News

2024-06-04

Hamlet’s IP & AI

Washington Drama: As US regulators turn their attention to Artificial Intelligence, they face many complicated issues to untangle. By Ron Marks

2024-06-01

A Single Attack Disabled Half A Million Routers

Details emerging about a 2023 exploit which knocked out over 600,000 routers in an unprecedented attack against a single Internet Service Provider.

2024-06-03

Shiny Hunters Attack Santander Bank

Hackers responsible for the massive breach at Ticketmaster have stolen the confidential information of 30 million Santander employees & customers.

2024-05-30

Email Encryption: What It Is & How It Works

Email Encryption: An essential tool that keeps users' sensitive information safe from threats like hacking, fraud, data breaches and identity theft.

2024-05-31

Online Fraud - Police Agencies Recover Stolen $Millions

Operation Endgame: Europol & the US Dept of Justice make arrests and recover stolen funds in separate operations against botnet & malware thieves.

2024-05-31

Telecoms - Beware Of The DDoS Threat Actor

Combatting the wave of DDoS attacks against the telecommunications industry is critical to protecting global connectivity. By Richard Hummel

2024-05-31

The Key Components Of Embedded Systems Development Services

Embedded systems development services are essential for businesses and industries seeking to leverage the power of customized & efficient systems.

2024-05-31

Safeguarding Data In The Quantum Computing Era

Quantum Apocalypse: Now is the time to start learning about existing quantum-resistant encryption technologies & solutions. By Prof. Nigel Smart

2024-05-30

Massive Breach At Ticketmaster

1.3 Terabytes Of Data Stolen: Ticketmaster has been hit by a cyber attack by the 'Shiny Hunters'. Sensitive customer data is for sale for $500k.

2024-05-30

Five AI-driven Features to Enhance Payment Gateway Security

Incorporating AI-driven features into payment gateway security frameworks is essential for staying ahead of sophisticated cyber threats.

2024-05-29

Hackers Exploit GitHub & FileZilla To Deliver Malware

Fake GitHub accounts & repositories resembling real software programs, but filled with malware, designed to access computers and steal data.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Althammer & Kill

Althammer & Kill

Althammer & Kill offers pragmatic solution concepts for data protection and digitization. We advise in the field of data protection, information security and compliance.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

Zorins Technologies

Zorins Technologies

Zorins Technologies is a leading IT company providing IT networking Equipment and expertise in managed services, consulting, and cybersecurity.