News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Sooraj Shah
Sooraj Shah
Freelance Writer
Critical Security Vulnerabilities Found in Segway Hoverboards
News
19 Jul 2017
WannaCry: 25% Add Cybersecurity to Boardroom Agenda
News
19 Jul 2017
Two Iranians Charged with Hacking US Defense Technology Maker
News
19 Jul 2017
FBI: IoT Toys Could Present a Privacy and Safety Risk
News
18 Jul 2017
Security Could Be Weakened If UK-EU Data Flows Are Hindered Post-Brexit
News
18 Jul 2017
Newcastle City Council Leaks Data of Thousands of Adopted Children
News
18 Jul 2017
IoT 'Smart' Alarm has Vulnerabilities that Could Help Black Hat Burglars
News
17 Jul 2017
Major Cyber-Attack Could Cost World Economy $121.4bn
News
17 Jul 2017
Ashley Madison Reaches Proposed Settlement with Exposed Users
News
17 Jul 2017
Bupa Employee Fired After 547,000 Customers' Data Compromised
News
14 Jul 2017
GCHQ Launches Second Security Accelerator for Start-ups
News
14 Jul 2017
WikiLeaks Reveals CIA Tool Acting as SMS Proxy on Android
News
14 Jul 2017
Bupa Suffers Data Breach
News
13 Jul 2017
Verizon Data of at Least Six Million Users Leaked Online
News
13 Jul 2017
UK Government to Invest £21m in NHS Cybersecurity
News
13 Jul 2017
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Fraudsters Exploit Telegram’s Popularity For Toncoin Scam
News
22 Apr 2024
1
Vulnerability Exploitation on the Rise as Attackers Ditch Phishing
News
23 Apr 2024
2
Security Leaders Braced for Daily AI-Driven Attacks by Year-End
News
24 Apr 2024
3
DragonForce Ransomware Group Uses LockBit's Leaked Builder
News
25 Apr 2024
4
Fifth of CISOs Admit Staff Leaked Data Via GenAI
News
24 Apr 2024
5
North Korean Hackers Target Dozens of Defense Companies
News
24 Apr 2024
6
North Korean Group Kimsuky Exploits DMARC and Web Beacons
News
17 Apr 2024
1
Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites
News
23 Apr 2024
2
Dependency Confusion Vulnerability Found in Apache Project
News
22 Apr 2024
3
NSA Launches Guidance for Secure AI Deployment
News
22 Apr 2024
4
Banning Ransomware Payments Will Do More Harm Than Good
Opinion
11 Apr 2024
5
Security Leaders Braced for Daily AI-Driven Attacks by Year-End
News
24 Apr 2024
6
Incident Response: Four Key Cybersecurity Measures to Protect Your Business
Webinar
19 Oct 2023
1
Is MFA Enough? Strategies for Next-Level Identity Security in 2024
Webinar
11 Apr 2024
2
Disinformation Defense: Protecting Businesses from the New Wave of AI-Powered Cyber Threats
Webinar
20 Mar 2024
3
Securing APIs in the Cloud Frontier
Webinar
20 Mar 2024
4
Navigating the Evolving Cybersecurity Compliance Landscape in 2024
Webinar
18 Apr 2024
5
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024
6
Infosecurity Magazine Spring Online Summit 2024: Day One
Online Summit
09:45 GMT, 19 Mar
–
15:00 GMT, 20 Mar 2024
1
Infosecurity Magazine Spring Online Summit 2024: Day Two
Online Summit
10:45
–
16:00 EDT, 20 Mar 2024
2
Russia’s Midnight Blizzard Accesses Microsoft Source Code
News
11 Mar 2024
3
I-Soon GitHub Leak: What Cyber Experts Learned About Chinese Cyber Espionage
News Feature
27 Feb 2024
4
LockBit Takedown: What You Need to Know about Operation Cronos
News
26 Feb 2024
5
Women in Cybersecurity at Infosecurity Europe 2024
Magazine Event
15:00
–
17:30 BST, 5 Jun 2024
6