Threats: Page 3


  • Deep fake
    Image attribution tooltip
    wildpixel via Getty Images
    Image attribution tooltip

    Corporate executives face mounting digital threats as AI drives impersonation

    Malicious actors are using deepfakes and voice-cloning technology to target senior executives in both the workplace and personal spaces.

    By June 6, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    FBI, CISA warn Play ransomware targeting critical infrastructure with evolving techniques

    The hacker group has breached hundreds of organizations and is working with others to exploit flaws in a popular remote support tool.

    By June 5, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Salesforce
    Image attribution tooltip
    Sundry Photography via Getty Images
    Image attribution tooltip

    Hackers abuse malicious version of Salesforce tool for data theft, extortion

    A threat group is using voice phishing to trick targeted organizations into sharing sensitive credentials.

    By June 4, 2025
  • Models in lingerie walk the runway at the end of the Victoria's Secret fashion show as confetti falls.
    Image attribution tooltip
    Lara Ewen/Cybersecurity Dive
    Image attribution tooltip

    Victoria’s Secret postponing release of report earnings amid breach impact

    The intrusion follows a string of attacks that appear to be the work of the cybercrime gang Scattered Spider.

    By June 3, 2025
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy

    After years of confusion, leading threat-intelligence companies will streamline how they name threat groups.  

    By June 2, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    ConnectWise warns of threat activity linked to suspected nation-state hackers

    The company said suspicious activity has affected a limited number of ScreenConnect customers.

    By Updated May 30, 2025
  • A black store banner reads "Victoria's Secret."
    Image attribution tooltip
    Daphne Howland/Cybersecurity Dive
    Image attribution tooltip

    Victoria’s Secret shuts down website in response to security incident

    Although stores are open, the company has also halted some in-store services as it works to fully restore operations. 

    By Kaarin Moore • May 29, 2025
  • An illustration of a calendar, with a mouse cursor clicking on a day
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Google: China-backed hackers hiding malware in calendar events

    The APT41 nation-state threat group is exploiting yet another cloud service to mask its operations, according to new research.

    By May 29, 2025
  • Broadband connections
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Thousands of ASUS routers compromised in sophisticated hacking campaign

    Researchers have previously linked the suspected threat actor, dubbed ViciousTrap, to the exploitation of Cisco routers.

    By May 29, 2025
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    CFOs, financial execs in crosshairs of ‘highly targeted’ spearphishing campaign

    Hackers are preying on senior corporate leaders at banks, investment firms, utilities and insurance companies worldwide.

    By Updated May 29, 2025
  • A cargo pallet filled with rockets and covered in safety straps sits on a tarmac at night.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft, Dutch government discover new Russian hacking group

    The findings highlight the vulnerability of all critical infrastructure firms to similar attack methods.

    By Updated May 28, 2025
  • DOJ voluntary self-disclosure pilot program
    Image attribution tooltip
    Bo Shen via Getty Images
    Image attribution tooltip

    US authorities charge 16 in operation to disrupt DanaBot malware

    Authorities said malware linked to Russia-based cybercrime group infected more than 300,000 computers around the world with the malicious code.

    By May 27, 2025
  • More than two dozen world leaders, tech executives, and experts stand in several rows on blue carpeted steps in front of a backdrop that says "AI Safety Summit"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    US, allies recommend security protections for AI models

    The joint guidance comes as officials fear how hackers could manipulate AI systems, especially in critical infrastructure.

    By May 22, 2025
  • A group of demonstrators hold U.S. and Ukrainian flags as they march in support of Ukraine in its war against Russia.
    Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Russia stepping up attacks on firms aiding Ukraine, Western nations warn

    One of Moscow’s most infamous hacker teams is targeting logistics and technology companies supporting Kyiv’s war effort.

    By May 21, 2025
  • Microsoft building with logo
    Image attribution tooltip
    HJBC via Getty Images
    Image attribution tooltip

    Microsoft leads international takedown of Lumma Stealer

    The Lumma infostealer malware is a popular way for hackers to steal passwords, credit cards and cryptocurrency wallets.

    By May 21, 2025
  • FBI seal displayed on a wall
    Image attribution tooltip
    Chip Somodevilla/Getty Images via Getty Images
    Image attribution tooltip

    FBI warns senior US officials are being impersonated using texts, AI-based voice cloning

    Hackers are increasingly using vishing and smishing for state-backed espionage campaigns and major ransomware attacks.

    By May 16, 2025
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China

    The Trump administration is facing mounting pressure to formulate a strategy for addressing supply-chain threats that endanger national security.

    By May 15, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    Researchers warn threat actors in UK retail attacks are targeting US sector

    Google Threat Intelligence researchers say the hackers behind intrusions at multiple British retailers are launching similar social engineering attacks against American companies. 

    By May 15, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    China helps North Korean operatives land IT roles, bypassing sanctions

    One Chinese company with at least 35 affiliates has shipped IT equipment to a North Korean government-backed organization.

    By Updated May 14, 2025
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    PowerSchool data breach leads to school extortion attempts

    A threat actor has contacted multiple school districts demanding payments related to student and staff data stolen in a December breach.

    By Anna Merod • May 13, 2025
  • An SAP logo is seen on a building in Frankfurt, Germany, on September 1, 2024.
    Image attribution tooltip
    Victor Golmer via Getty Images
    Image attribution tooltip

    SAP NetWeaver exploitation enters second wave of threat activity

    Researchers are tracking hundreds of cases around the world and warning that the risk is more serious than previously known.

    By May 9, 2025
  • The Department of Energy (DOE) sign is seen at its headquarters, the James Forrestal Building, nicknamed the Little Pentagon, in Washington, DC.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    CISA, FBI warn of ‘unsophisticated’ hackers targeting industrial systems

    Federal authorities, including the EPA and the U.S. Department of Energy, urged network defenders to secure remote access and use stronger passwords.

    By May 8, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Ransomware claims dipped slightly in 2024, cyber insurer says

    A major cyber insurer’s annual report lays out how hackers are trying to steal money and how its policyholders responded.

    By May 7, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    UK authorities warn of retail-sector risks following cyberattack spree

    Three major retail brands, including Harrods and M&S, have been targeted in recent weeks.

    By May 5, 2025
  • chief legal officer serving as corporate secretary
    Image attribution tooltip
    rorodenkoff via Getty Images
    Image attribution tooltip

    Operational impacts top list of vendor risk worries, study finds

    The report comes as years of supply chain cyberattacks shine a spotlight on third-party risks.

    By May 1, 2025