News

2024-02-23

Cyber Insurance For Industrial Companies - Its Complex

Industrial firms face big challenges & complex processes to get cyber insurance cover, leaving many of them excluded. By Edgardo Moreno

2024-02-23

Cybersecurity, Volt Typhoon & The Grid

As IT becomes more and more a part of OT, the growing reliance of the grid on digital systems increases the possibility of cyberattacks.

2024-02-23

A European Cybercrime Breakthrough Is Only Half The Battle

The First Rule Of Cybercrime Is That No One Goes To Prison: Cybercrime is global in nature but criminal laws are intensely local. By Emily Taylor

2024-02-24

Major US Mobile Network Failure

The US had a lengthy cellular outage last week with thousands reporting connectivity issues. affecting AT&T, T Mobile, Verizon and other networks.

2024-02-26

AI Targeted Drones Are Not Working

Both Ukraine & Russia have deployed small military drones that use AI to identify and select potential targets, but with no measurable effect.

2024-03-19

The Surge In Ransomware & AI Defence Innovations

Ransomware Evolution: Investing in stronger defences with AI-powered and cloud-delivered cyber security is key to protect against the new threats.

2024-02-22

Rhysida Ransomware Cracked & Decrypted

A Cyber Security Dilemma: A decyrptor tool that helps victims recover from a Rhysida malware infection will alert the hackers to try harder.

2024-03-06

Iranian Spy Ship Hacked

The US hacked onboard computer systems of an Iranian ship suspected of collecting targeting data on cargo vessels in the Gulf & Red Sea.

2024-03-18

Cyber Criminals Use CAPTCHA To Spread Malware

Dark Gate: Legal advertising tools like CAPTCHA are being used by cyber criminals to track victims response to infectious malware links.

2024-03-12

Deepfakes Deployed In Mobile Banking Malware Attacks

GoldPickaxe: Mobile malware that collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication.

2024-02-23

X Taking Payments From Terrorists

Verified Terrorist: Twitter / X allegedly granted subscription benefits to several proscribed groups which are banned from operating in the US.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

link22

link22

link22 offers a high level of expertise within IT security and system solutions. We help public and private actors with highly secure IT-solutions.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.