www.infosecurity-magazine.com
Open in
urlscan Pro
54.230.228.51
Public Scan
URL:
https://www.infosecurity-magazine.com/
Submission: On May 15 via api from IE — Scanned from DE
Submission: On May 15 via api from IE — Scanned from DE
Form analysis
4 forms found in the DOMGET https://www.infosecurity-magazine.com/search/
<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
<input type="search" name="q" class="form-control" placeholder="Search site…" aria-label="Search keywords" required="required">
<button type="submit" class="form-button with-icon">
<svg viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Search">
<path d="M15 15L21 21M10 17C6.13401 17 3 13.866 3 10C3 6.13401 6.13401 3 10 3C13.866 3 17 6.13401 17 10C17 13.866 13.866 17 10 17Z" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
</svg>
</button>
</form>
GET https://www.infosecurity-magazine.com/search/
<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
<input type="search" name="q" class="form-control" placeholder="Search Infosecurity Magazine…" aria-label="Search keywords" required="required">
<input type="submit" value="Search" class="form-button">
</form>
GET /my-account/login/
<form class="subscription-form" action="/my-account/login/" method="get">
<input type="email" placeholder="Enter your email…" name="signup" autocomplete="email" aria-label="Email address" required="required" class="form-control">
<input type="submit" class="form-button" value="Sign up">
</form>
GET /my-account/login/
<form class="subscription-form" action="/my-account/login/" method="get">
<input type="email" placeholder="Enter your email…" name="signup" autocomplete="email" aria-label="Email address" required="required" class="form-control">
<input type="submit" class="form-button" value="Sign up">
</form>
Text Content
* Log In * Sign Up * * News * Magazine Features * Opinions * News Features * Interviews * Editorial * Blogs * Reviews * Slackspace * Next-Gen Infosec * Webinars * White Papers * Podcasts * Industry Events & Training * Magazine Events * Online Summits * Company Directory * Application Security * Automation * Big Data * Business Continuity * Cloud Security * Compliance * Cybercrime * Data Protection * Digital Forensics * Encryption * Human Factor * Identity Access Management * Industry Announcements * Internet Security * Malware * Managed Services * Mobile Security * Network Security * Payment Security * Physical and Information Security Convergence * Privacy * Risk Management * The Internet of Things * Log In * Sign Up * * News * Topics * Features * Webinars * White Papers * Podcasts * EventsEvents & Conferences * Directory * * NIST CONFUSION CONTINUES AS CYBER PROS COMPLAIN CVE UPLOADS STALLED News 14 May 2024 CRITICAL VULNERABILITIES IN CINTERION MODEMS EXPOSED News 13 May 2024 ASCENSION RANSOMWARE ATTACK DIVERTS AMBULANCES, DELAYS APPOINTMENTS News 13 May 2024 BLACK BASTA RANSOMWARE VICTIM COUNT TOPS 500 News 13 May 2024 THREAT ACTOR CLAIMS MAJOR EUROPOL DATA BREACH News 13 May 2024 RSAC: HOW CISOS SHOULD PROTECT THEMSELVES AGAINST INDICTMENTS News 9 May 2024 INFOSECURITY MAGAZINE DON’T MISS OUT! Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events. LATEST NEWS AND FEATURES DATA BREACHES IN US SCHOOLS EXPOSED 37.6M RECORDS News14 May 2024 EBURY BOTNET OPERATORS DIVERSIFY WITH FINANCIAL AND CRYPTO THEFT News14 May 2024 CISA AND PARTNERS UNVEIL CYBERSECURITY GUIDE FOR CIVIL SOCIETY GROUPS News14 May 2024 NIST CONFUSION CONTINUES AS CYBER PROS COMPLAIN CVE UPLOADS STALLED News14 May 2024 Several software security experts have told Infosecurity that no new vulnerabilities have been added to the US National Vulnerability Database (NVD) since May 9 CHINA PRESENTS DEFINING CHALLENGE TO GLOBAL CYBERSECURITY, SAYS GCHQ News14 May 2024 GCHQ chief warns China's cyber actions threaten global internet security, while Russia and Iran pose immediate risks 44% OF CYBERSECURITY PROFESSIONALS STRUGGLE WITH REGULATORY COMPLIANCE News14 May 2024 RUSSIAN ACTORS WEAPONIZE LEGITIMATE SERVICES IN MULTI-MALWARE ATTACK News14 May 2024 Recorded Future details a novel campaign that abuses legitimate internet services to deploy multiple malware variants for credential theft UK INSURANCE AND NCSC JOIN FORCES TO FIGHT RANSOMWARE PAYMENTS News14 May 2024 HACKERS USE DNS TUNNELING TO SCAN AND TRACK VICTIMS News14 May 2024 FCC NAMES AND SHAMES FIRST ROBOCALL THREAT ACTOR News14 May 2024 DON’T MISS OUT! Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events. HOW TO PAIR THREAT HUNTING AND EXPLOIT INTELLIGENCE FOR BETTER CYBERSECURITY Webinar21 Feb 2024 Join this session to discover how threat hunting and exploit intelligence can help you secure your organization WEBINARS COMING UP LEARN FROM THE NHS - PROACTIVE PASSWORD SECURITY FOR IMPROVED CYBERSECURITY 16 May 2024, 14:00 BST , 09:00 EDT 16 May HOW TO OPTIMIZE THIRD-PARTY RISK MANAGEMENT PROGRAMS THROUGH NIST CSF 2.0 16 May 2024, 13:00 EDT, 10:00 PDT 16 May WHITE PAPERS ADAPTING TO TOMORROW'S THREAT LANDSCAPE: AI'S ROLE IN CYBERSECURITY OPERATIONS IN 2024 White Paper1 May 2024 GCORE RADAR: DDOS ATTACK TRENDS Q3 TO Q4, 2023 White Paper20 Mar 2024 HEALTHCARE CLOUD SECURITY BUILD VS. BUY White Paper17 Jan 2024 ON-DEMAND WEBINARS * WHY DDOS SIMULATION TESTING IS CRITICAL FOR PROACTIVE NETWORK DEFENSE 2 May 2024 Webinar * HOW TO SECURE REMOTE CONNECTIVITY WITHIN OPERATIONAL TECHNOLOGY ENVIRONMENTS 25 Apr 2024 Webinar * NAVIGATING THE EVOLVING CYBERSECURITY COMPLIANCE LANDSCAPE IN 2024 18 Apr 2024 Webinar * IS MFA ENOUGH? STRATEGIES FOR NEXT-LEVEL IDENTITY SECURITY IN 2024 11 Apr 2024 Webinar * ADAPTING TO TOMORROW'S THREAT LANDSCAPE: AI'S ROLE IN CYBERSECURITY AND SECURITY OPERATIONS IN 2024 28 Mar 2024 Webinar * UNDERSTAND AND COMBAT THE TOP HEALTHCARE CLOUD THREATS TODAY 21 Mar 2024 Webinar * DISINFORMATION DEFENSE: PROTECTING BUSINESSES FROM THE NEW WAVE OF AI-POWERED CYBER THREATS 20 Mar 2024 Webinar * SECURING APIS IN THE CLOUD FRONTIER 20 Mar 2024 Webinar * FIRESIDE CHAT: THE STATE OF RANSOMWARE TODAY WITH THE RANSOMWARE SOMMELIER 20 Mar 2024 Webinar * BOUNCING BACK: BUILDING ORGANIZATIONAL RESILIENCE IN THE FACE OF CYBER-ATTACK 20 Mar 2024 Webinar WHAT’S HOT ON INFOSECURITY MAGAZINE? * Read * Shared * Watched * Editor's Choice AI-POWERED RUSSIAN NETWORK PUSHES FAKE POLITICAL NEWS News9 May 2024 1 CRITICAL VULNERABILITIES IN CINTERION MODEMS EXPOSED News13 May 2024 2 BLACK BASTA RANSOMWARE VICTIM COUNT TOPS 500 News13 May 2024 3 THREAT ACTOR CLAIMS MAJOR EUROPOL DATA BREACH News13 May 2024 4 ASCENSION RANSOMWARE ATTACK DIVERTS AMBULANCES, DELAYS APPOINTMENTS News13 May 2024 5 FAKE ONLINE STORES SCAM OVER 850,000 SHOPPERS News9 May 2024 6 RSAC: CISA LAUNCHES VULNRICHMENT PROGRAM TO ADDRESS NVD CHALLENGES News8 May 2024 1 RSAC: HOW CISOS SHOULD PROTECT THEMSELVES AGAINST INDICTMENTS News9 May 2024 2 THREAT ACTOR CLAIMS MAJOR EUROPOL DATA BREACH News13 May 2024 3 RSAC: THREE STRATEGIES TO BOOST OPEN-SOURCE SECURITY News8 May 2024 4 KASEYA CISO ON PREPARING EFFECTIVELY FOR THE NEXT CYBER INCIDENT Interview6 May 2024 5 RSAC: LOG4J STILL AMONG TOP EXPLOITED VULNERABILITIES, CATO FINDS News7 May 2024 6 WHY DDOS SIMULATION TESTING IS CRITICAL FOR PROACTIVE NETWORK DEFENSE Webinar2 May 2024 1 SUPPLY CHAIN CYBERSECURITY: HOW TO MITIGATE THIRD-PARTY RISKS? Webinar16 Jun 2022 2 IS MFA ENOUGH? STRATEGIES FOR NEXT-LEVEL IDENTITY SECURITY IN 2024 Webinar11 Apr 2024 3 DISINFORMATION DEFENSE: PROTECTING BUSINESSES FROM THE NEW WAVE OF AI-POWERED CYBER THREATS Webinar20 Mar 2024 4 HOW TO SECURE REMOTE CONNECTIVITY WITHIN OPERATIONAL TECHNOLOGY ENVIRONMENTS Webinar25 Apr 2024 5 SECURING APIS IN THE CLOUD FRONTIER Webinar20 Mar 2024 6 WOMEN IN CYBERSECURITY AT INFOSECURITY EUROPE 2024 Magazine Event15:00 – 17:30 BST, 5 Jun 2024 1 RSAC: CISA LAUNCHES VULNRICHMENT PROGRAM TO ADDRESS NVD CHALLENGES News8 May 2024 2 LOCKBIT LEADER AKA LOCKBITSUPP IDENTITY REVEALED News7 May 2024 3 HOW TO PROACTIVELY REMEDIATE RISING WEB APPLICATION THREATS Webinar30 May 2024, 13:00 BST 4 LEARN FROM THE NHS - PROACTIVE PASSWORD SECURITY FOR IMPROVED CYBERSECURITY Webinar16 May 2024, 14:00 BST , 09:00 EDT 5 LIVE ROUNDTABLE EVENT: SECURE ENTERPRISE BROWSING, NEW WAYS TO STRENGTHEN ENDPOINT SECURITY Magazine Event10:00 – 11:30 BST, 4 Jun 2024 6 PODCASTS * CHANGE HEALTHCARE CYBER-ATTACK: INSIDE THE DISRUPTION AND THE LESSONS LEARNED 7 May 2024 Podcast * INSIDE OPERATION CRONOS: DECODING LOCKBIT'S DOWNFALL 8 Apr 2024 Podcast * BEYOND THE GIANTS: WHY SMES ARE NOW PRIME TARGETS FOR CYBERCRIME 28 Feb 2024 Podcast * DATA PRIVACY WEEK: PUTTING CONSUMERS IN CONTROL OF THEIR PERSONAL DATA 24 Jan 2024 Podcast * NAVIGATING THE CYBER SKILLS GAP, AI FOR CYBERSECURITY, AND THREAT LANDSCAPE IN 2023 11 Dec 2023 Podcast * AI SAFETY FOR CYBERSECURITY PROFESSIONALS: UNDERSTANDING THE RISKS AND IMPLICATIONS 20 Nov 2023 Podcast * COMBATTING PHISHING IN THE ERA OF AI AND DEEPFAKES 27 Oct 2023 Podcast * THE CYBERSECURITY SKILLS GAP: HOW TO BRIDGE THE DIVIDE 14 Sep 2023 Podcast * RANSOMWARE: THE RETURN OF THE VICIOUS CYCLE 2 Aug 2023 Podcast * INSIDE THE MOVEIT ATTACK: DECRYPTING CLOP'S TTPS AND EMPOWERING CYBERSECURITY PRACTITIONERS 4 Jul 2023 Podcast MORE NEWS AND FEATURES CRITICAL VULNERABILITIES IN CINTERION MODEMS EXPOSED News13 May 2024 MALLOX RANSOMWARE DEPLOYED VIA MS-SQL HONEYPOT ATTACK News13 May 2024 Analyzing Mallox samples, Sekoia identified two distinct affiliates using different approaches ASCENSION RANSOMWARE ATTACK DIVERTS AMBULANCES, DELAYS APPOINTMENTS News13 May 2024 BLACK BASTA RANSOMWARE VICTIM COUNT TOPS 500 News13 May 2024 THREAT ACTOR CLAIMS MAJOR EUROPOL DATA BREACH News13 May 2024 UK'S AI SAFETY INSTITUTE UNVEILS PLATFORM TO ACCELERATE SAFE AI DEVELOPMENT News10 May 2024 THE DATA PRIVACY RISKS FROM VIDEO SURVEILLANCE AT THE PARIS OLYMPICS Opinion10 May 2024 RSAC: EXPERTS HIGHLIGHT NOVEL CYBER THREATS AND TACTICS News10 May 2024 RSAC: WHY CYBERSECURITY PROFESSIONALS HAVE A DUTY TO SECURE AI News9 May 2024 Experts at the RSA Conference urged cyber professionals to lead the way in securing AI systems today and pave the way for AI to solve huge societal challenges RSAC: HOW CISOS SHOULD PROTECT THEMSELVES AGAINST INDICTMENTS News9 May 2024 Experts at the RSA Conference discussed what CISOs can do to protect themselves against legal pressure EVENTS COMING UP INFOSECURITY EUROPE 2024 Event4 – 6 Jun 2024 04 June LIVE ROUNDTABLE EVENT: SECURE ENTERPRISE BROWSING, NEW WAYS TO STRENGTHEN ENDPOINT SECURITY Magazine Event10:00 – 11:30 BST, 4 Jun 2024 04 June WOMEN IN CYBERSECURITY AT INFOSECURITY EUROPE 2024 Magazine Event15:00 – 17:30 BST, 5 Jun 2024 05 June NEXT-GEN INFOSEC HOW TO PREVENT DATA LEAKAGES Next-Gen11 Aug 2023 TOP CLOUD MISCONCEPTIONS THAT COULD DAMAGE YOUR ORGANIZATION Next-Gen4 Aug 2023 IMPROVE ASSET VISIBILITY IN OT SECURITY WITH HYBRID AI-CLOUD APPROACHES Next-Gen21 Jul 2023 THE MAGAZINE * About Infosecurity * Meet the team * Contact us ADVERTISERS * Media pack CONTRIBUTORS * Forward features * Op-ed * Next-gen submission * * * * Copyright © 2024 Reed Exhibitions Ltd. * Terms and Conditions * Privacy Policy * Intellectual property statement * Cookies Settings * Cookie Policy * Sitemap We use cookies to analyse and improve our service, to improve and personalise content, advertising and your digital experience. We also share information about your use of our site with our social media, advertising and analytics partners. Cookie Policy Accept All Cookies Cookies Settings COOKIE PREFERENCE CENTRE We process your information, to deliver content or advertisements and measure the delivery of such content or advertisements, extract insights, and generate reports to understand service usage; and/or accessing or storing information on devices for that purpose. You can choose not to allow some types of cookies. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more, to change our default settings, and/or view the list of Google Ad-Tech Vendors. Cookie Policy MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Confirm My Choices Back Button Back PERFORMANCE COOKIES Vendor Search Search Icon Filter Icon Clear Filters Information storage and access Apply Consent Leg.Interest All Consent Allowed Select All Vendors Select All Vendors All Consent Allowed Confirm My Choices