Threats


  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    What we know about the cybercrime group Scattered Spider

    The notorious hacker collective has attracted the attention of government authorities in several nations around the globe. 

    By July 30, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

    By July 30, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    FBI, CISA warn about Scattered Spider’s evolving tactics

    International authorities are pursuing the group following the arrests of four suspects in a series of attacks targeting British retailers.

    By July 29, 2025
  • Cyber Security Ransomware
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks against oil and gas firms surge

    Manufacturing remains the No. 1 ransomware target, new data from Zscaler shows.

    By July 29, 2025
  • A businessperson with a generative AI brain concept above his hand
    Image attribution tooltip
    chombosan via Getty Images
    Image attribution tooltip

    Research shows LLMs can conduct sophisticated attacks without humans

    The project, launched by Carnegie Mellon in collaboration with Anthropic, simulated the 2017 Equifax data breach.

    By July 28, 2025
  • Image depicting the digital landscape
    Image attribution tooltip
    Permission granted by ThreatLocker
    Image attribution tooltip
    Sponsored by ThreatLocker

    Emerging cybersecurity needs: What the market is telling us

    Default-deny, strict controls, and real-time monitoring: how to stop threats before they start.

    By Yuriy Tsibere, Product Manager and Business Analyst, ThreatLocker • July 28, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Treasury sanctions North Koreans involved in IT-worker schemes

    Authorities also charged several of the indicted people with attempting to evade U.S. sanctions on North Korea.

    By July 25, 2025
  • The Department of Energy (DOE) sign is seen at its headquarters, the James Forrestal Building, nicknamed the Little Pentagon, in Washington, DC.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    What we know about the Microsoft SharePoint attacks

    State-linked hackers and ransomware groups are targeting SharePoint customers across the globe.

    By July 24, 2025
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Trump AI plan calls for cybersecurity assessments, threat info-sharing

    It remains unclear how federal agencies depleted by layoffs will be able to implement the strategy’s ambitious vision, which includes an ISAC dedicated to AI.

    By July 23, 2025
  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Lapsed CISA contract impedes national lab’s threat-hunting operations

    The CyberSentry program remains operational, according to CISA, with analysts outside the lab continuing to review sensor data.

    By July 23, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft sees China-backed nation-state hackers among adversaries targeting SharePoint

    The company urged customers to apply security updates as security researchers warn of escalating attacks.

    By July 22, 2025
  • legal role in data incident or breach
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks in education jump 23% year over year

    Education was the fourth-most-targeted sector during the first half of 2025, according to a report from Comparitech.

    By Briana Mendez-Padilla • July 22, 2025
  • Aerial view of the Jack H. Wilson Water Treatment Plant in Little Rock, Arkansas.
    Image attribution tooltip
    Permission granted by Central Arkansas Water
    Image attribution tooltip
    Deep Dive

    Dwindling federal cyber support for critical infrastructure raises alarms

    A plan to transfer cybersecurity and resilience responsibilities to states could have major unintended consequences.

    By July 22, 2025
  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Top US senator calls out supply-chain risk with DoD contractors

    The Senate Intelligence Committee chairman questioned the security of Microsoft’s “digital escort” arrangement with its Chinese employees.

    By Updated July 18, 2025
  • A sign reading "Department of State" sits outside the U.S. State Department headquarters in Washington, D.C.
    Image attribution tooltip
    Pacheco, Isaac. Retrieved from U.S. Department of State / Flickr.
    Image attribution tooltip

    State Department cyber diplomacy firings and changes threaten US defenses

    Departures and restructuring will make it harder for the agency to pursue global policies that strengthen U.S. critical infrastructure, experts said.

    By July 17, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Khanchit Khirisutchalual via Getty Images
    Image attribution tooltip

    AI-powered attacks rise as CISOs prioritize AI security risks

    Security executives are concerned about flaws in AI agents but also eager to see them replace humans in some roles, according to a new report.

    By July 17, 2025
  • Cyberhackers-Ransomware
    Image attribution tooltip
    (Gorodenkoff) via Getty Images
    Image attribution tooltip

    Scattered Spider expands its roster of tactics in recent hacks

    Microsoft researchers warn they are seeing changing patterns as the cybercrime group has started trying to hack airlines and other industries after targeting retailers and insurers.

    By July 16, 2025
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Catastrophic cyber event could cause widespread disruptions to global infrastructure, study suggests

    The study by Munich Re and CyberCube also warned that the internet of things and large language models present near-term risks.  

    By July 15, 2025
  • A medical team takes a patient into the isolation ward in the emergency department of a full-service acute hospital facility.
    Image attribution tooltip
    Lisa Maree Williams via Getty Images
    Image attribution tooltip

    Risk management, legacy tech pose major threats to healthcare firms, report finds

    Companies have improved their recovery processes and user controls but still lag in risk preparedness, according to the report.

    By July 15, 2025
  • Belk storefront.
    Image attribution tooltip
    Kaarin Vembar/Cybersecurity Dive
    Image attribution tooltip

    DragonForce hackers claim responsibility for Belk data breach

    The North Carolina-based retailer is the latest known victim in a spree of attacks in the U.K. and U.S.

    By July 15, 2025
  • Norfolk Southern train Bellevue Yard Ohio
    Image attribution tooltip

    Retrieved from Norfolk Southern 

    Image attribution tooltip

    Major railroad-signaling vulnerability could lead to train disruptions

    The high-severity flaw could let a hacker abruptly halt — and potentially derail — a train.

    By Updated July 14, 2025
  • A hand with a phone in it and laptop in frame.
    Image attribution tooltip

     

    Shutterstock / TippaPatt

    Image attribution tooltip

    Businesses are overconfident as mobile phishing scams surge

    Nearly six in 10 companies experienced incidents because of voice or text phishing attacks that led to executive impersonation, according to a new report from Lookout.

    By July 11, 2025
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Ingram Micro restores global operations following hack

    The company is still assessing the full impact of the ransomware attack, which has been linked to the SafePay hacker group.

    By July 10, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    UK authorities arrest 4 people in probe of retail cyberattack spree

    The arrests mark the first major break in a case linked to the Scattered Spider cybercrime group, although additional work continues with multiple agencies.

    By Updated July 10, 2025
  • An Iranian flag hangs on the side of a damaged building
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Iran-linked hackers target US transportation, manufacturing firms

    U.S. authorities have been warning of potential state-linked or hacktivist threats since the country intervened in the Israel-Iran war.

    By July 9, 2025