FREE TO VIEW


« Back to News

2025-02-11

Hackers Innovate To Attack Microsoft 365 Accounts

High Speed Brute Force: Hackers have been using HTTP client tools for sophisticated account takeover attacks on Microsoft 365 environments.  

2025-02-07

Australia Bans DeepSeek In Government Networks

Backlash: Australia has banned DeepSeek from all their government systems because of what it says is an unacceptable national security risk.

2025-02-13

Texas Creates Its Own Cyber Command Center

Texas is the eighth largest economy in the world, with numerous Oil, Gas, Financial & Military targets for cyber criminals and nation state actors.

2025-02-11

Ransomware Attack on Tata Tech

Tata Technolgies, a major service supplier to government and the automotive, aerospace, and heavy machinery industries discloses a data breach.

2025-02-07

Google Reports Widespread Misuse Of Gemini AI

Google’s says that Iran is the leading state actor exploiting Gemini, its AI-powered chatbot, for hacking, espionage & information warfare.

2025-02-06

File Transfers Can Be The Weakest Link

File transfers need to be easy, quick and most of all, safe. But that requires more than just a traditional email gateway solution. By Richard Bourne

2025-02-05

A History Of Artificial Intelligence And Its Current & Future Development [extract]

AI Is No Longer A Technology Of The Future: It is a technology that already impacts all of us, ranging across many different applications.

2025-02-05

Cyber Threat Forecast Part 2 - India   

Strained relations across South Asia, as well as between India & nation-states further afield, threatens an explosion of cyber activity. By Craig Watt

2025-02-05

New Study From Gen Reveals Over 600% Rise in 'Scam-Yourself' Attacks

Genius In Simplicity: The attack's success relies not on sophisticated malware or zero-day exploits but on human psychology and social engineering.

2025-02-04

Lessons Learned From The Salt Typhoon Hacks

Relying On Detection Is Not Enough: Businesses need to be on the front foot and stop these attacks at the source. By Danny Jenkins

2025-02-10

New Laws To Prevent Using AI To Generate Sexual Images

Punishable By Five Years in Prison: Britain is to introduce new laws to tackle the misuse of AI tools behind the creation of abusive child imagery.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

CQR

CQR

CQR are at the forefront of innovative cyber solutions, dedicated to securing and fortifying Operational technology (OT) infrastructure.

YSecurity

YSecurity

At YSecurity, we simplify compliance, prevent breaches, and help startups scale with confidence. Focus on growth—we’ll handle the security.