FREE TO VIEW


« Back to News

2025-03-09

Russian Hackers Penetrate Ukrainian Signal Accounts

Russian hackers have found ways to connect their victims' accounts to their own devices by abusing the messaging app's linked devices.

2025-03-06

Hackers Exploiting Malware In Google Docs

Infostealer: A form of malware specialising in stealing system data, credentials, crypto-currency wallet keys and various configuration files.

2025-03-05

DeepSeek - A Deep Dive Reveals More Than One Red Flag

DeepSeek has several vulnerabilities, exposing organisations to privacy breaches, regulatory violations & reputational damage. By Aditya K Sood

2025-03-02

From Accidental Hacker To Cybersecurity Champion

Celebrating International Women's Day: Consider the inspiring story of Dr. Katie Paxton-Fear, a highly respected Bug Bounty Hunter.

2025-02-28

Australian Government Bans Kaspersky

Australia is the latest country to ban government agencies from using software made by Russian cyber security firm Kaspersky.

2025-02-27

GhostSocks Malware Can Slip Past Detection Systems

A strain of undetectable malware is exploiting unpatched software, weak credentials, & outdated security configurations to infiltrate networks.

2025-03-05

Getting Ready To Stop Ransomware Attacks

Look For Warning Signs: Ransomware attacks are a process that gradually invade defensive systems in stages and need to be adequately prepared for.

2025-02-27

Alibaba Intends To Spend $53bn On Developing AI

The leading Chinese technology business plans to spend more on its AI and cloud computing network than it has over the entire past decade.

2025-03-03

British Healthcare Provider Investigating Ransom Claims

Medusa Ransomware: British healthcare provider suffered a suspected ransom attack involving theft of two terabytes of confidential data.

2025-03-04

AI Could Help Prepare For The Next Pandemic

AI is already being used in medical and scientific research and has the potential to transform infectious disease epidemiology.  

2025-03-03

Salt Typhoon Exploited Cisco Vulnerabilities

Salt Typhoon hackers gained access to core US telecoms infrastructure through Cisco devices, then used that infrastructure to extract information.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Kratikal

Kratikal

Kratikal provides a complete suite of manual and automated security testing services.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Information Services Group (ISG)

Information Services Group (ISG)

As a leading global research and advisory firm, ISG partners with our clients to determine a future vision, lead rapid change and realize the value of your digital investments at scale.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Forthright Technology Partners

Forthright Technology Partners

Forthright Technology Partners (Forthright) is a next-generation cloud and managed IT services provider serving a global clientele.