Infosecurity Blogs

Cross-Functional Collaboration is Becoming Essential for Security Professionals

Cross-Functional Collaboration is Becoming Essential for Security Professionals

The threats facing organizations today are too numerous and complex to be dealt with exclusively by the security team

Qakbot: Analysing a Modern-Day Banking Trojan

Qakbot: Analysing a Modern-Day Banking Trojan

Attackers are using increasingly innovative methods to launch the Qakbot Trojan

Initial Access Brokers and Blocking the Continued March of Ransomware

Initial Access Brokers and Blocking the Continued March of Ransomware

IABs have made ransomware attacks easier for affiliate groups and organizations need to respond

Observing the Changing Nature of Security within Organizations

Observing the Changing Nature of Security within Organizations

Understand why an organization's security posture must align with business objectives

Brought to you by
Dito

Fixing Our Breaking Human Controls

Fixing Our Breaking Human Controls

Jenai Marinkovic argues that more empathy is required to mitigate cyber-threats

How to Solve Third-Party Remote Access Problems in Manufacturing

How to Solve Third-Party Remote Access Problems in Manufacturing

Under Industry 4.0 securing OT, ICS and PLC systems is more important than ever before

Brought to you by
SecureLink

The Role of Cloud Services in the Hybrid War in Ukraine

The Role of Cloud Services in the Hybrid War in Ukraine

Threat actors linked to the Russia-Ukraine war are increasingly seeking to exploit cloud services

Outsourcing Cyber Risk: Why an Integrated Approach is Critical

Outsourcing Cyber Risk: Why an Integrated Approach is Critical

While many organisations are looking for a silver bullet to combat all threats, there is no such thing as a one-size-fits-all approach

Looking East: Japanese Credit Card Customers Targeted With Phishing Attacks

Looking East: Japanese Credit Card Customers Targeted With Phishing Attacks

The threat actor was likely to have been of Chinese origin

The Challenge of Shadow OT

The Challenge of Shadow OT

No matter how your ICS/OT environment is connected, it needs to be secured

Keeping up with the Attackers: Educating Staff on New Monkeypox Themed Phishing Campaigns

Keeping up with the Attackers: Educating Staff on New Monkeypox Themed Phishing Campaigns

Threat actors exploit public wariness surrounding new medical concerns

Brought to you by
Cofense

How Russian Information Operations Are Trying to Win the War

How Russian Information Operations Are Trying to Win the War

A whole-of-community response is required to counter Russian attempts to undermine and divide the Western coalition

Our Bloggers

What’s Hot on Infosecurity Magazine?