Threats: Page 2


  • Fire and smoke arise after an attack on the Shahran oil depot in Tehran, Iran on June 15, 2025.
    Image attribution tooltip
    Stringer via Getty Images
    Image attribution tooltip

    US critical infrastructure could become casualty of Iran-Israel conflict

    Researchers warn that Iran-aligned threat groups could soon target U.S. companies and individuals in cyber espionage or sabotage attacks.

    By June 16, 2025
  • an executive in business attire
    Image attribution tooltip
    simon2579 via Getty Images
    Image attribution tooltip

    Cyberattacks top list of global business concerns, Kroll finds

    Many companies feel unprepared to comply with global privacy and security rules, according to the advisory firm’s annual business sentiment survey.

    By June 13, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Global law-enforcement operation targets infostealer malware

    Authorities in three countries arrested 32 people and seized dozens of servers.

    By June 11, 2025
  • A general view of the exterior of the branch of retailer Marks and Spencer at Westfield White City on October 20, 2020 in London, England. Marks & Spencer said customer data was accessed in an April 2025 cyberattack.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Marks & Spencer restores some online-order operations following cyberattack

    The department store chain six weeks ago was one of the first targets in an international spree of attacks disrupting retailers.

    By June 10, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Khanchit Khirisutchalual via Getty Images
    Image attribution tooltip

    From malware to deepfakes, generative AI is transforming attacks

    Generative AI is even helping hackers trick open-source developers into using malicious code, according to Gartner.

    By June 10, 2025
  • A general view of the exterior of the branch of retailer Marks and Spencer at Westfield White City on October 20, 2020 in London, England. Marks & Spencer said customer data was accessed in an April 2025 cyberattack.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Scattered Spider targeting MSPs, IT vendors in social engineering campaigns

    The same group is believed to be behind a wave of attacks against retailers in the UK, the US and elsewhere.

    By June 9, 2025
  • People walk by an Adidas storefront.
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    Data security is a CX issue, too

    A string of cyberattacks have targeted retailers like Adidas and North Face. Incidents like these can weaken customer trust and lead to lost business, experts say.

    By Kristen Doerer • June 9, 2025
  • Header image for "Financial Industry is Third-Most Targeted By Hackers"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    SentinelOne rebuffs China-linked attack — and discovers global intrusions

    The security firm said the operatives who tried to breach it turned out to be responsible for cyberattacks on dozens of critical infrastructure organizations worldwide.

    By Updated June 9, 2025
  • UNFI
    Image attribution tooltip
    Courtesy of United Natural Foods, Inc.
    Image attribution tooltip

    Main distributor to Whole Foods hit by cyberattack

    UNFI, a grocery retailer and wholesaler, is working to resume full operations following “unauthorized activity” involving its IT systems.

    By Sam Silverstein • June 9, 2025
  • Deep fake
    Image attribution tooltip
    wildpixel via Getty Images
    Image attribution tooltip

    Corporate executives face mounting digital threats as AI drives impersonation

    Malicious actors are using deepfakes and voice-cloning technology to target senior executives in both the workplace and personal spaces.

    By June 6, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    FBI, CISA warn Play ransomware targeting critical infrastructure with evolving techniques

    The hacker group has breached hundreds of organizations and is working with others to exploit flaws in a popular remote support tool.

    By June 5, 2025
  • Salesforce
    Image attribution tooltip
    Sundry Photography via Getty Images
    Image attribution tooltip

    Hackers abuse malicious version of Salesforce tool for data theft, extortion

    A threat group is using voice phishing to trick targeted organizations into sharing sensitive credentials.

    By June 4, 2025
  • Models in lingerie walk the runway at the end of the Victoria's Secret fashion show as confetti falls.
    Image attribution tooltip
    Lara Ewen/Cybersecurity Dive
    Image attribution tooltip

    Victoria’s Secret postponing release of report earnings amid breach impact

    The intrusion follows a string of attacks that appear to be the work of the cybercrime gang Scattered Spider.

    By June 3, 2025
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy

    After years of confusion, leading threat-intelligence companies will streamline how they name threat groups.  

    By June 2, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    ConnectWise warns of threat activity linked to suspected nation-state hackers

    The company said suspicious activity has affected a limited number of ScreenConnect customers.

    By Updated May 30, 2025
  • A black store banner reads "Victoria's Secret."
    Image attribution tooltip
    Daphne Howland/Cybersecurity Dive
    Image attribution tooltip

    Victoria’s Secret shuts down website in response to security incident

    Although stores are open, the company has also halted some in-store services as it works to fully restore operations. 

    By Kaarin Moore • May 29, 2025
  • An illustration of a calendar, with a mouse cursor clicking on a day
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Google: China-backed hackers hiding malware in calendar events

    The APT41 nation-state threat group is exploiting yet another cloud service to mask its operations, according to new research.

    By May 29, 2025
  • Broadband connections
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Thousands of ASUS routers compromised in sophisticated hacking campaign

    Researchers have previously linked the suspected threat actor, dubbed ViciousTrap, to the exploitation of Cisco routers.

    By May 29, 2025
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    CFOs, financial execs in crosshairs of ‘highly targeted’ spearphishing campaign

    Hackers are preying on senior corporate leaders at banks, investment firms, utilities and insurance companies worldwide.

    By Updated May 29, 2025
  • A cargo pallet filled with rockets and covered in safety straps sits on a tarmac at night.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft, Dutch government discover new Russian hacking group

    The findings highlight the vulnerability of all critical infrastructure firms to similar attack methods.

    By Updated May 28, 2025
  • DOJ voluntary self-disclosure pilot program
    Image attribution tooltip
    Bo Shen via Getty Images
    Image attribution tooltip

    US authorities charge 16 in operation to disrupt DanaBot malware

    Authorities said malware linked to Russia-based cybercrime group infected more than 300,000 computers around the world with the malicious code.

    By May 27, 2025
  • More than two dozen world leaders, tech executives, and experts stand in several rows on blue carpeted steps in front of a backdrop that says "AI Safety Summit"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    US, allies recommend security protections for AI models

    The joint guidance comes as officials fear how hackers could manipulate AI systems, especially in critical infrastructure.

    By May 22, 2025
  • A group of demonstrators hold U.S. and Ukrainian flags as they march in support of Ukraine in its war against Russia.
    Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Russia stepping up attacks on firms aiding Ukraine, Western nations warn

    One of Moscow’s most infamous hacker teams is targeting logistics and technology companies supporting Kyiv’s war effort.

    By May 21, 2025
  • Microsoft building with logo
    Image attribution tooltip
    HJBC via Getty Images
    Image attribution tooltip

    Microsoft leads international takedown of Lumma Stealer

    The Lumma infostealer malware is a popular way for hackers to steal passwords, credit cards and cryptocurrency wallets.

    By May 21, 2025
  • FBI seal displayed on a wall
    Image attribution tooltip
    Chip Somodevilla/Getty Images via Getty Images
    Image attribution tooltip

    FBI warns senior US officials are being impersonated using texts, AI-based voice cloning

    Hackers are increasingly using vishing and smishing for state-backed espionage campaigns and major ransomware attacks.

    By May 16, 2025