Please turn JavaScript on
header-image

Cybersecurity Magazine

Subscribe in seconds and receive Cybersecurity Magazine's news feed updates in your inbox, on your phone or even read them from your own news page here on follow.it.

You can select the updates using tags or topics and you can add as many websites to your feed as you like.

And the service is entirely free!

Follow Cybersecurity Magazine: Cybersecurity Magazine - Science meets Practice

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  1.98 / week

Message History

At the ETSI Security Conference 2025, we spoke with Bengt Sahlin from Ericsson about the emerging landscape of 6G security. Sahlin shared insights on the evolution of mobile network security from 5G to 6G, the unique challenges introduced by new technologies and use cases like integrated sensing, the importance of threat analysis and security-by-design, and the role of global...

Read full story

As the holiday season approaches, retailers are facing a perfect storm with  container imports totaling 2.5 million TEUs–a 1.6% incre...

Read full story

Welcome back to the series on the IEC 62443 standard for industrial cybersecurity. This third installment will investigate the documents that are part of the fourth of documents, or documents in the IEC 62443-4 series.

This series of documents are aimed at vendors that produce and support the gizmos in industrial infrastructure. Like the series of documents in the IEC ...

Read full story

One quiet morning in April 2025, officials at DaVita, one of the largest kidney dialysis providers in the United States, were jolted by a wireless alert that something was wrong. Cybercriminals had breached their network and were creeping around undetected for weeks, collecting the sensitive data of millions of patients. But there was an extraordinary, yet not inco...

Read full story

In July 2025, Ukraine’s CERT-UA disclosed a new form of cyber threat: malware that doesn’t wait for instructions. Instead, it acts autonomously. The incident, involving an AI-enabled agent known as LameNet, is among the first publicly documented cases of artificial intelligence being used to drive independent command execution within a...

Read full story