News

2022-10-07

Google Loses Its Appeal & Must Pay €4.1Billion EU Penalty

Google imposed “unlawful restrictions” on Android phone manufacturers in order to promote the Chrome search engine on mobile devices.

2022-10-02

Hackers Have Exploited The Queen’s Death

#Evilproxy: Hackers are using the wave of condolences after the funeral of Britain's Queen Elizabeth to launch credentials phishing attacks.

2022-10-11

Vulnerabilities In Airline WiFi Devices Expose Passenger Data

Two critical flaws have been detected in wireless LAN devices, leaving inflight passengers using WiFi devices vulnerable to attack.

2022-10-07

Microsoft Warning - Windows Flaw Being Attacked

Patch Tuesday: Microsoft finds zero-day exploits capable of exploiting a flaw in Windows, tricking users into opening a malicious file.

2022-10-12

Check Point Launches Horizon Security

Check Point Horizon Platform: A preventive approach to improve defences across the network, cloud and endpoints and stop future cyber attacks.

2022-10-10

Hacktivist Group GhostSec Attack Israel

#OpIsrael Update: A hacking group easily breached programmable logic control systems via the Internet, exploiting weak access credentials.

2022-10-12

US Defence Needs New Software at the Centre of its Operations

Cloud adoption, software modernisation, Artificial Intelligence and cyber security are paramount to all US Defense Department missions.

2022-10-05

The Metaverse: A Reality Check

The Metaverse is like a whole new Internet that people are unfamiliar with - a guarantee that both businesses and consumers will be exploited.

2022-10-05

EU Businesses Risk Fines For Not Complying With IoT Security Rules

Companies could face fines of €15 million or 2.5% of turnover if they don’t comply with draft EU legislation addressing the Internet of Things.

2022-10-04

Iranian Hacking Group Deploys Customised Spyware

The Iranian state-sponsored hacking group known as APT42 has been discovered using custom Android malware to spy on targets of interest.

2022-09-28

British Girl’s Suicide Puts Spotlight On Social Media

Anxiety, Depression, Self-harm & Suicide: The death of a 14-year-old girl may prove a turning point in the regulation of social media in Britain.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.