Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Water faucet and cup

Internet-exposed HMIs are a risk to water facilities, CISA warns

Jordyn Alger, Managing Editor, Security
Jordyn Alger
December 19, 2024

Water and wastewater system facilities have been urged to secure internet-exposed human-machine interfaces (HMIs).


Read More
Credit card and padlock

5M unique credit and debit cards exposed in data breach

Security Staff
December 19, 2024

The details of 5 million unique credit and debit cards were exposed in a data breach. 


Read More
Laptop on table

Credential phishing attacks rose by 703% in H2 of 2024

Security Staff
December 18, 2024

A new report analyzes scam trends to help organizations prepare for threats in 2025.


Read More
Monitor with coding

Nearly 400,000 WordPress credentials stolen

Jordyn Alger, Managing Editor, Security
Jordyn Alger
December 18, 2024

A threat actor labelled as MUT-1244 has stolen more than 390,000 WordPress credentials. 


Read More
Swirls of orange, yellow, and red on black screen

How businesses can protect themselves from data breaches

Eric Cohen
December 17, 2024

Although PCI compliance isn’t mandated by law, failing to comply with PCI DSS can result in investigations, fines, and penalties.


Read More
Rendered bitcoin

58,000 individuals’ data exposed after Bitcoin ATM operator hack

Jordyn Alger, Managing Editor, Security
Jordyn Alger
December 17, 2024

A United States Bitcoin ATM operator, Byte Federal, recently disclosed a cyber incident. 


Read More
Padlock on laptop with neon lights

27 DDoS-for-hire operations shut down by law enforcement

Jordyn Alger, Managing Editor, Security
Jordyn Alger
December 17, 2024

Law enforcement agencies across 15 countries have shut down 27 DDoS-for-hire operations. 


Read More
Blue digital background that says "2024 Cybersecurity Trends"

5 Cybersecurity trends in 2024

Taelor Sutherland, Associate Editor
Taelor Sutherland
December 16, 2024

2024 has seen a number of cybersecurity incidents, including high-profile cyberattacks and rapidly-developing artificial intelligence (AI).


Read More
Donuts

Security experts respond to Krispy Kreme cyberattack

Jordyn Alger, Managing Editor, Security
Jordyn Alger
December 16, 2024

A cybersecurity incident against Krispy Kreme disrupted its operations, and security leaders are sharing their insights. 


Read More
AI-powered phishing
Cyber Tactics

Combating the rising threat of AI-powered phishing attacks

To combat the rising threat of AI-powered phishing, a comprehensive strategy is crucial.
Pam Nigro headshot
Pam Nigro
December 16, 2024

To combat the rising threat of AI-powered phishing, a comprehensive strategy is crucial.


Read More
Previous 1 2 … 56 57 58 59 60 61 62 63 64 … 714 715 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing