News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Sandy Buglass
Sandy Buglass
Journalist
London-based musician, composer, lecturer and writer.
Malware-as-a-Service Creating New Cybercrime Ecosystem
News
22 Jul 2022
Google Brings Back Android App Permissions Section to the Play Store
News
22 Jul 2022
Hacked Ukrainian Radio Stations Broadcast Fake News About President Zelensky’s Health
News
22 Jul 2022
DCMS Sets Out Proposal For New AI Rulebook
News
18 Jul 2022
TikTok Engaging in Excessive Data Collection
News
18 Jul 2022
Pegasus Spyware Used Against Thailand’s Pro-Democracy Movement
News
18 Jul 2022
Average American Accesses Suspicious Sites 6.5 Times a Day
News
15 Jul 2022
DHS Releases Report into Log4j Vulnerabilities and Response
News
15 Jul 2022
North Korean Threat Actor Targeting SME Businesses with Ransomware
News
15 Jul 2022
#InfosecurityEurope2022: Preparing for Future Challenges and Opportunities
News
24 Jun 2022
#InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs
News
24 Jun 2022
#InfosecurityEurope2022: How Should SMEs Defend Against Cyber-Risks?
News
23 Jun 2022
#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?
News
23 Jun 2022
#InfosecurityEurope2022: Are You Prepared For The Next Big Crisis?
News
23 Jun 2022
#InfosecurityEurope2022: The Power of Narrative in Highlighting OT System Risks
News
23 Jun 2022
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
61% of Hackers Use New Exploit Code Within 48 Hours of Attack
News
25 Feb 2025
1
Signal May Exit Sweden If Government Imposes Encryption Backdoor
News
26 Feb 2025
2
Mobile Phishing Attacks Surge with 16% of Incidents in US
News
20 Feb 2025
3
Ransomware Gang Publishes Stolen Genea IVF Patient Data
News
26 Feb 2025
4
Essential Addons for Elementor XSS Vulnerability Discovered
News
24 Feb 2025
5
Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques
News
13 Feb 2025
6
Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques
News
13 Feb 2025
1
CISA and FBI Warn of Global Threat from Ghost Ransomware
News
20 Feb 2025
2
Telegram Used as C2 Channel for New Golang Malware
News
17 Feb 2025
3
West Coast Cybersecurity Salaries Outshine Rest of Country
News
20 Feb 2025
4
Mobile Phishing Attacks Surge with 16% of Incidents in US
News
20 Feb 2025
5
Malicious Ads Target Freelance Developers via GitHub
News
20 Feb 2025
6
The Challenge of Remote File Transfer Security: Is Centralization the Answer?
Webinar
10 Jun 2021
1
Auditing AI Risk: Essential Strategies for IT & Compliance Leaders
Webinar
23 Jan 2025
2
Phishing, Impersonation, and Beyond: CISO Insights on 2023-2024 External Threats
Webinar
15 Feb 2024
3
Enhancing Software Supply Chain Management: A DORA-Focused Approach
Webinar
30 Jan 2025
4
Alert Fatigue: What Are You and Your Security Teams Missing?
Webinar
5 Dec 2024
5
Dispelling the Myths of Defense-Grade Cybersecurity
Webinar
4 Dec 2024
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6