News

2023-03-10

Ransomware Gang Claims Responsibility For The Attack On Oakland

The Play ransomware gang has taken responsibility for a cyber attack on the City of Oakland that has disrupted IT systems since February.

2023-03-14

Meta Plans A Rival To Twitter 

A decentralized text-based app would allow Meta to take advantage of the current problems with Elon Musk's management of Twitter.

2023-03-13

Conflict Drives A Significant Increase In DDoS Attacks

Recent data analysis reveals increased DDoS attacks, combined with a significant link between geopolitical conflicts and these types of attacks.

2023-03-13

A New Tool For Protecting ML Systems Security

Arsenal: Microsoft and Mitre have developed a plug-in that combines open-source software tools to protect Machine Learning systems from attacks.

2023-03-13

A Warning From Ukraine About Russian Hackers

Gamaredon: Customised malware implants that can exfiltrate files of specific extensions, steal user credentials & screenshots of victims' computers.

2023-03-13

Barcelona Hospital Knocked Offline By Ransomware

The attack resulted in computers at the hospital's lab, emergency room & pharmacy at three main centres, plus external clinics being shut down.

2023-03-09

Which CI/CD Tools Can Promote Supply Chain Security?

Incorporating these tools into a supply chain security strategy can reduce risk, increase transparency & maintain the integrity of the supply chain.

2023-03-08

One Third Of Cyber Criminals Are Women

Unequal Female Engagement: A higher percentage of women participate in cyber crime than currently work in the cyber security industry.

2023-02-14

Two Cities In Californian  Attacked

Police Departments in the neighbouring Californian cities of Oakland and Modesto were knocked offline in a simultaneous ransomware attack.

2023-03-08

Cyberwar: Lessons From Ukraine

AI, OSINT, the IoT & Social Media: The tools that increasingly run the digital world have quickly been repurposed to have destructive physical effects.

2023-03-07

Keeping Up With The Increase In Phishing Attacks

Outwitting Employees: More than 80% of organisations experienced at least one successful criminal phishing email attack in 2022. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Clario Tech

Clario Tech

Clario is a simple, comprehensive, personalized protection app. It comes with a full suite of intelligent security software and intelligent people to help you live a better, safer digital life.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

DatChat

DatChat

DatChat Inc. is a blockchain, cybersecurity, and social media company that focuses on protecting privacy on our devices and also protecting our information after we have shared it with others.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.

Command Zero

Command Zero

Command Zero is the industry’s first autonomous and AI-assisted cyber investigations platform, built to transform security operations in complex enterprise environments.