News

2024-08-24

Chinese Attacks On Russian Government Agencies 

CloudSorcerer: Someone is attacking Russian government and infrastructure using a sophisticated tool associated with Chinese hackers.

2024-08-23

Predictions For The Fourth Industrial Revolution [extract]

Industry 4.0: The biggest surprise might be the unexpected ways that humanity innovates in response to the challenges & opportunities of the age.

2024-08-22

Predictions For The Fourth Industrial Revolution

Industry 4.0: The biggest surprise might be the unexpected ways that humanity innovates in response to the challenges & opportunities of the age.

2024-08-22

Judge Uses ChatGPT As A Source For Court Verdict

A lower court judge in the Netherlands asked an AI chatbot about the average life span of a solar panels, using the answer it generated in his verdict. 

2024-08-22

How Can You Scan Your Mac For Existing Malware?

Macs have a great reputation, but users need to take steps to identify potentially dangerous malware that might steal their identity & delete files.

2024-08-23

WhatsApp Is A Vehicle For Illegal Content

Encrypted Child Sexual Abuse Imagery: A conflict between the need for enforceable child protection measures and rights to user privacy.

2024-08-22

Threat Intelligence: Most Prevalent Malware Rankings

The Usual Suspects: The top Malware families, exploited Vulnerabilities, mobile Malwares, Ransomware groups and attacked industry sectors.

2024-08-20

APT42: Iranian Hackers At Work

State-sponsored hackers from Iran are busy ramping up targeted phishing campaigns and fake news operations to undermine the US elections.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

2024-08-20

Quantum Computing Security Could Solve The Data Sovereignty Challenge

What can organisations do to ensure their data processing remains on the right side of the law when managing data sovereignty? By Adrian Fern

2024-08-17

A New Microsoft Vulnerability Warning

Just a month after the Crowdstrike incident, another vulnerability has been found in Windows that can result in the 'Blue Screen of Death' error.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Auraya

Auraya

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities.