The present study conducted a bibliometric analysis to synthesise available literature on cybersecurity. The analysis identifies prolific authors, relevant sources, affiliations, nations, trend topics, publication trends, themes, and collaboration patterns among countries. Scopus database was searched using the keyword “cyber security” and the search resulted in 31,852 articles. After the
... [Show full abstract] inclusion and exclusion criteria, a total of 733 documents were extracted in a CSV format for analysis. The Biblioshiny web tool of the R-package was used for analysis. The finding shows an exponential rise in scholarly work on cybersecurity. “Information and computer security” is identified as the most relevant source. Chen H has published most articles and the USA leads the field in terms of publication, global citations, and collaboration with other countries. The trend topics and themes have also been listed. The study would help readers understand the landscape of cybersecurity research, identify key contributors, and guide them in addressing the challenges posed by cyber threats.