FREE TO VIEW


« Back to News

2024-06-01

A Single Attack Disabled Half A Million Routers

Details emerging about a 2023 exploit which knocked out over 600,000 routers in an unprecedented attack against a single Internet Service Provider.

2024-06-03

Shiny Hunters Attack Santander Bank

Hackers responsible for the massive breach at Ticketmaster have stolen the confidential information of 30 million Santander employees & customers.

2024-05-30

Email Encryption: What It Is & How It Works

Email Encryption: An essential tool that keeps users' sensitive information safe from threats like hacking, fraud, data breaches and identity theft.

2024-05-31

Online Fraud - Police Agencies Recover Stolen $Millions

Operation Endgame: Europol & the US Dept of Justice make arrests and recover stolen funds in separate operations against botnet & malware thieves.

2024-05-31

Telecoms - Beware Of The DDoS Threat Actor

Combatting the wave of DDoS attacks against the telecommunications industry is critical to protecting global connectivity. By Richard Hummel

2024-05-31

The Key Components Of Embedded Systems Development Services

Embedded systems development services are essential for businesses and industries seeking to leverage the power of customized & efficient systems.

2024-05-31

Safeguarding Data In The Quantum Computing Era

Quantum Apocalypse: Now is the time to start learning about existing quantum-resistant encryption technologies & solutions. By Prof. Nigel Smart

2024-05-30

Massive Breach At Ticketmaster

1.3 Terabytes Of Data Stolen: Ticketmaster has been hit by a cyber attack by the 'Shiny Hunters'. Sensitive customer data is for sale for $500k.

2024-05-30

Five AI-driven Features to Enhance Payment Gateway Security

Incorporating AI-driven features into payment gateway security frameworks is essential for staying ahead of sophisticated cyber threats.

2024-05-29

Hackers Exploit GitHub & FileZilla To Deliver Malware

Fake GitHub accounts & repositories resembling real software programs, but filled with malware, designed to access computers and steal data.

2024-05-29

Google AI Makes Embarrassing Errors

Google has attracted derision after its proprietary AI tool, Overview, produced inaccurate, in some cases bizarre, answers to user questions.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Capgemini

Capgemini

Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. Areas of expertise include Cybersecurity.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

ModelOp

ModelOp

ModelOp is the leading AI Governance software for enterprises and helps safeguard all AI initiatives.