Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cyber attack

Articles Tagged with ''cyber attack''

world-map-with-padlock.jpg

U.S. announces $25M to bolster Costa Rica’s cybersecurity

Security Staff
March 30, 2023

The U.S. and Costa Rica will collaborate on cybersecurity with the U.S. planning to provide $25M to strengthen Costa Rica’s digital infrastructure.


Read More
man-signing-document.jpg

New legislation to enhance N.J. cybersecurity protections

Security Staff
March 24, 2023

Recently signed legislation will require state agencies and government contractors to report cybersecurity incidents within 72 hours of an incident.


Read More
Ferrari-Interior.jpg

Ransomware attack exposed Ferrari customer data

Rachelle BlairFrasier
Rachelle Blair-Frasier
March 22, 2023

Italian car manufacturer Ferrari confirmed this week it was the target of a cyberattack with a ransom demand related to certain client contact details.


Read More
Healthcare-worker-laptop.jpg

Experts warn of healthcare sector cybersecurity risks

Security Staff
March 21, 2023

The healthcare sector continues to face a significant increase in cybersecurity threats putting patients’ lives and personal data at risk. 


Read More
ChatGPT on computer screen.jpg

Will AI replace humans in phishing attacks?

Rachelle BlairFrasier
Rachelle Blair-Frasier
March 17, 2023

Recent research from Hoxhunt analyzed effectiveness of ChatGPT-generated phishing attacks showing people are still better at deceiving other people.


Read More
bank-vault.jpg

Financial services DDoS resilience starts with understanding attack surface

Matthew Andriani
March 14, 2023

The recent attack on Danish Bank shows what can happen when organizations need more awareness of vulnerabilities and evolving DDoS attack surface. 


Read More
cyber security
Cyber Tactics

Reflections on 35 years in the trenches

To stay ahead of our adversaries, cybersecurity leaders must continually innovate and prioritize proactive security.
John McClurg
John McClurg
March 10, 2023

Columnist John McClurg shares lessons learned from his 35-year career as a cybersecurity leader, foregrounding the importance of cyber innovation.


Read More
Cybersecurity & Geopolitical Podcast
The Security Podcasts

1 year of war: From weaponizing Ukraine to Russia's outsourced cyber war

Check out Episode 14 of the Cybersecurity and Geopolitical Podcast.
Security Staff
March 2, 2023

In Episode 14 of the Cybersecurity & Geopolitical Podcast from Security magazine, hosts Ian Thornton-Trump and Philip Ingram assess the Russia-Ukraine conflict.


Read More
green code on black screen

Unauthorized network access most common cause of third-party attacks

Security Staff
February 7, 2023

Black Kite’s annual Third-Party Breach Report was released and examines the impact of third-party cyber breaches, which doubled in 2022.


Read More
Man thinking about money

Just 49% of organizations have funds for current cybersecurity needs

Security Staff
February 6, 2023

Only 49% of organizations have the budget to meet current cybersecurity needs and 11% can protect only their most critical assets, says NISC survey.


Read More
Previous 1 2 … 6 7 8 9 10 11 12 13 14 … 41 42 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing