News

2024-06-25

Hackers Use Windows Backdoor To Deliver BadSpace

Fake Browser Update: A multi-stage attack chain involving an infected website, a command-and-control server, and a JScript downloader.

2024-06-25

How To Effectively Detect & Prevent SAP Threats

Porous Entry Points: SAP systems contain IT-enabled or overlooked vulnerabilities which leave them open to exploitation. By Christoph Nagy

2024-06-25

Cyber Security Staff Burnout Costs Firms $600m A Year

Work-related stress, fatigue, illness and burnout are making cybersecurity professionals less productive, costing $millions.

2024-06-25

AI & Cloud Are At The Intersection Of Cyber Security

Check Point’s 2024 Cloud Security Report: Cloud threats are growing with increasing concerns over emerging risks & zero-day attacks.

2024-06-25

The Psychology Of GenAI Manipulation

A Deep Dive Into Human Tactics: GenAI bots can be tricked into divulging sensitive information, placing organisations at risk. By John Blythe

2024-06-24

Large - Scale Supply Chain Hack On Auto Industry

Hackers who disabled the software systems of a company that provides services to thousands of US car dealerships are demanding ransom.

2024-06-24

Leveraging The Benefits Of LLM Securely 

Holistic protection across the cloud native application lifecycle will enable business to embrace the full potential of GenAI. By Gilad Elyashar

2024-06-24

US Blocks Leading Cybersecurity Firm Kaspersky

Three Month Deadline: Kaspersky will no longer be able to sell it’s software or provide updates to software already in use by US customers.

2024-06-24

Facebook Phishing Emails Are Targeting Businesses

Be Aware: Fraudsters are increasingly inventive in finding ways to trick people into giving away their money & sensitive personal information. 

2024-06-24

Five Reasons Your Organization Needs API Security Testing

API security testing is a key component in safeguarding digital assets, ensuring the integrity & confidentiality of data transmitted across systems.

2024-06-21

Hackers Publish Stolen Blood Test Data From London Hospitals

The group behind the recent Snynnovis attack that is disrupting operations at several major hospitals in London has published stolen data online.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

AI Security Institute (AISI)

AI Security Institute (AISI)

The AI Security Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.