News

2022-01-03

Malicious Joker App Gets Half A Million Downloads

Joker Malware is a persistent threat that infects legitimate apps then steals from users by subscribing them to unwanted subcription services.

2022-01-03

Belgium’s Military Suffer From Log4j Attack

The Belgian Defence Ministry's computer network is being restored to full operation following an attack delivered via Log4shell vulnerabilities.

2021-12-22

Britain's HMRC Tax Agency Admits Numerous Data Breaches

The HMRC has disclosed 17 breaches in 15 months from 2020, affecting 3,000 individuals, as a result of unauthorised changes to personal records.

2021-12-29

Most British Workers Are Unaware Of Cyber Threats

Don't Know, Don't Care: Only a quarter of UK employees are aware of cyber risks, although more than half have been affected by an attack.

2021-12-31

British Plan To Become A ‘Global Cyber Power’ In 2022

Britain plans to advance in cyberspace and will support its workforce & industry in upgrading the technologies vital to developing its cyber power.

2021-12-24

Log4j Cyber Security Flaw Seriously Concerns Experts

The Log4j vulnerability is being widely exploited by a growing number of threat actors, prompting government officials to take action.

2021-12-22

Cyber Revolution In The Media & Entertainment Industry

Media & Entertainment companies are increasingly becoming targets for cyber crime as their business models swiftly evolve in the digital era.

2021-12-22

Microsoft's New AI Debugging Tool

BugLab: Microsoft’s concept is to develop an AI that can automatically find and repair software bugs using a 'hide and seek' game as the model.

2021-12-21

The Pentagon Needs To Change How It Does AI

The US Defense establishment needs a more integrated approach to AI if it is to translate its technical capabilities into effective military tools.

2021-12-21

Stealthy Malware Hiding Behind An Invalid Date

e-Commerce At Risk: A highly sophisticated malware targeting online stores, CronRAT is undetected by many antivirus engines.

2021-12-20

Protecting Your E-Commerce Business Against Ransomware Attacks

Online sales are soaring and businesses are building their digital presence, but they must ensure their cyber security keeps pace. By Neville Louzado

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Innovex Global

Innovex Global

Innovex is a full-service executive search and advisory business that engages with early-stage startups, scale-ups, and established businesses in the Fintech, Cybersecurity and Technology industries.

Sansec

Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers!

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.