Identity-based cyber attacks surged in 2025, with 32 million high-confidence phishing emails detected, marking a shift from breaching defenses to…
Read More »cybersecurity trends
U.S. data compromises reached a record high of 3,332 in 2025, but the number of affected individuals fell sharply due…
Read More »Account compromise incidents surged by 389% in 2025, with credential theft becoming the primary attack method, representing 75% of all…
Read More »Despite fewer major law enforcement takedowns, ransomware threats intensified, with a dramatic surge in publicly claimed victims indicating a shift…
Read More »Ransomware is expanding globally into new regions and sectors, with attackers increasingly targeting areas with less mature security defenses. The…
Read More »The retail sector is seeing a decline in data encryption during ransomware attacks, but attackers are increasingly using extortion-only tactics…
Read More »DigiCert's inaugural RADAR Threat Intelligence Brief reveals an unprecedented escalation in DDoS attacks, with two incidents reaching peaks of 2.4…
Read More »Ransomware payment rates have hit a record low of 23%, driven by improved corporate defenses and pressure from authorities not…
Read More »A significant surge in hardware, API, and network vulnerabilities is creating unprecedented risks, driven by IoT proliferation and resulting in…
Read More »Reports of HMRC phishing scams have significantly declined in the first half of 2025, suggesting improved public awareness and security…
Read More »The cyber insurance sector is maturing, with North America leading the market, though Europe's DACH region shows higher penetration rates…
Read More »AI platforms are experiencing rapid growth, with visits to AI-related websites surging 50% from 7 billion in early 2024 to…
Read More »The average cost of data breaches dropped 9% to $4.44 million, marking the first significant decrease in five years due…
Read More »The cybersecurity landscape is evolving rapidly, with experts at Infosecurity Europe 2025 stressing the need for foundational security practices like…
Read More »












