News

2024-02-22

Rhysida Ransomware Cracked & Decrypted

A Cyber Security Dilemma: A decyrptor tool that helps victims recover from a Rhysida malware infection will alert the hackers to try harder.

2024-03-06

Iranian Spy Ship Hacked

The US hacked onboard computer systems of an Iranian ship suspected of collecting targeting data on cargo vessels in the Gulf & Red Sea.

2024-03-18

Cyber Criminals Use CAPTCHA To Spread Malware

Dark Gate: Legal advertising tools like CAPTCHA are being used by cyber criminals to track victims response to infectious malware links.

2024-03-12

Deepfakes Deployed In Mobile Banking Malware Attacks

GoldPickaxe: Mobile malware that collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication.

2024-02-23

X Taking Payments From Terrorists

Verified Terrorist: Twitter / X allegedly granted subscription benefits to several proscribed groups which are banned from operating in the US.

2024-03-13

International Initiative To Control Commercial Spyware

Britain, France and the US have joined with Google, Microsoft & Meta in a statement on the need for action to control malicious spying tools.

2024-03-13

Threat Intelligence Exposes The Extent of Cyber Attacks

Businesses Must Continually Adapt their Security Strategies: Expert threat intelligence from MSPs can help detect & remediate attacks quickly.

2024-03-06

Russian Military Botnet Dismantled

The US Department of Justice has disrupted a botnet controlled by the Russia state-sponsored hackers, Forest Blizzard - aka Fancy Bear.

2024-03-08

Email Attacks Doubled In 2023

Cyber criminals are exploiting AI-enhanced techniques to create more convincing phishing scams, guaranteeing that this challenge will escalate.

2024-03-05

Cybercrime Hit 1.5m UK Businesses In 2023

More than 1.5 million UK businesses fell victim to some form of cybercrime last year, at a cost of more than £30.5 billion. London lost £7.1 billion.

2024-03-11

Deepfakes Complicate Election Security

Detection & Controlling Deepfakes: Leading US technology companies have agreed to combat the deceptive use of AI In the US Elections.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The Josef Group (TJG)

The Josef Group (TJG)

The Josef Group Inc. is a certified woman-owned permanent staffing agency specializing in Information Technology, Engineering, and US Government "cleared" IT candidates.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

Cygenta

Cygenta

Cygenta brings a new approach to cybersecurity. We understand that true security means having digital, human and physical security working in harmony.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.