FREE TO VIEW


« Back to News

2023-05-01

Iranian Hackers Targeted Israel

Iranian state-sponsored threat hackers are deploying an updated backdoor apparently targeting Israeli academic researchers with an interest in Iraq.

2023-04-27

Facebook Delivers Fake Reviews

Research by consumer group Which? shows that there are many fake review factories on Facebook - despite the risk of fines from regulators.

2023-04-27

Violent Indian Separatists Using Twitter Bots

Recent research reveals pro-Khalistani Sikh groups using Twitter bots to promote violence and anti-India propaganda across social media.

2023-04-25

Locked Shields - NATO’s 2023 Cyber Exercise

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) recently hosted the 2023 edition of the annual cyber defense exercise.

2023-04-24

Musk Threatens To Sue Microsoft

Charging For User Data: Twitter's owner Elon Musk is threatening to sue Microsoft as he accused the technology giant of misusing user data.

2023-04-24

Facebook Users In Line For $725m Payout

Cambridge Analytica Data Privacy Settlement: Facebook users could receive a share of a $multimillion settlement in a successful privacy lawsuit.

2023-05-02

Build and Implement an Effective Endpoint Detection and Response Strategy

Webinar: Thursday, May 11 | Discover how you can implement endpoint detection and response (EDR) tools into your security strategy.

2023-04-20

What Is A Credential Stuffing Attack & How To Protect Your Organization

Credential stuffing is a type of attack that relies on the fact that many people use the same usernames & passwords across multiple accounts.

2023-04-28

The Evolution Of Russian Cyber Warfare

Future Warfare: Intelligence leaks provide an insight into Russian cyberwar objectives & potential long-term threats to Western organisations.

2023-04-21

An Increasingly Diverse Attack Landscape

Covert Methods: SonicWall's research report details a more diversified cyber attack landscape and shifting patterns of threat actor strategies.

2023-04-19

British Cyber Security Agency Issues An Alert

Russian Hackers Target Critical Infrastructure: Russia seeks to "disrupt or destroy" Britain's critical infrastructure, Cabinet Office warns.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

SNC-Lavalin

SNC-Lavalin

SNC-Lavalin is a fully integrated professional services and project management company with offices around the world.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.