingly brandish EDR bypass tools

    Custom tool developed by RansomHub, dubbed “EDRKillShifter,” is used by several other rival ransomware gangs.

    By March 27, 2025
  • FCC Brendan Carr
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    FCC investigating China-linked companies over evasion of US national security measures

    The agency is cracking down on the use of prohibited technologies following a series of hacks into US telecommunications firms.

    By March 24, 2025
  • Cybersecurity Challenges in Remote Work, exploring vulnerabilities, evolving threats, employee awareness, digital transformation impacts
    Image attribution tooltip

    stock.adobe.com/peera

    Image attribution tooltip
    Sponsored by Veracode

    How ASPM gives you control over complex architectures

    ASPM gives organizations control by unifying risk data, automating threat analysis, and prioritizing vulnerabilities based on their business impact.

    By Sohail Iqbal, Chief Information Security Officer, Veracode • March 24, 2025
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    bin kontan / Getty Images via Getty Images
    Image attribution tooltip

    RansomHub using FakeUpdates scheme to attack government sector

    The ransomware gang is collaborating with SocGholish, an extensive malware operation that employs compromised websites and fake browser updates.

    By March 18, 2025
  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    Black Basta uses brute-forcing tool to attack edge devices

    The ransomware gang developed an automated framework to guess weak and reused passwords on VPNs and firewalls.

    By March 17, 2025
  • Federal Communications Commission Commissioner Brendan Carr
    Image attribution tooltip
    Kevin Dietsch / Getty Images via Getty Images
    Image attribution tooltip

    FCC launches national security unit to counter state-linked threats to US telecoms

    The new council is part of an effort to thwart Salt Typhoon and other cyber espionage groups.

    By March 13, 2025
  • A bronze depiction of ancient god Medusa with snakes in her hair
    Image attribution tooltip
    Paul Campbell via Getty Images
    Image attribution tooltip

    Medusa ransomware slams critical infrastructure organizations

    The ransomware-as-a-service gang tallied more than 300 victims in industries such as healthcare, manufacturing and technology.

    By March 13, 2025