www.infosecurity-magazine.com Open in urlscan Pro
54.230.228.51  Public Scan

URL: https://www.infosecurity-magazine.com/
Submission: On May 15 via api from IE — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://www.infosecurity-magazine.com/search/

<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
  <input type="search" name="q" class="form-control" placeholder="Search site…" aria-label="Search keywords" required="required">
  <button type="submit" class="form-button with-icon">
    <svg viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Search">
      <path d="M15 15L21 21M10 17C6.13401 17 3 13.866 3 10C3 6.13401 6.13401 3 10 3C13.866 3 17 6.13401 17 10C17 13.866 13.866 17 10 17Z" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
    </svg>
  </button>
</form>

GET https://www.infosecurity-magazine.com/search/

<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
  <input type="search" name="q" class="form-control" placeholder="Search Infosecurity Magazine…" aria-label="Search keywords" required="required">
  <input type="submit" value="Search" class="form-button">
</form>

GET /my-account/login/

<form class="subscription-form" action="/my-account/login/" method="get">
  <input type="email" placeholder="Enter your email…" name="signup" autocomplete="email" aria-label="Email address" required="required" class="form-control">
  <input type="submit" class="form-button" value="Sign up">
</form>

GET /my-account/login/

<form class="subscription-form" action="/my-account/login/" method="get">
  <input type="email" placeholder="Enter your email…" name="signup" autocomplete="email" aria-label="Email address" required="required" class="form-control">
  <input type="submit" class="form-button" value="Sign up">
</form>

Text Content

 * Log In
 * Sign Up

 * 

 * News
 * Magazine Features
 * Opinions
 * News Features
 * Interviews
 * Editorial
 * Blogs
 * Reviews
 * Slackspace
 * Next-Gen Infosec
 * Webinars
 * White Papers
 * Podcasts
 * Industry Events & Training
 * Magazine Events
 * Online Summits
 * Company Directory

 * Application Security
 * Automation
 * Big Data
 * Business Continuity
 * Cloud Security
 * Compliance
 * Cybercrime
 * Data Protection
 * Digital Forensics
 * Encryption
 * Human Factor
 * Identity Access Management
 * Industry Announcements
 * Internet Security
 * Malware
 * Managed Services
 * Mobile Security
 * Network Security
 * Payment Security
 * Physical and Information Security Convergence
 * Privacy
 * Risk Management
 * The Internet of Things

 * Log In
 * Sign Up

 * 
 * News
 * Topics
 * Features
 * Webinars
 * White Papers
 * Podcasts
 * EventsEvents & Conferences
 * Directory
 * * 


NIST CONFUSION CONTINUES AS CYBER PROS COMPLAIN CVE UPLOADS STALLED

News 14 May 2024


CRITICAL VULNERABILITIES IN CINTERION MODEMS EXPOSED

News 13 May 2024


ASCENSION RANSOMWARE ATTACK DIVERTS AMBULANCES, DELAYS APPOINTMENTS

News 13 May 2024


BLACK BASTA RANSOMWARE VICTIM COUNT TOPS 500

News 13 May 2024


THREAT ACTOR CLAIMS MAJOR EUROPOL DATA BREACH

News 13 May 2024


RSAC: HOW CISOS SHOULD PROTECT THEMSELVES AGAINST INDICTMENTS

News 9 May 2024



INFOSECURITY MAGAZINE


DON’T MISS OUT!

Subscribe to our weekly newsletter for the latest in industry news, expert
insights, dedicated information security content and online events.




LATEST NEWS AND FEATURES


DATA BREACHES IN US SCHOOLS EXPOSED 37.6M RECORDS

News14 May 2024


EBURY BOTNET OPERATORS DIVERSIFY WITH FINANCIAL AND CRYPTO THEFT

News14 May 2024


CISA AND PARTNERS UNVEIL CYBERSECURITY GUIDE FOR CIVIL SOCIETY GROUPS

News14 May 2024


NIST CONFUSION CONTINUES AS CYBER PROS COMPLAIN CVE UPLOADS STALLED

News14 May 2024

Several software security experts have told Infosecurity that no new
vulnerabilities have been added to the US National Vulnerability Database (NVD)
since May 9


CHINA PRESENTS DEFINING CHALLENGE TO GLOBAL CYBERSECURITY, SAYS GCHQ

News14 May 2024

GCHQ chief warns China's cyber actions threaten global internet security, while
Russia and Iran pose immediate risks


44% OF CYBERSECURITY PROFESSIONALS STRUGGLE WITH REGULATORY COMPLIANCE

News14 May 2024


RUSSIAN ACTORS WEAPONIZE LEGITIMATE SERVICES IN MULTI-MALWARE ATTACK

News14 May 2024

Recorded Future details a novel campaign that abuses legitimate internet
services to deploy multiple malware variants for credential theft


UK INSURANCE AND NCSC JOIN FORCES TO FIGHT RANSOMWARE PAYMENTS

News14 May 2024



HACKERS USE DNS TUNNELING TO SCAN AND TRACK VICTIMS

News14 May 2024


FCC NAMES AND SHAMES FIRST ROBOCALL THREAT ACTOR

News14 May 2024


DON’T MISS OUT!

Subscribe to our weekly newsletter for the latest in industry news, expert
insights, dedicated information security content and online events.




HOW TO PAIR THREAT HUNTING AND EXPLOIT INTELLIGENCE FOR BETTER CYBERSECURITY

Webinar21 Feb 2024

Join this session to discover how threat hunting and exploit intelligence can
help you secure your organization


WEBINARS COMING UP


LEARN FROM THE NHS - PROACTIVE PASSWORD SECURITY FOR IMPROVED CYBERSECURITY

16 May 2024, 14:00 BST , 09:00 EDT
16
May


HOW TO OPTIMIZE THIRD-PARTY RISK MANAGEMENT PROGRAMS THROUGH NIST CSF 2.0

16 May 2024, 13:00 EDT, 10:00 PDT
16
May


WHITE PAPERS


ADAPTING TO TOMORROW'S THREAT LANDSCAPE: AI'S ROLE IN CYBERSECURITY OPERATIONS
IN 2024

White Paper1 May 2024


GCORE RADAR: DDOS ATTACK TRENDS Q3 TO Q4, 2023

White Paper20 Mar 2024


HEALTHCARE CLOUD SECURITY BUILD VS. BUY

White Paper17 Jan 2024



ON-DEMAND WEBINARS


 * WHY DDOS SIMULATION TESTING IS CRITICAL FOR PROACTIVE NETWORK DEFENSE
   
   2 May 2024 Webinar


 * HOW TO SECURE REMOTE CONNECTIVITY WITHIN OPERATIONAL TECHNOLOGY ENVIRONMENTS
   
   25 Apr 2024 Webinar


 * NAVIGATING THE EVOLVING CYBERSECURITY COMPLIANCE LANDSCAPE IN 2024
   
   18 Apr 2024 Webinar


 * IS MFA ENOUGH? STRATEGIES FOR NEXT-LEVEL IDENTITY SECURITY IN 2024
   
   11 Apr 2024 Webinar


 * ADAPTING TO TOMORROW'S THREAT LANDSCAPE: AI'S ROLE IN CYBERSECURITY AND
   SECURITY OPERATIONS IN 2024
   
   28 Mar 2024 Webinar


 * UNDERSTAND AND COMBAT THE TOP HEALTHCARE CLOUD THREATS TODAY
   
   21 Mar 2024 Webinar


 * DISINFORMATION DEFENSE: PROTECTING BUSINESSES FROM THE NEW WAVE OF AI-POWERED
   CYBER THREATS
   
   20 Mar 2024 Webinar


 * SECURING APIS IN THE CLOUD FRONTIER
   
   20 Mar 2024 Webinar


 * FIRESIDE CHAT: THE STATE OF RANSOMWARE TODAY WITH THE RANSOMWARE SOMMELIER
   
   20 Mar 2024 Webinar


 * BOUNCING BACK: BUILDING ORGANIZATIONAL RESILIENCE IN THE FACE OF CYBER-ATTACK
   
   20 Mar 2024 Webinar




WHAT’S HOT ON INFOSECURITY MAGAZINE?

 * Read
 * Shared
 * Watched
 * Editor's Choice


AI-POWERED RUSSIAN NETWORK PUSHES FAKE POLITICAL NEWS

News9 May 2024
1


CRITICAL VULNERABILITIES IN CINTERION MODEMS EXPOSED

News13 May 2024
2


BLACK BASTA RANSOMWARE VICTIM COUNT TOPS 500

News13 May 2024
3


THREAT ACTOR CLAIMS MAJOR EUROPOL DATA BREACH

News13 May 2024
4


ASCENSION RANSOMWARE ATTACK DIVERTS AMBULANCES, DELAYS APPOINTMENTS

News13 May 2024
5


FAKE ONLINE STORES SCAM OVER 850,000 SHOPPERS

News9 May 2024
6



RSAC: CISA LAUNCHES VULNRICHMENT PROGRAM TO ADDRESS NVD CHALLENGES

News8 May 2024
1


RSAC: HOW CISOS SHOULD PROTECT THEMSELVES AGAINST INDICTMENTS

News9 May 2024
2


THREAT ACTOR CLAIMS MAJOR EUROPOL DATA BREACH

News13 May 2024
3


RSAC: THREE STRATEGIES TO BOOST OPEN-SOURCE SECURITY

News8 May 2024
4


KASEYA CISO ON PREPARING EFFECTIVELY FOR THE NEXT CYBER INCIDENT

Interview6 May 2024
5


RSAC: LOG4J STILL AMONG TOP EXPLOITED VULNERABILITIES, CATO FINDS

News7 May 2024
6



WHY DDOS SIMULATION TESTING IS CRITICAL FOR PROACTIVE NETWORK DEFENSE

Webinar2 May 2024
1


SUPPLY CHAIN CYBERSECURITY: HOW TO MITIGATE THIRD-PARTY RISKS?

Webinar16 Jun 2022
2


IS MFA ENOUGH? STRATEGIES FOR NEXT-LEVEL IDENTITY SECURITY IN 2024

Webinar11 Apr 2024
3


DISINFORMATION DEFENSE: PROTECTING BUSINESSES FROM THE NEW WAVE OF AI-POWERED
CYBER THREATS

Webinar20 Mar 2024
4


HOW TO SECURE REMOTE CONNECTIVITY WITHIN OPERATIONAL TECHNOLOGY ENVIRONMENTS

Webinar25 Apr 2024
5


SECURING APIS IN THE CLOUD FRONTIER

Webinar20 Mar 2024
6



WOMEN IN CYBERSECURITY AT INFOSECURITY EUROPE 2024

Magazine Event15:00 – 17:30 BST, 5 Jun 2024
1


RSAC: CISA LAUNCHES VULNRICHMENT PROGRAM TO ADDRESS NVD CHALLENGES

News8 May 2024
2


LOCKBIT LEADER AKA LOCKBITSUPP IDENTITY REVEALED

News7 May 2024
3


HOW TO PROACTIVELY REMEDIATE RISING WEB APPLICATION THREATS

Webinar30 May 2024, 13:00 BST
4


LEARN FROM THE NHS - PROACTIVE PASSWORD SECURITY FOR IMPROVED CYBERSECURITY

Webinar16 May 2024, 14:00 BST , 09:00 EDT
5


LIVE ROUNDTABLE EVENT: SECURE ENTERPRISE BROWSING, NEW WAYS TO STRENGTHEN
ENDPOINT SECURITY

Magazine Event10:00 – 11:30 BST, 4 Jun 2024
6



PODCASTS


 * CHANGE HEALTHCARE CYBER-ATTACK: INSIDE THE DISRUPTION AND THE LESSONS LEARNED
   
   7 May 2024 Podcast


 * INSIDE OPERATION CRONOS: DECODING LOCKBIT'S DOWNFALL
   
   8 Apr 2024 Podcast


 * BEYOND THE GIANTS: WHY SMES ARE NOW PRIME TARGETS FOR CYBERCRIME
   
   28 Feb 2024 Podcast


 * DATA PRIVACY WEEK: PUTTING CONSUMERS IN CONTROL OF THEIR PERSONAL DATA
   
   24 Jan 2024 Podcast


 * NAVIGATING THE CYBER SKILLS GAP, AI FOR CYBERSECURITY, AND THREAT LANDSCAPE
   IN 2023
   
   11 Dec 2023 Podcast


 * AI SAFETY FOR CYBERSECURITY PROFESSIONALS: UNDERSTANDING THE RISKS AND
   IMPLICATIONS
   
   20 Nov 2023 Podcast


 * COMBATTING PHISHING IN THE ERA OF AI AND DEEPFAKES
   
   27 Oct 2023 Podcast


 * THE CYBERSECURITY SKILLS GAP: HOW TO BRIDGE THE DIVIDE
   
   14 Sep 2023 Podcast


 * RANSOMWARE: THE RETURN OF THE VICIOUS CYCLE
   
   2 Aug 2023 Podcast


 * INSIDE THE MOVEIT ATTACK: DECRYPTING CLOP'S TTPS AND EMPOWERING CYBERSECURITY
   PRACTITIONERS
   
   4 Jul 2023 Podcast




MORE NEWS AND FEATURES


CRITICAL VULNERABILITIES IN CINTERION MODEMS EXPOSED

News13 May 2024


MALLOX RANSOMWARE DEPLOYED VIA MS-SQL HONEYPOT ATTACK

News13 May 2024

Analyzing Mallox samples, Sekoia identified two distinct affiliates using
different approaches


ASCENSION RANSOMWARE ATTACK DIVERTS AMBULANCES, DELAYS APPOINTMENTS

News13 May 2024


BLACK BASTA RANSOMWARE VICTIM COUNT TOPS 500

News13 May 2024


THREAT ACTOR CLAIMS MAJOR EUROPOL DATA BREACH

News13 May 2024



UK'S AI SAFETY INSTITUTE UNVEILS PLATFORM TO ACCELERATE SAFE AI DEVELOPMENT

News10 May 2024


THE DATA PRIVACY RISKS FROM VIDEO SURVEILLANCE AT THE PARIS OLYMPICS

Opinion10 May 2024


RSAC: EXPERTS HIGHLIGHT NOVEL CYBER THREATS AND TACTICS

News10 May 2024


RSAC: WHY CYBERSECURITY PROFESSIONALS HAVE A DUTY TO SECURE AI

News9 May 2024

Experts at the RSA Conference urged cyber professionals to lead the way in
securing AI systems today and pave the way for AI to solve huge societal
challenges


RSAC: HOW CISOS SHOULD PROTECT THEMSELVES AGAINST INDICTMENTS

News9 May 2024

Experts at the RSA Conference discussed what CISOs can do to protect themselves
against legal pressure


EVENTS COMING UP


INFOSECURITY EUROPE 2024

Event4 – 6 Jun 2024
04
June


LIVE ROUNDTABLE EVENT: SECURE ENTERPRISE BROWSING, NEW WAYS TO STRENGTHEN
ENDPOINT SECURITY

Magazine Event10:00 – 11:30 BST, 4 Jun 2024
04
June


WOMEN IN CYBERSECURITY AT INFOSECURITY EUROPE 2024

Magazine Event15:00 – 17:30 BST, 5 Jun 2024
05
June



NEXT-GEN INFOSEC


HOW TO PREVENT DATA LEAKAGES

Next-Gen11 Aug 2023


TOP CLOUD MISCONCEPTIONS THAT COULD DAMAGE YOUR ORGANIZATION

Next-Gen4 Aug 2023


IMPROVE ASSET VISIBILITY IN OT SECURITY WITH HYBRID AI-CLOUD APPROACHES

Next-Gen21 Jul 2023


THE MAGAZINE

 * About Infosecurity
 * Meet the team
 * Contact us


ADVERTISERS

 * Media pack


CONTRIBUTORS

 * Forward features
 * Op-ed
 * Next-gen submission

 * 
 * 
 * 

 * Copyright © 2024 Reed Exhibitions Ltd.
 * Terms and Conditions
 * Privacy Policy
 * Intellectual property statement
 * Cookies Settings
 * Cookie Policy
 * Sitemap




We use cookies to analyse and improve our service, to improve and personalise
content, advertising and your digital experience. We also share information
about your use of our site with our social media, advertising and analytics
partners. Cookie Policy
Accept All Cookies
Cookies Settings



COOKIE PREFERENCE CENTRE

We process your information, to deliver content or advertisements and measure
the delivery of such content or advertisements, extract insights, and generate
reports to understand service usage; and/or accessing or storing information on
devices for that purpose.

You can choose not to allow some types of cookies. However, blocking some types
of cookies may impact your experience of the site and the services we are able
to offer. Click on the different category headings to find out more, to change
our default settings, and/or view the list of Google Ad-Tech Vendors.


Cookie Policy



MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.



Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. If you do not allow these cookies, you will
experience less targeted advertising.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES



Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed

Confirm My Choices