News

2020-09-23

New Iranian Ransomware Groups Detected

Two new Iranian hacking groups using ransomware have recently been identified. One is a highly professional team, the other less so.

2020-09-23

The Dark Side Of The Web

Most people don’t understand the true extent of the Dark Web, with some estimates that it accounts for over 90% of the world wide web.

2020-10-14

Social Media Networking Sites You Need to Know About - part 3

The increase in social media use over the last decade has, of course, come together with a large increase in the amount of time that people spend online.

2020-10-14

Social Media Networking Sites You Need to Know About - part 2

If you’re not utilising social media effectively, you’re missing out on a whole new potential market of consumers.

2020-10-14

Social Media Networking Sites You Need to Know About - part 1

The rapid adoption of social media is changing how we find friends, partners and lovers, how we receive news and effect political change.

2020-09-22

Massive Increase In DDoS Attacks

Large website hosting providers are hard-driven by the trend to remote working and now they face a wave of large scale Denial of Service attacks.

2020-09-22

TikTok’s Indian Rival Ready For Testing

India has banned TikTok and other Chinese social media Apps. Now, YouTube will test a beta version of its new short-form mobile video rival.

2020-09-22

Major German Shopping Site Leaked Customer Data

A German online children’s clothing store was found operating a completely unsecured server, exposing private data of 700,000 customers.

2020-09-22

Find Yourself In The Mind Of An Attacker!

Now in CYRIN's new Packet Capture Analysis exercise lab, see how to use the advanced Filtering and Analysis capabilities of Wireshark.

2020-09-22

Exaggerating Cyber Threats Undermines Policy Making

Ex-NCSC chief says that predictions of catastrophic consequences for governments & business of a major cyber attack are counter-productive.

2020-09-21

British Universities Shut Down By Cyber Attacks

Britain's Northumbria University, which offers a prestigious Cyber Security Masters Programme, has been the target of a damaging cyberattack.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.