Threats


  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Stryker attack raises concerns about role of device management tool

    Researchers warn that Microsoft Intune may have been weaponized to wipe critical devices.

    By March 16, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker’s manufacturing, shipping disrupted after cyberattack

    The medtech company says it's still experiencing issues with order processing, manufacturing and shipping. 

    By Ricky Zipp , March 13, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Even primitive AI-coded malware helps hackers move faster, thwart attribution

    IBM researchers discovered an autonomously coded backdoor that they called unsophisticated but nonetheless ominous.

    By March 13, 2026
  • A worker uses Hexagon's design and engieering technology on his computer.
    Image attribution tooltip
    Courtesy of Hexagon
    Image attribution tooltip

    5 ways to protect manufacturing companies from cyberattacks

    Manufacturing suffered the most cyberattacks of any industry last year. Experts have advice about hardening networks and avoiding common mistakes.

    By Jeffrey Kinney • March 12, 2026
  • Coalition of information-sharing groups warns of cyber, physical attacks

    A joint advisory says Iran-linked groups are targeting U.S. critical infrastructure using DDoS, phishing and other retaliatory techniques.

    By Updated March 12, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    Industry to NIST: Keep agentic AI standards flexible and voluntary

    The business community said security guidance should reflect the nascency and diversity of the field.

    By March 11, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    US entities face heightened cyber risk related to Iran war

    The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks.

    By March 10, 2026
  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    State-linked actors targeted US networks in lead-up to Iran war

    Researchers found backdoors installed on U.S. company networks in the weeks prior to the U.S. and Israeli bombing campaign.

    By March 9, 2026
  • The exterior of the Department Health and Human Services headquarters.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    HHS adds cybersecurity guidance to healthcare sector self-assessment tool

    Organizations can now use the online platform to test their readiness for digital security crises.

    By March 6, 2026
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft, Europol disrupt global phishing platform Tycoon 2FA

    The service helped cybercriminals bypass multifactor authentication and led to business email compromise and ransomware.

    By March 5, 2026
  • A woman wearing a hijab and sunglasses waves an Iranian flag
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Pro-Russia actors team with Iran-linked hackers in attacks

    The groups formed a loose alliance in recent days, targeting critical infrastructure in the Middle East and the U.S. 

    By Updated March 3, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware is now less about malware and more about impersonation

    Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

    By March 3, 2026
  • Iranians protest against attacks on Iran by Israel and the United States on February 28, 2026 in Tehran, Iran. Iran launched a wave of missiles at Israel and regional U.S. military sites in response to today's attacks, in which the U.S. and Israel struck a series of locations across the country.
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Iran-linked hackers raise threat level against US, allies

    Security researchers warn that hacktivists and state-linked groups are using DDoS, phishing and other tactics against critical infrastructure.

    By Updated March 2, 2026
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Resurge’ malware can remain undetected on devices

    CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.

    By Updated Feb. 27, 2026
  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    AI accelerates lateral movement in cyberattacks

    New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.

    By Feb. 26, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders agencies to patch Cisco devices now under attack

    The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.

    By Feb. 25, 2026
  • A Chinese flag flutters in front of a Chinese government building, on top of which other Chinese flags are flying
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    China-linked hackers breached dozens of telecoms, government agencies

    The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.

    By Feb. 25, 2026
  • agentic AI business functions operations payments IT investment
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps

    CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.

    By Feb. 24, 2026
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Threat groups move at record speeds, as AI helps scale attacks

    A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.

    By Feb. 24, 2026
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI helps novice threat actor compromise FortiGate devices in dozens of countries

    Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according to a new Amazon report.

    By Feb. 23, 2026
  • A depiction of computer hardware.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    BeyondTrust Remote Support exploitation ramps up with backdoors, remote tools

    Researchers warn that thousands of instances may still be vulnerable to exploitation activity.

    By Updated Feb. 20, 2026
  • United States Treasury Department
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US Treasury Department offers secure AI advice to financial services firms

    The agency developed the resources in partnership with financial executives and other regulators.

    By Feb. 20, 2026
  • A laptop's screen shows the website of an AI service
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    AI’s ‘connective tissue’ is woefully insecure, Cisco warns

    In a new report, the company also said businesses should beware of the “SolarWinds of AI.”

    By Feb. 19, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity and supply chain need more attention, risk intelligence firm says

    Roughly a third of attacks now use stolen credentials, according to the company’s latest report.

    By Feb. 18, 2026
  • A man pushes his bike through debris and destroyed Russian military vehicles on a street on April 06, 2022 in Bucha, Ukraine.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Newly identified hacking groups provide access to OT environments

    A state-linked adversary has begun to pivot from the Ukraine war with new attacks targeting Europe and the U.S.

    By Feb. 17, 2026