FREE TO VIEW


« Back to News

2024-10-17

2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors

Complex nation state-level activity involving the deployment of intrusive attack vectors, influence campaigns & hybrid threats combining both.

2024-10-09

2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

USA 2024 Elections: Hostile nation pose a serious foreign influence threat, sowing discord & division amongst US citizens.. By Craig Watt 

2024-09-26

A Critical Flaw Exposing Google Cloud Servers

CloudImposer: The flaw could potentially expose millions of servers operating on Google Cloud Platform to Remote Code Execution attacks. 

2024-10-04

Cyber Insurance: What Businesses Need To Know

A Crucial Safety Net Gets More Expensive: As ransomware incidents have surged, so too have the premiums for cyber insurance. By Greg Day

2024-10-11

Advances In Recognising Deepfakes

Detecting AI-generated content is becoming increasingly difficult. This has significant implications, like deciding if evidence is real or not.

2024-10-11

Surge In DDoS Attacks On Financial Services

Network Layers 3 & 4: Financial services continues to be the most frequently targeted industry with DDoS attacks for the second year running.

2024-10-10

Improving Cyber Security With AI

Turning Information Into Intelligence: AI becomes more intelligent the more it’s used, understanding a company’s unique environment.

2024-10-09

Conspiracy - Reducing Fake News & Disinformation

AI Chatbot Of Truth: Widespread belief in unsubstantiated conspiracy theories is a major source of public concern and a focus of scholarly research.

2024-10-09

Pakistan Joins The Top Tier Of Global Cybersecurity

Pakistan has moved up to join the Top 50 in the ITU Global Cyber Security Index, in major boost to international confidence in the national economy.

2024-09-24

Chinese Botnet Deployed To Infect Critical Infrastructure

Chinese threat groups are using rigged IoT devices to hack US and other organisations, presenting an increased threat to critical infrastructure.

2024-10-08

Truth & Lies About US Hacked Voter Data

Malicious actors want to undermine confidence in US election infrastructure. There is no sign the voting system has been compromised, yet.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Cyberint

Cyberint

Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.

Cybonet

Cybonet

Cybonet provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolving threats.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

Procsima Group

Procsima Group

Procsima Group was created to help you achieve good IT management and security excellence.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.

Cyber Compliance Watch

Cyber Compliance Watch

Free index and notification of main new cyber security publications (standards and regulations) from agencies and regulators.