Infosecurity Group Websites
  • Magazine
  • Events
    • Infosecurity Europe
    • Infosecurity Leadership Summit
    • Infosecurity Magazine Events
    • Infosecurity North America
    • Infosecurity Netherlands
    • Infosecurity Belgium
    • Infosecurity Russia
    • Infosecurity Mexico
    • Infosecurity Middle East
  • Insight
    • Infosecurity Webinars
    • Infosecurity Whitepapers
    • Infosecurity Online Summits
Latest
  • #DEFCON: How Sanctions Impact Internet Operators
  • #HowTo: Secure Your Kubernetes Environments
  • #DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation
  • Three Extradited from UK to US on $5m BEC Charges
  • Hello From Your New Editor
  •  
  • News
  • Topics
    • Features
      • Webinars
      • White Papers
      • Podcasts
      • Events & Conferences
        • Directory
        • Search
        15 Aug 22News

        #DEFCON: How Sanctions Impact Internet Operators

        15 Aug 22News

        #DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation

        15 Aug 22News

        New Study Reveals Serious Cyber Insurance Shortfalls

        15 Aug 22News

        Critical Infrastructure at Risk as Thousands of VNC Instances Exposed

        12 Aug 22News

        Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments

        12 Aug 22News

        SolidBit Ransomware Group Recruiting New Affiliates on Dark Web

        12 Aug 22News

        US Unmasks Suspected Conti Ransomware Actor

        12 Aug 22News

        Zeppelin Ransomware Victims May Need Multiple Decryption Keys

        12 Aug 22News

        Recovery From NHS Ransomware Attack May Take a Month

        11 Aug 22News

        CISA Unveils Cybersecurity Toolkit to Shield US Elections From Hackers

        11 Aug 22News

        Zimbra RCE Vulnerability Exploited Without Admin Privileges

        11 Aug 22News

        #BHUSA: Russia's Wiper Attacks Against Ukraine Detailed

        11 Aug 22News

        #BHUSA: New Open Source Group Set to Streamline Threat Detection

        Sign Up to Our E-Newsletter

        Subscribe to our FREE weekly newsletter for all the latest industry news…

        Infosecurity Magazine, Digital Edition, Q2, 2022, Volume 19, Issue 2 Take a Look at the Digital Magazine Archive
        #DEFCON: How Sanctions Impact Internet Operators
        15 Aug 2022 News

        #DEFCON: How Sanctions Impact Internet Operators

        #HowTo: Secure Your Kubernetes Environments
        15 Aug 2022 Opinion

        #HowTo: Secure Your Kubernetes Environments

        15 Aug 2022 News

        #DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation

        #DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation

        Jen Easterly discusses the progress and challenges at CISA

        Three Extradited from UK to US on $5m BEC Charges
        15 Aug 2022 News

        Three Extradited from UK to US on $5m BEC Charges

        15 Aug 2022 Blog

        Hello From Your New Editor

        Hello From Your New Editor

        A quick introduction from the new editor at Infosecurity Magazine

        New Study Reveals Serious Cyber Insurance Shortfalls
        15 Aug 2022 News

        New Study Reveals Serious Cyber Insurance Shortfalls

        Critical Infrastructure at Risk as Thousands of VNC Instances Exposed
        15 Aug 2022 News

        Critical Infrastructure at Risk as Thousands of VNC Instances Exposed

        A Guide to User Access Monitoring and Why it is Important
        15 Aug 2022 Blog

        A Guide to User Access Monitoring and Why it is Important

        12 Aug 2022 News

        Meta Tests Encrypted Backups and End-to-End Encryption in Facebook Messenger

        Meta Tests Encrypted Backups and End-to-End Encryption in Facebook Messenger

        Meta is also introducing an encrypted backup feature called Secure Storage

        Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments
        12 Aug 2022 News

        Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments

        Webinars Coming Up

        08September
        8 Sep 2022, 15:00 BST , 10:00 EDT

        The Great Cybersecurity Automation Debate

        08September
        8 Sep 2022, 13:00 EDT, 10:00 PDT

        How to Secure Your Applications Against API Attacks

        Whitepapers

        12 Aug 2022 White Paper

        How to Build a Layered Defence to Combat Advanced Phishing Threats

        11 Aug 2022 White Paper

        Modern Bank Heists 5.0

        4 Aug 2022 White Paper

        An Intelligence Perspective on Insider Threats

        Webinars

        • The Rise of BEC: Are Your Users Getting Swindled?
          28 Jul 22 Webinar

          The Rise of BEC: Are Your Users Getting Swindled?

        • Reducing the Risk to Critical Infrastructure Before It’s Too Late
          12 Jul 22 Webinar

          Reducing the Risk to Critical Infrastructure Before It’s Too Late

        • Taking a Zero Trust Approach to Malware
          07 Jul 22 Webinar

          Taking a Zero Trust Approach to Malware

        • Attack Surface Management: Discover and Secure Your Unknown Internet Exposure at Scale
          30 Jun 22 Webinar

          Attack Surface Management: Discover and Secure Your Unknown Internet Exposure at Scale

        • Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?
          16 Jun 22 Webinar

          Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?

        • Securing Cyber-Attack Vulnerabilities From Your Supply Chain
          09 Jun 22 Webinar

          Securing Cyber-Attack Vulnerabilities From Your Supply Chain

        • Why APIs will be the No. 1 Enterprise Attack Vector in 2022
          08 Jun 22 Webinar

          Why APIs will be the No. 1 Enterprise Attack Vector in 2022

        • How Tech Can Save You From Bad User Behavior
          02 Jun 22 Webinar

          How Tech Can Save You From Bad User Behavior

        • Building Cyber Resilience Strategies for Your Business Endpoints
          26 May 22 Webinar

          Building Cyber Resilience Strategies for Your Business Endpoints

        • Secure Active Directory by Thinking Like an Attacker
          19 May 22 Webinar

          Secure Active Directory by Thinking Like an Attacker

        What’s Hot on Infosecurity Magazine?

        • Read
        • Shared
        • Watched
        • Editor's Choice
        1
        8 Jul 2021 News

        New PrintNightmare Patch Can Be Bypassed, Say Researchers

        2
        8 Jul 2021 News

        Cybercrime Costs Organizations Nearly $1.79 Million Per Minute

        3
        8 Jul 2021 News

        CTOs Keeping Quiet on Breaches to Avoid Cyber Blame Game

        4
        7 Jul 2021 News

        Over 170 Scam Cryptomining Apps Charge for Non-Existent Services

        5
        7 Jul 2021 News

        Most Insider Data Breaches Aren't Malicious

        6
        7 Jul 2021 News

        Kremlin Hackers Reportedly Breached Republican National Committee

        1
        15 Aug 2022 News

        #DEFCON: How Sanctions Impact Internet Operators

        2
        15 Aug 2022 Opinion

        #HowTo: Secure Your Kubernetes Environments

        3
        15 Aug 2022 News

        #DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation

        4
        15 Aug 2022 News

        Three Extradited from UK to US on $5m BEC Charges

        5
        15 Aug 2022 Blog

        Hello From Your New Editor

        6
        15 Aug 2022 News

        New Study Reveals Serious Cyber Insurance Shortfalls

        1
        8 Jul 2021 Webinar

        Overcoming 'Shadow IT' Need and Risk

        2
        23 Sep 2021 Webinar

        How to Rethink End-User Protection and Eliminate Phishing and Ransomware

        3
        21 Oct 2021 Webinar

        Machine ID Management and Digital Transformation: Building a Secure Future

        4
        16 Sep 2021 Webinar

        New Strategies for Managing Machine Identities

        5
        7 Oct 2021 Webinar

        Third-Party Vulnerabilities: Demystifying the Unknown

        6
        24 Jun 2021 Webinar

        Defining the Zero Trust and SASE Relationship

        1
        14 Feb 2022 News Feature

        As Nation-State and Cybercrime Threats Conflate, Should CISOs Be Worried?

        2
        3 Feb 2022 Podcast

        IntoSecurity Chats, Episode 8: Brian Honan, brought to you by HP

        3
        14 Feb 2022 Editorial

        Editorial: Only the Good Die Young (Q1 2022 Issue)

        4
        17 Mar 2022 Webinar

        The Journey Beyond the Endpoint

        5
        11 Aug 2022 News

        #BHUSA: Russia's Wiper Attacks Against Ukraine Detailed

        6
        27 May 2022 Digital Edition

        Infosecurity Magazine, Digital Edition, Q2, 2022, Volume 19, Issue 2

        Trending Topic: #InformationSecurity

        Retweeted 45 times
        15 Aug 22 | @Shubham_pen

        Cloud Computing Notes Cheat sheet Credit: https://t.co/rtcXL7oUqs #infosec #cybersecurity #pentesting #oscp… https://t.co/aeGTpB168m

        Retweeted 151 times
        15 Aug 22 | @Shubham_pen

        What is DNS and How it works Credit: https://t.co/lH8a06Ln7Z #infosec #cybersecurity #pentesting #oscp… https://t.co/8rlplYQARl

        Retweeted 151 times
        15 Aug 22 | @Shubham_pen

        What is DNS and How it works Credit: https://t.co/lH8a06Ln7Z #infosec #cybersecurity #pentesting #oscp… https://t.co/8rlplYQARl

        Podcasts

        • IntoSecurity Podcast Episode 38, brought to you by Snyk
          20 Jul 22 Podcast

          IntoSecurity Podcast Episode 38, brought to you by Snyk

        • IntoSecurity Chats, Episode #10 - Javvad Malik, Brought to you by Oxeye
          17 Jun 22 Podcast

          IntoSecurity Chats, Episode #10 - Javvad Malik, Brought to you by Oxeye

        • IntoSecurity Podcast Episode 37, brought to you by Cofense
          16 May 22 Podcast

          IntoSecurity Podcast Episode 37, brought to you by Cofense

        • Intosecurity Chats, Episode 9 - Camille Stewart
          29 Apr 22 Podcast

          Intosecurity Chats, Episode 9 - Camille Stewart

        • Intosecurity Podcast Episode 36, brought to you by Trustwave
          19 Apr 22 Podcast

          Intosecurity Podcast Episode 36, brought to you by Trustwave

        • IntoSecurity Podcast Episode 35
          28 Mar 22 Podcast

          IntoSecurity Podcast Episode 35

        • IntoSecurity Podcast Episode 34
          14 Feb 22 Podcast

          IntoSecurity Podcast Episode 34

        • IntoSecurity Chats, Episode 8: Brian Honan, brought to you by HP
          03 Feb 22 Podcast

          IntoSecurity Chats, Episode 8: Brian Honan, brought to you by HP

        • IntoSecurity Podcast Episode 33
          21 Jan 22 Podcast

          IntoSecurity Podcast Episode 33

        • IntoSecurity Podcast Episode 32
          23 Dec 21 Podcast

          IntoSecurity Podcast Episode 32

        12 Aug 2022 News

        SolidBit Ransomware Group Recruiting New Affiliates on Dark Web

        SolidBit Ransomware Group Recruiting New Affiliates on Dark Web

        20% of the earned profit from the distribution of the ransomware will be paid to the affiliates

        #BHUSA: Bug Bounty Botox – Why You Need a Security Process First
        12 Aug 2022 News

        #BHUSA: Bug Bounty Botox – Why You Need a Security Process First

        #BHUSA: Failure to Challenge is a Social Engineering Risk
        12 Aug 2022 News

        #BHUSA: Failure to Challenge is a Social Engineering Risk

        12 Aug 2022 News

        #BHUSA: What has Changed in the Post-Stuxnet Era?

        #BHUSA: What has Changed in the Post-Stuxnet Era?

        Investigative journalist Kim Zetter explains that Stuxnet continues to serves as a precedent for attacks happening now

        US Unmasks Suspected Conti Ransomware Actor
        12 Aug 2022 News

        US Unmasks Suspected Conti Ransomware Actor

        Zeppelin Ransomware Victims May Need Multiple Decryption Keys
        12 Aug 2022 News

        Zeppelin Ransomware Victims May Need Multiple Decryption Keys

        Recovery From NHS Ransomware Attack May Take a Month
        12 Aug 2022 News

        Recovery From NHS Ransomware Attack May Take a Month

        CISA Unveils Cybersecurity Toolkit to Shield US Elections From Hackers
        11 Aug 2022 News

        CISA Unveils Cybersecurity Toolkit to Shield US Elections From Hackers

        11 Aug 2022 News

        Zimbra RCE Vulnerability Exploited Without Admin Privileges

        Zimbra RCE Vulnerability Exploited Without Admin Privileges

        Over 1,000 ZCS instances around the world were reportedly backdoored and compromised

        Android Banking Trojan SOVA Comes Back With New Features Including Ransomware
        11 Aug 2022 News

        Android Banking Trojan SOVA Comes Back With New Features Including Ransomware

        Infosec

        The Wall Has Fallen, but Zero-Trust Architectures Can Save You
        19 Oct 2020 Infosec Blog

        The Wall Has Fallen, but Zero-Trust Architectures Can Save You

        TeamTNT Attack Highlights the Need for Cloud Governance
        15 Oct 2020 Infosec Blog

        TeamTNT Attack Highlights the Need for Cloud Governance

        Next-Gen Infosec

        Eight Benefits of Securing Data Using a VPN
        5 Aug 2022 Next-Gen

        Eight Benefits of Securing Data Using a VPN

        What’s Top of Mind for CISOs in 2022?
        29 Jul 2022 Next-Gen

        What’s Top of Mind for CISOs in 2022?

        • The Magazine
        • About Infosecurity
        • Subscription
        • Meet the Team
        • Contact Us
        • Advertisers
        • Media Pack
        • Contributors
        • Forward Features
        • Op-ed
        • Next-Gen Submission
        • Copyright © 2022 Reed Exhibitions Ltd.
        • Terms and Conditions
        • Privacy Policy
        • Intellectual property statement
        • Cookie Policy
        • Sitemap
        Please wait…