Breaches


  • An aerial view of the Workday building
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Hackers target Workday in social engineering attack

    Researchers cite increasing evidence of collaboration between Scattered Spider and the cybercrime group ShinyHunters in the campaign.

    By Aug. 19, 2025
  • Generic java programming code written on black.
    Image attribution tooltip
    funky-data via Getty Images
    Image attribution tooltip

    Developers knowingly push vulnerable code, despite growing breach risk

    Only three in 10 respondents said their application security programs were highly mature.

    By Aug. 15, 2025
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler flaws lead to critical infrastructure breaches

    Dutch authorities said hackers penetrated several critical infrastructure providers, in a warning sign for vulnerable organizations elsewhere.

    By Updated Aug. 12, 2025
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Financially motivated cluster a key player in ToolShell exploitation

    Researchers from Palo Alto Networks detail ransomware deployment and malicious backdoors in a campaign against Microsoft SharePoint users.

    By Aug. 8, 2025
  • AI Artificial Intelligence Security, Digital Information Protected Secured Lock
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    AI is helping hackers automate and customize cyberattacks

    CrowdStrike’s annual cyber-threat-hunting report reveals the double threat that AI poses to many businesses.

    By Aug. 4, 2025
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Ransomware gangs capitalize on law enforcement takedowns of competitors

    After authorities dismantled LockBit and RansomHub, other groups rushed in to snatch up their affiliates, according to a new report that highlights a cybercrime ecosystem in flux.

    By July 31, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

    By July 30, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    FBI, CISA warn about Scattered Spider’s evolving tactics

    International authorities are pursuing the group following the arrests of four suspects in a series of attacks targeting British retailers.

    By July 29, 2025
  • Cyber Security Ransomware
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks against oil and gas firms surge

    Manufacturing remains the No. 1 ransomware target, new data from Zscaler shows.

    By July 29, 2025
  • The logo of Allianz stands on two office buildings.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Allianz Life discloses massive data breach linked to supply-chain attack

    The intrusion comes amid a wave of recent social-engineering attacks targeting the insurance sector and other industries.

    By July 28, 2025
  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Philadelphia Indemnity Insurance discloses June data breach

    The regulatory filing follows a wave of hacks against the industry that researchers have linked to Scattered Spider.

    By July 25, 2025
  • Bottles of Clorox bleach on a supermarket shelf.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Clorox files $380 million suit blaming Cognizant for 2023 cyberattack

    The attack, linked to Scattered Spider, disrupted production of household cleaners and other goods.

    By July 23, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    SharePoint hacking campaign affects hundreds of systems worldwide

    CISA is responding to potential compromises at federal agencies and various state and local entities.

    By Updated July 23, 2025
  • legal role in data incident or breach
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks in education jump 23% year over year

    Education was the fourth-most-targeted sector during the first half of 2025, according to a report from Comparitech.

    By Briana Mendez-Padilla • July 22, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Khanchit Khirisutchalual via Getty Images
    Image attribution tooltip

    AI-powered attacks rise as CISOs prioritize AI security risks

    Security executives are concerned about flaws in AI agents but also eager to see them replace humans in some roles, according to a new report.

    By July 17, 2025
  • A white tractor-trailer in front of a red brick building.
    Image attribution tooltip
    Sam Silverstein/Cybersecurity Dive
    Image attribution tooltip

    UNFI expects cyberattack to cost it at least $350 million in sales

    Operations at the grocery distributor, whose customers include Whole Foods, have largely returned to normal, the company said.

    By Sam Silverstein • July 16, 2025
  • Belk storefront.
    Image attribution tooltip
    Kaarin Vembar/Cybersecurity Dive
    Image attribution tooltip

    DragonForce hackers claim responsibility for Belk data breach

    The North Carolina-based retailer is the latest known victim in a spree of attacks in the U.K. and U.S.

    By July 15, 2025
  • An Iranian flag hangs on the side of a damaged building
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Iran-linked hackers target US transportation, manufacturing firms

    U.S. authorities have been warning of potential state-linked or hacktivist threats since the country intervened in the Israel-Iran war.

    By July 9, 2025
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    SEC seeks SolarWinds settlement in reversal for agency under new leadership

    The decision by the commission, now under Republican control, could reshape the landscape of corporate accountability for cyber incidents.

    By July 7, 2025
  • Exterior of grocery story with sign
    Image attribution tooltip
    Sam Silverstein/Cybersecurity Dive
    Image attribution tooltip

    Ahold Delhaize USA says cyberattack exposed personal data of 2M people

    The intruders who gained access to the grocer’s online systems in November had access to information including birthdays, Social Security numbers and bank account details.

    By Sam Silverstein • July 1, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    US authorities unmask North Korean IT worker schemes and their American accomplices

    Federal officials said businesses should carefully verify the identities of remote employees to avoid falling prey to similar scams.

    By June 30, 2025
  • A single opened padlock glows red among rows of closed blue padlocks.
    Image attribution tooltip
    JuSun via Getty Images
    Image attribution tooltip

    Data breach at healthcare services firm Episource affects 5.4M

    The incident, one of the largest breaches reported to federal regulators this year, came after a cybercriminal accessed data on the company’s computer systems over the winter.

    By Emily Olsen • June 30, 2025
  • Grocery store cooler with empty space.
    Image attribution tooltip
    Sam Silverstein/Cybersecurity Dive
    Image attribution tooltip

    United Natural Foods says cyberattack will reduce quarterly earnings

    The company, which supplies Whole Foods and other grocery stores nationwide, had to disable electronic ordering systems while responding to the attack earlier this month.

    By June 27, 2025
  • A pedestrian walks by a sign posted in front of an AT&T store.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Judge approves AT&T’s $177M data breach settlement

    The settlement, which has received preliminary clearance, now awaits a December hearing for final approval.

    By Alexei Alexis • June 25, 2025
  • Steelmaker Nucor restores operations, confirms limited data breach

    The steel products giant said it does not expect the cyberattack to have a material impact on its operations.

    By June 23, 2025