News

2020-07-06

Journalist’s Phone Hacked Using An ‘Invisible’ Technique

The iPhone was infected by “network injection,” a fully automated technique which intercepts a cellular signal when it visits a website.

2020-07-06

Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

A cyber attack is thought to have caused a fire at Iran's Natanz nuclear enrichment facility, after a failed attempt to poison Israel's water supply.

2020-07-06

Hackers Extort $1.14m From University of California

The University of California has paid a ransom of $1.14 million to hackers to restore encrypted data following an attack on its School of Medicine.

2020-07-03

Hong Kongers Erase Their Digital Footprints

Hong Kong residents hurry to alter their digital footprints or remove their presence entirely from social media to escape new Chinese security law.

2020-07-03

Police First Hack Then Demolish Organised Crime Gangs

Police arrest 800 people across Europe after shutting down the encrypted EncroChat platform, used by organised crime groups for drug deals.

2020-07-02

Artificial Intelligence – A Brief History

AI is technology that enables a computer to think or act in a more 'human' way. It has a long history and has recently made incredible advances.

2020-07-01

LinkedIn ‘Job Offers’ Targeted Aerospace & Military Personnel

A malware campaign used LinkedIn spear-phishing messages posing as recruiters to steal data from the military and aerospace executives.

2020-07-02

Webinar: How To Protect All AWS Services & Surfaces

July 16th, 2020 | Explore best practices and get practical guidance on implementing a multi-layer defense strategy for security in the cloud.

2020-07-01

Employees Are The Biggest Cyber Security Risk

Businesses are at constant risk from website data breaches, cyber attacks or malicious emails and employees can often be the biggest risk of all.

2020-06-30

Cloud Security Is Different

Migration to the Cloud for data and services has some risks that require new users to carefully rethink their approach to managing cyber security.

2020-06-30

Quantum Computing Will Have A Revolutionary Effect

Quantum computing will combine with IoT and AI to create a secure new network of digital and physical devices that will revolutionise industry.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Mailinblack

Mailinblack

Mailinblack protects your organisation against email threats with an innovative solution that meets your security requirements.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

M7 Services

M7 Services

M7 Services are a comprehensive Managed Services Provider (MSP) with a focus on delivering cutting-edge information technology solutions and unparalleled customer service.

Kali Linux

Kali Linux

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing.