Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Computer with binary code hovering nearby

Vulnerability in Public Repository Could Enable Hijacked LLM Responses

Jordyn Alger, Managing Editor, Security
Jordyn Alger
June 20, 2025

Research reveals a CVSS 8.8 vulnerability, and security leaders are sharing their thoughts. 


Read More
Scania truck

Transport Solution Company Scania Confirms Cybersecurity Incident

Jordyn Alger, Managing Editor, Security
Jordyn Alger
June 19, 2025

Scania, a transport solution organization, has confirmed it faced a cybersecurity incident. 


Read More
Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

Jordyn Alger, Managing Editor, Security
Jordyn Alger
June 19, 2025

Scattered Spider, who is believed to be responsible for several cyberattacks against the retail sector in recent months, has apparently shifted targets to the insurance sector. 


Read More
Phone with message icon

Social Engineering Attacks: What You Need to Know

Lakhani headshot
Riaz Lakhani
June 19, 2025

Fighting back against social engineering requires security teams to understand how AI is reshaping these threats.


Read More
5 Minutes with Bhavsar
5 Minutes With

How Critical Infrastructure Is Becoming the First AI Trust Battleground

Jordyn Alger, Managing Editor, Security
Jordyn Alger
June 18, 2025

Security magazine talks with Vrajesh Bhavsar, CEO of Operant, about the importance of infrastructure-level protection. 


Read More
Laptop

New Research: Multi-Stage Malware Attack on Python Package Index Discovered

Jordyn Alger, Managing Editor, Security
Jordyn Alger
June 18, 2025

Researchers have discovered that the Python Package Index (PyPI) has a malicious package in its repository.


Read More
The Washington Post newspaper

Washington Post Journalists Targeted in Cyberattack

Jordyn Alger, Managing Editor, Security
Jordyn Alger
June 17, 2025

The Washington Post was the subject of a cyberattack. 


Read More
Aerial image of neighborhood

170,000 Records Exposed in Real Estate Investment and Management Database

Security Staff
June 17, 2025

Research has identified an unencrypted, non-password-protected database containing 170,360 records.


Read More
Rendered shopping cart with boxes and bags

Autonomous Shopping Agents Bring Innovation — and New Security Risks

White headshot
James White
June 17, 2025

It is only a matter of time until empowered AI agents routinely browse, select and buy goods online without step-by-step human intervention.


Read More
Coding

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds

Jordyn Alger, Managing Editor, Security
Jordyn Alger
June 16, 2025

The Fog ransomware group utilizes an uncommon toolset, including open-source pentesting utilities and an employee monitoring software. 


Read More
Previous 1 2 … 33 34 35 36 37 38 39 40 41 … 728 729 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing