Breaches


  • A massive lit-up sign with the tilted blue "Hasbro" logo and cartoon images looms over a dark room.
    Image attribution tooltip
    "Hasbro booth" by Gage Skidmore is licensed under CC BY-SA 2.0
    Image attribution tooltip

    Cyberattack hits Hasbro, impacting orders and shipping

    The major U.S. toymaker and entertainment company is still working to assess if company data was stolen in the attack.

    By Updated an hour ago
  • a set of missiles sit on their launches with Iranian flags in the background
    Image attribution tooltip
    Majid Saeedi/ via Getty Images
    Image attribution tooltip

    Iran-linked actors target Middle Eastern city governments to undermine missile-strike responses

    The password-spraying campaign is the latest evidence that Iran is hitting back in cyberspace.

    By April 1, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker restores most manufacturing after cyberattack

    The medtech company has been working to restore manufacturing, ordering and shipping operations since it was hit by a cyberattack on March 11.

    By Ricky Zipp • March 30, 2026
  • Four men sit on a stage in front of an audience. Behind them, a blue backdrop displays a logo reading "RSAC 2026 Conference."
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    ‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats

    Experts said companies rushing to buy AI services risk letting their existing, still-vital defensive measures deteriorate.

    By March 25, 2026
  • An executive in a business meeting room
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies face difficult choices in blaming hackers for an attack

    Publicly naming a hacking group can affect everything from retaliation to insurance coverage.

    By March 24, 2026
  • Image attribution tooltip
    Kevin Moloney via Getty Images
    Image attribution tooltip

    Lockheed Martin targeted in alleged breach by pro-Iran hacktivist

    The group is demanding millions of dollars to not sell the information to U.S. adversaries.

    By March 23, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker confirms cyberattack is contained and restoration underway

    An assurance letter from Palo Alto Networks provides insight into the forensic investigation at the medical technology firm.

    By March 23, 2026
  • A closeup photo shows the top floors of an office building that bears the name "TELUS" in purple alongside the company's green-and-purple logo
    Image attribution tooltip
    Marvin Samuel Tolentino Pineda/iStock via Getty Images
    Image attribution tooltip

    Telus Digital confirms hack as ShinyHunters claims credit for massive data theft

    The Canadian business-process outsourcer, which counts many major businesses among its customers, still isn’t sure what the hackers stole.

    By March 16, 2026
  • A modern office building with large reflective glass windows is shown behind a wide driveway and landscaped entrance. In the foreground, a white and orange monument sign reads "Intuitive Surgical" with the number "1020" vertically on the side.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Robotics firm Intuitive Surgical says cyberattack compromised business, customer data

    The company said an intruder accessed employee information, customer contact details and other records.

    By Ricky Zipp • March 16, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware is now less about malware and more about impersonation

    Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

    By March 3, 2026
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UFP Technologies investigating cyberattack that impacted company data

    The medical device maker warned of short-term shipment delays, but does not see a material impact.

    By Feb. 26, 2026
  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    AI accelerates lateral movement in cyberattacks

    New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.

    By Feb. 26, 2026
  • A Chinese flag flutters in front of a Chinese government building, on top of which other Chinese flags are flying
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    China-linked hackers breached dozens of telecoms, government agencies

    The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.

    By Feb. 25, 2026
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI helps novice threat actor compromise FortiGate devices in dozens of countries

    Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according to a new Amazon report.

    By Feb. 23, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity and supply chain need more attention, risk intelligence firm says

    Roughly a third of attacks now use stolen credentials, according to the company’s latest report.

    By Feb. 18, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Data-only extortion grows as ransomware gangs seek better profits

    Businesses should prioritize securing one type of technology in particular, the security firm Arctic Wolf said in a new report.

    By Feb. 17, 2026
  • Image attribution tooltip
    katleho Seisa via Getty Images
    Image attribution tooltip

    Ransomware attacks increase against IT and food sectors

    Social engineering and zero-day vulnerability weaponization are getting faster and easier, two information sharing and analysis centers said in new reports.

    By Feb. 13, 2026
  • cybersecurity hackers cyberattacks IT
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion attacks on the rise as hackers prioritize supply-chain weaknesses

    Consulting firms and manufacturing companies accounted for many of the ransomware victims posted to the dark web in 2025, Intel 471 said.

    By Feb. 11, 2026
  • Solar panels and wind turbines in a desert landscape.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Polish power grid hack offers lessons for critical infrastructure operators, CISA says

    The agency listed several steps businesses could take to prevent similar cyberattacks.

    By Feb. 10, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attacks against education sector slow worldwide

    The U.S. saw the highest number of education-related ransomware attacks in 2025, at 130, despite a 9% decline year over year.

    By Anna Merod • Feb. 6, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Asian government’s espionage campaign breached critical infrastructure in 37 countries

    The victims included national telecommunications firms, finance ministries and police agencies, with most targets suggesting an economic focus, Palo Alto Networks said.

    By Feb. 5, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Feb. 4, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • 2026 background, symbolizing future technologies and innovations in a high-tech environment.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

    A look at the most important trends and issues in cyber this year.

    By Cybersecurity Dive Staff • Jan. 30, 2026
  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

    By Jan. 30, 2026