Threats


  • The words ddos attack are spelled out in red on a computer screen amid random blue text.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US joins nearly two dozen other countries in striking back against DDoS-for-hire platforms

    Authorities around the world seized more than 50 websites associated with DDoS “booter” services.

    By April 17, 2026
  • a digital padlock illustration with the letters AI
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    CIOs fret over rising security concerns amid AI adoption

    AI is emerging as a critical tool and a growing threat as CIOs struggle to balance innovation with risk, according to a new report.

    By Scarlett Evans • April 16, 2026
  • Trendline

    Managing identity sprawl

    Cyber threat actors know the simplest way to hack into an enterprise and remain under the radar is with stolen, legitimate user credentials -- and cloud services and AI are making managing and securing digital identities more challenging than ever.

    By Cybersecurity Dive staff
  • The word "Netgear" is spelled out in large purple letters attached to a metal bar hanging from a ceiling
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    FCC exempts Netgear from foreign router ban

    The commission did not explain its action beyond citing a Defense Department determination.

    By April 15, 2026
  • Digital shield firewall with central computer processor and futuristic circuit board
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Brute-force cyberattacks originating in Middle East surge in Q1

    Hackers have primarily targeted SonicWall and Fortinet devices, according to researchers. 

    By April 14, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC signals continued commitment to Cyber Trust Mark program

    The government approved a new lead overseer for its IoT device security labeling initiative.

    By Updated April 14, 2026
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US, Indonesia shut down ‘sophisticated’ phishing kit

    For a nominal fee, cybercriminals could rent access to a service that maliciously duplicated popular websites’ login portals.

    By April 13, 2026
  • Industrial control equipment, including programmable logic controllers, are seen mounted to a wall
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Nearly 4K industrial control devices vulnerable to Iran-linked hacking campaign

    A research firm tallied the internet-exposed devices Iran is targeting and recommended mitigations for any infrastructure operator using them.

    By April 10, 2026
  • An engineer repairs an electricity pole as smoke billows after overnight airstrikes on oil depots on March 8, 2026 in Tehran, Iran.
    Image attribution tooltip
    Majid Saeedi/Getty Image via Getty Images
    Image attribution tooltip

    NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat

    Hackers have disrupted critical U.S. infrastructure by targeting programmable logic controllers, the Cybersecurity and Infrastructure Security Agency warned.

    By Robert Walton • April 9, 2026
  • A wireless router sits on a flat surface
    Image attribution tooltip
    Jens Domschky via Getty Images
    Image attribution tooltip

    US operation evicts Russia from hacked SOHO routers used to breach critical infrastructure

    The newly disclosed cyberattack campaign is the latest evidence of the threat end-of-life routers pose to major organizations.

    By Updated April 9, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    Iran-linked hackers target water, energy in US, FBI and CISA warn

    Nation-state actors have exploited flaws in industrial programmable logic controllers, leading to disruption and financial losses.

    By April 8, 2026
  • A person walks a runway in front of the Olympic rings.
    Image attribution tooltip
    Massimo Rosi via Getty Images
    Image attribution tooltip

    Olympic Games, FIFA World Cup offer huge platforms, rich cyberattack surface

    Global sporting events have become a lucrative target for criminal actors and geopolitical statements.

    By April 7, 2026
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat cluster launches extortion campaign using social engineering

    Researchers said the hackers are compromising business process outsourcers and targeting help desk support.

    By April 7, 2026
  • Digital cloud and network security. 3D computer hardware illustration.
    Image attribution tooltip
    solarseven
    Image attribution tooltip

    Government agencies see cyber threats as major barrier to tech improvements

    Federal leaders also see opportunities to accelerate cyber defense with AI, according to a new report, but most agencies are still only testing AI tools.

    By April 3, 2026
  • a technologist holds a laptop, facing a wall of code projected on a wall
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Axios open-source library targeted in sophisticated supply chain attack

    Researchers link the compromise to a North Korean adversary and warn the impacts could be wide ranging.

    By April 1, 2026
  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    Iran-linked actors target Middle Eastern city governments to undermine missile-strike responses

    The password-spraying campaign is the latest evidence that Iran is hitting back in cyberspace.

    By April 1, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    Iran actors’ claims raise questions about larger cyber threat to US, allies

    Questions are being raised about the veracity and tactics of Iran-linked actors, amid claims that a large trove of Lockheed Martin data is on the market.

    By Updated March 31, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Newly observed malware campaign likely combines AI and ClickFix

    Using the techniques in tandem helps hackers evade detection, a security firm said.

    By March 30, 2026
  • Shot of two young businessmen using a computer during a late night in a modern office
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Sponsored by Zurich Resilience Solutions

    Why user behavior is the primary entry point for cyberattacks

    Human error still drives 60% of breaches — here’s why attackers keep targeting users.

    March 30, 2026
  • Two men are engaged in discussion at a workstation. One wears glasses and a denim shirt, the other a purple shirt. A lamp and computer monitors are visible.
    Image attribution tooltip
    Permission granted by Cisco Duo
    Image attribution tooltip
    Sponsored by Cisco Duo

    6 trends redefining organizations’ future with IAM

    With the right preparation, you can stay ahead of the most common IAM risks. Let’s explore the emerging IAM trends and what you can do to address them proactively. 

    March 30, 2026
  • Engineer repairs 5G cell tower.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Espionage campaign targets telecom with stealthy Linux-based backdoor

    A China-nexus actor has been able to gain long-term access in a bid to gather intel on government agencies and critical infrastructure providers.

    By March 27, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity is the first line of defense, especially in an AI-fueled threat landscape

    Two new reports illustrate why companies need to do a better job of scrutinizing what their human employees and AI agents are doing.

    By March 27, 2026
  • Four men sit on a stage in front of an audience. Behind them, a blue backdrop displays a logo reading "RSAC 2026 Conference."
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    ‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats

    Experts said companies rushing to buy AI services risk letting their existing, still-vital defensive measures deteriorate.

    By March 25, 2026
  • A pile of rubble with an Iranian flag stuck in it is shown.
    Image attribution tooltip
    Majid Saeedi / Stringer via Getty Images
    Image attribution tooltip

    Iran-linked ransomware operation targeted US healthcare provider

    The Pay2Key group may have shifted its aims from extortion to destruction.

    By March 25, 2026
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Congress wants details from White House on cyber strategy, Iran resilience measures

    Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.

    By March 25, 2026
  • An executive in a business meeting room
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies face difficult choices in blaming hackers for an attack

    Publicly naming a hacking group can affect everything from retaliation to insurance coverage.

    By March 24, 2026