News

2024-06-28

Russia’s Nation-State Hackers: A Serious Threat To Global Security

Russian hacking grabbed attention as a potential threat to free elections, national security, water systems, and even social stability.

2024-06-27

Europe's Digital Market Act Comes Into Force

Illegal App Store: European Union regulators have accused Apple of being in breach of new laws designed to restrict the big technology companies.

2024-06-28

The Crucial Role Of AI Red Teaming In Safeguarding Systems & Data

Red teaming exercises are one of the best ways to identify security & safety concerns in emerging technologies like generative AI. By Dane Sherrets

2024-06-27

Malware Targeting Smart TVs

Pandoraspear malware, which targets smart TVs running an open-source Android OS, has jumped into the top 10 most widely detected malware list.

2024-06-28

Music Rights Owners Want Payment From AI Platforms

The music industry is joining a growing number of claims by authors & news organisations disputing the right of AI firms to use their work.

2024-06-27

Cyber Aftermath From The Airstrike On Syria’s Iranian Consulate

Strikes & Bytes: What role will cyberspace play as the expanding conflict in the Middle East saga continues to go on? By Craig Watt

2024-06-27

The Rising Threat Of Deepfakes

Exploring The Security Challenges & Opportunities Of AI: Realistic deepfake images, audio, & video, are a growing threat. By Sam Peters

2024-06-26

LockBit Claims It Hacked The US Federal Reserve

LockBit claims to have stolen 33 terabytes of confidential data from the US Federal Reserve, but security researchers are expressing doubt.

2024-06-26

Hacker, Spy, Or Journalist?

The enigmatic founder of Wikileaks, Julian Assange, returns to Australia a free man after pleading guilty to only one US charge of espionage.

2024-06-25

Hackers Use Windows Backdoor To Deliver BadSpace

Fake Browser Update: A multi-stage attack chain involving an infected website, a command-and-control server, and a JScript downloader.

2024-06-25

How To Effectively Detect & Prevent SAP Threats

Porous Entry Points: SAP systems contain IT-enabled or overlooked vulnerabilities which leave them open to exploitation. By Christoph Nagy

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

SecureStream Technologies

SecureStream Technologies

SecureStream Technologies have built the IoT SafetyNet - the Network Security Analytics platform to Eliminate Security Threats, Guarantee Privacy, Ensure Compliance, Simply & Easily.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.

Auria

Auria

Auria advances complex space, missile, and cyber operations with visionary solutions and software.