For its 2025 Business Impact Report the Identity Theft Resource Center (ITRC) surveyed 662 owners and senior executives at businesses with 500 or fewer employees about their IT security posture and how they plan to combat ai challenges. The study found that only 38% of small business leaders felt their organizations were “very prepared” to fend off a cyberattack or recover from a data breach.1
The Infostealer Leak Crisis: How Stolen Passwords Are Fueling the Next Wave of Breaches
Infostealer malware has rapidly emerged as one of the most dangerous and least understood cybersecurity threats facing businesses today. Unlike traditional data breaches that target a single organization, infostealer malware quietly harvests passwords, financial data, and sensitive credentials directly from large populations of infected devices, compiling them into massive credential leaks that fuel ransomware, fraud, and identity-based attacks at scale.
How Strong Password Management Could Have Helped Stop the Ubisoft Rainbow Six Siege Password & Token Leak
The recent Ubisoft Rainbow Six Siege incident demonstrates how a massive password leak can disrupt internal IT infrastructure. Rather than targeting user credentials, hackers exploited a database weakness, proving that strong credential management must extend beyond human accounts.
UK’s Most Leaked Passwords in 2026: If You’re Using These, Change Them Now
A comprehensive analysis of the most leaked passwords reveals that British users are making themselves sitting ducks for cybercriminals—and it’s time for a wake-up call.
Tackling the Financial Cost of Cybercrime
In 2025, 62.5% of U.S. small businesses suffered a breach resulting in a combined negative financial impact of at least $250,000 in lost revenue, remediation costs and fines. More than a third of that group reported losses upwards of $500,0001.
Major Current Password Breach Trends: What Security Teams Need to Know Going Into 2026
Unmanaged password breaches remain one of the most common and damaging cyber incidents in today’s digital landscape. Attackers continue to exploit weak credentials, reused passwords and stolen authentication tokens to gain access at scale. Thanks to AI, the growing sophistication of scams and malware make it harder to tell fact from fiction.
The Changing Nature of Cyberattacks & How to Protect Your Business
A new attack vector emerged as a significant threat in 2025: AI-powered cyberattacks.
5 Security New Year’s Resolutions for a Safer 2026
Some New Year’s resolutions like dieting, exercise and giving up smoking don’t make it beyond January.
Santa Learns an Expensive Gift Giving Lesson
Santa’s workshop at the North Pole suffered a major data breach. In their worst sugarplum and candy cane-induced nightmares, none of the elves on the IT staff at KringleToys, Ltd.