FREE TO VIEW


« Back to News

2024-10-09

Ukraine Hackers Disrupt Putin's Birthday

Russian state media company VGTRK was targeted in a massive cyberattack on 7th October by Kyiv's hackers, say Ukraine government sources.

2024-10-09

US Might Legislate To Break Up Google

Google faces the threat of being broken up, as the US government aims to change its monopoly in online search

2024-10-07

LockBit Arrests and Sanctions

Europol and other countries have taken steps against the Lockbit ransomware group with arrests and international sanctions in Operation Cronos

2024-10-07

US Legislation To Combat Chinese Cyber Threats

Legislation in the House of Representatives will combat growing cyber threats from the China against US critical infrastructure.

2024-10-03

US, UK & Australia Sanction Evil Corp Hackers

The UK, US and Australia have announced sanctions against 16 people that are accuse of being part of the most wanted cyber crime gang in the world.

2024-10-03

Thousands Of Facebook Scams Deleted As Australians Lose $43.4m

Meta has announced the expansion of a scheme that sees banks sharing information with the social media giant to help protect people against fraud

2024-10-01

California Blocks Landmark AI Safety Bill

California’s Governor has vetoed an AI safety bill, claiming it could stifle innovation & prompt AI developers to move out of the state

2024-10-01

New LinkedIn AI Data Policies Raise Concerns

LinkedIn has recently updated its Terms of Service, sparking discussions about user data privacy and AI training practices

2024-10-01

Malware Hidden In Software Packages Hits Developers

PondRAT: Threat actors connected to North Korea have used poisoned Python packages to deliver a new malware.

2024-09-30

Russian Faces 20 Year In Prison For DDoS Attack

Attack On Critical Infrastructure: This is the first time that the charge of treason, which carries a much more punitive sentence, has been used.

2024-09-27

The Key Issues For SME Cyber Security [extract]

Size Does Not Equal Vulnerability: SMEs serving regulated industries, critical infrastructure & large corporations are particularly at risk.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

Cybernance

Cybernance

Cybernance provide an enterprise-wide, web-based software solution for managing and mitigating cyber risk based on key compliance frameworks.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.