Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors

The outcome of this year's Super Bowl matchup between the Kansas City Chiefs and the San Francisco 49ers on Feb. 11 at the Allegiant Stadium in Las Vegas will likely remain unknown until the last down of the game. But one thing that is already abundantly clear is that attackers will have no shortage of targets to blitz at the event.

The NFL's continuing digitization of almost all aspects of the event, from ticketing to gate access systems and virtually every other point of contact with fans, has opened new vulnerabilities and targets that its security team has had to secure. Concerns include threats to arena security, ransomware attacks on critical systems, phishing and credential theft, and threats to personal data and other sensitive information belonging to fans, NFL employees, players, and coaches.

 

Search
  • There are no suggestions because the search field is empty.
Latest posts
Part 2: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025 Part 2: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025

By 2025, zero trust will be the dominant architecture model, fully replacing outdated perimeter-based models. Security controls will focus increasingly on the workforce and workloads rather than just the workplace, leading to enhanced protection across diverse environments.

DNSFilter’s Annual Security Report Reveals Worrisome Spike in Malicious DNS Requests DNSFilter’s Annual Security Report Reveals Worrisome Spike in Malicious DNS Requests

Data shows one in every 174 requests is malicious, up from one in every 1,000 in the previous report

Part 1: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025 Part 1: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025

By 2025, generative AI will be integrated into nearly every business and department, significantly boosting productivity. However, this will also introduce new security risks that organizations will need to address. Simply automating tasks won't be enough. A focus on secure automation and responsible AI practices will be essential. Additionally, creating cyber exploits will become easier, as the barrier to entry lowers. Individuals will need to t...

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.