FREE TO VIEW


« Back to News

2024-08-28

Hacker Kills Himself

Hacker Fakes His Death To Avoid Child Support: He became officially registered as a deceased person in many government databases.

2024-08-28

US Proposes New Cyber Security Standards For Aviation

Aircraft are increasingly designed to be connected to both internal & external data networks, rendering them more vulnerable to cyber threats.

2024-08-30

China Aims to Compete With OpenAI, Gemini & Grok

Update: OpenAI’s decision to ban their products in China is accelerating the rise of Chinese AI companies, in fierce competition with US platforms.

2024-08-28

California's Controversial AI Bill Will Soon Be Law

California’s AI Act is important as it will set the precedent for state guidelines across the US, laying down rules for developers working on GenAI.

2024-08-27

RansomHub Have A Tool That Neutralises EDR

Endpoint Detection & Response Threat: Organisations are recommended to enable extra tamper protection on their endpoint security defences.

2024-08-27

Telegram Messaging Platform Founder Arrested

Billionaire CEO Pavel Durov is under arrest in France on multiple charges of fraud, drug trafficking & organized crime being carried out on Telegram.

2024-08-25

Virtual Numbers & eSIM Technology Compared

Virtual Numbers: A profitable alternative to traditional telephone communication - they are not tied to a specific location and constantly available.

2024-08-27

Prioritizing Data Security In The Age Of Generative AI

The integration of generative AI brings a wave of innovation, but it also introduces new cybersecurity risks to protecting your data. By Samer Diya

2024-08-27

China & Russia In Technology Collaboration

Western sanctions have directly affected Russia’s technology supply chain, forcing it find critical technology like computer chips elsewhere.

2024-08-24

Chinese Attacks On Russian Government Agencies 

CloudSorcerer: Someone is attacking Russian government and infrastructure using a sophisticated tool associated with Chinese hackers.

2024-08-23

Predictions For The Fourth Industrial Revolution [extract]

Industry 4.0: The biggest surprise might be the unexpected ways that humanity innovates in response to the challenges & opportunities of the age.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Ntrepid

Ntrepid

Ntrepid products provide protection from web threats and enable organizations to safely conduct their online activities.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.

Tulpa AI

Tulpa AI

Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments.