Skip to content
ISF Information Security Forum
  • Solutions and Insights
  • Spotlight on…
  • Our Services
  • Events
  • Contact
  • Become a member
Search ISF
Member Login - ISF Live

Search ISF

Search Results for: hacking
news

Norway Alleges Russia Orchestrated Parliament Email Hack

…Solutions Analyst at the ISF Norway this week accused Russia of hacking the email system of the country’s parliament, known as the Storting, in September. In a statement released Tuesday,…

Leave a Comment on Norway Alleges Russia Orchestrated Parliament Email Hack
news

Is the IT Sector Beset by Fear-Mongering?

…illegal hacking services offered on the dark web. Although there have been some high-profile arrests, these have not been as frequent as the rise in cyber attacks. “Nobody’s getting punished…

news

How the Enterprise Can Shut Down Cyber Criminals and Protect a Remote Staff

…of hacking spiked 47% in the same time period. Hacking has gone viral But the coronavirus pandemic brought a new slew of cyber threats, feeding on how “Anxiety and desperation…

Leave a Comment on How the Enterprise Can Shut Down Cyber Criminals and Protect a Remote Staff
news

Hack on Japanese Port Shows How Compromised Operational Technology Can Have a Widespread Impact

…reported to have been perpetrated by pro-Russian hacking group LockBit 3.0,which demanded a ransom after infecting a computer system that was part of the network that manages the loading of…

news

Practical tips and advice for personal IoT security

…for reasons of design practicality. This leaves the device open to attacks and remote hacking, meaning sensitive data can be exfiltrated. However, some IoT manufacturers are beginning to adopt certification…

Leave a Comment on Practical tips and advice for personal IoT security
news

Understanding The Weaponization Of Agentic AI

…them highly attractive hacking tools to adversaries and threat actors. The Dark Side Of AI Revolution: Weaponized AI Agents As ethically used AI agents transform processes for efficiency gains, cybercriminals…

news

Watch this space

…occasions by hacking the ground computers at weak points around the globe. It’s not just weak points around the globe that state-sponsored hackers expose. According to Marc Kolenko, PwC Cyber…

event

Subnet Masks Required: How Covid-19 is changing the cyber security landscape

…make to secure your network and protect your assets. Seth Wahle, a U.S. Navy veteran, was featured in Forbes and BBC for hacking android phones using an implanted NFC chip…

Leave a Comment on Subnet Masks Required: How Covid-19 is changing the cyber security landscape
news

Deepfakes will tell true lies

…breed of security challenges beyond anything they have dealt with before. Nation states, activists and hacking groups will use deepfakes to spread disinformation on scale, leaving individuals and organizations unable…

Leave a Comment on Deepfakes will tell true lies
news

What are the risks associated with personal, unsanctioned apps on corporate devices and why?

…it is possible to install Kali Linux, other than maybe some specialist roles no one in an organisation should really be having this sophisticated hacking tool installed on a corporate…

news

Seven Practical Considerations for Effective Threat Intelligence

…databases; commercial sources of TI, like TI feeds, STIX, and TAXII; information collected by sensors, honeypots, and Web crawlers; hacking forums; and other partnerships or community alliances. Always be clear…

news

Five Reasons Why Supply Chain Security Must be on Your Agenda

…of popularity: Presentations on hacking supply chains at Black Hat and Defcon. Whether you are a technology buyer, seller, manufacturer, investor, or security professional, here are five reasons why supply…

Leave a Comment on Five Reasons Why Supply Chain Security Must be on Your Agenda
news

Security Think Tank: Bug bounties are changing the image of hackers

…degree. We all must start somewhere. The big difference now, though, is that the opportunities available to a hacker have increased dramatically. Hacking is now an accepted profession in which…

Leave a Comment on Security Think Tank: Bug bounties are changing the image of hackers
news

How to Secure a Smart City

…or hacking-group level, opportunistic attackers will become far more successful; with millions of devices requiring constant updates and patches, the likelihood of compromise at a device or even system level…

ISF Information Security Forum
Podcast Youtube Linkedin
  • About Us
  • In the news
  • Our Members
  • Sponsorship
  • ISF Annual Report 2024
  • Meet the ISF Experts
  • Terms of Use
  • Privacy Policy
  • Trust Centre
  • Code of Conduct Statement
  • Cookies Policy
  • Accessibility Statement
© Information Security Forum Ltd 2025 . All rights reserved.