FREE TO VIEW


« Back to News

2022-01-31

Millions Of IoT Devices At Risk To Malware

Source code of previously unknown malware named BotenaGo has been made widely available via GitHub, threatening millions of exposed IoT devices.

2022-01-31

DDoS Attack Knocks Out Andorra's Internet

Incidents in Andorra & Belarus demonstrate the dangerous vulnerability of small states with unitary telecoms infrastructure to external attack. 

2022-01-31

Russian Hackers Go After Gloucester

IT Quarantine: Gloucester City Council suffered a serious cyber security incident which has knocked out some local services for over a month.

2022-01-29

Canadian Government Ministry Under Attack

Canada's critical infrastructure operators are told to prepare for Russian state-sponsored cyber threats as the foreign ministry comes under attack.

2022-01-28

Russia's Cyber War Operations Begin

The US & British security agencies are warning organisations to prepare for cyber attacks on critrical infrasructure as Ukraine tensions escalate.

2022-01-26

Top Tips For SMEs To Dodge Hackers

Small business owners and their employees often lack basic training in cyber security measures and make risky mistakes that could cost them. 

2022-01-26

Online Daters Must Protect Themselves Against Fraud

Looking For Love: Online Dating has caused heartbreak for many, with over £90 million stolen through fraud and deception last year.

2022-01-26

How To Secure Web Gateway & Web Filtering

A secure web gateway offers protection against online security threats by enforcing company security policies & filtering malicious traffic.

2022-01-25

Ransomware Attack On Moncler

Italian luxury brand Moncler refused to pay ransom when its order processing system was disabled, resulting in a vengeful dump of employee data.

2022-01-25

Defending Against Log4j Vulnerabilities

Concealed Log4j vulnerabilities call for effective measures to reduce the frequency of disruptive events and to reduce the potential damage.

2022-01-25

Auto-Redirects: A Harmful Detour

Auto-redirects are a problem that many web users don't know about and are associated with a loss of privacy, malvertising, malware and more.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.