BUSINESS > Services > IT & Telecoms


« Back to News

2025-07-12

Malicious Actors Mislead Corporate Workers To Steal Google Credentials

Malicious Semrush Google Ads Reel In Victims: Stolen credentials are the entry point for interactive remote control capabilities. By Nick Ascoli

2025-07-14

Browser Extensions Malware Affects Millions Of Users

RedDirection: Browser extensions, which were previously considered safe, are found to have been covertly updated to include harmful code.

2025-07-10

GitHub Exploited In Sophisticated Malware Campaign

Malware Disguised As A VPN App: Increasing reliance on open-source repositories calls for much higher-levels of vigilance for deceptive tactics.

2025-07-09

Ingram Micro Grapples WIth SafePay Ransomware Attack

The attack has sent ripples through the global IT supply chain, highlighting vulnerabilities in even the most trusted technology organisations.

2025-07-07

An Organisation’s Responsibility Following A Data Leak

Empathy & Action: Data breaches are serious events that affect real people, not just abstract statistics. By Wouter Klinkhamer

2025-07-01

Using Cloud & Unified Communications To Enhance Collaboration & Productivity

CCaS: Unified cloud communications bring together multiple tools on a single platform, enabling seamless, real-time collaboration from anywhere.

2025-06-27

Sixty One Million Verizon Records Found On Web Forum

Alleged Verizon Data Breach: The exposed data reportedly includes first and last names, gender, dates of birth and tax IDs.

2025-06-04

Major Cybersecurity Risks In 2025 & How VPNs Help Defend Against Them

VPNs are essential if you want to stay private & secure online. When used correctly with other practices a VPN can make a huge difference.

2025-06-10

Critical Vulnerabilities Disclosed In Versa Concerto

Exploits In The Wild Place Organisations At Risk: An authentication bypass enables attackers to gain admin access & execute commands remotely. 

2025-06-09

The Email Security Threats Businesses Can’t Ignore

Caution: Simple mistakes like sending an email to the wrong person or attaching the wrong file can lead to serious data breaches. By Rick Goud

2025-06-09

Securing Spend To Address API Attacks

Despite their critical importance, APIs are still failing to be configured correctly or adequately tested during development. By Mohammad Ismail

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.

Cygence

Cygence

Cygence is a cyber security consultancy providing independent expertise and tailored security solutions.