The Latest

  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Senior NSC official said US needs to embrace offensive cyber

    Alexei Bulazel said the administration is unapologetically in favor of using offensive capabilities to deter the nation’s adversaries. 

  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip
    Deep Dive

    How AI and politics hampered the secure open-source software movement

    Tech giants pledged millions to secure open-source code. Then AI came along.

  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Mitsubishi Electric agrees to buy Nozomi Networks in deal valued at about $1B

    The agreement is part of a larger strategy for Mitsubishi to develop one-stop security capabilities in the OT space.

  • Bridgestone's Warren County Plant, makers of commercial truck and bus tires, in Morrison, Tennessee.
    Image attribution tooltip
    Permission granted by Bridgestone
    Image attribution tooltip

    Bridgestone Americas continues probe as it looks to restore operations

    The tiremaker disclosed a cyberattack just days after Jaguar Land Rover was impacted by a major hack that also disrupted production at certain locations. 

  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Salesloft platform integration restored after probe reveals monthslong GitHub account compromise

    An investigation by Mandiant found the attack began months ago, leading to a major supply chain attack.

  • App icons for generative AI assistants OpenAI ChatGPT, Google Gemini, Anthropic Claude, DeepSeek, Meta AI and xAI Grok are pictured on a smartphone screen.
    Image attribution tooltip
    Kenneth Cheung via Getty Images
    Image attribution tooltip

    Data security gaps stymy enterprise AI plans

    Nearly three-quarters of CIOs and CISOs see information complexity as an adoption roadblock.

  • Data privacy, cyber insurance
    Image attribution tooltip
    Khaosai Wongnatthakan via Getty Images
    Image attribution tooltip

    Swiss Re warns of rate deterioration in cyber insurance

    Competition among insurers has forced them to offer concessions on premiums, limits and controls.

  • The exterior of a Marriott hotel is seen on February 11, 2025 in Miami, Florida.
    Image attribution tooltip
    Joe Raedle / Staff via Getty Images
    Image attribution tooltip

    Marriott checks out AI agents amid technology transformation

    The multinational hospitality giant is building a model-agnostic chassis featuring an agentic layer.

  • a software developer inspects code on a screen
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    Researchers warn of zero-day vulnerability in SiteCore products

    Mandiant said it was able to disarm a ViewState deserialization attack leveraging exposed ASP.NET keys.

    Updated Sept. 4, 2025
  • Vegetables sit on grocery store shelves
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip
    Deep Dive

    How the newest ISAC aims to help food and agriculture firms thwart cyberattacks

    Food industry executives used to shrug off ransomware and cyber-espionage risks. A threat intel group is helping to change that, but its reach remains unclear.

  • Inside Cloudflare’s offices in San Francisco, California.
    Image attribution tooltip
    Permission granted by Cloudflare
    Image attribution tooltip

    Cloudflare, Proofpoint say hackers gained access to Salesforce instances in attack spree

    The breaches are part of hundreds of potential supply chain attacks linked to Salesloft Drift.

  • Beige and blue modern office building with large windows and the “paloalto networks” logo in black and red near the top corners.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Palo Alto Networks, Zscaler customers impacted by supply chain attacks

    A hacking campaign using credentials linked to Salesloft Drift has impacted a growing number of companies, including downstream customers of leading cybersecurity firms.

  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip
    Deep Dive

    FCC investigation could derail its own IoT security certification program

    Internet of Things device makers are eager to participate, but the commission’s concerns about its lead administrator have halted progress of the U.S. Cyber Trust Mark program.

  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    US, allies warn China-linked actors still targeting critical infrastructure

    An advisory from 13 countries says state-backed hackers continue trying to breach telecommunications systems and other vital networks.

  • Entrance greeting sign on the highway border between Nevada and Arizona
    Image attribution tooltip
    Pgiam via Getty Images
    Image attribution tooltip

    Federal, state officials investigating ransomware attack targeting Nevada

    The Sunday attack disrupted key services across the state and led to the theft of some data.

    Updated Aug. 29, 2025
  • Ransomware Data Breach Protection Cyber Security Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    NetScaler warns hackers are exploiting zero-day vulnerability

    The company is urging customers to patch their devices immediately, saying the flaw could lead to denial of service or remote code execution.

  • An artificial intelligence processor unit
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Safety-critical industries wary about using AI for cybersecurity

    Finance, tech and professional services are among the sectors with the widest adoption of AI-based security tools, according to a new report.

  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    Hackers steal data from Salesforce instances in widespread campaign

    Google researchers say the hackers abused a third-party tool in an attack spree designed to harvest credentials.

    Updated Aug. 29, 2025
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Execs worry about unknown identity-security weaknesses

    Credential theft attacks prove that companies need to do better, but business leaders cited many reasons for slow progress.

  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    CISOs grow more concerned about risk of material cyberattack

    A report by Proofpoint shows growing anxiety among security leaders about their companies’ cyber readiness.

  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Credential harvesting campaign targets ScreenConnect cloud administrators

    Researchers warn that attackers are using compromised Amazon email accounts in spear-phishing attacks that may lead to ransomware infections.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA updates SBOM recommendations

    The document is primarily meant for federal agencies, but CISA hopes businesses will also use it to push vendors for software bills of materials.

  • In a close-up of a severely shattered monitor screen, the display contains blue and black hues with various-sized white cracks.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    China-nexus hacker Silk Typhoon targeting cloud environments

    The state-linked espionage group has exploited zero-day flaws in Commvault and Citrix Netscaler, researchers say.

  • World image
    Image attribution tooltip
    Faruk Ibrahim Alpagut via Getty Images
    Image attribution tooltip

    US charges Oregon man in vast botnet-for-hire operation

    Federal prosecutors called Rapper Bot one of the most powerful DDoS botnets in history.

  • Magnifying glass with business report on financial advisor desk.
    Image attribution tooltip
    utah778 via Getty Images
    Image attribution tooltip

    Cyber, AI drive software spending to double-digit growth through 2029

    Cloud security and identity and access management tool purchases insulated the market from tariff-induced economic shocks, according to Forrester.