News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Kimberly Crawley
Kimberly Crawley
Freelance Writer
Computer Scientists: Passwords Can be Acquired from Brain Waves
News
30 June 2017
CIA May Have Developed Linux Malware
News
30 June 2017
Linux Systemd Vulnerability Enables DNS Attacks
News
29 June 2017
Shadow Brokers Taunt and Blackmail NSA
News
29 June 2017
Ransomware Vaccine Now Available
News
28 June 2017
Deloitte: Oil and Gas Companies Poorly Prepared for Cyber-Attack
News
27 June 2017
GhostHook Attack Targets Windows 10 Vulnerability
News
26 June 2017
China Agrees to Cease Cyber-Attacks on Canadian Private Sector
News
26 June 2017
Ohio Governor John Kasich the Latest Target of Cyber-Attack
News
26 June 2017
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Marquis Software Breach Affects Over 780,000 Nationwide
News
8 December 2025
1
Barts Health Seeks High Court Ban After Oracle EBS Breach
News
8 December 2025
2
Gartner Calls For Pause on AI Browser Use
News
9 December 2025
3
React2Shell Under Active Exploitation by China-Nexus Hackers
News
8 December 2025
4
React.js Hit by Maximum-Severity 'React2Shell' Vulnerability
News
5 December 2025
5
UK NCSC Raises Alarms Over Prompt Injection Attacks
News
9 December 2025
6
Critical PickleScan Vulnerabilities Expose AI Model Supply Chains
News
2 December 2025
1
CISA and International Partners Issue Guidance for Secure AI in Infrastructure
News
4 December 2025
2
New GhostFrame Phishing Framework Hits Over One Million Attacks
News
4 December 2025
3
ShadyPanda's Seven-Year Campaign Infects 4.3M Chrome and Edge Users
News
2 December 2025
4
Smishing Triad Impersonation Campaigns Expand Globally
News
25 November 2025
5
UK's Cyber Service for Telcos Blocks One Billion Malicious Site Attempts
News
3 December 2025
6
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
1
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
15:00 —
16:00, 17 July 2025
4
Mastering Identity and Access for Non-Human Cloud Entities
Webinar
14:00 —
16:00, 18 September 2025
5
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6