惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

酷 壳 – CoolShell
酷 壳 – CoolShell
H
Hacker News: Front Page
P
Palo Alto Networks Blog
T
ThreatConnect
Apple Machine Learning Research
Apple Machine Learning Research
博客园_首页
T
True Tiger Recordings
P
Privacy & Cybersecurity Law Blog
B
Blog
IT之家
IT之家
Last Week in AI
Last Week in AI
F
Full Disclosure
Hacker News: Ask HN
Hacker News: Ask HN
C
Comments on: Blog
Microsoft Azure Blog
Microsoft Azure Blog
C
Cybersecurity and Infrastructure Security Agency CISA
Microsoft Security Blog
Microsoft Security Blog
博客园 - 【当耐特】
N
News and Events Feed by Topic
NISL@THU
NISL@THU
腾讯CDC
雷峰网
雷峰网
Security Latest
Security Latest
李成银的技术随笔
M
Microsoft Research Blog - Microsoft Research
L
LangChain Blog
L
Lohrmann on Cybersecurity
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
C
Check Point Blog
Y
Y Combinator Blog
Recent Announcements
Recent Announcements
博客园 - Franky
N
News | PayPal Newsroom
V
V2EX
A
About on SuperTechFans
The Register - Security
The Register - Security
月光博客
月光博客
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
Google Online Security Blog
Google Online Security Blog
MyScale Blog
MyScale Blog
Cisco Talos Blog
Cisco Talos Blog
Vercel News
Vercel News
WordPress大学
WordPress大学
C
Cyber Attacks, Cyber Crime and Cyber Security
The Hacker News
The Hacker News
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
爱范儿
爱范儿
A
Arctic Wolf
L
LINUX DO - 最新话题
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More

www.infosecurity-magazine.com

Android Malware Campaign Used Hundreds of Fake Apps to Silently Charge Users Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem China-Linked Webworm APT Evolves Tactics, Expands to European Targets GitHub Confirms Breach of Internal Repositories Via Malicious VS Code Extension Researchers Warn CypherLoc Scareware Has Targeted Millions of Users Verizon DBIR: Vulnerability Exploits Overtake Credentials as Top Access Vector Microsoft Takes Down Fox Tempest for Providing Ransomware-Enabling Signing Tool AI Raises the Bar on Vulnerability Awareness and Secure-by-Design Software Agentic AI Accelerates Software Builds and Mobile App Attacks Grafana Labs Confirms Hackers Stole Source Code Hackers Bypass Security Tools to Target Users Directly Interpol Launches Sweeping Cybercrime Crackdown in MENA Region NCSC Publishes Guidance on Securing Agentic AI Use Security Researchers Find 47 Zero-Days at Pwn2Own Berlin Bank of England, FCA and Treasury Raise Alarm Over Frontier AI Gremlin Stealer Evolves into Modular Threat with Advanced Evasion Capabilities Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage Campaign Google Launches Android Spyware Forensics Tool for High-Risk Users New Fragnesia Flaw Hands Linux Local Users Root Access Most Organizations Now Use AI Agents for Sensitive Security Tasks ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack Avada Builder Flaws Expose One Million WordPress Sites Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers Global Cyber Agencies Issue New SBOMs for AI Guidance to Tackle AI Supply Chain Risks UK Cybersecurity Market Expands to £14.7bn with Strong Growth in AI Security Firms Microsoft Fixes 17 Critical Flaws in May Patch Tuesday OpenAI Launches 'Daybreak' to Help Build Secure By Design Software Mini Shai-Hulud Hits TanStack npm Packages End‑to‑End Encrypted RCS Messaging Arrives Across iPhone and Android Attackers Combine ClickFix With PySoxy Proxying to Maintain Persistence Malicious Hugging Face Repository Typosquats OpenAI South Staffordshire Water Fined £1m After Data Breach TrickMo Variant Routes Android Trojan Traffic Through TON Rushed Patches Follow Broken Embargo on New Linux Kernel Vulnerabilities Fake Claude Code Page Pushes PowerShell Stealer at Devs Hackers Observed Using AI to Develop Zero-Day for the First Time US: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates ShinyHunters Escalates Canvas Extortion with School by School Ransom Campaign Zara Data Breach Impacts Nearly 200,000 Customers Police Shut Relaunched Crimenetwork Dark Web Marketplace Australian Cyber Security Centre Issues Alert Over ClickFix Attacks PCPJack Campaign Boots TeamPCP Off Compromised Machines Legacy Security Tools Are Failing Data Protection, Capital One Software Report Finds Cline Kanban Flaw Lets Websites Hijack AI Coding Agents OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack, Warns Dragos Fake Claude AI Site Drops Beagle Backdoor on Windows Users Daemon Tools Developer Confirms Software Was Trojanized Researchers Spot Uptick in Use of Vercel for Phishing Campaigns CloudZ Malware Abuses Phone Link to Steal SMS OTPs CISA Urges Critical Infrastructure Providers to Make Plans to Remain Operational if hit by Cyber-Attack Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign One in Eight Workers Has Sold Their Corporate Logins Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails North Korean APT Targets Yanbian Gamers via Trojanized Platform Fake SSA Emails Drive Venomous#Helper Phishing Campaign AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed to Cyber Risk NCSC Warns of an AI-Fuelled “Vulnerability Patch Wave” Trellix Reveals Unauthorized Access to Source Code Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says OpenAI To Extend Cyber Program to Government Agencies Anthropic Rolls Out Claude Security for AI Vulnerability Scanning Two American Cybersecurity Workers Jailed for BlackCat Ransomware Attacks Nine-Year-Old Zero-Day Flaw in Linux Kernel Discovered by AI-Equipped Security Researcher Three Arrested for Hacking Over 610,000 Roblox Accounts Deep#Door Python Backdoor Evades Detection On Windows CISA and Partners Publish Zero Trust Guidance For OT Security UK: Education Sector Faces Surge in Cyber Breaches Despite Stable National Threat Levels Europol Busts Albanian Scam Call Centers in Major Online Fraud Case Cyber is the Number One Global “People Risk,” Says Marsh Cursor Extension Flaw Exposes Developer API Keys Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets Researchers Track 2.9 Billion Compromised Credentials Critical Flaw Turns Vect Ransomware into Data Destroying Wiper A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks Medtronic Confirms Data Breach After ShinyHunters Claims Ransomware Turf War as 0APT and KryBit Groups Trade Blows Chinese National Extradited Over Silk Typhoon Cyber Campaign No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures US Sanctions Target Cambodian Scam Network Leaders Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected Widely Used Browser Extensions Selling User Data Most Cybersecurity Professionals Feel Undervalued and Underpaid Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet BlackFile Group Targets Retail and Hospitality with Vishing Attacks UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation Google Favors General‑Purpose Gemini Models Over Cybersecurity‑Specific AI Apple Fixes iOS Notification Bug Exposing Deleted Messages Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform Cyber-Attacks Surge 63% Annually in Education Sector Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents NCSC Backs Passkeys, Hailing a New Era of Sign-in MacOS Native Tools Enable Stealthy Enterprise Attacks NCSC Unveils SilentGlass, a Plug-In Device to Protect Monitors from Cyber-Attacks UK Pledges £90m for Cybersecurity and Pushes for ‘Resilience Pledge’
The Infosecurity Europe Cyber Startup Competition: Meet the Finalists
2026-05-18 · via www.infosecurity-magazine.com

At Infosecurity Europe 2026, five cybersecurity startups are set to take part in a competition offering them the opportunity to showcase emerging technologies, share their bold ideas and connect directly with potential customers, partners and investors.

New for 2026, the Infosecurity Europe Cyber Startup competition will be accompanied by a dedicated area on the show floor, the Cyber Startups Zone.

The competition, which will take place on Tuesday 2 June, will see the five selected finalists each pitch their ideas live on stage to an audience of senior industry leaders, investors and buyers.

The judges are Shlomo Kramer, one of the most influential figures in the global cyber industry. As a founder and investor of pioneering cybersecurity companies including Check Point, Palo Alto Networks, Imperva, Cato Networks and Sumo Logic, he is strongly placed to help identify the next generation of innovative cybersecurity startups.

Also on the judging panel are Mun Valiji, group CISO at specialist banking group Close Brothers, and Kirsty Kelly, Group CISO at CFC insurance provider Underwriting.

The winner of the Cyber Startup competition will be awarded a prize package which includes a free exhibition stand at Infosecurity Europe 2027, PR support from cyber security PR agency Origin Communications, and a future-brand workshop package from Dusted brand consultancy.

The Five Startups Competing at Infosecurity Europe 2026

The five start-ups which will take to the stage during the Infosecurity Europe Cyber Startup competition include:

Cytidel

Cytidel is a vulnerability intelligence platform which provides users with a real-time intelligence layer between security tooling and decision-making, showing organizations which vulnerabilities matter, which threat actors are driving risk, and where to act first.

The platform enables cybersecurity personnel to move from reactive vulnerability management to intelligence-led risk decisions, reducing noise, improving resource allocation, and preparing organizations for an increasingly fast-moving threat landscape. Cytidel is headquartered in Castlebar, Mayo, Ireland and was founded in 2022.

Datambit Limited     

Datambit specialises in advanced deepfake detection for audio and video. It has a mission to restore trust in digital evidence online at a time when synthetic media, including as AI deepfakes, is increasingly used for fraud, impersonation, misinformation, reputational harm and national security threats.

The Datambit platform enables users to determine whether audio or video has been synthetically generated or manipulated, delivering high-confidence, explainable outputs suitable for investigative, legal and operational decision-making.

Datambit was founded in 2023 and is headquartered in London.

Konvu

Konvu is an AI-native vulnerability triage platform that automates investigation. It connects to the scanners enterprises already use, runs agent-driven checks across code, configuration, and optional runtime signals, then returns evidence-backed exploitability decisions directly into existing workflows.

At a time when attackers are at weaponizing issues and probing complex environments faster than ever before, Konvu looks to aid organizations stay on top of the bottleneck. That bottleneck is no longer just about finding vulnerabilities. It is about investigating them fast enough to keep up and producing decisions you can defend.

Konvu was founded in 2024 and is headquartered in New York, USA.

Ploy

Ploy is an agentic access intelligence platform which provides security teams with complete visibility and autonomous control over who has access to what, across every SaaS application, cloud environment, identity provider and collaboration tool in the organization’s technology stack.

At a time when identity-related attacks are responsible for 80% of breaches and 93% of organisations suffering multiple identity incidents every year, Ploy’s autonomous identity management platform is designed to solve this problem.

Ploy was founded in 2023 by Jacob Prime (CEO) and Harry Lucas (CTO) and is headquartered in London.

Red Carbon

With the aim of helping the Security Operations Centre (SOC) manage alerts and false positives, Red Carbon introduces a workforce of six AI Analysts to help organizations manage cybersecurity and compliance challenges.

These AI analysts provide organizations with automated low-level analysis to prevent alert fatigue among staff, threat intelligence analysis, compliance Analysis, auditing analysis and more.

RedCarbon is a native AI solution for IT security and is designed solves problems, improving operational efficiency and optimising the skills of professionals. The company was founded in 2020 and is headquartered in Torino, Italy.

Register for Infosecurity Europe 2026 here.