Infosecurity News

  1. #IRISSCON: 12 Ways to Defend and Respond to Cyber-Attacks Effectively

    Brian Honan sets out a number of security strategies organizations should adopt to defend and respond effectively to cyber-attacks

  2. #IRISSCON: Transition from Cybersecurity to Cyber-Immunity, Says Eugene Kaspersky

    Eugene Kaspersky argues traditional approaches to cybersecurity are no longer sufficient for protecting critical infrastructure from cyber-attacks

  3. Suspected EncroChat Drug Trafficker Faces Trial

    Kalman Butt is said to have used the encrypted comms platform

  4. Malicious PyPl Packages Downloaded 40,000+ Times

    Threat actors go to great lengths to stay hidden on the repository

  5. Less than Half of Consumers Change Passwords Post-Breach

    A fifth took no action at all, according to non-profit study

  6. North Korean Cyber-criminal Recycles Tactics and Targets

    Researchers investigating the activities of TA406 are left with a prevailing sense of déjà vu

  7. Man Charged with Impersonating Female Minnesota Student Online

    Charges brought in cyberstalking case that forced victim to move house

  8. Overworked CISOs are Skipping Family Vacations and Holidays

    CISOs’ heavy workload is causing them to miss medical appointments and holidays

  9. #IRISSCON: Understanding the Reality of Cyber Threats to Improve Defenses

    Ciaran Martin sets out the reality of cyber harms, and argues this knowledge underpins strong cybersecurity

  10. #IRISSCON: Security Industry Should Change the Rhetoric Around Cyber-Threats

    Dr Victoria Baines believes the sector needs to avoid the use of dramatic language when describing cyber-threats to the public

  11. China's APT41 Manages Library of Breached Certificates

    Shared resource dramatically increases success rates for Winnti group

  12. Russian Cybercrime Forums Open Doors to Chinese-Speakers

    Researchers see east-west activity across Ramp and XSS

  13. Threat Actors Discuss Leasing Zero-Day Exploits

    Exploit-as-a-service model mooted in the cybercrime underground

  14. NSA Grants Boost University's Cyber Academy

    Cash injection funds expansion of University of North Georgia’s cybersecurity instruction program

  15. New Partnership to Invest in Cybersecurity Startups

    Geekdom teams up with gener8tor to help cybersecurity companies develop products

  16. US to Sell $56m in Seized Crypto-Currency

    BitConnect promoter’s seized crypto-currency to be liquidated to benefit victims of fraud

  17. Organizations More Susceptible to Ransomware Attacks During Weekends and Holidays

    37% of organizations do not have contingency plans in place to respond to a ransomware attack during weekend and holiday periods

  18. DDoS Attacks Surge 35% in Q3 as VoIP is Targeted

    Lumen claims longest attack lasted 14 days

  19. Ghostwriter Disinformation Operation Linked to Belarus

    Rogue state blamed for long-running campaign for first time

  20. UK Spooks Handled Record Number of Cyber-Incidents Last Year

    GCHQ agency trumpets “world-class” cybersecurity

What’s Hot on Infosecurity Magazine?