About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Cognyte 2025 Threat Landscape Report Reveals Global Trends in Cyberattacks, Ransomware and Stolen Credentials

Extensive data analysis and AI-driven insights indicate hacktivist groups increasingly involved in cybercrime; data shows a 28% increase in stolen access credentials available on the dark web

Cognyte Software Ltd. (NASDAQ: CGNT) (“Cognyte”), a global leader in investigative analytics software, today announced the latest findings from Cognyte’s LUMINAR Threat Intelligence Research Group, highlighted in its 2025 Annual Threat Landscape Report. The report provides detailed insights into the global cyber threat landscape and analyzes major trends and threat vectors worldwide, including exploitation of high-profile vulnerabilities, ransomware attacks and stolen access credentials.

The report findings demonstrate how the boundaries are increasingly blurring between traditional types of threat actors – nation-state sponsored attackers, cybercriminals and hacktivists. Crime, conflict and terror are evolving, crossing borders, bypassing traditional cyber defenses and operating at scale.

Among the key findings from the 2025 LUMINAR Threat Landscape Report:

  • 49% of cyberattacks were attributed to financially motivated cybercriminals, while state-sponsored actors accounted for 36% of attacks and hacktivists accounted for 4% of attacks in 2024.
  • Several hacktivist groups ventured into cybercrime in 2024, launching their own ransomware and ransomware-as-a-service (RaaS) operations. Nation-state actors showed increased cooperation with ransomware gangs.
  • Stolen access credentials continue to enable widespread cyberattacks, leading to data breaches, financial loss and system compromises. The unique expert insights and comprehensive data in the report show that stolen access credentials published on dark web marketplaces increased about 28% from approximately 6 million in 2023 to approximately 7.7 million in 2024.
  • Cyber activities are increasingly used to support physical operations in war. Regional conflicts have escalated cyberattacks globally.
  • Vulnerabilities continue to be a key attack vector. 40,704 new vulnerabilities were disclosed in 2024, with an average CVSS (Common Vulnerability Scoring System) score of 5.7.
  • Ransomware gangs claimed responsibility for targeting 6,133 victims in 2024, an increase from 5,336 claimed victims in 2023. On the other hand, ransomware payments dropped by 35% worldwide.
  • AI continues to revolutionize the cybersecurity landscape, with significant potential for fighting threats, as well as for exploitation in the hands of threat actors.

The data revealed in Cognyte’s 2025 LUMINAR Threat Landscape Report illuminates attack methods and threat vectors spanning financial services, technology, manufacturing, healthcare, government, commercial and education sectors. The report details real-world examples of cyberattacks, threats and the impact of law enforcement operations targeting them.

The 2025 LUMINAR Threat Landscape Report also includes an overview of Cognyte’s recommendations and general best practices to protect against the common threat vectors and threats addressed in the report. The full report is available for download here.

Research Methodology

Cognyte’s 2025 LUMINAR Threat Landscape Report includes extensive data analysis and AI-driven insights distilled from wide-ranging 2024 data, utilizing a proprietary threat intelligence repository with evidence-based data on global cybersecurity incidents. LUMINAR is an analytics-driven external threat intelligence software, enabling security and risk management leaders the ability to maintain visibility of their threat landscape and extract timely, accurate and actionable insights that can be applied before, during and after threats reach the organization. For the analysis in this report, Cognyte’s LUMINAR Threat Intelligence Research Group utilized extensive data from diverse sources, including hacking forums, dark web marketplaces, ransomware leak sites, commercial feeds and other proprietary sources.

About Cognyte Software Ltd.

Cognyte is a leading software-led technology company, focused on solutions for data processing and investigative analytics which allow customers to generate actionable intelligence from their data, thereby enabling a safer world. Cognyte’s solutions empower law enforcement, national security, national and military intelligence agencies, and other organizations to navigate an increasingly complex landscape. With offerings that leverage state-of-the-art technology, including Artificial Intelligence (AI), big data analytics and advanced machine learning, Cognyte enables smarter, faster decisions for successful outcomes. Hundreds of customers rely on Cognyte solutions to uncover critical insights from past events and anticipate emerging threats. By harnessing AI-driven intelligence, Cognyte accelerates investigations with exceptional speed and accuracy while enabling customers to better anticipate, predict and mitigate threats with greater precision. Learn more at www.cognyte.com.

The unique expert insights and comprehensive data in the report show that stolen access credentials published on dark web marketplaces increased about 28% from approximately 6 million in 2023 to approximately 7.7 million in 2024.

Contacts

Media Relations Contact:

Michelle Allard McMahon

Rainier Communications on behalf of Cognyte Software

prcognyte@rainierco.com

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.