News

2024-09-09

Iranian Campaign Targets WhatsApp Users

Meta has disclosed a cyber security issue involving Iranian threat actors targeting WhatsApp users across multiple countries, including Israel.

2024-09-07

Hackers Attack Russia & Belarus

Head Mare: A hacktivist group carrying out cyber attacks targeting organisations located in Russia and Belarus using ransomware tools & tactics.

2024-09-02

Beware Of Online Rental Scams

Criminals posing as a landlord to make potential renters pay money for a property that isn’t available, doesn’t exist, or isn’t theirs to rent out.

2024-09-04

Global AI Safety: Scientists Can Move The Needle

As differences in political values & priorities intensify cooperation on AI safety, scientist-led dialogue shows its worth. By Isabella Wilkinson

2024-09-04

High Stakes: Business Email Compromise

Research has discovered that half of spam emails are BEC. Of these, 40% were AI-generated and, in some cases, AI created the entire message.

2024-09-03

Bolster Security Using Dark Web Intelligence

Transferring unknown risk into known and mitigated risk, preventing threat actors before they strike and taking immediate actions in response.

2024-09-04

London Transport Hit By A Cyber Attack

Update: IT systems at Transport for London, which manages public transport across the capital, have been targeted in an on-going cyber attack.

2024-09-01

AI & Biometrics In Cybersecurity

Securing the Digital Frontier: AI and Biometrics have a place in the cybersecurity measures needed to defend against cyber threats.

2024-09-02

Iranian State-Sponsored Hackers Attacking Israel

Established Iranian hackers are working with cyber criminals who specialise in ransom, sharing their expertise to accelerate attacks on Israel.

2024-09-02

The Rise Of SD-WAN And Its Implications For Security & Performance

Navigating The Future Of Networking: The deployment of SD-WAN should go hand in hand with increased cyber surveillance. By John Diamond

2024-09-02

Standards: The Key To Building A Sustainable Quantum-Safe Future 

Quantum computing has the potential to address some urgent problems, while simultaneously risking security infrastructure. By Issam Toufik

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.

DuploCloud

DuploCloud

DuploCloud offers an end-to-end DevOps software platform for dev teams that don’t have dedicated DevOps engineers and augments those that do.