NEWS > Cybersecurity News


« Back to News

2024-08-23

WhatsApp Is A Vehicle For Illegal Content

Encrypted Child Sexual Abuse Imagery: A conflict between the need for enforceable child protection measures and rights to user privacy.

2024-08-22

Threat Intelligence: Most Prevalent Malware Rankings

The Usual Suspects: The top Malware families, exploited Vulnerabilities, mobile Malwares, Ransomware groups and attacked industry sectors.

2024-08-20

APT42: Iranian Hackers At Work

State-sponsored hackers from Iran are busy ramping up targeted phishing campaigns and fake news operations to undermine the US elections.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

2024-08-17

A New Microsoft Vulnerability Warning

Just a month after the Crowdstrike incident, another vulnerability has been found in Windows that can result in the 'Blue Screen of Death' error.

2024-08-16

Trump Campaign Emails Hacked

Update: Donald Trump’s election campaign claim that its internal communications have been hacked by the Iranian government looks credible.

2024-08-16

EU Regulators Threaten To Prosecute Elon Musk

Illegal Content: The European Union is heading for a confrontation with Elon Musk following his live interview with Donald Trump on X.

2024-08-14

Coming Soon - An AI Cyber Security Code

AI Cyber Security Code Of Practice: A proposed set of guidelines that could become the standard for AI security in Britain & potentially worldwide.

2024-08-12

British Nuclear Plant Has Serious Cyber Security Failures

Multiple investigations revealed staggering vulnerabilities that exposed the operation to a wide range of potentially devastating cyber attacks.

2024-08-09

British Government Warned To Prioritise Cyber Security

‘Wake Up’: Britain is warned it needs to take further measure to protect vulnerable infrastructure and prevent catastrophic system failures.

2024-08-09

Elon Musk Promotes Fake News About British Rioters

Under Elon Musk's ownership, X / Twitter has had a succession of controversies, including accusations of promoting fake news & hosting harmful content.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.