News

2023-09-08

Iranian Spyware Exposed

Balance Of Power: Hacking gang GhostSec has exposed face recognition & motion detection systems used to spy on Iranian dissidents.

2023-09-11

LockBit Hacked Montreal's Electricity Supplier

The ubiquitous ransomware group, LockBit, has breached data held by Montreal's power utility and is demanding a ransom of C$2 million.

2023-09-08

Poland’s Train Network Disrupted

Standstill In Szczecin: Poland's security & intelligence services are investigating an attack on its railway system's communications network.

2023-09-08

Qakbot Malware Taken Down

Qakbot malware infected victims via spam emails with malicious attachments, links and served as a platform for ransomware operators. 

2023-09-07

Can Shortening The Cyber Stack Increase Stability?

More Is Not Better: CISOs would derive more benefit from improving control over the stack rather than buying in more tools. By Tim Wallen

2023-09-07

The Unique TTPs Attackers Use To Target APIs

Application Programming Interfaces are the gateways to key data, and attackers will go to extraordinary lengths to compromise them. By Andy Mills

2023-09-06

Establishing A Digital Immune System

Creating The Self-Healing Enterprise With DIS: Why immunity should be your new favourite cybersecurity metaphor. By Matt Tuson

2023-09-06

LockBit Hacked British Military Data 

Details are emerging about how LockBit got access to top secret military data via a metal fence manufacturer running 20-year-old software.

2023-09-06

How To Check If A Link Is Safe

Malicious Links - A Step-by-Step Guide: Everyone connected to the Internet needs to learn how to test links for viruses and other hidden dangers. 

2023-09-05

Hackers Hit British Defence Ministry

Supply Chain Hack: Top secret security information on British military & intelligence sites has been leaked by hackers linked to Russia.

2023-09-04

Hackers Target Satellites 

Timing Systems, GPS & Communications: Orbital satellites keep the world running smoothly but have just the same vulnerability as ground facilities.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

Mocana

Mocana

Mocana provides a software platform that allows you to develop, test and distribute more secure IoT devices and services.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

CYSEC Global

CYSEC Global

CYSEC Global is a series of summits dedicated to tackle regional cyber security challenges.