About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Lumu 2025 Compromise Report Finds Key Trends Across Evasion, Malware, and Phishing Attack Vectors

Report examines current cybersecurity trends, increase of malware in different industries, and MITRE tactics used by cyber criminals

Lumu, the cybersecurity company pioneering Continuous Compromise Assessment, today issued the 2025 Compromise Report identifying three key cybersecurity trends including new phishing techniques, a rise in certain forms of malware, and increasingly clever evasion techniques such as anonymizers and droppers. The report also found an increase in attacks across four essential sectors including Education, State and Local Government, Finance, and Healthcare, with the SLED sector (a combination of State and Local Government and Education) facing 60% of recorded anonymous attacks, 50% of droppers attacks, and 70% of ransomware attacks.

“Today’s cybersecurity landscape is a continuously shifting battleground. Unfortunately, evasion is no longer the exception – it’s fast becoming the norm. In order for today’s organizations to effectively defend themselves against a constant onslaught of threats, they need to better understand how their enemies and their tactics are changing,” said Ricardo Villadiego, Founder and CEO of Lumu. “Our latest report provides essential insights into the evolving tactics, techniques, and procedures adversaries are using to get past even the most robust defenses and emphasizes the need for continuous detection, a well-integrated stack, and up-to-date intelligence.”

The report notes that attackers are getting savvier at bypassing security controls, leveraging techniques like Living-off-the-Land (LotL) and exploiting vulnerable drivers. Anonymizers and droppers are also being used to hide attackers’ actions, while they simultaneously deliver harmful software. Malware, too, is getting better at evading detection. Hackers are increasingly turning to infostealers, which use fileless execution and obfuscation, to steal a wider range of data, and in doing so pave the way for ransomware and other attacks. Phishing attacks are also evolving, whereby attackers are using AI for polymorphic emails, exploiting MFA fatigue, and using quishing—the use of Quick Response (QR) codes in phishing—to fool users.

The report also provides an in-depth case study of Lumma Stealer, a common type of infostealer that is now the top type of malware and which accounts for over 25% of recorded infostealer attacks worldwide and over 50% of infostealer attacks on the US SLED sector.

Other key findings include:

  • Almost 40% of ransomware attacks in the US targeted the education sector
  • New phishing attack techniques, including fake-CAPTCHA, AI-powered polymorphic phishing, and quishing, are on the rise
  • While phishing attempts were detected across all sectors, essential services such as education, associations and nonprofits, government, IT and software companies, finance, and healthcare, were the most popular targets
  • Defense evasion is the most-used MITRE tactic in cyber incidents today
  • Attackers are using execution tactics to run malicious software on compromised systems, with the most common technique being Malicious File (T1204.002)

To read a full copy of the report, please visit 2025 Compromise Report. To learn more about Lumu’s industry-leading cybersecurity solutions, visit lumu.io.

About Lumu

Lumu is a cybersecurity company that helps organizations operate cybersecurity proficiently by measuring and understanding compromise in real time. Through its Continuous Compromise Assessment model, Lumu empowers security teams to act immediately on confirmed compromises and minimize risk exposure. For more information, visit www.lumu.io.

"Our latest report provides essential insights into the evolving tactics, techniques, and procedures adversaries are using to get past even the most robust defenses."

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.