Hackers/page/15 news and trends

The Cyber Insecurity List: Why Hackers Are Logging in, Not Breaking In
Cybersecurity // April 20, 2026

Cybercriminals ranging from state actors to industrialized ransomware syndicates are converging on the same strategic truth: the shortest path into a target is often through the digital relationships that help the target function. Get the Full Story Complete the form to unlock this article and...

Faster AI Hacks Spark OpenAI-Anthropic Rift
Cybersecurity // April 15, 2026

The debate about what artificial intelligence (AI) can do is over. This week, Anthropic and OpenAI each answered the question. The answers landed very differently. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content...

Cybersecurity’s Hottest New Job Is Negotiating With Hackers
Cybersecurity // April 13, 2026

In the escalating cybersecurity arms race, the enterprise’s most valuable asset may no longer be its defense perimeter but rather someone who knows how to talk to the hackers. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access...

The Cybersecurity Hit List: From Enterprise AI to Compromised Coffee Machines
Cybersecurity // April 06, 2026

Bad actors love a good opportunity. And the enterprise cybersecurity landscape has given them several in just the past few days. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins...

Interviews & Exclusives
Faster AI Hacks Spark OpenAI-Anthropic Rift

April 15, 2026
The debate about what artificial intelligence (AI) can do is over. This week, Anthropic and OpenAI each answered the question. The answers landed very differently. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, […]

Cybersecurity’s Hottest New Job Is Negotiating With Hackers

April 13, 2026
In the escalating cybersecurity arms race, the enterprise’s most valuable asset may no longer be its defense perimeter but rather someone who knows how to talk to the hackers. Get...

Fake Invoices Hit 47% of Mid-Market Companies in the Past Year

December 17, 2025
An attack that begins with a trusted vendor rather than a masked hacker is becoming one of the most persistent risks facing medium-sized companies in the United States. Get the...

When Partners Become Cybersecurity Risks

August 27, 2025
When the British retailer Marks & Spencer (M&S) disclosed last year that a supplier breach had unleashed a ransomware attack, it was the kind of nightmare scenario every corporate board...

Quick Reads
$3.5 Million Volo Hack Deepens DeFi’s Security Problem

April 22, 2026
Another decentralized finance (DeFi) protocol has been the target of a hack. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By completing this form, you agree to receive marketing communications from […]

FBI Classifies Breach of Its Networks as Major Incident

April 03, 2026
The Federal Bureau of Investigation (FBI) has classified a breach of its networks as a “major incident,” Bloomberg reported Thursday (April 2). Get the Full Story Complete the form to...

US and Global Law Enforcement Shut Down LeakBase Hackers Forum

March 04, 2026
The Justice Department announced the seizure of what it called one of the world’s largest hacker forums. Get the Full Story Complete the form to unlock this article and enjoy unlimited free...

Google Battles Worldwide Network of China-Linked Hackers

February 25, 2026
Google has reportedly disrupted a hacking group that breached dozens of organizations in 42 countries. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access...