Threats: Page 2


  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity is the first line of defense, especially in an AI-fueled threat landscape

    Two new reports illustrate why companies need to do a better job of scrutinizing what their human employees and AI agents are doing.

    By March 27, 2026
  • Four men sit on a stage in front of an audience. Behind them, a blue backdrop displays a logo reading "RSAC 2026 Conference."
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    ‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats

    Experts said companies rushing to buy AI services risk letting their existing, still-vital defensive measures deteriorate.

    By March 25, 2026
  • Trendline

    Managing identity sprawl

    Cyber threat actors know the simplest way to hack into an enterprise and remain under the radar is with stolen, legitimate user credentials -- and cloud services and AI are making managing and securing digital identities more challenging than ever.

    By Cybersecurity Dive staff
  • A pile of rubble with an Iranian flag stuck in it is shown.
    Image attribution tooltip
    Majid Saeedi / Stringer via Getty Images
    Image attribution tooltip

    Iran-linked ransomware operation targeted US healthcare provider

    The Pay2Key group may have shifted its aims from extortion to destruction.

    By March 25, 2026
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Congress wants details from White House on cyber strategy, Iran resilience measures

    Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.

    By March 25, 2026
  • An executive in a business meeting room
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies face difficult choices in blaming hackers for an attack

    Publicly naming a hacking group can affect everything from retaliation to insurance coverage.

    By March 24, 2026
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime groups speed up initial access handoff through planning, coordination

    A report by Google Threat Intelligence Group also shows voice-based phishing has surged amid a rise in social engineering tactics.

    By March 24, 2026
  • Three people sit and one person stands on a stage with a backdrop reading "RSAC 2026 Conference"
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    ISACs confront AI’s promise and peril for threat intelligence-sharing

    Any use of AI for ISAC work must preserve members’ trust, representatives of three critical infrastructure sectors said.

    By March 23, 2026
  • Header image for "Financial Industry is Third-Most Targeted By Hackers"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    AI poised to help low-skilled hackers in the near term

    The expected rise in automated cyberattacks means more work for defenders — but they can use AI to fight back.

    By March 23, 2026
  • Image attribution tooltip
    Kevin Moloney via Getty Images
    Image attribution tooltip

    Lockheed Martin targeted in alleged breach by pro-Iran hacktivist

    The group is demanding millions of dollars to not sell the information to U.S. adversaries.

    By March 23, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker confirms cyberattack is contained and restoration underway

    An assurance letter from Palo Alto Networks provides insight into the forensic investigation at the medical technology firm.

    By March 23, 2026
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Network edge devices still widely used after reaching end-of-life status

    A report by VulnCheck shows nation-state hackers often target flaws in aging routers, firewalls and VPNs.

    By March 23, 2026
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    US, allies move to dismantle four high-volume IoT botnets

    The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars.

    By March 20, 2026
  • antitrust enforcement
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    DOJ confirms seizure of domains linked to Iran-backed threat actor

    A group connected to Iranian intelligence used the same infrastructure to claim credit for the hack of medical technology firm Stryker. 

    By March 20, 2026
  • Circular clarifier tanks are seen at a water treatment facility
    Image attribution tooltip
    pigphoto/iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Water utilities need hands-on cybersecurity help, not just free guidance, pilot program finds

    In a new report, Microsoft criticized the federal government for scaling back support to critical infrastructure operators.

    By March 19, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges organizations to harden endpoint security following Stryker attack

    The agency is coordinating with the FBI and other agencies amid concerns about additional threat activity involving Microsoft Intune. 

    By March 19, 2026
  • Industrial equipment sits inside a building.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups target cyber-physical systems to disrupt critical infrastructure providers

    The Iran war has raised concerns that key industrial sectors could be the target of hacktivists, state actors and other groups.

    By March 18, 2026
  • A person wearing a hoodie sits at a computer in front of a North Korean flag
    Image attribution tooltip
    vchal/iStock /Getty Images Plus via Getty Images
    Image attribution tooltip

    New research unpacks North Korea’s stealthy, sophisticated remote IT worker schemes

    The report recommends that businesses practice several forms of vigilance to avoid unwittingly hiring Pyongyang’s operatives.

    By March 18, 2026
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Stryker attack raises concerns about role of device management tool

    Researchers warn that Microsoft Intune may have been weaponized to wipe critical devices.

    By March 16, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker’s manufacturing, shipping disrupted after cyberattack

    The medtech company says it's still experiencing issues with order processing, manufacturing and shipping. 

    By Ricky Zipp , March 13, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Even primitive AI-coded malware helps hackers move faster, thwart attribution

    IBM researchers discovered an autonomously coded backdoor that they called unsophisticated but nonetheless ominous.

    By March 13, 2026
  • A worker uses Hexagon's design and engieering technology on his computer.
    Image attribution tooltip
    Courtesy of Hexagon
    Image attribution tooltip

    5 ways to protect manufacturing companies from cyberattacks

    Manufacturing suffered the most cyberattacks of any industry last year. Experts have advice about hardening networks and avoiding common mistakes.

    By Jeffrey Kinney • March 12, 2026
  • Coalition of information-sharing groups warns of cyber, physical attacks

    A joint advisory says Iran-linked groups are targeting U.S. critical infrastructure using DDoS, phishing and other retaliatory techniques.

    By Updated March 12, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    Industry to NIST: Keep agentic AI standards flexible and voluntary

    The business community said security guidance should reflect the nascency and diversity of the field.

    By March 11, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    US entities face heightened cyber risk related to Iran war

    The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks.

    By March 10, 2026
  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    State-linked actors targeted US networks in lead-up to Iran war

    Researchers found backdoors installed on U.S. company networks in the weeks prior to the U.S. and Israeli bombing campaign.

    By March 9, 2026