Threats: Page 6


  • A cargo pallet filled with rockets and covered in safety straps sits on a tarmac at night.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft, Dutch government discover new Russian hacking group

    The findings highlight the vulnerability of all critical infrastructure firms to similar attack methods.

    By Updated May 28, 2025
  • DOJ voluntary self-disclosure pilot program
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US authorities charge 16 in operation to disrupt DanaBot malware

    Authorities said malware linked to Russia-based cybercrime group infected more than 300,000 computers around the world with the malicious code.

    By May 27, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • More than two dozen world leaders, tech executives, and experts stand in several rows on blue carpeted steps in front of a backdrop that says "AI Safety Summit"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    US, allies recommend security protections for AI models

    The joint guidance comes as officials fear how hackers could manipulate AI systems, especially in critical infrastructure.

    By May 22, 2025
  • A group of demonstrators hold U.S. and Ukrainian flags as they march in support of Ukraine in its war against Russia.
    Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Russia stepping up attacks on firms aiding Ukraine, Western nations warn

    One of Moscow’s most infamous hacker teams is targeting logistics and technology companies supporting Kyiv’s war effort.

    By May 21, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft leads international takedown of Lumma Stealer

    The Lumma infostealer malware is a popular way for hackers to steal passwords, credit cards and cryptocurrency wallets.

    By May 21, 2025
  • FBI seal displayed on a wall
    Image attribution tooltip
    Chip Somodevilla/Getty Images via Getty Images
    Image attribution tooltip

    FBI warns senior US officials are being impersonated using texts, AI-based voice cloning

    Hackers are increasingly using vishing and smishing for state-backed espionage campaigns and major ransomware attacks.

    By May 16, 2025
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China

    The Trump administration is facing mounting pressure to formulate a strategy for addressing supply-chain threats that endanger national security.

    By May 15, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    Researchers warn threat actors in UK retail attacks are targeting US sector

    Google Threat Intelligence researchers say the hackers behind intrusions at multiple British retailers are launching similar social engineering attacks against American companies. 

    By May 15, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    China helps North Korean operatives land IT roles, bypassing sanctions

    One Chinese company with at least 35 affiliates has shipped IT equipment to a North Korean government-backed organization.

    By Updated May 14, 2025
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    PowerSchool data breach leads to school extortion attempts

    A threat actor has contacted multiple school districts demanding payments related to student and staff data stolen in a December breach.

    By Anna Merod • May 13, 2025
  • An SAP logo is seen on a building in Frankfurt, Germany, on September 1, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SAP NetWeaver exploitation enters second wave of threat activity

    Researchers are tracking hundreds of cases around the world and warning that the risk is more serious than previously known.

    By May 9, 2025
  • The Department of Energy (DOE) sign is seen at its headquarters, the James Forrestal Building, nicknamed the Little Pentagon, in Washington, DC.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, FBI warn of ‘unsophisticated’ hackers targeting industrial systems

    Federal authorities, including the EPA and the U.S. Department of Energy, urged network defenders to secure remote access and use stronger passwords.

    By May 8, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware claims dipped slightly in 2024, cyber insurer says

    A major cyber insurer’s annual report lays out how hackers are trying to steal money and how its policyholders responded.

    By May 7, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    UK authorities warn of retail-sector risks following cyberattack spree

    Three major retail brands, including Harrods and M&S, have been targeted in recent weeks.

    By May 5, 2025
  • chief legal officer serving as corporate secretary
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Operational impacts top list of vendor risk worries, study finds

    The report comes as years of supply chain cyberattacks shine a spotlight on third-party risks.

    By May 1, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    FBI seeks public tips about Salt Typhoon

    The bureau’s public alert follows months of conversations with the telecom industry about the far-reaching cyber espionage campaign by a Chinese nation-state threat actor.

    By April 28, 2025
  • An SAP logo is seen on a building in Frankfurt, Germany, on September 1, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in SAP NetWeaver under threat of active exploitation

    Attackers have been observed dropping webshell backdoors and researchers warn the application is popular among government agencies.

    By Updated April 25, 2025
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups exploit resurgent vulnerabilities

    VPNs, routers and firewalls are being targeted via older CVEs, new GreyNoise research shows.

    By April 24, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    BEC scams, investment fraud accounted for biggest cybercrime losses in 2024

    Americans lost $16.6 billion to cyber fraud last year, according to an FBI report, with phishing, spoofing and extortion topping the list of complaints.

    By April 23, 2025
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Financial gain still drives majority of cyber threat activity

    Stolen credentials are becoming a more prevalent form of initial access, a report from Mandiant shows.

    By April 23, 2025
  • Exterior of Stop & Shop supermarket
    Image attribution tooltip
    Sam Silverstein/Cybersecurity Dive
    Image attribution tooltip

    Ahold Delhaize confirms data stolen after threat group claims credit for November attack

    A highly active threat group says it will release stolen information, months after an attack disrupted e-commerce operations at the grocer’s U.S. business.

    By , Sam Silverstein • April 17, 2025
  • Capitol building, DC
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Bill extends cyber threat info-sharing between public, private sector

    The Cybersecurity Information Sharing Act of 2015, set to expire in September, “moved the needle.”

    By Elizabeth Montalbano, Contributing Reporter • April 16, 2025
  • Person using multiple devices.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Remote access tools most frequently targeted as ransomware entry points

    Supply chain risk via third-party vendors increased sharply last year, according to a report by At-Bay.

    By April 11, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Windows CLFS zero-day exploited in ransomware attacks

    A threat actor tracked as Storm-2460 has used PipeMagic malware to facilitate the attacks.

    By April 9, 2025
  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Over 5K Ivanti VPNs vulnerable to critical bug under attack

    China-linked threat actors last month began exploiting CVE-2025-22457, a critical stack buffer-overflow flaw.

    By April 8, 2025