FREE TO VIEW


« Back to News

2024-09-10

Google's $200 Billion AdTech Business Has A Monopoly Challenge

Google has lost one major case concerning its dominance in Online Search. Now, it faces a second lawsuit challenging its dominace in AdTech.

2024-09-10

Social Media, Misinformation & The US Elections

Generative AI plus a reliance on social media & other online news sources are making it hard for voters to know what's real and what's not.

2024-09-09

Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming

The accused claimed more than $10m in music royalty payments using AI tools and a network of bots, in a highly sophisticated long-term fraud.

2024-09-09

Telegram Disables Features Used For Illegal Activity

Telegram has moved fast to change some key features of its messaging platform, affecting 950m users, following the arrest of CEO Pavel Durov.

2024-09-06

How AI Will Help Disrupt Elections Around The Globe

Generative AI is an attractive option for politically driven and nation state-sponsored threat actors. What can stop them? By Craig Watt

2024-09-09

Cyber Attack Hits German Air Traffic Control

The German air traffic control agency was hit by a cyber attack disrupting its office communications and Russian military hackers are suspected.

2024-09-09

Iranian Campaign Targets WhatsApp Users

Meta has disclosed a cyber security issue involving Iranian threat actors targeting WhatsApp users across multiple countries, including Israel.

2024-09-07

Hackers Attack Russia & Belarus

Head Mare: A hacktivist group carrying out cyber attacks targeting organisations located in Russia and Belarus using ransomware tools & tactics.

2024-09-02

Beware Of Online Rental Scams

Criminals posing as a landlord to make potential renters pay money for a property that isn’t available, doesn’t exist, or isn’t theirs to rent out.

2024-09-04

Global AI Safety: Scientists Can Move The Needle

As differences in political values & priorities intensify cooperation on AI safety, scientist-led dialogue shows its worth. By Isabella Wilkinson

2024-09-04

High Stakes: Business Email Compromise

Research has discovered that half of spam emails are BEC. Of these, 40% were AI-generated and, in some cases, AI created the entire message.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.