For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2024-09-02

Webinar: Generative AI and Security

Watch Now: An expert overview of things to consider in leveraging generative AI for security and diving deeper into Amazon Bedrock.

2024-09-20

Iran Pays $Mulitmillion Ransom To Protect Its Banks

Iran’s government pushed for the ransom to be paid, fearing instability of the country’s weak financial system, which is under intense pressure.

2024-09-18

Meta Bans Russian Media From Facebook

Meta is banning Russian state media networks, saying that they carry out influence operations and evade detection on its social media platforms. 

2024-09-18

Is The NIS2 Directive A Step In The Right Direction? 

New EU-wide legislation on cybersecurity will provide legal measures to boost the overall level of cybersecurity across the EU. By Yannis Velitsikakis

2024-09-18

Britain Convenes An International Cyber Skills Conference

Protection & Defence: Britain is bringing western countries together to discuss the cyber security threats that face nations around the world.

2024-09-17

US Healthcare Firm Loses 22GB of Data

Stolen & Leaked: The 3AM Ransomware group is claiming responsibility for stealing the Personal Health Information of 464,000 patients.

2024-09-17

2024 US Presidential Election: Nation State Cyber Threats

As the country prepares to vote, hostile nation state actors are seeking to capitalize on US instability to meet pre-defined objectives. By Craig Watt

2024-09-17

Who Are The Top 10 Cyber Security Companies? [extract]

The business of cyber security is consolidating with major participants making power moves like acquisitions & innovation. Big money is at stake.

2024-09-17

Attack On Transport For London Exposed Passenger Bank Details

Teenager Arrested: 30,000 staff passwords exposed, plus bank account details of 5,000 passengers, including account numbers and sort codes.

2024-09-16

What Android Users Need To Know About New Malware

SpyAgent: A new Android mobile malware which targets mnemonic keys by scanning your device for recognisable images. By Oliver Devane

2024-09-16

Mental Health Provider Has Exposed Patient Data

No Password Protection: The 5.3 terabytes of exposed data included critical personal details about patients, going far beyond therapy sessions.

2024-09-16

Russian Hackers Exploit Mobile Browser Vulnerabilities

Researchers identify multiple campaigns exploiting Internet browsers flaws using methods very like those first developed by NSO Group.

Subscribe!

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

TrustGrid

TrustGrid

Trustgrid is a pioneer and leader in secure, cloud-native software-defined connectivity.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.