The Latest

  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Federal pivot on software security oversight could complicate vendor strategies

    Software companies cheered the elimination of a government-wide attestation mandate. What comes next could be messy.

  • Man used a desktop and on a call
    Image attribution tooltip
    Violeta Stoimenova via Getty Images
    Image attribution tooltip
    Sponsored by Modulate

    Voice channels are the next major attack vector that security teams can’t monitor

    Deepfake voices, live fraud, zero visibility: why voice channels are the next security blind spot.

  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI tools break quickly, underscoring need for governance

    In a new report, the security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.

  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Corporate workers lean on shadow AI to enhance speed

    A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk.

    Updated Jan. 28, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime group claims credit for voice phishing attacks

    Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.

    Updated Jan. 27, 2026
  • CISA Director Jen Easterly speaking at RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Federal agencies abruptly pull out of RSAC after organizer hires Easterly

    The decision fits a pattern of government withdrawal from the cybersecurity community under the Trump administration.

  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    5 cybersecurity trends to watch in 2026

    Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market.

  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST is rethinking its role in analyzing software vulnerabilities

    As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.

  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Acting CISA chief defends workforce cuts, declares agency ‘back on mission’

    Lawmakers in both parties expressed concerns about CISA losing roughly a thousand employees.

  • Multiple padlocks encircled by white, on a blue surface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT teams aren’t equipped to stop rogue AI agents

    Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.

  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    LastPass warns backup request is phishing campaign in disguise

    Customers received deceptive emails over the holiday weekend claiming the company was doing maintenance.

    Updated Jan. 23, 2026
  • Two businesspeople -- one holding a calculator, the other with clasped hands -- sit facing each other at a table.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CFOs, CISOs clash over cybersecurity spending as threats mount: Expel

    Four in 10 finance leaders said quantified risk reduction would make it easier to justify a cybersecurity spending hike.

  • UK authorities are warning about pro-Russia hacktivists targeting critical infrastructure and local governments in a January 2026 advisory.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UK authorities warn of pro-Russia groups targeting critical infrastructure, local government

    The alert comes just over a month after a joint advisory from CISA, the FBI and Western allies citing hacktivist activity against OT providers. 

  • a high contrast image of two executives in a boardroom
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CEOs and CISOs differ on AI’s security value and risks

    A new report also found that American executives are more bullish on AI's potential than their British counterparts.

  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in Fortinet FortiSIEM targeted in exploitation threat

    Researchers originally disclosed the vulnerability in August 2025, however, a proof of concept and an advisory were just released.

  • Transmission towers against a dark sky
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US and allies collaborate on operational technology security guidance

    A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.

  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in AWS Console risked compromise of build environment

    The CodeBreach vulnerability could have enabled a massive supply chain attack, researchers warn.

    Updated Jan. 15, 2026
  • A desk holds a mouse, a keyboard, and two computer screens with black wallpaper and the Department of Homeland Security logo
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    DHS prepares replacement for critical infrastructure collaboration framework

    It remains unclear if the new system will include liability protections that companies say are necessary.

  • Businessman pointing at risk management concept on screen
    Image attribution tooltip
    guvendemir
    Image attribution tooltip

    AI surges among top business risk concerns, while cybersecurity holds firm

    A report from Allianz Commercial shows the rapid embrace of AI is posing new challenges for enterprise leaders.

  • Trump resubmits Sean Plankey for CISA director

    It’s unclear when the Senate will act on Plankey’s nomination, which stalled last year after multiple senators blocked it.

  • A clinical operating room with two medical professionals; one seated at a robotic surgery console and the other standing next to a patient covered in blue drapes with robotic arms positioned above.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Healthcare breaches double as shadow AI, vendor risks proliferate

    A new report paints a picture of a sector with limited confidence in its defensive capabilities.

  • Business person uses software tool to help with tracking business performance.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of hedge funds boosted cybersecurity spending in 2025

    About half of firms suffered a breach, and a large percentage cited third-party risks.

  • A digital map of the globe
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Executives worry most about cyber-enabled fraud, geopolitics and AI

    The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.

  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    Critical vulnerability found in n8n workflow automation platform

    The open-source platform is widely used across enterprise environments, leaving thousands of instances at risk.

  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    CISA’s 7 biggest challenges in 2026

    From infrastructure protection to improving morale, the cybersecurity agency has a lot on its plate — and it still lacks a leader.