News

2022-01-21

Chinese APT Hackers Used Log4Shell Exploit To Target Academic Institution

Specific steps you can take to ensure your security online & avoid tangling with hacker groups exploiting Log4j security flaws. By Ulrike Niemann

2022-01-19

Europol Is Told To Delete Its 'Big Data Ark'

The EU data protection regulator has ordered Europol to destroy six years worth of crime reports, hacked phones records & other intelligence.

2022-01-19

Facebook Hosted A Surge Of Fake News Prior To Capitol Riot

The social media platform's efforts to police misinformation on Facebook groups calling for violent confrontation with US government failed dismally.

2022-01-18

Major Dark Net Site Is Closing Down

Going Out Of Business: UniCC, the largest illegal marketplace on the Dark Net controlling 30% of stolen card payment data worth $350m, is closing.

2022-01-18

Corporate Cyber Attacks Up 50% Last Year

2021 saw a 50% increase in cyber attacks per week on corporate networks compared to 2020, peaking in December, largely due to Log4J exploits. 

2022-01-18

Employee Cyber Security Training Is Vital To Reduce Cyber Attacks

Online cyber awareness training for employees can mitigate the risk of cyber attacks on your business without disrupting the workday.

2022-01-19

WhisperGate: Russia Responsible For Cyber Attacks On Ukraine

Update: Russia is responsible for malware attacks, defacing websites & leaving numerous infected Ukraine Government computers wiped.

2022-01-17

'War Is Coming’ - TikTok Used To Scare Swedish Children

Swedish youngsters who are heavy TikTok users are being frightened by a mysterious disinformation campaign threatening an impending war.

2022-01-17

Google Buys Siemplify For $500m

A Watershed Moment: Google has acquired Israeli threat detection firm Siemplify and wants to ‘change the rules’ of threat detection and response.

2022-01-17

REvil Cyber Ransomware Gang Members Arrested

REvil Has Ceased To Exist: Russian law enforcement has dismantled the notorious ransomware group and made over a dozen arrests.

2022-01-15

Process Sensor Cyber Security Is A Vital Issue

The gap in process sensor cyber security and process safety is a critical vulnerability in many industries, calling for expert scrutiny. By Joe Weiss

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Cydome

Cydome

Cydome offers full-spectrum cybersecurity solutions tailored for the maritime industry.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Euro-Recycling

Euro-Recycling

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.