Threats


  • Classic architecture details of a Bank building
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In financial sector, vendors lag behind customers on cybersecurity

    Financial firms should be performing regular oversight of their vendors to avoid supply chain compromises, according to a new report.

    By Nov. 6, 2025
  • symbol of danger
    Image attribution tooltip
    Permission granted by 10KMedia
    Image attribution tooltip
    Sponsored by 10KMedia

    Your AI-driven threat hunting is only as good as your data platform and pipeline

    The data-centric foundation for modern threat hunting.

    By Taylor Smith, Director of Product Marketing at Exaforce • Nov. 6, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-based malware makes attacks stealthier and more adaptive

    Google says it has discovered at least five malware families that use AI to reinvent themselves and hide from defenders.

    By Nov. 5, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers targeting Cisco IOS XE devices with BadCandy implant

    Security researchers and Australian authorities warn that exploitation activity is ongoing.

    By Updated Nov. 5, 2025
  • A hand typing login and password
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity-based attacks need more attention in cloud security strategies

    Companies should lock down user accounts and scan for compromised credentials, according to a new report.

    By Nov. 4, 2025
  • Open packages and debris on railroad tracks is seen through metal fencing.
    Image attribution tooltip
    Edwin Lopez/Cybersecurity Dive
    Image attribution tooltip

    Cybercrime groups team with organized crime in massive cargo theft campaigns

    Financially motivated hackers are abusing remote monitoring and access tools against trucking and freight companies, Proofpoint warns.

    By Updated Nov. 3, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Windows Server Update Service exploitation ensnares at least 50 victims

    Researchers say hackers could be gathering intelligence for future attacks, and authorities warn users to apply patches and check for compromise.

    By Oct. 31, 2025
  • A man wearing a blue suit and purple tie gestures with both hands while sitting in a chair on a stage
    Image attribution tooltip
    John Lamparski via Getty Images
    Image attribution tooltip

    FCC will vote to scrap telecom cybersecurity requirements

    The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.

    By Updated Oct. 31, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates guidance and warns security teams on WSUS exploitation

    The agency urges users to apply emergency patches from Microsoft to counter a serious threat.

    By Oct. 30, 2025
  • With cyberattacks becoming more frequent, now is the time for CFOs to shore up their cybersecurity programs and strategies.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI adoption outpaces corporate governance, security controls

    Security and business leaders warn that companies are accelerating their use of agentic AI beyond the ability to maintain proper guardrails. 

    By Oct. 29, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Google probes exploitation of critical Windows service CVE

    Researchers have traced the threat activity to a newly identified hacker, while separate evidence points to more than one variant.

    By Oct. 28, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    North Korea led the world in nation-state hacking in Q2 and Q3

    Security leaders should prioritize anomalous-activity detection and zero-trust principles, a new report recommends.

    By Oct. 24, 2025
  • Artificial Intelligence digital concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security flaws afflict half of organizations

    EY suggested ways for companies to reduce AI-related hacking risks.

    By Oct. 22, 2025
  • security operations center analysts monitoring cyber threats
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to prepare for and respond to today’s evolving threat landscape

    With the emergence of AI, security operations teams must navigate a fast-moving generation of cyber threats.

    By Jeremy D'Hoinne, Distinguished Research VP, Gartner • Oct. 21, 2025
  • Ransomware Data Breach Protection Cyber Security Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-fueled automation helps ransomware-as-a-service groups stand out from the crowd

    Ransomware gangs that offer their affiliates customization and automation are growing faster than those that don’t, a new report finds.

    By Oct. 21, 2025
  • Humanoid robot works in a call center.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Social engineering gains ground as preferred method of initial access

    Senior executives and high-net-worth individuals are increasingly at risk as hackers use deepfakes, voice cloning and other tactics for targeted attacks. 

    By Updated Oct. 21, 2025
  • Individuals work on computers.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Why security awareness training doesn’t work — and how to fix it

    Companies have built their security strategies around phishing simulations and educational webinars, tactics that research shows are ineffective.

    By Oct. 20, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    F5 supply chain hack endangers more than 600,000 internet-connected devices

    The enterprise device vendor has patched several vulnerabilities that hackers discovered after breaching its networks.

    By Oct. 17, 2025
  • legal role in data incident or breach
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Many IT leaders click phishing links, and some don’t report them

    A new survey shines light on the security practices and AI fears of IT leaders and their subordinates.

    By Oct. 16, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Auto sector faces historic cyber threats to business continuity

    A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability.

    By Oct. 16, 2025
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Nation-state hackers breached sensitive F5 systems, stole customer data

    The federal government is scrambling to determine if any agencies have been hacked.

    By Oct. 15, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SonicWall SSLVPN devices compromised using valid credentials

    More than 100 SonicWall SSLVPN accounts have been impacted, according to Huntress.

    By Oct. 14, 2025
  • Entrance to a modern glass building with a large blue cloud-shaped sign that reads “salesforce.” The text “Welcome to Salesforce Tower” is displayed on the wall below the sign.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Salesforce refuses to submit to extortion demands linked to hacking campaigns

    The company said it is aware of recent claims, but will not negotiate or pay a ransom.

    By Oct. 8, 2025
  • Businessman touching an artificial intelligence-themed brain
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI fuels social engineering but isn’t yet revolutionizing hacking

    AI tools are still too computationally intense for cybercriminals to rely on, according to a new report.

    By Oct. 8, 2025
  • Artificial intelligence and machine learning concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses fear AI exposes them to more attacks

    More than half of companies have already faced AI-powered phishing attacks, a new survey finds.

    By Oct. 7, 2025