Sponsor of the Day:
Jerkmate
https://www.infosecurity-magazine.com/news/cyber-breaches-compliance/
Cyber Breaches, Compliance and Reputation Top UK Corporate Concerns - Infosecurity Magazine
top ukconcerns infosecuritycyberbreachescompliance
https://www.infosecurity-magazine.com/news/phishing-verizon-credentials/
Phishing Tactic Targets Verizon Users' Credentials - Infosecurity Magazine
Oct 12, 2024 - Phishing attack targets and collects Verizon user credentials
credentials infosecurityphishingtactictargetsverizon
https://www.infosecurity-magazine.com/white-papers/prm/3-ways-to-spot-insider-risk/
3 Ways to Spot Insider Risk - Infosecurity Magazine
Feb 23, 2026 - The biggest challenge to spotting a threat is knowing what to look for.
3 waysinsider riskinfosecurity magazinespot
https://www.infosecurity-magazine.com/profile/ivan-alba/
Ivan Alba - Application Solutions Architect , Rubrik - Infosecurity Magazine
application solutionsinfosecurity magazineivanalbaarchitect
https://itchannelpro.nl/infosecurity-magazine/
InfoSecurity Magazine - ITchannelPRO
Apr 21, 2021 - Infosecurity Magazine is het enige onafhankelijke vakblad in de Benelux dat zich expliciet bezighoudt met informatiebeveiliging. Het blad beweegt zich op het...
infosecurity magazineitchannelpro
https://www.infosecurity-magazine.com/webinars/page-2/
Page 2 of 6 - Information Security Webinars - Infosecurity Magazine
Listing 13–24 for information security webinars.
information security webinarsinfosecurity magazine26
https://www.infosecurity-magazine.com/news/half-ransomware-access-hijacked/
Half of Ransomware Access Due to Hijacked VPN Credentials - Infosecurity Magazine
Apr 6, 2026 - Beazley Security data finds the top cause of initial access for ransomware in Q3 was compromised VPN credentials
credentials infosecurityhalfransomwareaccessdue
https://www.infosecurity-magazine.com/interviews/page-6/
Page 6 of 30 - Infosecurity Interviews - Infosecurity Magazine
Listing 101–120 for information security interviews.
interviews magazine630infosecurity
https://www.infosecurity-magazine.com/mediapack/
Advertise on Infosecurity - Infosecurity Magazine
Find out more about advertising on Infosecurity, the multi-award winning magazine for Information Security professionals. Download the media pack today.
infosecurity magazineadvertise
https://www.infosecurity-magazine.com/profile/kirsten-lora/
Kirsten Lora - VP Product, ISACA - Infosecurity Magazine
infosecurity magazinekirstenloravpproduct
https://www.infosecurity-magazine.com/webinars/prm/phishing-impersonation-ciso/
Phishing, Impersonation: CISO Insights on 2023-2024 External Threats - Infosecurity Magazine
CISOs are the gatekeepers of our organizations. Find out about some of the most prevalent threats they have been facing over the past year.
threats infosecurity magazinephishing impersonationciso insights2023 2024external
https://www.infosecurity-magazine.com/news/goofing-off-at-work-can-lead-to-malware/
Goofing off at Work Can Lead to Malware Infections and Data Breaches - Infosecurity Magazine
Aug 4, 2025 - Surveys show that employees spend up to 30% of their working hours on private affairs. And all of those non-productive hours could translate to not just lost...
data breaches infosecuritymalware infectionsgoofingworklead
https://in4security.com/attestaciya-obektov-informatizacii
Аттестация объектов информатизации | Infosecurity
Аттестация объектов информатизации: ИСПДн, КИИ, АС, АСУ ТП, ГИС от Infosecurity. Соответствие требованиям ФСТЭК и ФСБ, защита данных и инфраструктуры
infosecurity
https://www.infosecurityeurope.com:443/en-gb/visit/venue-and-travel.html
Venue and travel information | Getting to Infosecurity Europe
Important travel and venue information for all that are looking to attend, visit or exhibit at Infosecurity Europe
travel informationinfosecurity europevenuegetting
https://www.infosecurity-magazine.com/news/chinese-hackers-cyberattacks-ai/
Chinese Hackers Automate Cyber-Attacks With AI-Powered Claude Code - Infosecurity Magazine
Mar 25, 2026 - Anthropic’s Claude Code AI assistant performed 80% to 90% of the tasks involved in a recent cyber-attack campaign, said Anthropic researchers
chinese hackerscyber attacksai poweredclaude codeinfosecurity magazine
https://www.infosecurity-magazine.com/profile/donavan-cheah/
Donavan Cheah - Emerging Trends Working Group Member, ISACA - Infosecurity Magazine
emerging trendsworking groupinfosecurity magazinedonavanmember
https://www.infosecurity-magazine.com/news/weblogic-server-patch-needs-a-new/
WebLogic Server Patch Needs a New Fix - Infosecurity Magazine
Mar 30, 2026 - Servers are again at risk for the Oracle WebLogic Server flaw because of a faulty patch.
weblogic servernew fixinfosecurity magazinepatchneeds
https://www.infosecurity-magazine.com/opinions/ciso-crucible-strength-control/
The CISO's Crucible – Finding Strength in Control - Infosecurity Magazine
Apr 6, 2026 - Deloitte's Peter Gooch discusses how CISOs can overcome the immense strains and challenges of their roles
control infosecurity magazinefinding strengthcisocrucible
https://www.infosecurity-magazine.com/news/winordll64-backdoor-linked-lazarus/
WinorDLL64 Backdoor Linked to Lazarus Group - Infosecurity Magazine
Mar 1, 2025 - The Wslink loader can reportedly serve other connecting clients and load additional payloads
group infosecurity magazinebackdoorlinkedlazarus
https://www.infosecurity-magazine.com/news/zoom-zeroday-bug-hits-legacy/
Zoom Zero-Day Bug Hits Legacy Windows Users - Infosecurity Magazine
Oct 10, 2025 - Vulnerability could allow for arbitrary remote code execution
zero day bugwindows usersinfosecurity magazinezoomhits
https://www.infosecurity-magazine.com/webinars/prm/software-supply-chain-management/
Enhancing Software Supply Chain Management: A DORA-Focused Approach - Infosecurity Magazine
This webinar will provide senior decision-makers with practical guidance to address post-compliance challenges, secure software supply chains and enhance...
software supply chainfocused approachinfosecurity magazineenhancingmanagement
https://www.infosecurity-magazine.com/news/business-email-compromise-55bn/
Business Email Compromise Costs $55bn Over a Decade - Infosecurity Magazine
Apr 2, 2026 - New FBI data reveals BEC scams have cost businesses more than $55bn since 2013
business email compromiseinfosecurity magazinecosts55bndecade
https://www.infosecurity-magazine.com/webinars/prm/boardroom-boost-cyber-resilience/
How Can the Boardroom Boost Cyber Resilience? - Infosecurity Magazine
This session will highlight the importance of boardroom oversight of cyber-risk and how to foster effective collaboration between the c-suite and security teams
cyber resilienceinfosecurity magazineboardroomboost
https://www.infosecurity-magazine.com/news/ddos-services-hit-by-police/
DDoS-For-Hire Services Disrupted by International Police Action - Infosecurity Magazine
Apr 20, 2026 - Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users
hire servicesinternational policeinfosecurity magazineddosdisrupted
https://www.infosecurity-magazine.com/news/judge-signs-off-775m-equifax/
Judge Signs Off on $7.75m Equifax Settlement - Infosecurity Magazine
Jun 21, 2025 - $7.75m Equifax settlement with financial institutions over 2017 data breach ratified by judge
judge signsinfosecurity magazine7equifaxsettlement
https://www.infosecurity-magazine.com/news/new-gremlin-infostealer/
New Gremlin Infostealer Distributed on Telegram - Infosecurity Magazine
Apr 6, 2026 - Administrators of a Telegram channel named CoderSharp have been advertising Gremlin Stealer since March 2025
infosecurity magazinenewgremlininfostealerdistributed
https://www.infosecurity-magazine.com/news/teampcp-exploit-stolen-supply/
TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets - Infosecurity Magazine
Apr 3, 2026 - TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs
supply chaininfosecurity magazineteampcpexploresways
https://www.infosecurity-magazine.com/news/new-linux-vulnerabilities-surge/
New Linux Vulnerabilities Surge 967% in a Year - Infosecurity Magazine
Apr 6, 2026 - Researchers discovered over 3000 Linux vulnerabilities in 2024, the largest of any category
year infosecurity magazinenew linuxvulnerabilitiessurge967
https://www.infosecurity-magazine.com/profile/christelle-barnes/
Christelle Barnes - General Manager, SolarEdge UK - Infosecurity Magazine
general managerinfosecurity magazinechristellebarnessolaredge
https://www.infosecurity-magazine.com/news/mfa-failure-infostealer-breach-50/
MFA Failure Enables Infostealer Breach At 50 Enterprises - Infosecurity Magazine
Apr 6, 2026 - Threat actor “Zestix” was able to breach around 50 firms using infostealers because they lacked multi-factor authentication
infosecurity magazinemfafailureenablesinfostealer
https://www.infosecurity-magazine.com/news-features/cybersecurity-ma-roundup-feb-26/
Cybersecurity M&A Roundup: Firms Focus on AI Agents - Infosecurity Magazine
Apr 6, 2026 - Cybersecurity industry mergers and acquisitions in February continued around a focus on agentic AI
ai agentsinfosecurity magazinecybersecurityroundupfirms
https://www.infosecurity-magazine.com/news/tycoon2fa-phishing-service-resumes/
Tycoon2FA Phishing Service Resumes Activity Post-Takedown - Infosecurity Magazine
Apr 3, 2026 - Tycoon2FA phishing platform resumes activity post-takedown, leveraging AITM techniques to bypass MFA
tycoon2fa phishinginfosecurity magazineserviceresumesactivity
https://www.infosecurity-magazine.com/interviews/
Information Security and IT Security Interviews -Infosecurity Magazine
Read the latest Information Security and IT Security Interviews - Infosecurity Magazine
information securityinfosecurity magazineinterviews
https://www.infosecurity-magazine.com/news/apk-malformation-android-malware/
APK Malformation Found in Thousands of Android Malware Samples - Infosecurity Magazine
Apr 20, 2026 - APK malformation tactic now appears in over 3000 Android malware samples evading static analysis
android malwareinfosecurity magazineapkmalformationfound
https://www.infosecurity-magazine.com/news-features/cybersecurity-ma-crowdstrike/
Cybersecurity M&A Roundup: CrowdStrike, SentinelOne and Check Point In - Infosecurity Magazine
Mar 24, 2026 - AI security was the main focus for acquisitions in September, while Mitsubishi Electric unveiled a $1bn deal to buy OT security firm Nozomi Networks
check pointinfosecurity magazinecybersecurityroundupcrowdstrike
https://www.infosecurity-magazine.com/blogs/how-to-restore-exchange-mailbox/
How to Restore Exchange Mailbox - Infosecurity Magazine
Feb 20, 2026 - Discover how native methods to restore soft-deleted and hard-deleted mailboxes work and learn how third-party tools like Stellar Repair for Exchange can...
exchange mailboxinfosecurity magazinerestore
https://www.infosecurity-magazine.com/news/nintendo-hacker-pleads-guilty/
Nintendo Hacker Pleads Guilty to Downloading Child Porn - Infosecurity Magazine
Nov 14, 2024 - California resident admits downloading child pornography and habitually hacking Nintendo
pleads guiltychild porninfosecurity magazinenintendohacker
https://www.infosecurity-magazine.com/news/clop-ransomware-exploits/
Clop Ransomware Group Exploits GoAnywhere MFT Flaw - Infosecurity Magazine
Jun 12, 2025 - The vulnerability has a CVSS score of 7.2 and was exploited against several companies in the US
clop ransomwaregoanywhere mftinfosecurity magazinegroupexploits
https://www.infosecurity-magazine.com/directory/xopero-software-gitprotectio/
Xopero Software / Gitprotect.io - Infosecurity Magazine
xopero softwaregitprotect ioinfosecurity magazine
https://www.infosecurity-magazine.com/news/claude-desktop-extensions-prompt/
Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection - Infosecurity Magazine
Apr 6, 2026 - Three of Anthropic’s Claude Desktop extensions were vulnerable to command injection – flaws that have now been fixed
claude desktopweb basedprompt injectioninfosecurity magazineextensions
https://www.infosecurity-magazine.com/webinars/prm/the-intelligence-edge-clarity-and/
Clarity, Context and the Human Advantage in Modern CTI - Infosecurity Magazine
This session explores how leading organizations maintain their intelligence edge by combining advanced CTI capabilities, human expertise, and collaborative...
human advantageinfosecurity magazineclaritycontextmodern
https://www.infosecurity-magazine.com/white-papers/prm/customer-identity-buyers-guide/
The Customer Identity Buyer’s Guide - Infosecurity Magazine
Mar 9, 2026 - How to choose a customer identity and access management solution that supports your most critical business objectives
customer identityinfosecurity magazineguide
https://www.infosecurity-magazine.com/podcasts/your-guide-to-infosecurity-europe/
Your Guide to Infosecurity Europe: Insider Tips from Cybersecurity Pro - Infosecurity Magazine
In this episode two veteran cybersecurity pros share their expert advice on how to get the most out of your visit Infosecurity Europe 2025
infosecurity europeinsider tipspro magazineguidecybersecurity
https://www.infosecurity-magazine.com/profile/sean-mitchell/
Sean Mitchell - Founder, School of SOC - Infosecurity Magazine
founder schoolinfosecurity magazineseanmitchellsoc
https://www.infosecurity-magazine.com/news/bec-attacks-expand-toward-mobile/
BEC Attacks Expand Beyond Email and Toward Mobile Devices - Infosecurity Magazine
Nov 6, 2025 - Scammers typically obtain mobile numbers from data breaches, social media and data brokers
bec attacksexpand beyondmobile devicesinfosecurity magazineemail
https://www.infosecurity-magazine.com/news/shark-tank-star-corcoran-loses/
Shark Tank Star Corcoran Loses $400K in Email Scam - Infosecurity Magazine
Apr 6, 2025 - Invoice fraud tricks her finance team into wiring funds abroad
shark tankemail scaminfosecurity magazinestarcorcoran
https://www.infosecurityeurope.com/en-gb/exhibit/lead-manager.html
Lead Manager | Infosecurity Europe
lead managerinfosecurity europe
https://www.infosecurity-magazine.com/next-gen-infosec/risk-severe-data-breaches/
Reducing the Risk of Severe Data Breaches - Infosecurity Magazine
Dec 9, 2023 - Data breaches often result in severe financial and reputational losses for victims
data breaches infosecurityreducingriskseveremagazine
https://www.infosecurity-magazine.com/blogs/page-6/
Page 6 of 81 - Infosecurity Blogs - Infosecurity Magazine
Listing 101–120 for information security blogs.
81 infosecurity blogs6magazine
https://www.infosecurity-magazine.com/profile/phil-muncaster/
Phil Muncaster - UK / EMEA News Reporter, Infosecurity Magazine
uk emeanews reporterinfosecurity magazinephilmuncaster
https://www.infosecurity-magazine.com/magazine-features/prm/business-email-compromise-cyber/
Business Email Compromise Is Dead, Long Live Cyber-Enabled Financial Fraud - Infosecurity Magazine
Apr 7, 2026 - With a surge in global financial losses due to BEC, this social engineering attack can no longer be exclusively treated as a simple financial incident.
business email compromisedead long livecyber enabledfinancial fraudinfosecurity magazine
https://www.bankinfosecurity.asia/infosecurity-europe-2018-c-510
Infosecurity Europe - bank information security
Infosecurity Europe. bank information security
bank information securityinfosecurity europe
https://www.infosecurity-magazine.com/news/cloud-account-attacks-surged-2023/
Cloud Account Attacks Surged 16-Fold in 2023 - Infosecurity Magazine
Jul 30, 2025 - Red Canary said cloud account compromise detections rose 16-fold in 2023, becoming the fourth most prevalent technique used by threat actors
2023 infosecurity magazinecloud accountattackssurged16
https://www.infosecurity-magazine.com/news/surge-in-software-supply-chain/
Surge in Software Supply Chain Attacks - Infosecurity Magazine
Dec 19, 2022 - Survey found lack of visibility and awareness of how to combat supply chain attacks
software supply chainattacks infosecurity magazinesurge
https://www.infosecurity-magazine.com/news/nhs-gets-150m-cyberspending-boost/
NHS Gets £150m Cyber-Spending Boost - Infosecurity Magazine
Dec 19, 2022 - Health service will upgrade machines to Windows 10
spending boostinfosecurity magazinenhsgetscyber
https://www.infosecurity-magazine.com/news/ai-insider-risk-critical-business/
AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns - Infosecurity Magazine
Apr 6, 2026 - Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast
ai driveninsider riskreport warnsinfosecurity magazinebusiness
https://www.infosecurity-magazine.com/news/microsoft-phishing-fake-compliance/
Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails - Infosecurity Magazine
May 5, 2026 - Microsoft researchers warn of a large-scale phishing campaign using fake compliance emails to steal credentials, targeting 35,000 users across 13,000...
phishing campaignusing fakeinfosecurity magazinemicrosoftflags
https://www.infosecurity-magazine.com/opinions/data-privacy-age-ai/
Data Privacy Week: Navigating Data Privacy in the Age of AI - Infosecurity Magazine
Jun 16, 2025 - Lawyers from Hanson Bridgett say there must be a commitment to responsible AI practices to navigate the changing data regulation landscape
data privacy weekinfosecurity magazinenavigatingageai
https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/
Compromised WordPress Sites Deliver ClickFix Attacks - Infosecurity Magazine
Apr 7, 2026 - Over 250 legitimate websites, including news outlets and a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, warn...
attacks infosecurity magazinewordpress sitescompromiseddeliverclickfix
https://www.infosecurity-magazine.com/news/capital-one-fined-80-breach/
Capital One Fined $80m for 2019 Breach - Infosecurity Magazine
Nov 12, 2025 - The Office of the Comptroller of the Currency fines Capital One over its 2019 breach
breach infosecurity magazinecapital onefined80m2019
https://www.careersinfosecurity.asia/infosecurity-europe-2025-securing-uncertain-world-a-29841
Infosecurity Europe 2025: Securing an Uncertain World
Welcome to Information Security Media Group's Infosecurity Europe 2025 Compendium featuring cybersecurity insights from industry's top researchers, CEOs, CISOs,
infosecurity europe 2025uncertain worldsecuring
https://www.infosecurity-magazine.com/webinars/prm/how-midmarket-can-leverage/
How Mid-Market Businesses Can Leverage Microsoft Security for Proactiv - Infosecurity Magazine
Learn how to unlock the full value of your existing Microsoft Security stack, harness AI for both defence and efficiency and build a culture of resilience...
mid market businessesmicrosoft securityinfosecurity magazineleverageproactiv
https://www.infosecurity-magazine.com/next-gen-infosec/overcome-challenges-zero-trust/
How to Overcome Challenges to Zero Trust Adoption - Infosecurity Magazine
Nov 17, 2023 - Organizations must conduct a zero trust assessment of their environment and existing capabilities and create a roadmap to achieve it
zero trust adoptionovercome challengesinfosecurity magazine
https://www.infosecurity-magazine.com/opinions/managed-threat-hunting-fills-a/
Managed Threat Hunting Fills a Critical Gap - Infosecurity Magazine
Sep 20, 2025 - Can managed threat hunting get you in the proactive detection game?
managed threat huntingcritical gapinfosecurity magazinefills
https://www.infosecurity-magazine.com/news/enisa-europe-seeks-top-level-root/
ENISA Seeks Top-Tier Status in CVE Program - Infosecurity Magazine
Apr 19, 2026 - The EU cybersecurity agency looks to become the third Top-Level Root CVE Numbering Authority, alongside CISA and MITRE
program infosecurity magazinetop tierenisaseeksstatus
https://www.infosecurity-magazine.com/news-features/why-hacktivists-joining-ransomware/
Why Hacktivists Are Joining the Ransomware Ranks - Infosecurity Magazine
Mar 17, 2026 - Infosecurity explores why hacktivists are embracing ransomware and collaborating more with financially motivated cybercriminal groups
infosecurity magazinehacktivistsjoiningransomwareranks
https://www.infosecurity-magazine.com/profile/alessandro-mascellino/
Alessandro Mascellino - News Reporter - Infosecurity Magazine
news reporterinfosecurity magazinealessandro
https://www.infosecurity-magazine.com/news/dussman-group-data-leaked/
Dussmann Group Data Leaked After Ransomware Attack - Infosecurity Magazine
Mar 18, 2026 - German giant admits attack targeted subsidiary
attack infosecurity magazinegroup datadussmannleakedransomware
https://www.infosecurity-magazine.com/news/trust-cyber-cni-budgets-flatline/
Trust in Cyber Takes a Knock as CNI Budgets Flatline - Infosecurity Magazine
May 24, 2025 - Bridewell report reveals critical infrastructure firms are losing faith in their defensive tooling
infosecurity magazinetrustcybertakesknock
https://www.infosecurity-magazine.com/news/zionsiphon-malware-water/
ZionSiphon Malware Targets Water Infrastructure Systems - Infosecurity Magazine
Apr 20, 2026 - ZionSiphon malware targets OT water systems with sabotage and ICS scanning capabilities
systems infosecurity magazinemalware targetswater infrastructurezionsiphon
https://www.inforisktoday.eu/infosecurity-europe-2018-c-510
Infosecurity Europe - information risk management
Infosecurity Europe. information risk management
europe information riskinfosecuritymanagement
https://www.infosecurity-magazine.com/news/lazarus-group-targets-macos-supply/
Lazarus Group Targets macOS in Supply Chain Assault - Infosecurity Magazine
Jun 13, 2025 - ESET explained the impact of the supply chain attack translated to a 16.8% increase in Trojan detections
lazarus grouptargets macossupply chaininfosecurity magazineassault
https://www.infosecurity-magazine.com/news/cisa-kev-cisco-ise/
CISA Warns of Exploited Vulnerabilities in Cisco Products - Infosecurity Magazine
Apr 7, 2026 - Hackers are actively exploiting two critical flaws in Cisco Identity Services Engine, said the US Cybersecurity and Infrastructure Security Agency
cisa warnsexploited vulnerabilitiescisco productsinfosecurity magazine
https://www.infosecurity-magazine.com/news/cve-program-new-user-researcher/
CVE Program Launches Two New Forums to Enhance CVE Utilization - Infosecurity Magazine
Mar 18, 2026 - The CVE Board has launched a Consumer Working Group and a Researcher Working Group, allowing new stakeholders to shape the future of the CVE Program
launches two newcve programinfosecurity magazineforumsenhance
https://www.healthcareinfosecurity.com/infosecurity-europe-2025-securing-uncertain-world-a-29841
Infosecurity Europe 2025: Securing an Uncertain World
Welcome to Information Security Media Group's Infosecurity Europe 2025 Compendium featuring cybersecurity insights from industry's top researchers, CEOs, CISOs,
infosecurity europe 2025uncertain worldsecuring
https://www.infosecurity-magazine.com/news/microsoft-european-cloud-data/
Microsoft Promises to Keep European Cloud Data in Europe - Infosecurity Magazine
Jan 26, 2026 - Microsoft’s Sovereign Cloud solutions are designed to ensure European cloud data is stored and processed in Europe
microsoft promiseseuropean cloudinfosecurity magazinekeepdata
https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware/
GitHub Used as Covert Channel in Multi-Stage Malware Campaign - Infosecurity Magazine
Apr 3, 2026 - LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration
multi stagemalware campaigninfosecurity magazinegithubused
https://www.infosecurity-magazine.com/news-features/un-cybercrime-treaty-negotiations/
Hope Revived for UN Cybercrime Treaty as Negotiations Set to Resume - Infosecurity Magazine
Jul 24, 2025 - The negotiations for the Russia-led resolution are on hold at the UN. Infosecurity asked cyber-geopolitics experts how it can still be a beneficial instrument...
un cybercrimeinfosecurity magazinehoperevivedtreaty
https://www.infosecurity-magazine.com/news/jlr-posts-639m-q2-losses/
Cyber-Attack Costs Carmaker JLR $258m in Q2 - Infosecurity Magazine
Mar 17, 2026 - Carmaker JLR has posted $639m Q2 losses and a one-off $258m hit after a major ransomware attack
cyber attackinfosecurity magazinecostscarmakerjlr
https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/
Dramatic Escalation Frequency and Power of in DDoS Attacks - Infosecurity Magazine
Apr 7, 2026 - DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report
attacks infosecurity magazinedramaticescalationfrequencypower
https://www.infosecurity-magazine.com/bespoke-events/women-in-cybersecurity-2026/
Women in Cybersecurity at Infosecurity Europe 2025 - Infosecurity Magazine
Join us as we celebrate a decade of the Women in Cybersecurity program at Infosecurity Europe with sessions designed to inspire, empower and catalyse real...
infosecurity europe 2025womencybersecuritymagazine
https://www.infosecurity-magazine.com/podcasts/can-ai-solve-vulnerability-problem/
Can AI Solve the Vulnerability Problem in Critical Infrastructure? - Infosecurity Magazine
Infosecurity sat down with the Taesoo Kim, leader of Team Atlanta, the AIxCC winning team, and Andrew Carney, program manager for the AIxCC at DARPA and ARPA-H
ai solvecritical infrastructureinfosecurity magazinevulnerabilityproblem
https://www.infosecurity-magazine.com/profile/ricardo-amper/
Ricardo Amper - Founder & CEO, Incode - Infosecurity Magazine
founder ceoinfosecurity magazinericardoamperincode
https://www.infosecurity-magazine.com/news/bec-attack-on-monongalia-health-1/
BEC Attack on Monongalia Health System - Infosecurity Magazine
May 7, 2025 - Cyber-thieves steal from West Virginia-based healthcare provider by impersonating vendor
bec attackhealth systeminfosecurity magazine
https://www.infosecurity-magazine.com/news/supply-chain-attack-smart/
Supply Chain Attack Uses Smart Contracts for C2 Ops - Infosecurity Magazine
Sep 28, 2025 - Checkmarx has observed a novel npm supply chain attack using Ethereum smart contracts to manage command-and-control (C2) operations
supply chain attackuses smartinfosecurity magazinecontractsc2
https://www.infosecurity-magazine.com/news/cryptocurrency-firms-warned/
Microsoft Warns Cryptocurrency Firms Against Complex Cyber-Attacks - Infosecurity Magazine
Dec 28, 2024 - Attacks included fraud, vulnerability exploitation, fake applications and info stealer deployments
cyber attacks infosecuritymicrosoft warnscryptocurrencyfirmscomplex
https://www.infosecurity-magazine.com/directory/anomali-1/
Anomali - Infosecurity Magazine
infosecurity magazineanomali
https://www.infosecurity-magazine.com/news/warlock-ransomware-sharepoint/
Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShe - Infosecurity Magazine
Mar 17, 2026 - Trend Micro highlighted a sophisticated post-compromise attack chain to deploy the Warlock ransomware in unpatched SharePoint on-prem environments
infosecurity magazinewarlockransomwarehittingvictims
https://www.infosecurity-magazine.com/news/chanel-pandora-breach-salesforce/
Chanel and Pandora Breached as Salesforce Campaign Continues - Infosecurity Magazine
Apr 7, 2026 - Chanel and Pandora have revealed data breaches reportedly linked to attacks on their Salesforce instances
campaign continuesinfosecurity magazinechanelpandorabreached
https://www.infosecurity-magazine.com/news/northern-ireland-police-data-leak-1/
Northern Ireland Police Data Leak Sees Service Fined by ICO - Infosecurity Magazine
Oct 12, 2025 - The ICO blamed the Police Service of Northern Ireland for procedural failings that exposed the personal data of 9843 personnel, putting police officers at risk
northern ireland policedata leakinfosecurity magazineseesservice
https://www.infosecurity-magazine.com/news/bluenoroff-dprk-hackers-target/
North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures - Infosecurity Magazine
May 1, 2026 - Arctic Wolf attributed this large-scale spear-phishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group
north korean hackerscrypto firmsinfosecurity magazinetargetclickfix
https://www.infosecurity-magazine.com/news/data-breaches-human-error/
95% of Data Breaches Tied to Human Error in 2024 - Infosecurity Magazine
Apr 7, 2026 - Mimecast found that insider threats, credential misuse and user-driven errors were involved in most security incidents last year
2024 infosecurity magazinedata breacheshuman error95tied
https://www.infosecurity-magazine.com/news/european-governments-zeroday/
European Governments Breached in Zero-Day Attacks Targeting Ivanti - Infosecurity Magazine
Apr 7, 2026 - The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches
zero day attackseuropean governmentsinfosecurity magazinebreachedtargeting
https://www.infosecurity-magazine.com/news/uk-signs-council-of-europe-ai/
UK Signs Council of Europe AI Convention - Infosecurity Magazine
Oct 22, 2025 - The first legally binding international treaty on AI was adopted by all 46 Council of Europe member states in May 2024
uk signseurope aiinfosecurity magazinecouncilconvention
https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit/
Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year - Infosecurity Magazine
Apr 7, 2026 - Most of the 78% of UK manufacturers compromised last year suffered financial loss, says ESET
year infosecurity magazine10 ukcyber incidenteightmanufacturers
https://www.infosecurity-magazine.com/webinars/prm/financial-services-under-pressure/
Financial Services Under Pressure: Supply Chain Risk, Regulation and O - Infosecurity Magazine
Strengthening third‑party cybersecurity and operational resilience is no longer optional. It’s critical. Join this webinar to learn why this shift matters now,...
supply chain riskfinancial servicesinfosecurity magazinepressureregulation
https://www.infosecurity-magazine.com/opinions/preventing-cyber-attacks/
Prevent-ilation: Airing out the Myths of Preventing Cyber Attacks - Infosecurity Magazine
Dec 12, 2024 - There is no foolproof method to ensuring you do not experience sinister cyber activity
cyber attacks infosecuritypreventairingmythsmagazine
https://www.infosecurity-magazine.com/my-account/login/
Join the Community and Subscribe to Infosecurity Magazine
It’s quick and easy to join the Infosecurity Magazine community. Once you’re a member you’ll unlock exclusive and unlimited access to premium content across...
infosecurity magazinejoincommunitysubscribe
https://www.infosecurity-magazine.com/news/cloud-storage-exploited-sms/
Cybercriminals Exploit Cloud Storage For SMS Phishing Scams - Infosecurity Magazine
Jan 26, 2026 - According to Enea, these campaigns use cloud storage platforms to host malicious websites, sending links via SMS to bypass firewalls
scams infosecurity magazinecybercriminals exploitcloud storagesms phishing
https://www.infosecurity-magazine.com/profile/camellia-chan/
Camellia Chan - CEO and founder, X-PHY, a Flexxon brand - Infosecurity Magazine
infosecurity magazinecamelliachanceofounder