Threats: Page 2


  • A man pushes his bike through debris and destroyed Russian military vehicles on a street on April 06, 2022 in Bucha, Ukraine.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Russia-aligned hackers target US company in attack linked to Ukraine war effort

    A threat group called RomCom has a history of cyberattacks against entities connected to the conflict.

    By Updated Nov. 25, 2025
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Startup firm called Factory disrupts campaign designed to hijack development platform

    The AI-based firm intercepted a state-linked operation that was abusing resources as part of a criminal cyber-fraud network.

    By Nov. 21, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Salesforce
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Salesforce investigating campaign targeting customer environments connected to Gainsight app

    Researchers warn that ShinyHunters has been compromising OAuth tokens to gain potential access to customer data. 

    By Updated Nov. 21, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Record-breaking DDoS attack against Microsoft Azure mitigated

    The attack was linked to the Aisuru botnet, which targets compromised home routers and cameras.

    By Nov. 19, 2025
  • Two men and a woman sit in chairs on a stage in front of a screen showing the logos of the Aspen Cyber Summit and Aspen Digital
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump’s cyber strategy will emphasize adversary deterrence, industry partnerships

    Cyberattacks on the U.S. are “becoming more aggressive every passing day,” the national cyber director says.

    By Nov. 18, 2025
  • An automated automotive assembly line in a factory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers increasingly target operational technology, with manufacturing sector bearing the brunt

    Companies should segment and monitor their networks to prevent hackers from crossing over from IT to OT, a new report said.

    By Nov. 18, 2025
  • DOJ antitrust, Trump nominee
    Image attribution tooltip
    Yin Yang via Getty Images
    Image attribution tooltip

    US chips away at North Korean IT worker fraud

    Authorities have described Pyongyang’s revenue-generating schemes as threats to U.S. national and economic security.

    By Nov. 17, 2025
  • Claude, AI startup, Anthropic
    Image attribution tooltip
    Permission granted by Anthropic
    Image attribution tooltip

    Anthropic warns state-linked actor abused its AI tool in sophisticated espionage campaign

    Researchers said a China-backed adversary conducted powerful attacks with almost no human intervention. 

    By Updated Nov. 14, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Akira engaged in ransomware attacks against critical sectors

    The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.

    By Updated Nov. 14, 2025
  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies want more from their threat intelligence platforms

    Customers expect faster, more accurate and more relevant data, Recorded Future found in a new report.

    By Nov. 12, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix

    Hackers use custom malware to access multiple vulnerabilities, researchers from Amazon warn.

    By Nov. 12, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

    By Nov. 12, 2025
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Cisco detects new attack variant targeting vulnerable firewalls

    Hackers may be able to overload unpatched devices, the company said.

    By Nov. 10, 2025
  • Sparks come off an industrial machine in a factory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks surge against IoT, mobile devices in critical infrastructure

    Manufacturing and energy firms saw some of the biggest increases in malware activity targeting connected devices.

    By Nov. 7, 2025
  • Classic architecture details of a Bank building
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In financial sector, vendors lag behind customers on cybersecurity

    Financial firms should be performing regular oversight of their vendors to avoid supply chain compromises, according to a new report.

    By Nov. 6, 2025
  • symbol of danger
    Image attribution tooltip
    Permission granted by 10KMedia
    Image attribution tooltip
    Sponsored by 10KMedia

    Your AI-driven threat hunting is only as good as your data platform and pipeline

    The data-centric foundation for modern threat hunting.

    By Taylor Smith, Director of Product Marketing at Exaforce • Nov. 6, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-based malware makes attacks stealthier and more adaptive

    Google says it has discovered at least five malware families that use AI to reinvent themselves and hide from defenders.

    By Nov. 5, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers targeting Cisco IOS XE devices with BadCandy implant

    Security researchers and Australian authorities warn that exploitation activity is ongoing.

    By Updated Nov. 5, 2025
  • A hand typing login and password
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity-based attacks need more attention in cloud security strategies

    Companies should lock down user accounts and scan for compromised credentials, according to a new report.

    By Nov. 4, 2025
  • Open packages and debris on railroad tracks is seen through metal fencing.
    Image attribution tooltip
    Edwin Lopez/Cybersecurity Dive
    Image attribution tooltip

    Cybercrime groups team with organized crime in massive cargo theft campaigns

    Financially motivated hackers are abusing remote monitoring and access tools against trucking and freight companies, Proofpoint warns.

    By Updated Nov. 3, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Windows Server Update Service exploitation ensnares at least 50 victims

    Researchers say hackers could be gathering intelligence for future attacks, and authorities warn users to apply patches and check for compromise.

    By Oct. 31, 2025
  • A man wearing a blue suit and purple tie gestures with both hands while sitting in a chair on a stage
    Image attribution tooltip
    John Lamparski via Getty Images
    Image attribution tooltip

    FCC will vote to scrap telecom cybersecurity requirements

    The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.

    By Updated Oct. 31, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates guidance and warns security teams on WSUS exploitation

    The agency urges users to apply emergency patches from Microsoft to counter a serious threat.

    By Oct. 30, 2025
  • With cyberattacks becoming more frequent, now is the time for CFOs to shore up their cybersecurity programs and strategies.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI adoption outpaces corporate governance, security controls

    Security and business leaders warn that companies are accelerating their use of agentic AI beyond the ability to maintain proper guardrails. 

    By Oct. 29, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Google probes exploitation of critical Windows service CVE

    Researchers have traced the threat activity to a newly identified hacker, while separate evidence points to more than one variant.

    By Oct. 28, 2025