h2
Clop Ransom Gang Breaches Big Names Via MOVEit Flaw
h2
What’s Hot on Infosecurity Magazine?
h3
Social Media Phishing – The 2023 Cybersecurity Threat
h3
How SMEs Can Secure the Remote Workforce
h3
Infosecurity Europe 2023
h3
Countering Today’s Top Email Threats: A Team Effort
h3
Insider Risk: How to Keep Your Data Safe in a Hybrid Working World
h3
Defending Data Against Ransomware
h3
NIS2 - What is it and how it impacts cybersecurity
h3
Secure Enterprise Network Traffic Against Modern Cyberthreats
h3
#InfosecurityEurope: What to Expect at This Year’s Event
h3
AI: The good, the bad and the ugly. The team discuss AI’s evolution over the past six months.
h3
The editorial team preview the 2023 RSA conference and chat to ISACA’s Pam Nigro about what are like
h3
One year since the outbreak of war in Ukraine, the team discusses the evolution of Russia-aligned cy
h3
For #DataPrivacyWeek the team speak to privacy expert Valerie Lyons about consumer awareness, AI’s i
h3
Beth Maundrill is Joined by Cybersecurity Advocate Jen Ellis to Talk About How you can impact cybers
h3
The Team are Joined by Cybersecurity Experts to Review 2022 and How to Prepare Information Security
h3
Hear from CISA’s Deputy Mission Coordinator for Threat Hunting, Jillian Rucker, and payment security
h3
Beth Maundrill is joined by Dr. Jason Nurse, Associate Professor in Cyber Security at the University
h3
The team looks at some of the Cybersecurity Awareness Month campaigns and other efforts focusing how
h3
Cisco Counterfeiter Pleads Guilty to $100m Scheme
h3
FBI Warns of Surge in Deepfake Sextortion Attempts
h3
CVEs Surge By 25% in 2022 to Another Record High
h3
Three Vulnerabilities Discovered in Game Dev Tool RenderDoc
h3
Exploitation of Vulnerabilities Have Soared, Unit 42 Report Finds
h3
New ChatGPT Attack Technique Spreads Malicious Packages
h3
The Open-Source Software in Our Pockets Needs Our Help
h3
BEC Volumes and Ransomware Costs Double in a Year
h3
Kaspersky Releases Tool to Detect Zero-Click iOS Attacks
h3
Clop Ransom Gang Breaches Big Names Via MOVEit Flaw
h3
UK Closes CCP Cyber Certification Scheme
h3
Critical Zero-Day Flaw Exploited in MOVEit Transfer
h3
The Open-Source Software in Our Pockets Needs Our Help
h3
North Korea Makes 50% of Income from Cyber-Attacks: Report
h3
Exploitation of Vulnerabilities Have Soared, Unit 42 Report Finds
h3
Spanish Bank Globalcaja Hit By Ransomware Attack
h3
North Korea Makes 50% of Income from Cyber-Attacks: Report
h3
New ChatGPT Attack Technique Spreads Malicious Packages
h3
Insurers Predict $33bn Bill for Catastrophic "Cyber Event"
h3
Pentagon Cyber Policy Cites Learnings from Ukraine War
h3
The Open-Source Software in Our Pockets Needs Our Help
h3
Ransomware Gangs Adopting Business-like Practices to Boost Profits
h3
The Growing Importance of Digital Forensics and Incident Response in Corporate Environments
h3
The ChatGPT Revolution: The Role of Large Language Models in Enterprise IT
h3
Adapting Your Data Security Strategy to the Latest Cyber Threats
h3
How to Transfer Data Securely When Moving to the Cloud
h3
Web App and Portal Protection: Managing File Upload Security Threats
h3
How to Mitigate Cyber-Risks Through a Threat Exposure Management Program
h3
#RSAC: Election Protection is CISA’s Top Priority for Next 18 Months
h3
Replacing GDPR in the UK: Assessing AI and Research Provisions
h3
#RSAC: Understanding AI's Role in Cybersecurity Beyond the Hype
h3
Thousands of Social Media Takedowns Hit People Smugglers
h3
Pulling Back the Curtain to Address TikTok Security Concerns
h3
How to Mitigate Cyber-Risks Through a Threat Exposure Management Program
h3
Strategic Shield: Leveraging Threat Intelligence for Security Resilience
h3
The Growing Importance of Digital Forensics and Incident Response in Corporate Environments
h3
The ChatGPT Revolution: The Role of Large Language Models in Enterprise IT
h3
How to Transfer Data Securely When Moving to the Cloud
h3
Adapting Your Data Security Strategy to the Latest Cyber Threats
h3
How to Mitigate Cyber-Risks Through a Threat Exposure Management Program
h3
Combating InfoSec Compliance Fatigue: Pain Points and Best Practices
h3
Authentication Security: Crafting a Bulletproof Password Reset Process
h3
How to Ensure your NDR Tool isn't a Firehose That Gets Away From You
h3
The Infosecurity Magazine End of Year Xmas Quiz (Feat. The Beer Farmers)
h3
Pharmaceutical Giant Eisai Hit By Ransomware Incident
h3
Microsoft Brings OpenAI Tech to US Agencies
h3
Why Apps Like TikTok Can Be a Security Issue for Your Business
h3
Interpol: Human Trafficking is Fueling Fraud Epidemic
h3
Lazarus Group Blamed for Atomic Wallet Heist
h3
Cyber Extortionists Seek Out Fresh Victims in LatAm and Asia
h3
CISA and Partners Publish Guide For Remote Access Security
h3
North Korean APT Group Kimsuky Expands Social Engineering Tactics
h3
"PowerDrop" PowerShell Malware Targets US Aerospace Industry
h3
AI vs Cybersecurity: Preparing for the Most Transformative Meta-Invention of Our Times