News

2022-01-25

Ransomware Attack On Moncler

Italian luxury brand Moncler refused to pay ransom when its order processing system was disabled, resulting in a vengeful dump of employee data.

2022-01-25

Defending Against Log4j Vulnerabilities

Concealed Log4j vulnerabilities call for effective measures to reduce the frequency of disruptive events and to reduce the potential damage.

2022-01-25

Auto-Redirects: A Harmful Detour

Auto-redirects are a problem that many web users don't know about and are associated with a loss of privacy, malvertising, malware and more.

2022-01-25

Making Open-Source Software Safer

Open-source software has unique security challenges, because of its widespread use and the fact its security maintenance is reliant on volunteers.

2022-01-24

SAAS Malware Used To Attack Crypto Wallets

Cheap and easy-to-use malware available on Dark Web markets means that it has never been easier for cyber criminals to steal crypto currencies.

2022-01-24

Red Cross Hacked - Half A Million Victims At Risk

Hackers targeted an external server company that stores names, locations & contact information gathered from 60 Red Cross societies worldwide.

2022-01-24

NATO & Ukraine Agree Deeper Cyber Co-operation

The new agreement gives Ukraine access to NATO’s malware information sharing platform and help to identify Ukrainian cyber security training needs.

2022-01-22

The Next 9/11 Will Be A Cyber Attack

As tension in Ukraine grows, some security experts are saying that a cyber attack of devastating proportions is not a matter of if, but when.

2022-01-21

Is Cyber Training Fit For Purpose?

Tick A Box: Just telling your people to use stronger passwords, look out for suspicious links and check emails from new contacts isn’t enough.

2022-01-21

Chinese APT Hackers Used Log4Shell Exploit To Target Academic Institution

Specific steps you can take to ensure your security online & avoid tangling with hacker groups exploiting Log4j security flaws. By Ulrike Niemann

2022-01-19

Europol Is Told To Delete Its 'Big Data Ark'

The EU data protection regulator has ordered Europol to destroy six years worth of crime reports, hacked phones records & other intelligence.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Laneden

Laneden

Laneden specialise in helping organisations identify security concerns and quantify the risks you may have across your assets, using Penetration Testing, Threat Simulation and Compliance Testing.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.