Topic: cyber risks
-
Olympics Cyber Threats: Phishing and Spoofed Sites Still Top Risks
Cybersecurity experts warn that phishing attacks and spoofed websites remain the primary digital threats for the 2026 Winter Games, attracting a wide range of malicious actors due to the event's global scale and high incentive for disruption. Historical analysis shows past Olympic events faced si...
Read More » -
2026 Cybersecurity Forecast: Key Trends to Watch
Cybercriminals are increasingly targeting people over software vulnerabilities, using tactics like phishing and deceptive applications to breach networks, as seen in the 2025 Salesforce attack by Shiny Hunters. Artificial intelligence tools are creating more sophisticated threats, such as advance...
Read More » -
US Government Shutdown Cuts Cybersecurity Staff
The US government shutdown has drastically reduced staffing at key cybersecurity agencies, with CISA losing 65% of its personnel and NIST retaining only 34%, severely limiting national digital defense capabilities. Critical cybersecurity functions are impaired, including vulnerability management,...
Read More » -
The Energy Sector's Urgent Cybersecurity Crisis
The global energy sector is increasingly targeted by sophisticated cyberattacks, threatening power grids, national security, and economic stability due to rising electricity demand and vulnerabilities. Recent incidents, including a blackout in Spain and Portugal and attacks by groups like Sandwor...
Read More » -
BEAMTEL Launches CyberPlatform to Boost Morocco's Cybersecurity
BEAMTEL has launched CyberPlatform, Morocco's first fully Arabic-language cybersecurity education portal, to enhance national cyber resilience and make digital safety knowledge widely accessible. The platform offers tailored resources for various groups, including individuals, businesses, and gov...
Read More » -
Arctera InfoScale Uses AI to Detect and Stop Ransomware
Arctera's InfoScale platform now uses AI to detect and neutralize ransomware threats in real time by analyzing behavioral patterns across applications, storage, and infrastructure. The system provides full-stack visibility and application-aware actions, enabling immediate protective measures to l...
Read More »