BUSINESS > Services > IT & Telecoms


« Back to News

2025-03-03

Obsolete: Skype To Shut Down

The video calling service Skype will close on May 14th 2025, its owner Microsoft has said.

2025-03-04

Orange Group Hacked - User Data Stolen

The alleged breach includes source code, client contracts, project blueprints, and user data, risking operational security & customer privacy.

2025-02-27

GhostSocks Malware Can Slip Past Detection Systems

A strain of undetectable malware is exploiting unpatched software, weak credentials, & outdated security configurations to infiltrate networks.

2025-03-03

Salt Typhoon Exploited Cisco Vulnerabilities

Salt Typhoon hackers gained access to core US telecoms infrastructure through Cisco devices, then used that infrastructure to extract information.

2025-02-23

Apple Removes Data Protection For Users In Britain

Encrypted Cloud Data: Apple will comply with a UK government order, where it will no longer be possible to activate Advanced Data Protection.

2025-02-18

Backdoor Access To Apple User Data Condemned

Right To Privacy: US Lawmakers & Human Rights advocates oppose a UK government order to get access to Apple users' encrypted data.

2025-02-11

AI-Based Phishing Attacks Demand A Multi-Pronged Response

New Techniques Demand A Zero Trust Mindset: A new strategy for combating AI-powered phishing attacks is needed. By Oliver Paterson

2025-02-10

Apple Ordered To Give Access To Users' Encrypted Data

Investigatory Powers: British law enforcement have demanded access to encrypted data stored by Apple users in its global cloud service.

2025-02-06

File Transfers Can Be The Weakest Link

File transfers need to be easy, quick and most of all, safe. But that requires more than just a traditional email gateway solution. By Richard Bourne

2025-02-03

US Nationals Indicted For Fraudulent Remote IT Work

The FBI has uncovered a plot to install North Korean IT workers as remote employees to generate revenue for North Korea and evade sanctions.

2025-01-20

Data Broker Discloses A Major Breach Of App User Data

Misappropriated Access Key: Hacked data appears to have originated in thousands of smartphone apps, including Tinder, Grindr and Candy Crush.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Cyberint

Cyberint

Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

IT Band Systems

IT Band Systems

IT Band Systems is an international provider of IT products and services including web server monitoring and web security consulting.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.