24th June 2025
Hilton London Canary Wharf
11th November 2025
Hilton London Canary Wharf
Search
Close this search box.

ContiLeaks: Ransomware gang suffers data breach

By Varonis Conti, one of the most infamous, prolific and successful big game ransomware threats, has suffered yet another embarrassing leak with a treasure trove of both internal chat transcripts and source code being shared by a reported Ukrainian member. Having previously had their internal manuals and tools exposed by a disgruntled affiliate in August […]

CISO Live Interactive Event – Last chance to register!

Today’s the day! In a few short hours our virtual live event for CISOs and about CISOs will be starting. Our interactive event will give you the chance to ask questions about the latest topics in cyber security and vote in our polls about the latest threats organisations face.    Join F5, CyCognito and NoName at […]

IT security in 2022 – what you need to know

By Jack Rosier of QMS International, one of the UK’s leading ISO certification bodies We’re living in the age of computers, with technology playing a more important role in our lives with each passing year. With the pandemic acting as a catalyst for increasing digitalisation, 2022 is likely to see more technology usage than ever […]

NEW CISO Live Interactive Event – Register today!

In a recent survey, 85% of CISOs reported they think security will be more complicated, with 71% have a cyber skills shortage and 72% struggling to retain security staff Many CISOs find themselves in a tight spot. Not only are IT teams desperately playing a game of catch-up, many are stretched due to a lack […]

Supply chain attacks of 2022 on the rise

According to Microsoft, the goal of a supply chain attack is to ‘source codes, build processes, or update mechanisms by infecting legitimate apps to distribute malware.’ Supply chain attacks ‘begin with an advanced persistent threat that determines a member of the supply network with the weakest cyber security in order to affect the target organization.’ (CERT-UK report […]

Backup is dead: True Cyber Protection is the way ahead

By Adam Brace, EveryCloud So, is Backup Really Dead? In the traditional sense we would say yes, as Cyber Criminals have developed and deployed ways that mean backing up alone is not enough to provide true data protection. Now (and especially in the future), to be fully protected, organisations need to ensure their data is recoverable, […]

Identify and investigate Business Email Compromise (BEC) scams

Business Email Compromise is an email-based phishing attack that specifically targets businesses and organizations to steal money, sensitive information, or account credentials. These attacks can be difficult to prevent as criminals may utilize social engineering techniques such as impersonation and intimidation to manipulate users. Threat actors will often prepare for BEC attacks by first performing […]

Learn from the best at the Security IT Summit

There are just a handful of delegate places left for this summer’s Security IT Summit – don’t miss out on expert insight for our great line up of speakers. Here is one of the three seminar sessions that you can enjoy this June; “I can steal your sh1t!” If you dare to join my audience, […]

Do you specialise in Intrusion Detection & Prevention? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in March we’re focussing on Intrusion Detection & Prevention solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Intrusion […]

Ransomware Year in Review 2021

By Varonis In 2021, attacks became highly effective and impactful. At the same time, high-volume indiscriminate ransomware threats remained omnipresent throughout the year. In this post, the Varonis Threat Labs team shares what they observed in the wild while working on ransomware investigations. Overall, the team identified these five ransomware trends that shaped 2021: Ransomware-as-a-Service […]