News

2025-04-22

Google's Online Advertising Technology Ruled Illegal

Monopoly Power: Google faces the possibility of US courts ordering it to sell assets or change its business practices to avoid anti-trust violations.

2025-04-23

The FBI Has Lost Track Of Its Hacking Tools

The FBI is secretive about its use of hacking tools, with very little information available about what the tools are, or what they are used for.

2025-04-18

Hackers Claim They Are Selling FortiGate Firewall Access

Zero-Day Vulnerability: The exploit appears to target versions of Fortinet's FortiOS, which was found to be susceptible to authentication bypass flaws.

2025-04-22

Fraud Is Dominating Cyber Insurance Claims

Claims Up by 16%: Financial fraud is one of the most common type of cyber attack leading to an insurance claim, and is certainly the most costly.

2025-04-21

For Sale: Cheap DIY Cyber Crime Kits

Ransomware tools are being sold on the Dark Web for one-time use, allowing inexperienced amateurs to get into cybercrime for as little as $25.

2025-04-17

The Geostrategic Battle Over Semiconductor Chips Just Got Bigger

President Trump is trying to create a domestic US semiconductor industry through protectionism and the US technology sector is getting worried.

2025-04-17

Protecting Your Website From SEO Fraud

Effective Tips To Know About: If you become the victim of SEO fraud there can be unpleasant consequences for both your credibility & reputation.

2025-04-14

Securing The Cloud: The Role Of DevOps Programmers & Azure Engineers In Modern Cybersecurity

Automation Scales Decisions. People Guide Them: Combining DevOps with Azure cloud security is appealing to enterprise and mid-sized orgs.

2025-04-14

Phishing Scams Put Hotel Guest Data At Risk

Fake Captcha: Hotel workers are being tricked into downloading credential-stealing malware by cyber criminals successfully impersonating Booking.com.

2025-04-17

ChatGPT's Image Generation Could Be Driving Retail Fraud 

ChatGPT's sophisticated image generator could make the traditional verification process redundant. How can retailers fight back? By Doriel Abrahams

2025-04-11

Unlocking Business Potential With Strategic IT Evaluations

Technology Assessment: Ensuring the appropriate decisions, matching technology to strategic objectives, improving efficiency, and reducing risks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.

CASwell

CASwell

Caswell is an industry-leading OEM/ODM specializing in networking, security, SD-WAN, NFV, telecommunication and IoT applications.