Threats


  • Image attribution tooltip
    katleho Seisa via Getty Images
    Image attribution tooltip

    Ransomware attacks increase against IT and food sectors

    Social engineering and zero-day vulnerability weaponization are getting faster and easier, two information sharing and analysis centers said in new reports.

    By Feb. 13, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA will shutter some missions to prioritize others

    The agency has lost roughly one-third of its workforce since January 2025.

    By Updated 15 hours ago
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA seeks infrastructure sector consultation on incident reporting rule

    The agency is particularly interested in feedback on several aspects of the long-awaited regulation.

    By Feb. 12, 2026
  • CFOs play a key role in advocating for preventative cybersecurity actions that help reduce the cost of cyber risks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SmarterMail facing widespread attacks targeting critical flaws

    The business email and collaboration software is being exploited for potential ransomware.

    By Feb. 12, 2026
  • Programming code abstract technology background of software developer and Computer script
    Image attribution tooltip

    shutterstock.com/whiteMocca

    Image attribution tooltip
    Sponsored by 10KMedia

    The Future of DAST in an AI-First World: Why Runtime Security Testing Remains Critical

    Runtime validation is where the gap is widening—and where this shift creates the biggest leap forward.

    By Joni Klippert, CEO of StackHawk • Feb. 12, 2026
  • cybersecurity hackers cyberattacks IT
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion attacks on the rise as hackers prioritize supply-chain weaknesses

    Consulting firms and manufacturing companies accounted for many of the ransomware victims posted to the dark web in 2025, Intel 471 said.

    By Feb. 11, 2026
  • Solar panels and wind turbines in a desert landscape.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Polish power grid hack offers lessons for critical infrastructure operators, CISA says

    The agency listed several steps businesses could take to prevent similar cyberattacks.

    By Feb. 10, 2026
  • One of the entrances to the Federal Trade Commission Building in Washington, DC, that serves as the headquarters of the Federal Trade Commission (FTC).
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    FTC data highlights online threats to consumers and businesses

    The commission listed several steps companies can take to fend off attacks.

    By Feb. 9, 2026
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attacks against education sector slow worldwide

    The U.S. saw the highest number of education-related ransomware attacks in 2025, at 130, despite a 9% decline year over year.

    By Anna Merod • Feb. 6, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to disconnect unsupported network edge devices

    The government is worried about hackers accessing systems through insecure and poorly monitored routers, firewalls and similar equipment at the network perimeter.

    By Feb. 5, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Asian government’s espionage campaign breached critical infrastructure in 37 countries

    The victims included national telecommunications firms, finance ministries and police agencies, with most targets suggesting an economic focus, Palo Alto Networks said.

    By Feb. 5, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Feb. 4, 2026
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    React2Shell exploitation undergoes significant change in threat activity

    Researchers see a sudden consolidation of source IPs since late January.

    By Updated Feb. 4, 2026
  • Two men and a woman sit on an event stage in front of a blue backdrop that displays the name of the event and its organizer
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI-ISAC inches forward under Trump administration

    The U.S. government is exploring different options for how the information-sharing organization should work, an official said.

    By Feb. 3, 2026
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ShinyHunters escalates tactics in extortion campaign linked to Okta environments

    Researchers are tracking multiple clusters that are using social engineering to gain access to victims.

    By Feb. 2, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • Man used a desktop and on a call
    Image attribution tooltip
    Violeta Stoimenova via Getty Images
    Image attribution tooltip
    Sponsored by Modulate

    Voice channels are the next major attack vector that security teams can’t monitor

    Deepfake voices, live fraud, zero visibility: why voice channels are the next security blind spot.

    By Mike Pappas, CEO & Co-founder, Modulate • Feb. 2, 2026
  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

    By Jan. 30, 2026
  • Jaguar Land Rover Assembly Line for at Halewood in the U.K.
    Image attribution tooltip
    Courtesy of Jaguar Land Rover
    Image attribution tooltip
    Deep Dive

    Manufacturers fortify cyber defenses in response to dramatic surge in attacks

    IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.

    By , Jan. 29, 2026
  • Hooded hacker sits in front of computer screens.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, security researchers warn FortiCloud SSO flaw is under attack

    The exploitation activity comes weeks after a similar authentication bypass vulnerability was found.

    By Jan. 29, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

    By Jan. 27, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime group claims credit for voice phishing attacks

    Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.

    By Updated Jan. 27, 2026
  • Man using a laptop at work
    Image attribution tooltip
    Morsa Images via Getty Images
    Image attribution tooltip
    Sponsored by Cisco Duo

    Top 3 factors for selecting an identity access management tool

    Identity and access management (IAM) ensures that people and entities with digital identities have the right level of access to your enterprise resources.

    Jan. 26, 2026
  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    5 cybersecurity trends to watch in 2026

    Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market.

    By Jan. 23, 2026
  • Multiple padlocks encircled by white, on a blue surface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT teams aren’t equipped to stop rogue AI agents

    Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.

    By James Anderson • Jan. 22, 2026