News
Magazine Features
Opinions
News Features
Interviews
Editorial
Blogs
Reviews
Slackspace
Next-Gen Infosec
Webinars
White Papers
Podcasts
Industry Events & Training
Magazine Events
Online Summits
Company Directory
Application Security
Automation
Big Data
Business Continuity
Cloud Security
Compliance
Cybercrime
Data Protection
Digital Forensics
Encryption
Human Factor
Identity Access Management
Industry Announcements
Internet Security
Malware
Managed Services
Mobile Security
Network Security
Payment Security
Physical and Information Security Convergence
Privacy
Risk Management
The Internet of Things
News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Sooraj Shah
Sooraj Shah
Freelance Writer
Critical Security Vulnerabilities Found in Segway Hoverboards
News
19 Jul 2017
WannaCry: 25% Add Cybersecurity to Boardroom Agenda
News
19 Jul 2017
Two Iranians Charged with Hacking US Defense Technology Maker
News
19 Jul 2017
Newcastle City Council Leaks Data of Thousands of Adopted Children
News
18 Jul 2017
IoT 'Smart' Alarm has Vulnerabilities that Could Help Black Hat Burglars
News
17 Jul 2017
Ashley Madison Reaches Proposed Settlement with Exposed Users
News
17 Jul 2017
Bupa Employee Fired After 547,000 Customers' Data Compromised
News
14 Jul 2017
WikiLeaks Reveals CIA Tool Acting as SMS Proxy on Android
News
14 Jul 2017
Bupa Suffers Data Breach
News
13 Jul 2017
Blockchain: What it Means for Cybersecurity
Magazine Feature
2 Jun 2017
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
CISA Urges All Organizations to Patch Exploited Critical Ivanti Vulnerabilities
News
11 Mar 2025
1
95% of Data Breaches Tied to Human Error in 2024
News
11 Mar 2025
2
How to Backup and Restore Database in SQL Server
Blog
27 Mar 2023
3
Spy Module Discovered in WhatsApp Mods
News
2 Nov 2023
4
Chinese Botnet Bypasses MFA in Microsoft 365 Attacks
News
25 Feb 2025
5
Attackers Leverage Microsoft Teams and Quick Assist for Access
News
3 Mar 2025
6
Over Half of Organizations Report Serious OT Security Incidents
News
5 Mar 2025
1
SIM Swapping Fraud Surges in the Middle East
News
10 Mar 2025
2
Trump Administration Shakes Up CISA with Staff and Funding Cuts
News
12 Mar 2025
3
Ransomware Groups Favor Repeatable Access Over Mass Vulnerability Exploits
News
7 Mar 2025
4
Six Critical Infrastructure Sectors Failing on NIS2 Compliance
News
6 Mar 2025
5
Cybersecurity Job Satisfaction Plummets, Women Hit Hardest
News
6 Mar 2025
6
The Threat Intelligence Imperative: Transforming Risk into Cyber Resilience
Webinar
13 Mar 2025
1
Alert Fatigue: What Are You and Your Security Teams Missing?
Webinar
5 Dec 2024
2
Auditing AI Risk: Essential Strategies for IT & Compliance Leaders
Webinar
23 Jan 2025
3
How to Manage Your Risks and Protect Your Financial Data
Webinar
30 Oct 2024
4
Enhancing Software Supply Chain Management: A DORA-Focused Approach
Webinar
30 Jan 2025
5
Dispelling the Myths of Defense-Grade Cybersecurity
Webinar
4 Dec 2024
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6