News

2022-03-21

The App At The Frontline Of Information Warfare

Telegram enables Russian citizens to access first-hand information, news & video from war scenes in Ukraine, that run counter to Russian propaganda.

2022-03-22

PressReader Suffers Cyber Attack

PressReader had opened free access to its newspaper and magazine content inside Ukraine. Then it was struck by a crippling cyber attack.

2022-03-25

Ukraine: Spam Website To Reach Millions Of Russians

A Norwegian computer expert has created a website enabling anyone to send an email about the war in Ukraine to millions of Russians.

2022-03-21

Facebook Allows Calls for Violence Against Russian Leaders

Extreme: Facebook and Instagram will allow users to call for violence against Vladimir Putin and Russian soldiers over Ukraine’s invasion.

2022-03-22

Phishing Attack On US Government Linked To Chinese Hackers

At least two Chinese state-sponsored advanced persistent threat groups have been identied as behind attacks on US and EU targets.

2022-03-21

Ukraine's 'IT Army' Risks Being Hijacked By Malware

A malware campaign is exploiting people's willingness to support Ukraine against Russian invasion to infect them with malicious Trojans.

2022-03-16

Employees Blame Their Employer For Data Theft

Stolen Personal Data: A sophisticated cyber attack at a Mercedes dealership has prompted the affected staff to sue their employer.

2022-03-15

Hacker Behind Kaseya Ransomware Attack Extradited

An alleged key member of the REvil ransomware group, responsible for the Kaseya hack, has been extradited to the US to face charges.

2022-03-21

AI Fills In The Missing Gaps From Ancient Greece

Artificial Intelligence: A system created by DeepMind has been “trained” to analyse inscriptions & decrees from the ancient Athenian empire.

2022-03-15

The Limits Of Social Media Soft Power

Social media platforms can - and in the case of Ukraine - have turned social media into soft power. But it has its limits. By Ronald Marks

2022-03-14

The US Military Want 5G Fast

Military communications need the rapid transfer of large quantities of data that 5G technology enables, combined with high levels of resilience.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Tanium

Tanium

Tanium delivers Autonomous Endpoint Management (AEM) with the industry’s only true real-time platform for AI.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

Buchbinder Information Technology Solutions

Buchbinder Information Technology Solutions

Buchbinder Tunick & Company is a premier CPA and advisory firm offering a broad range of assurance, tax, business consulting and IT consulting services.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.

Runtime Ventures

Runtime Ventures

Runtime Ventures focuses on seed and pre-seed stage cybersecurity investments. We love to work with ambitious founders building the future of the secure enterprise.