Catch up on the latest TV appearances, press coverage, research-driven reporting, and executive thought leadership from SecurityScorecard in Q1 2025. Coverage highlights how SecurityScorecard is helping organizations better understand and manage cyber risk, with expert perspectives on the accelerating impact of third-party and Nth-party breaches, software supply chain attacks linked to nation-state actors, and rising scrutiny of cyber risk governance across enterprises, financial services, and critical infrastructure.
Media covered several SecurityScorecard reports, from the Global Third-Party Breach Report to the STRIKE Threat Intelligence team’s research on North Korean hackers and DeepSeek research.
January – March 2025
TV
SecurityScorecard TV appearances from Q1 2025.
- FOX Seattle – Avoiding sweetheart scams this Valentines Day. SecurityScorecard appeared on FOX Seattle to discuss common romance and “sweetheart” scams, offering practical guidance to help consumers recognize and avoid emotionally driven fraud tactics.
Report Coverage
Media outlets covered SecurityScorecard’s 2025 Global Third-Party Breach Report, research on North Korean hacking groups, insurance-sector breach analysis, and security ratings data on European enterprises, reinforcing the role of vendor-driven exposure as defining cybersecurity challenges in 2025.
- Forbes – Nth-Party Risks In Modern Business Environments
- Dark Reading –SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks
- Risky Business – France runs phishing test on 2.5 million students
- The HIPAA Journal – More Than One-Third of Data Breaches Due to Third-Party Compromises
- SC Media – Upswing in third-party breaches observed
- Infosecurity Magazine – SecurityScorecard Observes Surge in Third-Party Breaches
- TechRadar – Third-party security issues could be the biggest threat facing your business
- IT Pro – These five countries recorded the most third-party data breaches last year
- InformationWeek – Capital One Outage Highlights Third-Party Risk
- SiliconANGLE – CoreWeave’s IPO Fizzles. Is The AI Data Center Boom About To Sputter Too?
- Help Net Security – Only 26% of Europe’s top companies earn a high rating for cybersecurity
- TechRadar – Third-party data breaches have become a major security concern
- Insurance Journal –Third-Party Attack Vectors Responsible for 59% of Insurance Breaches
- Security Magazine – 59% insurance sector breaches caused by third parties
- IT Pro – Insurance sector urged to sharpen up third-party risk management as attacks surge
- SDxCentral – SecurityScorecard report: 59% of breaches impacting insurance sector caused by third-party attack vectors
- Singapore Business Review – Singapore leads world in third-party breach rate at 71.4%
- CSO – North Korean hackers impersonated recruiters to steal credentials from over 1,500 developer systems
- Risky Business – Risky Bulletin: Sandworm deploys Tor nodes on hacked networks
- TechRadar – North Korean Lazarus hackers launch large-scale cyberattack by cloning open source software
- Dark Reading – Researchers Uncover Lazarus Admin Layer for C2 Servers
- The Hacker News – Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks
- Risky Business – Threat actor impersonates FSB APT to target Russian orgs.
- Infosecurity Magazine – North Korea Targets Crypto Devs Through NPM Packages
- TechRadar – New Lazarus Group campaign sees North Korean hackers spreading undetectable malware through GitHub and open source packages
- Infosecurity Magazine – Lazarus Group Targets Bitdefender Researcher with LinkedIn Job Scam
- Infosecurity Magazine – Lazarus Group Targets Developers in New Data Theft Campaign Original
- SC Media – New Lazarus Group attack campaign sets sights on freelance software developers
- SecurityWeek – North Korean Hackers Targeting Freelance Software Developers
- Dark Reading – North Korea’s Lazarus Evolves Developer-Recruitment Attacks
- The Hacker News – Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99
- The Register – Harry Potter publisher breached, millions of records lifted
- Computing UK – Lazarus Group hiding malware in GitHub and open-source packages.
- The Register – North Korea hits crypto wallets in NPM supply chain attack.
- The Register – North Koreans clone open source projects to plant backdoors, steal credentials.
Illuminating Cyber Risk to Help Protect Organizations Across North America
North American coverage referenced SecurityScorecard insights on nation-state cyber activity, evolving attack techniques, policy developments, and the operational consequences of third-party failures.
- Forbes – The End Of The Traditional CISO. SecurityScorecard CEO and Co-Founder Dr. Aleksandr Yampolskiy wrote on the evolving role of the CISO and bridging the gap between technical and business needs.
- Dark Reading – Pentagon, CISA Deny Change in U.S. Cyber Policy on Russia. Dark Reading examined U.S. cyber posture toward Russia, featuring commentary from SecurityScorecard.
- SC Magazine – DeepSeek: A fleeting challenger? Or a looming threat?. SecurityScorecard CEO and Co-Founder Dr. Aleksandr Yampolskiy wrote on SecurityScorecard research on the cybersecurity risks of using DeepSeek.
- CyberScoop – Restoring U.S. cyber resilience: A blueprint for the new administration. Brian Harrell and Jeff Le co-authored thought leadership on public-private collaboration, policy direction, deterrence, critical infrastructure protection, and CISA.
- ISMG – Evolving DDoS tactics: Cyber experts analyse the X incident. ISMG analyzed shifting DDoS tactics in the context of a high-profile platform disruption, citing SecurityScorecard’s STRIKE team analysis on attack evolution.
- Government Technology – Grading CISOs: Effective Metrics and Personal Growth Strategies. Government Technology explored how CISOs are evaluated, citing SecurityScorecard thought leadership.
- Information Week – What Is Going on with US Cyber Command in Regard to Russia? InformationWeek analyzed U.S. Cyber Command and state-level signaling, featuring SecurityScorecard commentary.
- American Banker – U.S. government, companies reject DeepSeek; should banks? American Banker examined institutional hesitation around DeepSeek and associated security risks.
- Dark Reading – Risk, Reputational Scoring Services Enjoy Mixed Success. Dark Reading covered the effectiveness of cyber risk scoring.
- Infosecurity Magazine – Cyber AI Trends Review: Preparing for 2025. Infosecurity Magazine analyzed AI trends shaping cybersecurity strategy.
- FutureCISO – Risks and how to respond to software supply chain attacks in 2025. SecurityScorecard CISO Steve Cobb wrote in FutureCISO about third-party supply chain threats of 2025 and how to mitigate them.
Illuminating Cyber Risk to Help Protect Organizations Across Europe and the Middle East
Press coverage in EMEA referenced SecurityScorecard insights to examine attribution of cyber incidents, supply chain compromise, regulatory change, and high-profile data breaches.
- Sky News – X outage: Who are hackers ‘behind massive cyber attack’ on Elon Musk’s social media platform? Sky News explored attribution questions surrounding a major platform outage, citing SecurityScorecard research.
- The London Standard – Pointing finger at Ukraine after X outage is ‘dangerous’, cyber expert says. The Standard featured SecurityScorecard STRIKE insights on attribution.
- BBC – DeepSeek ‘shared user data’ with TikTok owner ByteDance. The BBC covered SecurityScorecard research on DeepSeek.
- Computing UK – US risks losing critical cyber capabilities, say analysts. Computing UK examined cyber deterrence and cyber policy, highlighting SecurityScorecard STRIKE commentary.
- SC Magazine UK – Regulation Predictions: From NIS2 and DORA to AI. SC Magazine UK assessed upcoming regulatory shifts affecting cybersecurity strategy, featuring analysis from SecurityScorecard CEO and Co-Founder Dr. Aleksandr Yampolskiy.
- Forbes – Eclypsium Raises $45M To Lock Down Supply-Chain Security. Forbes covered investment activity focused on supply chain defense, citing SecurityScorecard data.
Press contact
Explore more insights from the STRIKE Threat Intelligence Team or see our latest blogs for additional insights.