News

2025-03-05

Apple Takes Legal Action Over Data Privacy

Investigatory Powers Tribunal: Apple is taking legal action over the UK government efforts to force the company to weaken iCloud encryption.

2025-03-04

The Urgency Of AI Governance

Rapid Adoption Of AI-Driven Solutions: The lack of proper AI governance exposes businesses to financial, regulatory & reputational risks.

2025-03-03

Frontend vs Backend vs Full Stack: What’s The Difference?

Full-stack, Backend & Frontend: How does a full stack development company employ each of these skill sets to build seamless digital experiences?

2025-03-03

Cyber Command Ordered To Cease Hacking Russia

Defence Secretary Pete Hegseth has ordered the US military to pause offensive cyber operations against Russian targets.

2025-03-03

President Trump Says Russia Is Not A Cyber Threat

Trump has publicly & privately said that he does not believe Russia presents a cyber threat to US national security or critical infrastructure.

2025-03-03

Obsolete: Skype To Shut Down

The video calling service Skype will close on May 14th 2025, its owner Microsoft has said.

2025-03-04

Orange Group Hacked - User Data Stolen

The alleged breach includes source code, client contracts, project blueprints, and user data, risking operational security & customer privacy.

2025-03-09

Russian Hackers Penetrate Ukrainian Signal Accounts

Russian hackers have found ways to connect their victims' accounts to their own devices by abusing the messaging app's linked devices.

2025-03-06

Hackers Exploiting Malware In Google Docs

Infostealer: A form of malware specialising in stealing system data, credentials, crypto-currency wallet keys and various configuration files.

2025-03-05

DeepSeek - A Deep Dive Reveals More Than One Red Flag

DeepSeek has several vulnerabilities, exposing organisations to privacy breaches, regulatory violations & reputational damage. By Aditya K Sood

2025-03-02

From Accidental Hacker To Cybersecurity Champion

Celebrating International Women's Day: Consider the inspiring story of Dr. Katie Paxton-Fear, a highly respected Bug Bounty Hunter.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

Neptune Shield

Neptune Shield

Neptune Shield's mission is to deliver cutting edge Maritime focused Cyber Security & Threat Protection through our Hampton Roads based Tech & Cyber Security Hub.

TeamSystem

TeamSystem

TeamSystem is a leading tech company in the market for digital business management solutions for companies and professionals.

ClamAV

ClamAV

ClamAV is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security.