Page 2


  • Chairman of the Joint Chiefs of Staff Air Force Gen. Dan Caine discusses the mission details of a strike on Iran during a news conference at the Pentagon on June 22, 2025 in Arlington, Virginia. U.S. President Donald Trump gave an address to the nation last night after three Iranian nuclear facilities were struck by the U.S. military.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    DHS warns of heightened cyber threat as US enters Iran conflict

    Federal officials are warning that pro-Iran hacktivists or state-linked actors may target poorly secured U.S. networks.

  • Aflac duck at awards ceremony
    Image attribution tooltip
    John Lamparski/WireImage via Getty Images
    Image attribution tooltip

    Aflac discloses cyber intrusion linked to wider crime spree targeting insurance industry

    The breach marks the latest in a series of recent attacks linked to cybercrime group Scattered Spider.

    Updated June 20, 2025
  • Amy Herzog on stage speaking during a conference
    Image attribution tooltip
    Permission granted by AWS
    Image attribution tooltip

    AWS CISO stumps for security as an AI enabler

    AI’s rapid development underscores the need for secure foundations, Amy Herzog said Tuesday during the company’s annual cybersecurity conference.

  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Researchers urge vigilance as Veeam releases patch to address critical flaw

    The patch for a previously disclosed vulnerability in the company’s backup software did not offer adequate protection, according to researchers.

  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    Critical Zyxel vulnerability under active exploitation after long period of quiet

    Researchers say a sudden burst of activity could be linked to a Mirai botnet variant.

  • An attendee passes an AWS logo on a escalator at the AWS re:Invent 2024 conference hosted at in Las Vegas on December 3, 2024.
    Image attribution tooltip
    Noah Berger / Stringer via Getty Images
    Image attribution tooltip

    Cloud storage buckets leaking secret data despite security improvements

    New data from Tenable highlighted significant improvements in the number of businesses with publicly exposed and critically vulnerable buckets storing sensitive data.

  • New cars J.D. Power
    Image attribution tooltip
    Shaunl via Getty Images
    Image attribution tooltip

    FTC reminds car dealers to protect customer data

    The commission described how recently updated federal regulations affect dealerships — and their vendors.

    Updated June 17, 2025
  • Businessman with protective hands gesture and insurance icons.
    Image attribution tooltip
    Galeanu Mihai via Getty Images
    Image attribution tooltip

    Threat group linked to UK, US retail attacks now targeting insurance industry

    The warning from Google researchers follows a recent incident at Erie Insurance, although the perpetrators of that attack have not been identified.

  • Fire and smoke arise after an attack on the Shahran oil depot in Tehran, Iran on June 15, 2025.
    Image attribution tooltip
    Stringer via Getty Images
    Image attribution tooltip

    US critical infrastructure could become casualty of Iran-Israel conflict

    Researchers warn that Iran-aligned threat groups could soon target U.S. companies and individuals in cyber espionage or sabotage attacks.

  • an executive in business attire
    Image attribution tooltip
    simon2579 via Getty Images
    Image attribution tooltip

    Cyberattacks top list of global business concerns, Kroll finds

    Many companies feel unprepared to comply with global privacy and security rules, according to the advisory firm’s annual business sentiment survey.

  • SEC seal outside Washington D.C. building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    SEC scraps proposed cybersecurity rules for investment advisers, market participants

    The commission offered no rationale for removing rules that would have imposed security requirements on financial services providers.

    Updated June 16, 2025
  • Remote software
    Image attribution tooltip
    Courtesy of Remote
    Image attribution tooltip

    CISA warns of supply chain risks as ransomware attacks exploit SimpleHelp flaws

    The latest confirmed cyber intrusion hit a utility billing software provider and its customers.

  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Software vulnerabilities pile up at government agencies, research finds

    A Veracode report reveals that government networks have accumulated years of unresolved security flaws, putting them at serious risk of exploitation.

  • Microsoft CEO Satya Nadella speaks during the OpenAI DevDay event on November 06, 2023 in San Francisco, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Critical flaw in Microsoft Copilot could have allowed zero-click attack

    Researchers said the vulnerability, dubbed “EchoLeak,” could allow a hacker to access data without any specific user interaction.

    Updated June 11, 2025
  • An IT professional works at a computer next to colleagues.
    Image attribution tooltip
    Courtesy of Johnson Controls
    Image attribution tooltip

    How AI agents could revolutionize the SOC — with human help

    AI agents aren’t foolproof, but they could soon replace some of the most common tasks for cyber defenders.

  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Global law-enforcement operation targets infostealer malware

    Authorities in three countries arrested 32 people and seized dozens of servers.

  • Full UNFI truck parked on the street
    Image attribution tooltip
    Peyton Bigora/Cybersecurity Dive
    Image attribution tooltip

    UNFI’s operations remain hobbled following cyberattack

    The grocery company had to entirely shut down its network following the intrusion and is serving customers on only a “limited basis” as it works to recover, CEO Sandy Douglas said.

  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Khanchit Khirisutchalual via Getty Images
    Image attribution tooltip

    From malware to deepfakes, generative AI is transforming attacks

    Generative AI is even helping hackers trick open-source developers into using malicious code, according to Gartner.

  • A general view of the exterior of the branch of retailer Marks and Spencer at Westfield White City on October 20, 2020 in London, England. Marks & Spencer said customer data was accessed in an April 2025 cyberattack.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Marks & Spencer restores some online-order operations following cyberattack

    The department store chain six weeks ago was one of the first targets in an international spree of attacks disrupting retailers.

  • UNFI
    Image attribution tooltip
    Courtesy of United Natural Foods, Inc.
    Image attribution tooltip

    Main distributor to Whole Foods hit by cyberattack

    UNFI, a grocery retailer and wholesaler, is working to resume full operations following “unauthorized activity” involving its IT systems.

  • Header image for "Financial Industry is Third-Most Targeted By Hackers"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    SentinelOne rebuffs China-linked attack — and discovers global intrusions

    The security firm said the operatives who tried to breach it turned out to be responsible for cyberattacks on dozens of critical infrastructure organizations worldwide.

    Updated June 9, 2025
  • A general view of the exterior of the branch of retailer Marks and Spencer at Westfield White City on October 20, 2020 in London, England. Marks & Spencer said customer data was accessed in an April 2025 cyberattack.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Scattered Spider targeting MSPs, IT vendors in social engineering campaigns

    The same group is believed to be behind a wave of attacks against retailers in the UK, the US and elsewhere.

  • Board members
    Image attribution tooltip
    AnnaStills via Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to create a compelling SOC narrative for executives

    Focus on financial impact, efficiency and risk management to ensure informed cybersecurity investment decisions. 

  • President Donald Trump waves to a crowd at the White House on April 2, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump scraps Biden software security, AI, post-quantum encryption efforts in new executive order

    The White House accused the Biden administration of trying to “sneak problematic and distracting issues into cybersecurity policy.” 

  • People walk by an Adidas storefront.
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    Data security is a CX issue, too

    A string of cyberattacks have targeted retailers like Adidas and North Face. Incidents like these can weaken customer trust and lead to lost business, experts say.