The Latest

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA, eyeing China, plans hiring spree to rebuild its depleted ranks

    The agency will also change some of its workforce policies to avoid driving away talented staff.

    Updated Nov. 18, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports major earnings impact from cyberattack

    The automaker set aside hundreds of millions to help stabilize its massive international supply chain. 

  • An automated automotive assembly line in a factory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers increasingly target operational technology, with manufacturing sector bearing the brunt

    Companies should segment and monitor their networks to prevent hackers from crossing over from IT to OT, a new report said.

  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in Fortinet FortiWeb is under exploitation

    The company faces criticism as multiple researchers claim a silent patch was issued weeks before official guidance was released.

  • DOJ antitrust, Trump nominee
    Image attribution tooltip
    Yin Yang via Getty Images
    Image attribution tooltip

    US chips away at North Korean IT worker fraud

    Authorities have described Pyongyang’s revenue-generating schemes as threats to U.S. national and economic security.

  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISO pay is on the rise, even as security budgets tighten

    Companies are increasingly lavishing benefits on their top security executives, a recent report found.

  • Claude, AI startup, Anthropic
    Image attribution tooltip
    Permission granted by Anthropic
    Image attribution tooltip

    Anthropic warns state-linked actor abused its AI tool in sophisticated espionage campaign

    Researchers said a China-backed adversary conducted powerful attacks with almost no human intervention. 

    Updated Nov. 14, 2025
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    Western governments disrupt trifecta of cybercrime tools

    Authorities seized more than 1,000 servers and 20 domains in the operation.

  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Akira engaged in ransomware attacks against critical sectors

    The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.

    Updated Nov. 14, 2025
  • an exterior shot of the US capitol building
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Government funding bill temporarily revives cybersecurity information-sharing law

    The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January.

  • A person in business attire speaks while holding a card, with a blue background displaying the words "Billington Cybersecurity" in a tiled pattern.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    UK authorities propose law to set minimum cyber standards for critical sectors

    The legislation follows a wave of social engineering attacks that rocked the nation’s retail and automotive supply chains.

  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix

    Hackers use custom malware to access multiple vulnerabilities, researchers from Amazon warn.

  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies want more from their threat intelligence platforms

    Customers expect faster, more accurate and more relevant data, Recorded Future found in a new report.

  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Cisco detects new attack variant targeting vulnerable firewalls

    Hackers may be able to overload unpatched devices, the company said.

  • Data Breach Button on Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent warns of further financial fallout from cyberattack

    The company has incurred millions in expenses related to data breach notifications stemming from an attack earlier this year. 

  • Close up of a circuit board, essential for advancements in AI.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI agents worsen IT’s capacity crunch: S&P Global

    An infrastructure overhaul to support agentic systems is underway, bringing with it a new set of capacity demands and security considerations. 

  • Nevada Gov. Joe Lombardo standing in front of microphone with American and Nevada flags behind him
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    Nevada ransomware attack traced back to malware download by employee

    The state refused to pay a ransom and recovered 90% of the impacted data.

  • Sparks come off an industrial machine in a factory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks surge against IoT, mobile devices in critical infrastructure

    Manufacturing and energy firms saw some of the biggest increases in malware activity targeting connected devices.

  • In a close-up of a severely shattered monitor screen, the display contains blue and black hues with various-sized white cracks.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    SonicWall says state-linked actor behind attacks against cloud backup service

    CEO announces security and governance reforms inside the company, including the adoption of secure-by-design practices.

  • Classic architecture details of a Bank building
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In financial sector, vendors lag behind customers on cybersecurity

    Financial firms should be performing regular oversight of their vendors to avoid supply chain compromises, according to a new report.

  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers targeting Cisco IOS XE devices with BadCandy implant

    Security researchers and Australian authorities warn that exploitation activity is ongoing.

    Updated Nov. 5, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-based malware makes attacks stealthier and more adaptive

    Google says it has discovered at least five malware families that use AI to reinvent themselves and hide from defenders.

  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of flaws that allow manipulation of Microsoft Teams messages

    A report by Check Point shows hackers could forge identities and alter messages.

  • EY offices stand in 1 More London Riverside on October 1, 2018 in London, England.
    Image attribution tooltip
    Jack Taylor via Getty Images
    Image attribution tooltip

    AI risks pack a punch, but governance provides a buffer

    Enterprises strengthen governance and focus on responsible practices as more than 3 in 5 suffer AI risk-related losses of more than $1 million, EY data shows.