Events
Schedule
Become a Sponsor
Become a Speaker
FAQ
News
Webcasts
Remote Sessions
eSummits
Podcast
About Us
Contact Us
Testimonials
Themes
Press Room
Privacy Policy
Subscribe
SecureWorld News
Web Conference
Ransomware: Breaking the Criminal Business Model
Wednesday, June 22, 2016
10 AM PDT
Web Conference
Ransomware: Breaking the Criminal Business Model
Wednesday, June 22, 2016
10 AM PDT
Web Conference
Ransomware: Breaking the Criminal Business Model
Wednesday, June 22, 2016
10 AM PDT
Original Content
Curated News
Featured Authors
Filter By Keyword Topic
View All
Cybersecurity
Vulnerabilities
Privacy
Data Breach
GRC
Internet of Things
From Our News Team
Malware
Mobile Security
Technology
Hackers
Apple
vulnerabilities artificial-intelligence zero-trust saas
The Growing Cybersecurity Risks Behind Third-Party SaaS Integrations
Mon | Dec 15, 2025 | 7:00 AM PST
by
Alex Tray
Alex Tray is a system administrator with 10 years of experience in the IT field....
cybersecurity trends
The Stories that Shaped Cybersecurity in 2025: SecureWorld's 10 Most-Read Headlines of the Year
Thu | Dec 11, 2025 | 9:50 AM PST
career-development skills-gap infosec-workforce ai
Why Cybersecurity Is Layoff-Resistant in the Age of AI
Thu | Dec 11, 2025 | 6:23 AM PST
cybersecurity predictions
Strategic Shifts: Cybersecurity Predictions for 2026
Wed | Dec 10, 2025 | 5:28 AM PST
grc board-oversight ai
The AI Reckoning: Elevating Cybersecurity, Governance to the Boardroom
Tue | Dec 9, 2025 | 8:54 AM PST
cybersecurity ai
How AI Is Reshaping Cyber Defense and Offense
Mon | Dec 8, 2025 | 6:19 AM PST
by
Sudhakar Tiwari
Sudhakar Tiwari is a senior cybersecurity architect and IAM strategist with more...
security-research phishing threat-intel
The End of the Typo Rule: Report Examines Normalization of Phishing
Thu | Dec 4, 2025 | 8:22 AM PST
osint nsa artificial-intelligence cisa ot-security
NSA, CISA Guidance Demands a Secure-by-Design Approach for AI in OT
Thu | Dec 4, 2025 | 5:28 AM PST
infosec-workforce ai
The New Partnership: How AI Agents Are Redefining Cybersecurity Roles
Wed | Dec 3, 2025 | 6:22 AM PST
ai soc
When AI Agents in the SOC Become the New Insider
Tue | Dec 2, 2025 | 10:37 AM PST
by
Advait Patel
Advait Patel is a Senior Site Reliability Engineer at Broadcom, where he helps s...
data-security charitable-donations
The EOL Dilemma: Donating Used Devices without Compromising Security
Mon | Dec 1, 2025 | 12:16 PM PST
phishing holiday-scams
Ho, Ho, %@#! Reports Warn of Explosive Growth in Holiday Scams
Wed | Nov 26, 2025 | 7:30 AM PST
solarwinds-hack sec
The Sun Sets on the SolarWinds Lawsuit by the SEC
Tue | Nov 25, 2025 | 7:32 AM PST
banking third-party-vendors financial-sector data-breach
Major U.S. Banks Assess Fallout After SitusAMC Cyberattack Exposes Mortgage Data
Mon | Nov 24, 2025 | 1:15 PM PST
cybersecurity government digital-transformation
Cybersecurity Mandate Hidden in the Digital Cities Innovation Awards
Mon | Nov 24, 2025 | 7:38 AM PST
cybersecurity third-party-vendors smb small-buisness
Are Small Businesses at Risk by Outsourcing Parts of Their Operations?
Fri | Nov 21, 2025 | 6:22 AM PST
by
Chester Avey
Chester Avey has over a decade of experience in cybersecurity. He enjoys sharing...
cybersecurity grc c-suite financial-sector
Relentless Cybersecurity Pressures Eat at CFOs
Thu | Nov 20, 2025 | 6:26 AM PST
ransomware zero-day third-party-vendors data-breach
Logitech Confirms Cl0p Extortion Attack Linked to Third-Party Zero-Day
Wed | Nov 19, 2025 | 5:52 AM PST
cloud-security third-party-vendors internet
Cloudflare Outage Knocks Out Major Internet Services, Exposes 'Fragile Chokepoints'
Tue | Nov 18, 2025 | 3:48 PM PST
cybersecurity automotive-industry
Securing Auto Dealerships: Data Reveals an Industry Under Siege
Tue | Nov 18, 2025 | 11:11 AM PST
cloud-security automation ai
AI and Automation Driving Cloud Security at Scale
Tue | Nov 18, 2025 | 5:41 AM PST
by
Sudhakar Tiwari
Sudhakar Tiwari is a senior cybersecurity architect and IAM strategist with more...
fbi ransomware security-alerts cisa
CISA, FBI Issue Urgent Warning on Akira Ransomware
Mon | Nov 17, 2025 | 12:38 PM PST
infosec-workforce diversity-inclusion women-in-cybersecurity
The Inclusion Imperative: 'The Women in Security Documentary'
Mon | Nov 17, 2025 | 6:43 AM PST
cyber-attacks artificial-intelligence china espionage
Anthropic: China-Linked Hackers Used AI to Automate Cyber Espionage Campaign
Fri | Nov 14, 2025 | 12:55 PM PST
cyber-fraud security-awareness
Why Fraud Awareness Week Is Now a Cybersecurity Imperative
Thu | Nov 13, 2025 | 10:39 AM PST
grc financial-sector cyber-risk
The Cyber Risk Realities in Financial Services & Insurance
Thu | Nov 13, 2025 | 5:41 AM PST
security-research artificial-intelligence api-security non-human-identities github
Two-Thirds of Leading AI Companies Leaking Secrets on GitHub, Report Finds
Wed | Nov 12, 2025 | 10:00 AM PST
vulnerabilities microsoft zero-trust
Collaboration Catastrophe: Teams Flaws Expose the Crisis of Trust
Wed | Nov 12, 2025 | 6:37 AM PST
information-sharing congress cisa
Congress Moves to End Shutdown—with Temporary Lifeline for CISA 2015
Tue | Nov 11, 2025 | 6:18 AM PST
apt threat-intel cybercrime-threats
Dissecting the Scattered LAPSUS$ Hunters (SLH) Threat
Mon | Nov 10, 2025 | 10:34 AM PST
cybersecurity security-leadership
What to Ask When You Take Over a Security Program
Sun | Nov 9, 2025 | 7:30 AM PST
by
Marc Menninger
Marc Menninger is a seasoned corporate information security and risk management ...
cybersecurity grc security-business cyber-resilience cyber-risk
Capital at Risk: How Cyber Incidents Influence Corporate Valuation
Fri | Nov 7, 2025 | 6:38 AM PST
by
Thomas Young
Senior Economist at Common Sense Institute Colorado, Partner at Econowest, and P...
cyber-resilience
Defending Trust in the Age of Intelligent Threats
Thu | Nov 6, 2025 | 6:16 AM PST
by
Sudhakar Tiwari
Sudhakar Tiwari is a senior cybersecurity architect and IAM strategist with more...
data-security financial-sector physical-security
The Financial Sector's Data Crisis: 82% Suffer Recent Breaches
Wed | Nov 5, 2025 | 4:21 AM PST
ransomware insider-threats third-party-vendors
The Ultimate Betrayal: When Cyber Negotiators Became the Attackers
Tue | Nov 4, 2025 | 1:16 PM PST
ciso-cso artificial-intelligence
The CISO's Playbook: From Reactive to Predictive
Tue | Nov 4, 2025 | 9:08 AM PST
by
Sandeep Dommari
Sandeep Dommari is a principal cybersecurity architect and IAM strategist with o...
education identity-access-mgmt data-breach
Hacker Claims 1.2 Million Records in University of Pennsylvania Breach
Mon | Nov 3, 2025 | 2:58 PM PST
vulnerabilities devops
Persistent XSS Vulnerabilities and Modern Mitigation Best Practices
Mon | Nov 3, 2025 | 7:24 AM PST
by
Alex Vakulov
Alex Vakulov is a cybersecurity researcher with over 20 years of experience in m...
malware endpoint-mobile-security
Tap-and-Steal: NFC Relay Malware Closes the Mobile Distance Gap
Fri | Oct 31, 2025 | 6:19 AM PDT
risk-management healthcare
Shifting Healthcare Security from Assets to Systemic Function
Thu | Oct 30, 2025 | 4:19 AM PDT
risk-management cybersecurity it-security-budget board-oversight
Beyond FUD: The Economist's Guide to Defending Your Cybersecurity Budget
Wed | Oct 29, 2025 | 6:19 AM PDT
by
Pierre Raymond
Pierre Raymond is driven by his passion for financial technology. He has transit...
blockchain cryptography quantum-computing ibm
IBM Breakthroughs: Quantum Error Correction and Digital Asset Security
Tue | Oct 28, 2025 | 4:26 PM PDT
automotive-industry cyber-attacks
Jaguar Land Rover Cyber Attack Most Expensive in UK History
Tue | Oct 28, 2025 | 5:44 AM PDT
risk-management security-research enterprise-security
2025 Risk Reality Check: Cybersecurity at a Crossroads
Mon | Oct 27, 2025 | 6:46 AM PDT
iot-security ai
In IoT Security, AI Can Make or Break
Fri | Oct 24, 2025 | 2:41 PM PDT
by
David Balaban
David Balaban is a computer security researcher with over 18 years of experience...
security-research microsoft cybercrime-threats
Decoding the Microsoft Digital Defense Report 2025
Thu | Oct 23, 2025 | 9:50 AM PDT
vulnerabilities cybercrime-threats salt-typhoon
Salt Typhoon's New Playbook Targets Citrix NetScaler Gateway
Wed | Oct 22, 2025 | 5:12 AM PDT
ciso-cso artificial-intelligence board-oversight cyber-risk
Boardroom to War Room: Translating AI-Driven Cyber Risk into Action
Tue | Oct 21, 2025 | 10:14 AM PDT
by
Sandeep Dommari
Sandeep Dommari is a principal cybersecurity architect and IAM strategist with o...
cio peer-report
State CIOs Survey a Blueprint for Government CISOs
Mon | Oct 20, 2025 | 2:15 PM PDT
artificial-intelligence cyber-defense cybercrime-threats
The Impact of AI on Cybersecurity: Navigating AI-Enhanced Threats and AI-Enabled Defenses
Sun | Oct 19, 2025 | 8:23 AM PDT
by
Sudhakar Tiwari
Sudhakar Tiwari is a senior cybersecurity architect and IAM strategist with more...
third-party-vendors data-breach vendor-security
F5 Breach Analysis: When the Cobbler's Shoes Are Stolen
Fri | Oct 17, 2025 | 6:18 AM PDT
microsoft security-patches windows-10
The Windows 10 End of Life: When the Lifeline Is Cut
Thu | Oct 16, 2025 | 5:26 AM PDT
soc
Build or Buy a SOC: Choosing the Best Monitoring and Response Strategy
Wed | Oct 15, 2025 | 1:16 PM PDT
by
Alex Vakulov
Alex Vakulov is a cybersecurity researcher with over 20 years of experience in m...
identity-access-mgmt
Agentless, Seamless, Secure: Rethinking Access Management for Modern Business
Wed | Oct 15, 2025 | 4:26 AM PDT
by
Ani Khachatryan
Ani Khachatryan is Chief Technology Officer at Syteca. With a strong background ...
information-sharing healthcare cybercrime-threats
Health-ISAC Insights: When Healthcare Becomes the Bullseye
Tue | Oct 14, 2025 | 11:57 AM PDT
supply-chains security-leadership third-party-vendors data-breach
Qantas Incident Blurs Lines Between Direct and Supply Chain Breaches
Tue | Oct 14, 2025 | 4:56 AM PDT
spyware android malware endpoint-mobile-security
ClayRat: A New Android Mobile Threat Vector
Mon | Oct 13, 2025 | 9:32 AM PDT
artificial-intelligence shadow-ai
Shadow AI in Your Systems: How to Detect and Control It
Thu | Oct 9, 2025 | 11:20 AM PDT
by
Sandeep Dommari
Sandeep Dommari is a principal cybersecurity architect and IAM strategist with o...
security-awareness human-factor cyber-risk national-cybersecurity-alliance
NCA 'Oh, Behave!' Report Points to Humans as Top Cyber Risk
Thu | Oct 9, 2025 | 6:41 AM PDT
threat-intel telecommunications
Nokia Report Signals a Strategic Shift in Telecom Threats
Wed | Oct 8, 2025 | 3:36 PM PDT
security-research skills-gap artificial-intelligence devops soc
Three Reports Define 2025's AI Cybersecurity Reality
Wed | Oct 8, 2025 | 6:03 AM PDT
cybersecurity data-breach
The True Cost of a Data Breach: A Quantitative Analysis of Market Cap and Shareholder Value
Mon | Oct 6, 2025 | 12:13 PM PDT
by
Pierre Raymond
Pierre Raymond is driven by his passion for financial technology. He has transit...
education security-awareness artificial-intelligence
Research Examines Promise and Peril of AI in Education
Fri | Oct 3, 2025 | 5:38 AM PDT
cloud-security artificial-intelligence smb
Securing AI Innovation and Cloud Agility in Asia-Pacific SMBs
Thu | Oct 2, 2025 | 10:23 AM PDT
information-sharing critical-infrastructure u-s-government threat-intel cisa
Federal Support for MS-ISAC Ends as CISA Shifts Cybersecurity Model
Thu | Oct 2, 2025 | 4:36 AM PDT
vulnerabilities nsa security-patches
Broadcom Patches High-Severity VMware Vulnerabilities Reported by NSA
Wed | Oct 1, 2025 | 12:52 PM PDT
security-awareness security-education
Should Cybersecurity Be Taught in Schools?
Wed | Oct 1, 2025 | 6:16 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
industrial-controls operational-technology
New UK NCSC Guidance a Game-Changer for OT Security
Tue | Sep 30, 2025 | 2:16 PM PDT
identity-access-mgmt
Identity at the Core: Elevating Cybersecurity with Modern IAM
Tue | Sep 30, 2025 | 6:39 AM PDT
by
Sudhakar Tiwari
Sudhakar Tiwari is a senior cybersecurity architect and IAM strategist with more...
artificial-intelligence quantum-threats quantum
The Next Cyber Crisis Won't Be Just AI, It Will Be Quantum-Enhanced
Mon | Sep 29, 2025 | 8:08 AM PDT
by
Sandeep Dommari
Sandeep Dommari is a principal cybersecurity architect and IAM strategist with o...
cybersecurity security-leadership ethics
Cybersecurity as Stewardship: Protecting What Can't Protect Itself
Sun | Sep 28, 2025 | 8:23 AM PDT
by
Vanessa Pegueros
Vanessa Pegueros is an accomplished technology executive with more than 30 years...
malware cryptomining russia-ukraine-war
SVG Files Weaponized to Target Ukrainian Organizations
Fri | Sep 26, 2025 | 7:22 AM PDT
ransomware airline-security
Collins Aerospace Ransomware Attack Disrupts European Air Travel
Thu | Sep 25, 2025 | 11:17 AM PDT
automotive-industry operational-technology
The Automotive Industry's Growing Cybersecurity Crisis
Thu | Sep 25, 2025 | 5:43 AM PDT
cybercrime-threats u-s-secret-service telecommunications
Secret Service Dismantles Major Telecom Threat Near UN Headquarters
Wed | Sep 24, 2025 | 7:12 AM PDT
cyber-attacks cyber-risk
Lessons from Airport Cyber Attack: Cyber Risk Is Business Risk
Tue | Sep 23, 2025 | 9:22 AM PDT
by
Dr. Roisin Ni Thuama
Roisin Ni Thuama is a Doctor of Law, a governance and risk management expert, an...
cyber-attacks law-enforcement
Global Takedown: U.K. Arrests 'Scattered Spider' Cyber Criminals
Mon | Sep 22, 2025 | 6:48 AM PDT
data-breach cyber-resilience
Breach Lessons: From Bleeding Costs to Built-In Resilience
Thu | Sep 18, 2025 | 2:00 PM PDT
certifications non-human-identities
Governing Non-Human Identities: New Certification Offers Needed Help
Wed | Sep 17, 2025 | 11:33 AM PDT
risk-management third-party-vendors
The Due Diligence Imperative: Homes, Cars, and Software
Tue | Sep 16, 2025 | 4:21 PM PDT
by
Kabir Manocha
Kabir Manocha is an Information Security Architect at Drexel University, where h...
fbi security-alerts cyber-attacks salesforce
FBI FLASH Alert: Salesforce Under Siege
Mon | Sep 15, 2025 | 4:16 PM PDT
smart-cities cybersecurity pci encryption-dlp
Building Trust in Smart Cities with Secure Transit Payments
Sun | Sep 14, 2025 | 8:09 AM PDT
by
Tim Green
Tim Green is passionate about cybersecurity and currently enjoys writing content...
u-s-government phishing china geopolitics
China-Linked APT41 Targets U.S. Trade Policy Stakeholders in Cyber Espionage
Fri | Sep 12, 2025 | 6:23 AM PDT
ransomware artificial-intelligence
When Ransomware Meets AI: Study Shows Alarming Trends
Thu | Sep 11, 2025 | 6:36 AM PDT
phishing mfa
Salty2FA Exposes the Next Evolution of Phishing Operations
Wed | Sep 10, 2025 | 6:09 AM PDT
identity-access-mgmt
Adaptive Identity Governance: Turning Real-Time Signals into Better Access Decisions
Tue | Sep 9, 2025 | 12:44 PM PDT
by
Sudhakar Tiwari
Sudhakar Tiwari is a senior cybersecurity architect and IAM strategist with more...
supply-chains information-sharing agriculture cyber-risk
New Food and Ag ISAC Aims for Supply Chain Cybersecurity
Tue | Sep 9, 2025 | 5:22 AM PDT
ceo data-breach accountability
Qantas CEO's Bonus Docked After Cyber Breach
Mon | Sep 8, 2025 | 7:26 AM PDT
career-development artificial-intelligence
How Artificial Intelligence Is Reshaping Cybersecurity Careers
Fri | Sep 5, 2025 | 3:09 PM PDT
by
Derek Fisher
Cybersecurity leader and educator, serving as a professor and director in higher...
social-engineering artificial-intelligence x-twitter malware
Hackers Exploit Grok AI to Spread Malware Through Promoted Ads
Thu | Sep 4, 2025 | 2:56 PM PDT
supply-chains salesforce data-breach saas
Salesloft Drift Breach Exposes Salesforce Data at Top Cyber Companies
Thu | Sep 4, 2025 | 7:25 AM PDT
vulnerabilities artificial-intelligence pen-testing
AI-Powered Testing: The Next Frontier in Cybersecurity Defense
Wed | Sep 3, 2025 | 3:39 PM PDT
by
Alex Tray
Alex Tray is a system administrator with 10 years of experience in the IT field....
cyber-attacks data-breach vendor-security
Can We Trust Cybersecurity Firms that Fall Victim to Cyber Attacks?
Wed | Sep 3, 2025 | 11:10 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
artificial-intelligence police
Phoenix Police AI Call Triage Raises Governance Issues
Tue | Sep 2, 2025 | 10:38 AM PDT
security-research critical-infrastructure operational-technology
What the Data Tell Us About IT/OT Security Risks
Fri | Aug 29, 2025 | 10:09 AM PDT
regulations breach-notification sec
New U.S. SEC Cybersecurity Rules Require Prompt Disclosures
Thu | Aug 28, 2025 | 1:28 PM PDT
security-software devops sboms
Embedded Software Security Is Seismically Shifting, Report Shows
Thu | Aug 28, 2025 | 5:36 AM PDT
supply-chains social-engineering financial-sector data-breach
Farmers Insurance Data Breach Affects 1.1 Million Customers
Wed | Aug 27, 2025 | 10:38 AM PDT
banking financial-sector cybercrime-threats endpoint-mobile-security
Inside Hook v3: Diving into the Next-Gen Banking Trojan
Wed | Aug 27, 2025 | 5:26 AM PDT
security-awareness online-scams national-cybersecurity-alliance
Stuck in 'Family IT Support' Role? Empower them with New NCA Resource
Tue | Aug 26, 2025 | 6:39 AM PDT
phishing cybercrime-threats
UpCrypter-Enabled Phishing Campaign Uncovered
Tue | Aug 26, 2025 | 4:24 AM PDT
connected-cars cybersecurity automotive-industry
Cybersecurity Imperatives for the Automotive Industry
Mon | Aug 25, 2025 | 10:50 AM PDT
cybersecurity internet identity-access-mgmt cybercrime-threats
Defeating Cybercriminals: A New Framework for Trusted Digital Ecosystems
Sun | Aug 24, 2025 | 7:42 AM PDT
cybersecurity smb small-buisness
The Dangerous Myth of 'Too Small to Notice'
Sun | Aug 24, 2025 | 7:36 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
exploits vulnerabilities cyber-risk
Rise in Exploits, Enterprise Risks Detailed in Vulnerability Report
Fri | Aug 22, 2025 | 6:39 AM PDT
apple privacy surveillance u-s-government encryption-dlp europe
U.K. Backs Down on Apple Encryption Backdoor
Thu | Aug 21, 2025 | 4:26 AM PDT
social-engineering third-party-vendors salesforce breach-notification data-breach
The Weakest Link: ShinyHunters Hits Workday in CRM Breach
Wed | Aug 20, 2025 | 5:41 AM PDT
fcc data-breach telecommunications
U.S. Telecoms Must Report Data Breaches, Per Court Ruling
Tue | Aug 19, 2025 | 3:54 PM PDT
vulnerabilities pen-testing attack-surface
Pen Test Report Reveals Growing Attack Surfaces
Tue | Aug 19, 2025 | 6:21 AM PDT
cybersecurity operational-technology manufacturing
Report: Manufacturers Must Prioritize OT Security
Mon | Aug 18, 2025 | 7:13 AM PDT
security-awareness online-scams child-safety
Identifying and Defending Against the Cyber Scams Targeting Children
Sun | Aug 17, 2025 | 8:24 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
privacy data-security
The Dating App that Leaked Women's Secrets to the World
Fri | Aug 15, 2025 | 7:13 AM PDT
by
Kip Boyle
Kip Boyle is the Virtual Chief Information Security Officer (vCISO) of Cyber Ris...
cyber-defense aviation
Aviation Cybersecurity Takes Flight: Key Market Insights
Thu | Aug 14, 2025 | 1:59 PM PDT
operational-technology cyber-risk
Billions at Stake: The Financial Risks of OT Security
Thu | Aug 14, 2025 | 5:42 AM PDT
autonomous-vehicles cybersecurity automotive-industry sboms
The Cyber Threats to Vehicle Automation
Wed | Aug 13, 2025 | 5:43 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
artificial-intelligence chatgpt
GPT-5 Under the Microscope: Advanced Model More Capable, More Vulnerable
Tue | Aug 12, 2025 | 6:21 AM PDT
dhs ransomware cybercrime-threats
U.S. ICE Leads Global Takedown of BlackSuit Ransomware Infrastructure
Mon | Aug 11, 2025 | 11:59 AM PDT
u-s-government incident-response-siem data-breach legal-industry
U.S. Courts Ramp up Security After Sophisticated CM/ECF & PACER Breach
Mon | Aug 11, 2025 | 9:08 AM PDT
social-engineering hacking salesforce
Dissecting the Salesforce Social Engineering Attacks
Thu | Aug 7, 2025 | 12:08 PM PDT
artificial-intelligence ponemon-research ibm data-breach
IBM, Ponemon Report Credits AI for Drop in Data Breach Costs
Wed | Aug 6, 2025 | 11:18 AM PDT
cybersecurity security-leadership it-security-budget
CISOs Brace for Budget Squeeze as Security Growth Slows to 5-Year Low
Wed | Aug 6, 2025 | 5:37 AM PDT
vulnerabilities legal-industry
Human-Based Attacks Linger in Legal Industry, Report Shows
Tue | Aug 5, 2025 | 6:06 AM PDT
critical-infrastructure security-alerts cisa
U.S. CISA, Coast Guard Issue Wake-Up Call for Critical Infrastructure
Mon | Aug 4, 2025 | 8:14 AM PDT
politics deepfake
Can We Secure Politics Against the Evolving Threat of Deepfakes?
Sun | Aug 3, 2025 | 7:14 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
security-awareness remote-work
Gen Z, Polyworking, and the Expanding Cyber Attack Surface
Thu | Jul 31, 2025 | 3:28 PM PDT
supply-chains nist devops
New from NIST: Securing the Software Supply Chain
Thu | Jul 31, 2025 | 4:43 AM PDT
supply-chains data-breach
Supply Chain Vulnerability Strikes Again in Allianz Life Data Breach
Tue | Jul 29, 2025 | 4:18 AM PDT
google critical-infrastructure ransomware cybercrime-threats
Scattered Spider Targets U.S. Critical Infrastructure Through VMware Attacks
Mon | Jul 28, 2025 | 12:13 PM PDT
data-security dark-web cybercrime-threats
Exploring the Stolen Data Marketplace
Sun | Jul 27, 2025 | 7:39 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
white-house artificial-intelligence u-s-government
What Trump's AI Action Plan Means for Cybersecurity
Thu | Jul 24, 2025 | 8:46 AM PDT
cybersecurity artificial-intelligence non-human-identities
AI Is Outpacing Cybersecurity, Benchmark Report Shows
Thu | Jul 24, 2025 | 6:06 AM PDT
zero-day microsoft security-patches china
Microsoft Links China to Massive SharePoint Zero-Day Attacks
Wed | Jul 23, 2025 | 9:48 AM PDT
social-engineering malware endpoint-mobile-security
SarangTrap Malware Campaign Weaponizes Emotion
Wed | Jul 23, 2025 | 6:06 AM PDT
critical-infrastructure maritime-security
The Seabed: A New Digital Frontier to Protect from Threats
Tue | Jul 22, 2025 | 5:09 AM PDT
cybersecurity microsoft europe
The Implications of Microsoft's New European Security Program
Mon | Jul 21, 2025 | 8:08 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
cyber-fraud financial-sector deepfake
AI-Driven Fraud and Impersonation: The New Face of Financial Crime
Fri | Jul 18, 2025 | 6:12 AM PDT
by
Ankit Gupta
Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud ...
security-research industrial-controls ot-security
OT Under Siege No More? Fortinet Report Shows Improving Landscape
Thu | Jul 17, 2025 | 6:40 AM PDT
dhs cyber-warfare military china data-breach
Salt Typhoon Breached U.S. Army National Guard, DHS Memo Reveals
Wed | Jul 16, 2025 | 12:17 PM PDT
cybersecurity artificial-intelligence
AI Appreciation Day Recognizes Positive Contributions
Wed | Jul 16, 2025 | 5:26 AM PDT
artificial-intelligence financial-sector devops
Goldman Sachs Pilots Its First Autonomous Coder
Tue | Jul 15, 2025 | 9:08 AM PDT
cyber-warfare cyber-defense nato
The Potential of NATO's Cybersecurity Proposals
Mon | Jul 14, 2025 | 11:24 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
cyber-attacks retail cybercrime-threats police
4 Arrested in U.K. for Cyberattacks on Retail Tied to Scattered Spider
Thu | Jul 10, 2025 | 1:38 PM PDT
artificial-intelligence cybercrime-threats api-security
2025 Supply Chain Threat Landscape: AI, APIs, and the Weakest Link
Thu | Jul 10, 2025 | 4:38 AM PDT
by
Shilpi Mittal
Shilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads str...
cybersecurity devops
Policy-as-Code Implementation in Secure SDLC
Wed | Jul 9, 2025 | 11:30 AM PDT
by
Derek Fisher
Cybersecurity leader and educator, serving as a professor and director in higher...
artificial-intelligence u-s-government cybercrime-threats deepfake genai
Marco Rubio Impersonation Reveals Growing Threat of AI-Powered Attacks
Wed | Jul 9, 2025 | 6:14 AM PDT
ransomware cybercrime-threats
The Rise of Ransomware-as-a-Service (RaaS)
Tue | Jul 8, 2025 | 12:10 PM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
cloud-security
White Paper Sees Repatriation of Cloud to Private and On-Prem
Tue | Jul 8, 2025 | 6:08 AM PDT
fbi cybercrime-threats data-breach
FBI Cybersecurity Breach Led to Murders of Informants in El Chapo Case
Mon | Jul 7, 2025 | 6:42 AM PDT
regulations artificial-intelligence
Texas Passes Most Comprehensive AI Governance Bill
Wed | Jul 2, 2025 | 5:39 AM PDT
critical-infrastructure cyber-attacks cyber-resilience
Securing Critical Infrastructure Against Cyberattacks
Tue | Jul 1, 2025 | 6:24 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
security-alerts smb threat-detection
Why SMBs Need Cyberattack Early Warning Systems More Than Ever
Mon | Jun 30, 2025 | 6:41 AM PDT
by
Kip Boyle
Kip Boyle is the Virtual Chief Information Security Officer (vCISO) of Cyber Ris...
cybercrime-threats police data-breach
BreachForums Crackdown: 5 Arrested in International Cybercrime Operation
Thu | Jun 26, 2025 | 11:35 AM PDT
artificial-intelligence ethics
Agentic AI and the Painted Fence Analogy
Thu | Jun 26, 2025 | 5:39 AM PDT
by
Rick Doten
Rick is the former VP and NC Healthplan CISO for Centene. He now focuses on AI G...
medical-security manufacturing
FDA Playbook Engineers Safety Into Medical Device Manufacturing
Wed | Jun 25, 2025 | 12:16 PM PDT
dhs security-alerts iran
Iranian Cyber Threats Loom as DHS Issues National Terrorism Advisory
Tue | Jun 24, 2025 | 3:37 PM PDT
phishing qr-code
From Menu to Malware: How Innocent Scans Lead to Quishing Attacks
Mon | Jun 23, 2025 | 6:47 AM PDT
by
David Balaban
David Balaban is a computer security researcher with over 18 years of experience...
cyber-warfare iran israel
Israel–Iran Conflict Escalates in Cyberspace: Banks and Crypto Hit, Internet Cut
Thu | Jun 19, 2025 | 1:19 PM PDT
nsa data-security artificial-intelligence cisa
AI and Data Security: Takeaways from Latest Cybersecurity Info Sheet
Thu | Jun 19, 2025 | 5:23 AM PDT
cybersecurity artificial-intelligence cybercrime-threats
How Real Is the Threat of Adversarial AI to Cybersecurity?
Wed | Jun 18, 2025 | 11:16 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
critical-infrastructure renewable-energy threat-modeling
Threat Modeling in Solar Power Infrastructure
Wed | Jun 18, 2025 | 5:13 AM PDT
by
Derek Fisher
Cybersecurity leader and educator, serving as a professor and director in higher...
cyber-attacks apt financial-sector
Scattered Spider Swarms Insurance Sector with Targeted Cyber Attacks, Google Warns
Tue | Jun 17, 2025 | 1:43 PM PDT
risk-management artificial-intelligence vendor-security
Maturing Your AI Vendor Security Assessment Process
Mon | Jun 16, 2025 | 11:15 AM PDT
by
Jatin Mannepalli
Jatin Mannepalli, CISSP, CCSP, is an Information Security Officer (ISO) at IMC T...
ransomware insider-threats application-security
Fog Ransomware Exploits Legitimate Monitoring Software in Sophisticated Attacks
Thu | Jun 12, 2025 | 12:10 PM PDT
grc artificial-intelligence
AI as Alien Intelligence: A Relational Ethics Framework for Human-AI Co-Evolution
Wed | Jun 11, 2025 | 9:08 AM PDT
by
Wolfgang Rohde
Dr. Rohde, a pioneer in applying cutting-edge technologies, co-founded IBM’s Web...
supply-chains cyber-attacks breach-notification
Whole Foods Supplier United Natural Foods Hit in Cyber Attack
Tue | Jun 10, 2025 | 12:42 PM PDT
cybersecurity artificial-intelligence devops
The New Frontier: How AI Is Reshaping Security and Technology Delivery
Tue | Jun 10, 2025 | 7:08 AM PDT
by
Brian Shea
Brian is an IT Executive with 29 years of experience from Security Operations an...
hackers third-party-vendors china cybercrime-threats
Chinese Hackers Target SentinelOne in Broader Espionage Campaign
Mon | Jun 9, 2025 | 2:53 PM PDT
cybersecurity airline-security
Cybersecurity in Aviation: Rising Threats and Modernization Efforts
Mon | Jun 9, 2025 | 6:46 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
critical-infrastructure industrial-controls cybercrime-threats ot-security
Operational Technology Is Under Siege, Honeywell Report Shows
Fri | Jun 6, 2025 | 6:09 AM PDT
security-research incident-response-siem
'SIEM Sprawl' Makes It Tough for Security Teams to Detect What Matters
Thu | Jun 5, 2025 | 5:19 AM PDT
supply-chains api-security open-source
Malicious Open-Source Packages Target Crypto Wallets, Telegram Tokens, and Codebases
Wed | Jun 4, 2025 | 11:58 AM PDT
supply-chains cyber-attacks cybercrime-threats data-breach
Luxury, Loyalty and Lateral Movement: Retail and Banking Attacks Surge
Wed | Jun 4, 2025 | 6:13 AM PDT
malware personal-information cybercrime-threats data-breach
Massive InfoStealer Malware Breach Exposes 184 Million Credentials
Tue | Jun 3, 2025 | 5:39 AM PDT
microsoft threat-intel crowdstrike threat-attribution
CrowdStrike and Microsoft Join Forces on Naming Threat Actors
Mon | Jun 2, 2025 | 2:26 PM PDT
fbi security-alerts cyber-attacks artificial-intelligence
FBI Warning: AI-Driven Impersonation Attacks Target U.S. Officials
Fri | May 30, 2025 | 5:25 AM PDT
cloud-security third-party-vendors microsoft api-security
OneDrive File Picker Flaw Exposes Cloud Storage to Over-Permission Risks
Thu | May 29, 2025 | 11:30 AM PDT
ransomware retail cybercrime-threats data-breach
Retailers Under Siege: Victoria's Secret Latest Victim of Cyberattacks
Wed | May 28, 2025 | 1:23 PM PDT
supply-chains cybersecurity retail
Cyber Criminals and Groceries?
Wed | May 28, 2025 | 6:37 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
risk-management data-security artificial-intelligence
99% of Organizations Expose Sensitive Data to AI Tools, Report Shows
Fri | May 23, 2025 | 9:19 AM PDT
grc legislation regulations artificial-intelligence
A Federal AI Power Move... without a Real Preemption Clause
Thu | May 22, 2025 | 12:38 PM PDT
by
Violet Sullivan
Violet Sullivan leads cyber consulting services at Crum & Forster. She works wit...
endpoint-mobile-security operational-technology cyber-resilience
The Edge Has Become the Battleground
Wed | May 21, 2025 | 12:06 PM PDT
by
Todd Inskeep
Todd Inskeep—executive, advisor, inventor, and CISO—has spent 30+ years driving ...
ransomware cryptocurrency cybercrime-threats data-breach
Coinbase Flips the Script on Ransomware Criminals
Wed | May 21, 2025 | 7:24 AM PDT
ransomware cybercrime-threats
Inside LockBit: New Leak Exposes Ransomware Giant's Operations
Tue | May 20, 2025 | 5:03 AM PDT
cybersecurity space
Space: The Final Cybersecurity Frontier
Mon | May 19, 2025 | 7:39 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
united-kingdom retail cybercrime-threats
Scattered Spider Strikes Again: U.K. Attacks Spark U.S. Retailer Alarm
Fri | May 16, 2025 | 4:52 AM PDT
critical-infrastructure breach-notification manufacturing
Steelmaker Nucor Faces Breach, Temporarily Halts Production
Thu | May 15, 2025 | 4:38 AM PDT
fbi cybercrime-threats
Cybercrime Soars: FBI's 2024 Report Reveals $16.6 Billion in Losses
Wed | May 14, 2025 | 5:38 AM PDT
spyware privacy whatsapp surveillance meta
Meta Scores $168M Legal Victory Over NSO Group for Spyware Abuse
Tue | May 13, 2025 | 10:33 AM PDT
risk-management grc third-party-vendors
From Compliance to Confidence: How AI Is Reshaping Third-Party Risk
Tue | May 13, 2025 | 4:29 AM PDT
privacy california
California Privacy Agency Enforcement, CCPA Rulemaking, and CIPA Reform
Mon | May 12, 2025 | 7:33 AM PDT
by
Myriah Jaworski
Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. ...
cybersecurity passwords
Invisible Characters and How to Use Them to Prevent Being Hacked
Sun | May 11, 2025 | 8:12 AM PDT
by
Alex Tray
Alex Tray is a system administrator with 10 years of experience in the IT field....
cybersecurity security-awareness
The Intersection of Cybersecurity and Behavioral Psychology: Building a Human Firewall
Sat | May 10, 2025 | 8:38 AM PDT
by
Chahak Mittal
Chahak Mittal is a Certified Information Systems Security Professional (CISSP) a...
russia malware
Russia's COLDRIVER Targets Western Entities with 'LOSTKEYS' Malware
Fri | May 9, 2025 | 6:17 AM PDT
critical-infrastructure security-alerts cybercrime-threats oil-gas
Agencies Issue Warning on Threats to Oil and Gas ICS and OT Systems
Thu | May 8, 2025 | 5:23 AM PDT
artificial-intelligence infosec-workforce
AI and the Future of Work: What It Means for Cybersecurity and Beyond
Wed | May 7, 2025 | 5:38 AM PDT
cybersecurity infosec-workforce mental-health
This Mental Health Awareness Month, Cyber Resilience Starts Within
Tue | May 6, 2025 | 6:06 AM PDT
ransomware burnout mental-health
How Ransomware Gangs Weaponize Employee Burnout to Breach Corporate Defenses
Mon | May 5, 2025 | 6:16 AM PDT
by
Nahla Davies
Nahla Davies is a software developer and tech writer. Before devoting her work f...
healthcare security-business medical-security
Healthcare Cybersecurity Market Soars: Key Trends and Insights
Fri | May 2, 2025 | 10:36 AM PDT
authentication passwords
Why World Password Day Is a Perfect Reminder to Up Your Security Game
Thu | May 1, 2025 | 5:28 AM PDT
cybersecurity smb cybersecurity-conference
Navigating the Unique Cybersecurity Challenges for SMBs
Wed | Apr 30, 2025 | 1:55 PM PDT
Show More News
See what SecureWorld can do for you. Contact us today!
Subscribe
Stay updated with the latest industry news, expert interviews, and original articles and research.
Subscribe to Email Updates