The Latest

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA’s Joint Cyber Defense Collaborative takes major personnel hit

    JCDC’s troubles add to the woes of the already-depleted CISA, which could lose even more personnel as additional contracts with private companies expire.

  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    What we know about the cybercrime group Scattered Spider

    The notorious hacker collective has attracted the attention of government authorities in several nations around the globe. 

  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    FBI, CISA warn about Scattered Spider’s evolving tactics

    International authorities are pursuing the group following the arrests of four suspects in a series of attacks targeting British retailers.

  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

  • Cyber Security Ransomware
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks against oil and gas firms surge

    Manufacturing remains the No. 1 ransomware target, new data from Zscaler shows.

  • A businessperson with a generative AI brain concept above his hand
    Image attribution tooltip
    chombosan via Getty Images
    Image attribution tooltip

    Research shows LLMs can conduct sophisticated attacks without humans

    The project, launched by Carnegie Mellon in collaboration with Anthropic, simulated the 2017 Equifax data breach.

  • The logo of Allianz stands on two office buildings.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Allianz Life discloses massive data breach linked to supply-chain attack

    The intrusion comes amid a wave of recent social-engineering attacks targeting the insurance sector and other industries.

  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Treasury sanctions North Koreans involved in IT-worker schemes

    Authorities also charged several of the indicted people with attempting to evade U.S. sanctions on North Korea.

  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Philadelphia Indemnity Insurance discloses June data breach

    The regulatory filing follows a wave of hacks against the industry that researchers have linked to Scattered Spider.

  • The Department of Energy (DOE) sign is seen at its headquarters, the James Forrestal Building, nicknamed the Little Pentagon, in Washington, DC.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    What we know about the Microsoft SharePoint attacks

    State-linked hackers and ransomware groups are targeting SharePoint customers across the globe.

  • Senators push CISA director nominee on election security, agency focus

    Sean Plankey said he would double down on CISA’s core mission and “allow the operators to operate.”

  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Trump AI plan calls for cybersecurity assessments, threat info-sharing

    It remains unclear how federal agencies depleted by layoffs will be able to implement the strategy’s ambitious vision, which includes an ISAC dedicated to AI.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    SharePoint hacking campaign affects hundreds of systems worldwide

    CISA is responding to potential compromises at federal agencies and various state and local entities.

    Updated July 23, 2025
  • Bottles of Clorox bleach on a supermarket shelf.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Clorox files $380 million suit blaming Cognizant for 2023 cyberattack

    The attack, linked to Scattered Spider, disrupted production of household cleaners and other goods.

  • Aerial view of the Jack H. Wilson Water Treatment Plant in Little Rock, Arkansas.
    Image attribution tooltip
    Permission granted by Central Arkansas Water
    Image attribution tooltip
    Deep Dive

    Dwindling federal cyber support for critical infrastructure raises alarms

    A plan to transfer cybersecurity and resilience responsibilities to states could have major unintended consequences.

  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Lapsed CISA contract impedes national lab’s threat-hunting operations

    The CyberSentry program remains operational, according to CISA, with analysts outside the lab continuing to review sensor data.

  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft sees China-backed nation-state hackers among adversaries targeting SharePoint

    The company urged customers to apply security updates as security researchers warn of escalating attacks.

  • a microsoft storefront in a city nightscape
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft, CISA warn of cyberattacks targeting on-premises SharePoint servers

    The flaw has already led to widespread compromises prior to Microsoft’s release of an emergency patch.

    Updated July 21, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    How IT leaders infuse cyber hygiene into daily work

    For technology chiefs, a “do as I say, not as I do” stance could lead to a security breach. Instead, cyber awareness can be taught by example.

  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Top US senator calls out supply-chain risk with DoD contractors

    The Senate Intelligence Committee chairman questioned the security of Microsoft’s “digital escort” arrangement with its Chinese employees.

    Updated July 18, 2025
  • A sign reading "Department of State" sits outside the U.S. State Department headquarters in Washington, D.C.
    Image attribution tooltip
    Pacheco, Isaac. Retrieved from U.S. Department of State / Flickr.
    Image attribution tooltip

    State Department cyber diplomacy firings and changes threaten US defenses

    Departures and restructuring will make it harder for the agency to pursue global policies that strengthen U.S. critical infrastructure, experts said.

  • a headshot of mark ryland in business attire
    Image attribution tooltip
    Permission granted by Amazon
    Image attribution tooltip
    Q&A

    Amazon’s director of security on locking down enterprise AI

    "We've seen hype cycles before, but this one is a little different," Mark Ryland, director of security at Amazon, told CIO Dive.

  • Ransomware Data Breach Protection Cyber Security Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Researchers warn of cyberattacks targeting key Fortinet software

    Experts urged Fortinet customers to immediately apply patches or disable the affected administrative interface.

    Updated July 18, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Khanchit Khirisutchalual via Getty Images
    Image attribution tooltip

    AI-powered attacks rise as CISOs prioritize AI security risks

    Security executives are concerned about flaws in AI agents but also eager to see them replace humans in some roles, according to a new report.

  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Threat actor targets end-of-life SonicWall SMA 100 appliances in ongoing campaign

    The hacker has deployed a backdoor to modify the boot process and has exploited several different vulnerabilities during the attack spree.