NEWS > Cybersecurity News


« Back to News

2024-11-29

How AI Is Reshaping The Cybersecurity Landscape 

ChatGPT Turns Two: Generative AI has revolutionised countless industries, including cybersecurity. A discussion with Alex Rice & Darren Thomson.

2024-11-21

Hamas Affiliates Attacking Israel

A group named WIRTE has been identified targeting Israeli infrastructure, as well as the Palestinian Authority, Jordan, Iraq, Saudi Arabia & Egypt.

2024-11-20

The Industries Facing The Biggest Cyber Threats

Understanding the sectors most frequently targeted by cybercriminals can offer insights into the breadth & nature of these threats. By John McLoughlin

2024-11-19

Oxford University Reinforces British Cyber Security

CRANE Network: It aims to be a collaborative hub for engagement between researchers and other organisations to prepare the UK for cyber threats. 

2024-11-22

Cyber Monday Is Not The Same As Black Friday

New Tradition: Cyber Monday, as the name suggests, historically only takes place online, while Black Friday sees deals both online and in-store.

2024-11-19

Undersea Communications Cables Cut

Internet cables between Germany and Finland, and Lithuania and Sweden suffered a sudden outage. The affected countries suspect sabotage.

2024-11-19

Musk Sues Microsoft Over OpenAI

Elon Musk is expanding his lawsuit against ChatGPT, charging that OpenAI, along with Microsoft, have violated antitrust law by stifling competitors.

2024-11-15

Imminent Zero-Day Attacks

CISA & NCSC alert warns of an increase in cyber attackers exploiting previously unknown vulnerabilities to compromise enterprise networks.

2024-11-15

Hacker Sentenced For Bitcoin Theft

Razzlekhan: The husband of flamboyant Hip-Hop artist sentenced to 5 years in jail for theft and money laundering of Bitcoin currently worth $9billion.

2024-11-12

Fancy Bear At Work

Confirm You Are Not A Robot: A phishing campaign using emails that deliver a link which appears to be a Google reCAPTCHA bot-detection dialog.

2024-11-03

X Is A Vehicle For Political Propaganda

Critics claim the platform is being used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Topsec Cloud Solutions

Topsec Cloud Solutions

The Topsec Managed Email Security Platform eliminates Spam, Viruses, Malware, and Phishing.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Offensive Security Manager (OSM)

Offensive Security Manager (OSM)

Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.