Threats


  • agentic AI business functions operations payments IT investment
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps

    CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.

    By Feb. 24, 2026
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Threat groups move at record speeds, as AI helps scale attacks

    A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.

    By Feb. 24, 2026
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI helps novice threat actor compromise FortiGate devices in dozens of countries

    Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according to a new Amazon report.

    By Feb. 23, 2026
  • A depiction of computer hardware.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    BeyondTrust Remote Support exploitation ramps up with backdoors, remote tools

    Researchers warn that thousands of instances may still be vulnerable to exploitation activity.

    By Updated Feb. 20, 2026
  • United States Treasury Department
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US Treasury Department offers secure AI advice to financial services firms

    The agency developed the resources in partnership with financial executives and other regulators.

    By Feb. 20, 2026
  • A laptop's screen shows the website of an AI service
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    AI’s ‘connective tissue’ is woefully insecure, Cisco warns

    In a new report, the company also said businesses should beware of the “SolarWinds of AI.”

    By Feb. 19, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity and supply chain need more attention, risk intelligence firm says

    Roughly a third of attacks now use stolen credentials, according to the company’s latest report.

    By Feb. 18, 2026
  • A man pushes his bike through debris and destroyed Russian military vehicles on a street on April 06, 2022 in Bucha, Ukraine.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Newly identified hacking groups provide access to OT environments

    A state-linked adversary has begun to pivot from the Ukraine war with new attacks targeting Europe and the U.S.

    By Feb. 17, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Data-only extortion grows as ransomware gangs seek better profits

    Businesses should prioritize securing one type of technology in particular, the security firm Arctic Wolf said in a new report.

    By Feb. 17, 2026
  • people in motion
    Image attribution tooltip

    Commvault via Midjourney

    Image attribution tooltip
    Sponsored by Commvault

    When AI agent security controls are enough – and when they’re not

    Not all AI agents carry the same risk. Four zones that help determine when built-in controls are enough.

    Feb. 17, 2026
  • Image attribution tooltip
    katleho Seisa via Getty Images
    Image attribution tooltip

    Ransomware attacks increase against IT and food sectors

    Social engineering and zero-day vulnerability weaponization are getting faster and easier, two information sharing and analysis centers said in new reports.

    By Feb. 13, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA will shutter some missions to prioritize others

    The agency has lost roughly one-third of its workforce since January 2025.

    By Updated Feb. 13, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA seeks infrastructure sector consultation on incident reporting rule

    The agency is particularly interested in feedback on several aspects of the long-awaited regulation.

    By Feb. 12, 2026
  • CFOs play a key role in advocating for preventative cybersecurity actions that help reduce the cost of cyber risks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SmarterMail facing widespread attacks targeting critical flaws

    The business email and collaboration software is being exploited for potential ransomware.

    By Feb. 12, 2026
  • Programming code abstract technology background of software developer and Computer script
    Image attribution tooltip

    shutterstock.com/whiteMocca

    Image attribution tooltip
    Sponsored by 10KMedia

    The Future of DAST in an AI-First World: Why Runtime Security Testing Remains Critical

    Runtime validation is where the gap is widening—and where this shift creates the biggest leap forward.

    By Joni Klippert, CEO of StackHawk • Feb. 12, 2026
  • cybersecurity hackers cyberattacks IT
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion attacks on the rise as hackers prioritize supply-chain weaknesses

    Consulting firms and manufacturing companies accounted for many of the ransomware victims posted to the dark web in 2025, Intel 471 said.

    By Feb. 11, 2026
  • Solar panels and wind turbines in a desert landscape.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Polish power grid hack offers lessons for critical infrastructure operators, CISA says

    The agency listed several steps businesses could take to prevent similar cyberattacks.

    By Feb. 10, 2026
  • One of the entrances to the Federal Trade Commission Building in Washington, DC, that serves as the headquarters of the Federal Trade Commission (FTC).
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    FTC data highlights online threats to consumers and businesses

    The commission listed several steps companies can take to fend off attacks.

    By Feb. 9, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attacks against education sector slow worldwide

    The U.S. saw the highest number of education-related ransomware attacks in 2025, at 130, despite a 9% decline year over year.

    By Anna Merod • Feb. 6, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to disconnect unsupported network edge devices

    The government is worried about hackers accessing systems through insecure and poorly monitored routers, firewalls and similar equipment at the network perimeter.

    By Feb. 5, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Asian government’s espionage campaign breached critical infrastructure in 37 countries

    The victims included national telecommunications firms, finance ministries and police agencies, with most targets suggesting an economic focus, Palo Alto Networks said.

    By Feb. 5, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Feb. 4, 2026
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    React2Shell exploitation undergoes significant change in threat activity

    Researchers see a sudden consolidation of source IPs since late January.

    By Updated Feb. 4, 2026
  • Two men and a woman sit on an event stage in front of a blue backdrop that displays the name of the event and its organizer
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI-ISAC inches forward under Trump administration

    The U.S. government is exploring different options for how the information-sharing organization should work, an official said.

    By Feb. 3, 2026
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ShinyHunters escalates tactics in extortion campaign linked to Okta environments

    Researchers are tracking multiple clusters that are using social engineering to gain access to victims.

    By Feb. 2, 2026