News

2019-01-05

Major US Newspapers Under Malware Attack

Several major newspaper titles suffered serious print and delivery disruption caused by targeted cyber-attacks originating outside the US.

2019-01-08

German Politicians Suffer Mass Hacking

Personal data, phone numbers & financial information of politicians, including Angela Merkel and President Steinmeier, are leaked via Twitter.

2019-01-08

Hackers Demand Ransom For Stolen 911 Documents

Secret information about the murderous 911 attacks has allegedly been stolen from the insurer and is being offered for sale to terrorist groups.

2019-01-08

Revealed: Top Secret Israeli Hackers For Hire

Candiru is an offensive cyber company comprising ex-military specialists that can sell its customers a complete attack system.

2019-01-07

Optimising Maritime Cybersecurity

Modern vessels have multiple, complex technologies. Now, both onboard and shoreside crews can monitor each ship and an entire fleet

2019-01-07

Cyber Attacks On Business Are Surging

2018 saw a massive increase in global cybercrime with the damage done taking a measurable proportion of GDP, running into billions of dollars

2019-01-07

Prosecutors Sue Facebook Over Cambridge Analytica

Facebook faces a fine of up to $1.7 billion if all 340,000 instances are considered “violations” as Washington prosecutors press charges.

2019-01-04

China’s Hackers Have Stolen EU, US & Global Secrets

APT10: A China-based hacking group well known to the information security community has been hacking the rest of the world since 2014.

2018-12-31

Publishers Need Micro-Payments Now

Professional journalism is on a downward slope, driven by the growth of fake news, propaganda and personal blog opinion. What's to be done?

2018-12-31

Dark Web Dealers Voluntarily Ban Deadly Fentanyl

Major dark web drug suppliers have started to voluntarily ban the synthetic opioid fentanyl because it is too dangerous.

2019-01-03

Beware Of Cyber Criminals Demanding Payments In Bitcoin

Cyber-crime syndicates have resorted to transactions using crypto currency or Bitcoin money to avoid detection by the authorities.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

National Security Agency (NSA) - USA

National Security Agency (NSA) - USA

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

DDLS

DDLS

DDLS is Australia's largest provider of corporate IT, process training and cybersecurity training courses and certification programs.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Swise

Swise

Swise is a Cyber security and compliance platform for your small business. Simplify and automate your security and compliance with our AI-powered platform.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.