GOVERNMENT > Law Enforcement


« Back to News

2025-04-23

The FBI Has Lost Track Of Its Hacking Tools

The FBI is secretive about its use of hacking tools, with very little information available about what the tools are, or what they are used for.

2025-04-21

For Sale: Cheap DIY Cyber Crime Kits

Ransomware tools are being sold on the Dark Web for one-time use, allowing inexperienced amateurs to get into cybercrime for as little as $25.

2025-04-01

Cracking Down On Cyber Crime In Africa

Operation Red Card: An operation co-ordinated by Interpol has disrupted criminal networks causing major harm to individuals & businesses.

2025-03-28

Staying Ahead Of First-Party Fraud & Abuse

Ecommerce fraud involving consumers exploiting chargebacks & refund policies, is driving a big part of online retail losses. By Xavier Sheikrojan

2025-03-27

Essential Strategies To Prevent Ransomware Attacks

Nurturing A Culture Of Protection: Banning ransom pay-outs addresses the symptoms, but we need to tackle the cause. By Robert Phan

2025-02-15

Thai Police Arrest Russian Hackers

Phobos Ransomware: Hackers stole $16m through ransomware attacks targeting Swiss & US targets, affecting over 1,000 victims worldwide.

2025-01-20

Remote Deletion Of Malware Enforced On Thousands Of Computers 

The US Justice Dept. has confirmed completion of an operation ordering removal of PlugX Chinese malware infecting over 4,000 computers.  

2024-12-10

The Football Season Is In Full Swing & So Are Cybercriminals

The stakes are high, not just for fans but also for the clubs & sporting organisations that form the backbone of their sport. By Spencer Starkey

2024-12-03

US Citizen Jailed For Cyber Espionage

A US citizen has been sentenced to jail for spying and sharing sensitive information about his employers with China's domestic intelligence agency.

2024-11-23

Phishing Scheme That Generated $11M Taken Down

Scattered Spider: Charges of using text messages to extract victims' personal information as a gateway to steal millions in crypto currency.

2024-11-15

Hacker Sentenced For Bitcoin Theft

Razzlekhan: The husband of flamboyant Hip-Hop artist sentenced to 5 years in jail for theft and money laundering of Bitcoin currently worth $9billion.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Upstream Security

Upstream Security

Upstream Security is the first cloud-based cyber-security solution that protects the technologies and applications of connected and autonomous vehicles.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.

METCLOUD

METCLOUD

METCLOUD is driving a cloud evolution. A cloud that promises relentless cybersecurity, performance, resilience and sustainability.

Roundsec

Roundsec

Roundsec provide information security services including risk assessment and pentesting of sites and apps.