Threats


  • An aerial view shows large pools of water at a wastewater treatment plant
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Water sector expands partnership with volunteer hackers

    As threats to critical infrastructure grow and government funding stagnates, operators are turning to civic-minded volunteers from the cybersecurity industry.

    By Aug. 14, 2025
  • antitrust enforcement
    Image attribution tooltip
    Douglas Rissing via Getty Images
    Image attribution tooltip

    DOJ, international partners take down BlackSuit group’s infrastructure

    BlackSuit has been among the most prolific ransomware gangs in recent years, targeting government agencies, critical manufacturing companies and healthcare firms.

    By Aug. 11, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Six men stand on a stage. Three men hold an oversized $4 million check made out to "Team Atlanta," while two of the other men flank this trio and pose for a photo with them. The sixth person stands off to the side and applauds.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    DARPA touts value of AI-powered vulnerability detection as it announces competition winners

    The U.S. military research agency hopes to foster a new ecosystem of autonomous vulnerability remediation.

    By Aug. 8, 2025
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Financially motivated cluster a key player in ToolShell exploitation

    Researchers from Palo Alto Networks detail ransomware deployment and malicious backdoors in a campaign against Microsoft SharePoint users.

    By Aug. 8, 2025
  • Three men sit on chairs on a stage. One man gestures with his hands while the other two look at him.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA officials say agency is moving ahead despite workforce purge

    Two senior officials defended the agency’s progress amid concerns about the effects of mass layoffs and budget cuts.

    By Aug. 8, 2025
  • An aerial view shows a series of buildings, parking lots, and highways
    Image attribution tooltip
    Patrick Smith via Getty Images
    Image attribution tooltip

    NSA partnering with cyber firms to support under-resourced defense contractors

    The spy agency has sought out creative ways to help protect small companies supplying the U.S. military.

    By Aug. 7, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    SonicWall says recent attack wave involved previously disclosed flaw, not zero-day

    The company said it had linked recent hacks to customers’ use of legacy credentials when migrating from Gen 6 to Gen 7 firewalls.

    By Aug. 7, 2025
  • A large sign reading "Black Hat" sits in the carpeted foyer of a convention center
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    US still prioritizing zero-trust migration to limit hacks’ damage

    The zero-trust initiative, which gained steam during the Biden administration, is still underway.

    By Updated Aug. 7, 2025
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    SonicWall investigating possible zero-day related to firewall attacks

    Researchers recently warned about a surge in Akira ransomware attacks linked to a potential SonicWall vulnerability.

    By Aug. 5, 2025
  • AI Artificial Intelligence Security, Digital Information Protected Secured Lock
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    AI is helping hackers automate and customize cyberattacks

    CrowdStrike’s annual cyber-threat-hunting report reveals the double threat that AI poses to many businesses.

    By Aug. 4, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    Palo Alto Networks investigating ransomware threat related to SharePoint exploitation

    Researchers said an unidentified hacker demanded a ransom after an intrusion linked to the SharePoint flaw.  

    By Aug. 1, 2025
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Ransomware gangs capitalize on law enforcement takedowns of competitors

    After authorities dismantled LockBit and RansomHub, other groups rushed in to snatch up their affiliates, according to a new report that highlights a cybercrime ecosystem in flux.

    By July 31, 2025
  • he Hawaiian Airlines logo is displayed at a check-in area at Los Angeles International Airport (LAX) on December 4, 2023 in Los Angeles, California.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Industry groups urge vigilance as Scattered Spider evolves tactics

    Information-sharing organizations warned their members that Scattered Spider continues to pose a major threat.

    By July 31, 2025
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    What we know about the cybercrime group Scattered Spider

    The notorious hacker collective has attracted the attention of government authorities in several nations around the globe. 

    By July 30, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

    By July 30, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    FBI, CISA warn about Scattered Spider’s evolving tactics

    International authorities are pursuing the group following the arrests of four suspects in a series of attacks targeting British retailers.

    By July 29, 2025
  • Cyber Security Ransomware
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks against oil and gas firms surge

    Manufacturing remains the No. 1 ransomware target, new data from Zscaler shows.

    By July 29, 2025
  • A businessperson with a generative AI brain concept above his hand
    Image attribution tooltip
    chombosan via Getty Images
    Image attribution tooltip

    Research shows LLMs can conduct sophisticated attacks without humans

    The project, launched by Carnegie Mellon in collaboration with Anthropic, simulated the 2017 Equifax data breach.

    By July 28, 2025
  • Image depicting the digital landscape
    Image attribution tooltip
    Permission granted by ThreatLocker
    Image attribution tooltip
    Sponsored by ThreatLocker

    Emerging cybersecurity needs: What the market is telling us

    Default-deny, strict controls, and real-time monitoring: how to stop threats before they start.

    By Yuriy Tsibere, Product Manager and Business Analyst, ThreatLocker • July 28, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Treasury sanctions North Koreans involved in IT-worker schemes

    Authorities also charged several of the indicted people with attempting to evade U.S. sanctions on North Korea.

    By July 25, 2025
  • The Department of Energy (DOE) sign is seen at its headquarters, the James Forrestal Building, nicknamed the Little Pentagon, in Washington, DC.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    What we know about the Microsoft SharePoint attacks

    State-linked hackers and ransomware groups are targeting SharePoint customers across the globe.

    By July 24, 2025
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Trump AI plan calls for cybersecurity assessments, threat info-sharing

    It remains unclear how federal agencies depleted by layoffs will be able to implement the strategy’s ambitious vision, which includes an ISAC dedicated to AI.

    By July 23, 2025
  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Lapsed CISA contract impedes national lab’s threat-hunting operations

    The CyberSentry program remains operational, according to CISA, with analysts outside the lab continuing to review sensor data.

    By July 23, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft sees China-backed nation-state hackers among adversaries targeting SharePoint

    The company urged customers to apply security updates as security researchers warn of escalating attacks.

    By July 22, 2025
  • legal role in data incident or breach
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks in education jump 23% year over year

    Education was the fourth-most-targeted sector during the first half of 2025, according to a report from Comparitech.

    By Briana Mendez-Padilla • July 22, 2025