Threats


  • Solar panels and wind turbines in a desert landscape.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Polish power grid hack offers lessons for critical infrastructure operators, CISA says

    The agency listed several steps businesses could take to prevent similar cyberattacks.

    By Feb. 10, 2026
  • One of the entrances to the Federal Trade Commission Building in Washington, DC, that serves as the headquarters of the Federal Trade Commission (FTC).
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    FTC data highlights online threats to consumers and businesses

    The commission listed several steps companies can take to fend off attacks.

    By Feb. 9, 2026
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attacks against education sector slow worldwide

    The U.S. saw the highest number of education-related ransomware attacks in 2025, at 130, despite a 9% decline year over year.

    By Anna Merod • Feb. 6, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to disconnect unsupported network edge devices

    The government is worried about hackers accessing systems through insecure and poorly monitored routers, firewalls and similar equipment at the network perimeter.

    By Feb. 5, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Asian government’s espionage campaign breached critical infrastructure in 37 countries

    The victims included national telecommunications firms, finance ministries and police agencies, with most targets suggesting an economic focus, Palo Alto Networks said.

    By Feb. 5, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Feb. 4, 2026
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    React2Shell exploitation undergoes significant change in threat activity

    Researchers see a sudden consolidation of source IPs since late January.

    By Updated Feb. 4, 2026
  • Two men and a woman sit on an event stage in front of a blue backdrop that displays the name of the event and its organizer
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI-ISAC inches forward under Trump administration

    The U.S. government is exploring different options for how the information-sharing organization should work, an official said.

    By Feb. 3, 2026
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ShinyHunters escalates tactics in extortion campaign linked to Okta environments

    Researchers are tracking multiple clusters that are using social engineering to gain access to victims.

    By Feb. 2, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • Man used a desktop and on a call
    Image attribution tooltip
    Violeta Stoimenova via Getty Images
    Image attribution tooltip
    Sponsored by Modulate

    Voice channels are the next major attack vector that security teams can’t monitor

    Deepfake voices, live fraud, zero visibility: why voice channels are the next security blind spot.

    By Mike Pappas, CEO & Co-founder, Modulate • Feb. 2, 2026
  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

    By Jan. 30, 2026
  • Jaguar Land Rover Assembly Line for at Halewood in the U.K.
    Image attribution tooltip
    Courtesy of Jaguar Land Rover
    Image attribution tooltip
    Deep Dive

    Manufacturers fortify cyber defenses in response to dramatic surge in attacks

    IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.

    By , Jan. 29, 2026
  • Hooded hacker sits in front of computer screens.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, security researchers warn FortiCloud SSO flaw is under attack

    The exploitation activity comes weeks after a similar authentication bypass vulnerability was found.

    By Jan. 29, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

    By Jan. 27, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime group claims credit for voice phishing attacks

    Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.

    By Updated Jan. 27, 2026
  • Man using a laptop at work
    Image attribution tooltip
    Morsa Images via Getty Images
    Image attribution tooltip
    Sponsored by Cisco Duo

    Top 3 factors for selecting an identity access management tool

    Identity and access management (IAM) ensures that people and entities with digital identities have the right level of access to your enterprise resources.

    Jan. 26, 2026
  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    5 cybersecurity trends to watch in 2026

    Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market.

    By Jan. 23, 2026
  • Multiple padlocks encircled by white, on a blue surface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT teams aren’t equipped to stop rogue AI agents

    Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.

    By James Anderson • Jan. 22, 2026
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    LastPass warns backup request is phishing campaign in disguise

    Customers received deceptive emails over the holiday weekend claiming the company was doing maintenance.

    By Updated Jan. 23, 2026
  • Transmission towers against a dark sky
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US and allies collaborate on operational technology security guidance

    A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.

    By Jan. 16, 2026
  • Business person uses software tool to help with tracking business performance.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of hedge funds boosted cybersecurity spending in 2025

    About half of firms suffered a breach, and a large percentage cited third-party risks.

    By Jan. 13, 2026
  • A clinical operating room with two medical professionals; one seated at a robotic surgery console and the other standing next to a patient covered in blue drapes with robotic arms positioned above.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Healthcare breaches double as shadow AI, vendor risks proliferate

    A new report paints a picture of a sector with limited confidence in its defensive capabilities.

    By Jan. 13, 2026
  • A digital map of the globe
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Executives worry most about cyber-enabled fraud, geopolitics and AI

    The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.

    By Jan. 12, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

    By Jan. 9, 2026