News

2022-01-03

Malicious Joker App Gets Half A Million Downloads

Joker Malware is a persistent threat that infects legitimate apps then steals from users by subscribing them to unwanted subcription services.

2022-01-03

Belgium’s Military Suffer From Log4j Attack

The Belgian Defence Ministry's computer network is being restored to full operation following an attack delivered via Log4shell vulnerabilities.

2021-12-22

Britain's HMRC Tax Agency Admits Numerous Data Breaches

The HMRC has disclosed 17 breaches in 15 months from 2020, affecting 3,000 individuals, as a result of unauthorised changes to personal records.

2021-12-29

Most British Workers Are Unaware Of Cyber Threats

Don't Know, Don't Care: Only a quarter of UK employees are aware of cyber risks, although more than half have been affected by an attack.

2021-12-31

British Plan To Become A ‘Global Cyber Power’ In 2022

Britain plans to advance in cyberspace and will support its workforce & industry in upgrading the technologies vital to developing its cyber power.

2021-12-24

Log4j Cyber Security Flaw Seriously Concerns Experts

The Log4j vulnerability is being widely exploited by a growing number of threat actors, prompting government officials to take action.

2021-12-22

Cyber Revolution In The Media & Entertainment Industry

Media & Entertainment companies are increasingly becoming targets for cyber crime as their business models swiftly evolve in the digital era.

2021-12-22

Microsoft's New AI Debugging Tool

BugLab: Microsoft’s concept is to develop an AI that can automatically find and repair software bugs using a 'hide and seek' game as the model.

2021-12-21

The Pentagon Needs To Change How It Does AI

The US Defense establishment needs a more integrated approach to AI if it is to translate its technical capabilities into effective military tools.

2021-12-21

Stealthy Malware Hiding Behind An Invalid Date

e-Commerce At Risk: A highly sophisticated malware targeting online stores, CronRAT is undetected by many antivirus engines.

2021-12-20

Protecting Your E-Commerce Business Against Ransomware Attacks

Online sales are soaring and businesses are building their digital presence, but they must ensure their cyber security keeps pace. By Neville Louzado

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

Aptible

Aptible

Aptible is a Platform as a Service (PaaS) that gives startups everything developers need to launch and scale apps and databases that are secure, reliable, and compliant.

National Cybersecurity Preparedness Consortium (NCPC) - USA

National Cybersecurity Preparedness Consortium (NCPC) - USA

The mission of the NCPC is to provide research-based, cybersecurity-related training, exercises and technical assistance to local jurisdictions, counties, states and the private sector.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.