GOVERNMENT > Law Enforcement


« Back to News

2022-08-23

BlackByte Ransomware Group Have An Update

Version 2.0: Blackbyte are back with advanced new extortion techniques that include a data leak website modelled on Lockbit.

2022-08-23

Technology To Combat Human Trafficking

AI, Facial Recognition & Blockchain: There are a growing number of ways in which technology can be applied to combat human trafficking.

2022-08-16

Why You Must Report A Cyber Attack

Once you’ve suffered a cyber attack, most of the damage has been done. But ignoring your regulatory obligations will only make things worse.

2022-08-15

$3 Million Romance Fraudster Arrested

#YourAccountYourCrime: Police make a high profile arrest as Interpol launches a new campaign warning of the dangers of romance scams.

2022-08-09

US Federal Court Court IT Systems Breached

Hackers and other criminals may have had access to documents across the US Court Electronic Records and Case Management systems.

2022-08-01

Over One Hundred Arrests In Business Email Compromise Swoop

Members of the criminal group included computer experts, who created the phishing domains and carried out a sophisticated email fraud.

2022-07-25

FBI Issues A Warning To Users Of Crypto Currency Apps

The FBI has released an advisory warning crypto currency investors and firms to be wary of fraudulent apps that aim to steal money from victims. 

2022-07-12

Chainalysis Crypto Theft Hotline

Crypto Incident Response: The service is for victims of a hack or ransomware attack in which crypto currency is either demanded or stolen.

2022-06-20

British Defence Ministry Gets A Quantum Computer

The British government has got its first quantum computer to process complex calculations at high speed, focused on military applications.

2022-06-24

Preventing Exploitation Of Digital Images Of Children

Digital Fingerprints: Online mages of child sexual abuse are a daunting challenge for practitioners working in the field of child sexual abuse.

2022-06-23

For Sale: Academic Credentials

The FBI is warning universities & colleges that illegally obtained user accounts & other credentials are available for sale on the Dark Web. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.