News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Sooraj Shah
Sooraj Shah
Freelance Writer
Critical Security Vulnerabilities Found in Segway Hoverboards
News
19 Jul 2017
WannaCry: 25% Add Cybersecurity to Boardroom Agenda
News
19 Jul 2017
Two Iranians Charged with Hacking US Defense Technology Maker
News
19 Jul 2017
Newcastle City Council Leaks Data of Thousands of Adopted Children
News
18 Jul 2017
IoT 'Smart' Alarm has Vulnerabilities that Could Help Black Hat Burglars
News
17 Jul 2017
Ashley Madison Reaches Proposed Settlement with Exposed Users
News
17 Jul 2017
Bupa Employee Fired After 547,000 Customers' Data Compromised
News
14 Jul 2017
WikiLeaks Reveals CIA Tool Acting as SMS Proxy on Android
News
14 Jul 2017
Bupa Suffers Data Breach
News
13 Jul 2017
Blockchain: What it Means for Cybersecurity
Magazine Feature
2 Jun 2017
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Midnight Blizzard Targets European Diplomats with Wine Tasting Phishing Lure
News
18 Apr 2025
1
Identity Attacks Now Comprise a Third of Intrusions
News
17 Apr 2025
2
NTLM Hash Exploit Targets Poland and Romania Days After Patch
News
17 Apr 2025
3
Senators Urge Cyber-Threat Sharing Law Extension Before Deadline
News
17 Apr 2025
4
ICO Issues Merseyside-Based Law Firm £60,000 Fine After Cyber-Attack
News
17 Apr 2025
5
92% of Mobile Apps Found to Use Insecure Cryptographic Methods
News
16 Apr 2025
6
Chaos Reigns as MITRE Set to Cease CVE and CWE Operations
News
16 Apr 2025
1
Trump Administration Shakes Up CISA with Staff and Funding Cuts
News
12 Mar 2025
2
Digital Certificate Lifespans to Fall to 47 Days by 2029
News
14 Apr 2025
3
China-Backed Hackers Exploit BRICKSTORM Backdoor to Spy on European Businesses
News
16 Apr 2025
4
NVD Revamps Operations as Vulnerability Reporting Surges
News
11 Apr 2025
5
CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension
News
17 Apr 2025
6
The Evolving Ransomware Landscape: A 2025 Survival Guide
Webinar
15 Apr 2025
1
Proactive Incident Response and Recovery: Navigating Ransomware Attacks
Webinar
15 Apr 2025
2
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
10 Apr 2025
3
Fireside Chat: How Initial Access Brokers Fuel the Ransomware-as-a-Service Model
Webinar
15 Apr 2025
4
Ransomware Negotiations: Mastering an Attacker’s Mindset and Minimizing Leverage
Webinar
15 Apr 2025
5
How to Implement Attack Surface Management in the AI and Cloud Age
Webinar
3 Apr 2025
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6