FREE TO VIEW


« Back to News

2023-08-03

Chinese Spies Used Forged Validation Tokens To Access Government Emails

Chinese hackers breached email accounts at numerous organisations, including US government agencies, to intercept secret information.

2023-07-19

RomCom Hackers Target NATO Summit

RomCom Rat: Russian state-sponsored hackers detected using malicious downloads targeting delegates attending a NATO conference.

2023-07-19

Details On How Revolut's Payment System Got Hacked

Hackers exploited differences between European and US payment systems, finding an unknown flaw enabling them to steal over $20m.

2023-08-03

The Most Used Malware In H1 2023

Qbot has been the most prevalent malware so far in 2023, ranking first in five out of the six months to date, while MOVEit has made a big impact.

2023-07-28

HSBC Using Quantum To Protect Against Cyber Threats

The major international bank is testing a quantum-secured network in London's financial centre, as it prepares for future security threats.

2023-08-02

TrueBot: Cyber Security Agencies Issue A Warning

A new variant of TrueBot malware is focusing on companies in the US and Canada, aimed at stealing private data from infiltrated systems.

2023-08-02

A Cyber Security Plan For Digital Currency

Central Bank Digital Currencies: The BIS has laid out a seven-point plan designed to help countries prevent cyber attacks on digital currencies.

2023-08-01

Who Practices Digital Safety Better, Mac Or Windows Users?

Microsoft Vs. Apple: Despite ever-evolving changes in the cyber security landscape, many people still hold outdated ideas about digital safety.

2023-07-31

Cyber Crime Claims Repeat Victims

Over 80% Attacked More than Once: Cyber crime attacks are costly and some businesses are finding themselves being targeted multiple times.

2023-07-24

The Security Challenge: Mapping & Securing Your Distributed Data

Why mapping your distributed data is necessary, what challenges you’ll face along the way, and how you can overcome them. By Dotan Nahum

2023-07-26

British Employees Lack The Training To Use AI Tools

Research from Salesforce shows that skills shortages at organisations across the UK pose serious challenges for the uptake of AI tools. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

TSARKA

TSARKA

TSARKA (formerly the Center for Analysis & Investigation of Cyber Attacks - CAICA) is a leader in cybersecurity in Central Asia, playing a key role in protecting government and private IT assets.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

RedArx Cyber Group

RedArx Cyber Group

At RedArx Cyber Group, our vision is to empower businesses with cutting-edge, proactive security solutions that safeguard their digital landscapes.