Munich Cyber Security and Security Conferences 2025 [Live Updates]

Avatar

Recorded Future News will be providing live coverage from the Munich Cyber Security Conference (February 13 & 14) and Munich Security Conference (February 14 – 16). We will be updating this page with live coverage throughout the conferences with reporting from Alexander Martin, Daryna Antoniuk and Dina Temple-Raston. Check back soon for the latest stories, analysis and exclusive interviews.

CybercrimeGovernmentLeadershipNewsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Adam Janofsky

is the founding editor-in-chief of The Record from Recorded Future News. He previously was the cybersecurity and privacy reporter for Protocol, and prior to that covered cybersecurity, AI, and other emerging technology for The Wall Street Journal.

 

Total
0
Shares
Previous Post

Cybercrime evolving into national security threat: Google

Next Post

An Italian journalist speaks about being targeted with Paragon spyware

Related Posts

Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called Output Messenger as part of a cyber espionage attack campaign since April 2024. "These exploits have resulted in a collection of related user data from targets in Iraq," the Microsoft Threat Intelligence team said. "The targets of the attack are associated with the Kurdish
Avatar
Read More

New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It

Whether it’s CRMs, project management tools, payment processors, or lead management tools - your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for protecting against malicious access and data exfiltration, but these fall short for protecting against shadow SaaS, data damage, and more. A new report, Understanding SaaS Security Risks: Why
Avatar
Read More