The Latest

  • The Microsoft logo is pictures on the technology company's headquarters in Redmond, Washington, on July 3, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Medium-severity flaw in Microsoft SharePoint exploited

    The flaw should be taken seriously, despite its relatively low score, according to researchers.

    Updated April 16, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC signals continued commitment to Cyber Trust Mark program

    The government approved a new lead overseer for its IoT device security labeling initiative.

    Updated April 14, 2026
  • Digital shield firewall with central computer processor and futuristic circuit board
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Brute-force cyberattacks originating in Middle East surge in Q1

    Hackers have primarily targeted SonicWall and Fortinet devices, according to researchers. 

  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US, Indonesia shut down ‘sophisticated’ phishing kit

    For a nominal fee, cybercriminals could rent access to a service that maliciously duplicated popular websites’ login portals.

  • Team of professionals meeting in office around computers
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs see gaps in their incident response playbooks

    A survey by Sygnia reveals that senior-level security leaders fear they are not prepared to respond to the next cyberattack.

  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker warns of earnings fallout from March cyberattack

    The medtech company was targeted in a wiper attack linked to an Iran-sponsored threat group.

  • Industrial control equipment, including programmable logic controllers, are seen mounted to a wall
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Nearly 4K industrial control devices vulnerable to Iran-linked hacking campaign

    A research firm tallied the internet-exposed devices Iran is targeting and recommended mitigations for any infrastructure operator using them.

  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog

    The code injection flaw is similar to a prior vulnerability that was immediately flagged in January.

  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    Iran-linked hackers target water, energy in US, FBI and CISA warn

    Nation-state actors have exploited flaws in industrial programmable logic controllers, leading to disruption and financial losses.

  • An engineer repairs an electricity pole as smoke billows after overnight airstrikes on oil depots on March 8, 2026 in Tehran, Iran.
    Image attribution tooltip
    Majid Saeedi/Getty Image via Getty Images
    Image attribution tooltip

    NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat

    Hackers have disrupted critical U.S. infrastructure by targeting programmable logic controllers, the Cybersecurity and Infrastructure Security Agency warned.

  • A wireless router sits on a flat surface
    Image attribution tooltip
    Jens Domschky via Getty Images
    Image attribution tooltip

    US operation evicts Russia from hacked SOHO routers used to breach critical infrastructure

    The newly disclosed cyberattack campaign is the latest evidence of the threat end-of-life routers pose to major organizations.

    Updated April 9, 2026
  • A person walks a runway in front of the Olympic rings.
    Image attribution tooltip
    Massimo Rosi via Getty Images
    Image attribution tooltip

    Olympic Games, FIFA World Cup offer huge platforms, rich cyberattack surface

    Global sporting events have become a lucrative target for criminal actors and geopolitical statements.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA’s vulnerability scans, field support on chopping block in Trump budget

    The president is proposing to shrink the agency by nearly 900 positions.

  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data

    The stolen information could help intruders plan follow-up attacks and breach more organizations, Cisco researchers said.

  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat cluster launches extortion campaign using social engineering

    Researchers said the hackers are compromising business process outsourcers and targeting help desk support.

  • A building with large glass windows bears the Fortinet logo at the top, while a sign at ground level reads "Fortinet - 909 Kifer Road"
    Image attribution tooltip
    Courtesy of Fortinet
    Image attribution tooltip

    Critical flaw in FortiClient EMS under exploitation

    Fortinet released an emergency hotfix after security researchers discovered the vulnerability being exploited as a zero-day.

    Updated April 6, 2026
  • Hims & Hers Super Bowl ad header
    Image attribution tooltip
    Courtesy of Hims & Hers
    Image attribution tooltip

    Hims & Hers says limited data stolen in social engineering attack

    The telehealth provider said hackers gained access to a third-party customer service platform, but medical records remained secure.

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump’s FY2027 budget again targets CISA

    The White House reiterated accusations about CISA’s counter-misinformation work to justify a major proposed reduction.

  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of critical flaws in Progress ShareFile

    Attackers could chain vulnerabilities together, leading to configuration changes or remote code execution.

  • Digital cloud and network security. 3D computer hardware illustration.
    Image attribution tooltip
    solarseven
    Image attribution tooltip

    Government agencies see cyber threats as major barrier to tech improvements

    Federal leaders also see opportunities to accelerate cyber defense with AI, according to a new report, but most agencies are still only testing AI tools.

  • Walmart retail credit card swipe fees Visa Mastercard
    Image attribution tooltip
    Jessica McGowan via Getty Images
    Image attribution tooltip

    Retail and hospitality CISOs expect budget growth, new AI headaches and opportunities

    More than eight in 10 security leaders in the sector say they’ve rolled out an AI governance framework to some degree, a new survey found.

  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Critical flaw in F5 BIG-IP faces wide exploitation risk

    The company revised a security advisory as newly disclosed information heightens the potential impact.

  • a technologist holds a laptop, facing a wall of code projected on a wall
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Axios open-source library targeted in sophisticated supply chain attack

    Researchers link the compromise to a North Korean adversary and warn the impacts could be wide ranging.

  • A massive lit-up sign with the tilted blue "Hasbro" logo and cartoon images looms over a dark room.
    Image attribution tooltip
    "Hasbro booth" by Gage Skidmore is licensed under CC BY-SA 2.0
    Image attribution tooltip

    Cyberattack hits Hasbro, impacting orders and shipping

    The major U.S. toymaker and entertainment company is still working to assess if company data was stolen in the attack.

    Updated April 1, 2026
  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    Iran-linked actors target Middle Eastern city governments to undermine missile-strike responses

    The password-spraying campaign is the latest evidence that Iran is hitting back in cyberspace.