Threats: Page 4
-
Cisco sees vulnerability exploitation top phishing in Q4
The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.
By Eric Geller • Jan. 30, 2026 -
Deep Dive
Manufacturers fortify cyber defenses in response to dramatic surge in attacks
IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.
By Eric Geller , David Jones • Jan. 29, 2026 -
Explore the Trendline➔
Getty Images
TrendlineManaging identity sprawl
Cyber threat actors know the simplest way to hack into an enterprise and remain under the radar is with stolen, legitimate user credentials -- and cloud services and AI are making managing and securing digital identities more challenging than ever.
By Cybersecurity Dive staff -
CISA, security researchers warn FortiCloud SSO flaw is under attack
The exploitation activity comes weeks after a similar authentication bypass vulnerability was found.
By David Jones • Jan. 29, 2026 -
Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority
A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.
By Eric Geller • Jan. 27, 2026 -
Cybercrime group claims credit for voice phishing attacks
Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.
By David Jones • Updated Jan. 27, 2026 -
Sponsored by Cisco Duo
Top 3 factors for selecting an identity access management tool
Identity and access management (IAM) ensures that people and entities with digital identities have the right level of access to your enterprise resources.
Jan. 26, 2026 -
Deep Dive
5 cybersecurity trends to watch in 2026
Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market.
By David Jones • Jan. 23, 2026 -
IT teams aren’t equipped to stop rogue AI agents
Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.
By James Anderson • Jan. 22, 2026 -
LastPass warns backup request is phishing campaign in disguise
Customers received deceptive emails over the holiday weekend claiming the company was doing maintenance.
By David Jones • Updated Jan. 23, 2026 -
US and allies collaborate on operational technology security guidance
A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.
By Eric Geller • Jan. 16, 2026 -
Majority of hedge funds boosted cybersecurity spending in 2025
About half of firms suffered a breach, and a large percentage cited third-party risks.
By David Jones • Jan. 13, 2026 -
Healthcare breaches double as shadow AI, vendor risks proliferate
A new report paints a picture of a sector with limited confidence in its defensive capabilities.
By Eric Geller • Jan. 13, 2026 -
Executives worry most about cyber-enabled fraud, geopolitics and AI
The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.
By Eric Geller • Jan. 12, 2026 -
Telecom sector sees steady rise in ransomware attacks
A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.
By Eric Geller • Jan. 9, 2026 -
Deep Dive
CISA’s 7 biggest challenges in 2026
From infrastructure protection to improving morale, the cybersecurity agency has a lot on its plate — and it still lacks a leader.
By Eric Geller • Jan. 9, 2026 -
Moody’s forecasts growing AI threats, regulatory friction for 2026
The U.S. and the EU continue to pursue starkly different regulatory agendas, the research firm noted.
By Eric Geller • Jan. 8, 2026 -
How CIOs can brace for AI-fueled cyberthreats
Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.
By Jen A. Miller • Jan. 8, 2026 -
R. Eskalis/NIST. Retrieved from NIST.
NIST asks public for help securing AI agents
The agency is interested in case studies showing how best to protect agents from hackers.
By Eric Geller • Jan. 7, 2026 -
Fraud attacks expected to ramp up in AI ‘perfect storm’
2026 is poised to be “the year of impersonation attacks” amid an explosion of AI-powered tools, a fraud prevention expert said.
By Alexei Alexis • Jan. 7, 2026 -
Risky shadow AI use remains widespread
A new report offers fresh evidence for why enterprises should prioritize AI governance policies.
By Eric Geller • Jan. 6, 2026 -
Cyber risks grow as manufacturers turn to AI and cloud systems
Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report.
By Sakshi Udavant • Jan. 5, 2026 -
R. Eskalis/NIST. Retrieved from NIST.
NIST and MITRE partner to test AI defense technology for critical infrastructure
Experts said the new partnership should focus on making AI-based systems more reliable.
By Eric Geller • Dec. 23, 2025 -
AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says
Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.
By Eric Geller • Dec. 22, 2025 -
CISA warns of continued threat activity linked to Brickstorm malware
Officials provided additional evidence showing its ability to maintain persistence and evade defenses.
By David Jones • Dec. 22, 2025 -
State-linked and criminal hackers use device code phishing against M365 users
Russia-linked groups have attacked multiple sectors in recent months.
By David Jones • Dec. 19, 2025