Phishing remains the preferred technique among threat actors Security Staff February 19, 2025 Phishing is the preferred technique among threat actors, according to a new report.Read More
US agencies and defense contractors infected with infostealing malware Jordyn Alger February 19, 2025 Active infostealer infections have been found within U.S. agencies and defense contractors. Read More
76% of security leaders plan to increase their security budgets in 2025 Security Staff February 19, 2025 A CDG report found that 92% of IT professionals stated they had some degree of confidence in their ability to meet compliance requirements.Read More
Ransomware attack hits 5 Michigan casinos, shuts them down Security Staff February 18, 2025 Casinos in Michigan were targeted by a ransomware attack. Read More
Super Bowl Sunday saw a 57% rise in malicious gambling content Security Staff February 18, 2025 A recent cybersecurity report by DNSFilter found that Super Bowl Sunday saw a 57% rise in malicious gambling and betting content. Read More
The Change Healthcare breach: What changed, what didn’t, and what must Kel Pults February 18, 2025 One year after the Change Healthcare breach, it’s time to look at what changed, what didn’t, and what must. Read More
Cyber incident response in 2025: Rising risks and dynamic challenges Matt Cullina February 18, 2025 In 2025, business security professionals will likely face three significant trends shaping the way cyber incidents are managed.Read More
5 Minutes With Understanding the value and practicality of cyber insurance Jordyn Alger February 17, 2025 Security magazine talks with Nick Kathmann, CISO at LogicGate, about the value of cyber insurance for organizations. Read More
The top 4 unmanaged apps are AI-driven Security Staff February 17, 2025 A recent Torii report analyzed how businesses are managing a rise in "shadow IT" and artificial intelligence (AI) driven tools. Read More
6 tips to ace security posture in higher education Doug Thompson February 17, 2025 Education institutions, just like any business or organization, need to pay careful attention to their cybersecurity posture and that of the third parties they work with.Read More