News

2024-09-09

Iranian Campaign Targets WhatsApp Users

Meta has disclosed a cyber security issue involving Iranian threat actors targeting WhatsApp users across multiple countries, including Israel.

2024-09-07

Hackers Attack Russia & Belarus

Head Mare: A hacktivist group carrying out cyber attacks targeting organisations located in Russia and Belarus using ransomware tools & tactics.

2024-09-02

Beware Of Online Rental Scams

Criminals posing as a landlord to make potential renters pay money for a property that isn’t available, doesn’t exist, or isn’t theirs to rent out.

2024-09-04

Global AI Safety: Scientists Can Move The Needle

As differences in political values & priorities intensify cooperation on AI safety, scientist-led dialogue shows its worth. By Isabella Wilkinson

2024-09-04

High Stakes: Business Email Compromise

Research has discovered that half of spam emails are BEC. Of these, 40% were AI-generated and, in some cases, AI created the entire message.

2024-09-03

Bolster Security Using Dark Web Intelligence

Transferring unknown risk into known and mitigated risk, preventing threat actors before they strike and taking immediate actions in response.

2024-09-04

London Transport Hit By A Cyber Attack

Update: IT systems at Transport for London, which manages public transport across the capital, have been targeted in an on-going cyber attack.

2024-09-01

AI & Biometrics In Cybersecurity

Securing the Digital Frontier: AI and Biometrics have a place in the cybersecurity measures needed to defend against cyber threats.

2024-09-02

Iranian State-Sponsored Hackers Attacking Israel

Established Iranian hackers are working with cyber criminals who specialise in ransom, sharing their expertise to accelerate attacks on Israel.

2024-09-02

The Rise Of SD-WAN And Its Implications For Security & Performance

Navigating The Future Of Networking: The deployment of SD-WAN should go hand in hand with increased cyber surveillance. By John Diamond

2024-09-02

Standards: The Key To Building A Sustainable Quantum-Safe Future 

Quantum computing has the potential to address some urgent problems, while simultaneously risking security infrastructure. By Issam Toufik

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Pervade Software

Pervade Software

Pervade Software is a global provider of dedicated compliance tracking software with monitoring & reporting capabilities.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

GB Group (GBG)

GB Group (GBG)

GBG is a global technology specialist in fraud, location and identity data intelligence.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

runZero

runZero

runZero delivers the most complete security visibility possible, providing you the ultimate foundation for successfully managing exposures and compliance.

Astra Cybertech

Astra Cybertech

At Astra Cybertech, we're more than just cybersecurity experts - we're your partners in safeguarding your digital assets.

Cygence

Cygence

Cygence is a cyber security consultancy providing independent expertise and tailored security solutions.

Memgraph

Memgraph

Memgraph, is an in-memory graph database designed for real-time applications such as risk assessment, 360-degree data and network data exploration, and supply chain and network logistics.