News

2024-08-05

Russian Cyberwar Methods Are Evolving

Russia's changing priorities may be an indication that cyber weapons are becoming a more effective alternative to their conventional weapons.

2024-08-05

Cyber Crime Hothouses In Myanmar

Slave Labour: Online fraud in Southeast Asia is continuing to grow, with organised crime syndicates generating an estimated $64 billion annually.

2024-08-05

App Security Testing: Exploring The Pros & Cons Of Different Approaches 

Understanding Emerging Technology Risks: It is important to be familiar with the different approaches in app security to choose the right solutions.

2024-08-02

Dark Angels Score Record Breaking $75m Ransom

Extortion Pays: ThreatLabz has uncovered a victim who paid Dark Angels $75 million in ransom, higher than any previous publicly known amount.

2024-08-02

Hackers Target Maritime Facilities With Malware

Sidewinder: An Indian APT using spear-phishing to deliver malicious payloads to conduct espionage and trigger new chains of attack.

2024-08-01

AI At The Paris 2024 Olympics

The 2024 Games are using AI tools across many applications. But the large amounts of data being generated risk being used for malicious purposes.

2024-07-31

Electric Vehicle Charging Stations Are Here - Will Cyberattacks Follow?

A Soft Target: Cybercriminals who focus on targeting EV charging stations have the capability to launch attacks right across the local grid.

2024-07-31

DDoS Attack Knocks Azure Offline

Intermittent Downtime: Cyber security teams had to scramble to deal with the widespread incident affecting utilities, banks & government agencies.

2024-08-13

Grok Faces Prosecution For Misusing AI Training Data

Update: Elon Musk's AI model Grok used posts on X as a training tool without properly obtaining users for permission, breaking GDPR rules.

2024-07-30

The AI Threat: How Can Businesses Protect Themselves?

AI offers exponential opportunities for growth, but organisations equally face increasing risks that should not be ignored. By Sam Peters

2024-07-30

What Sets Next-Generation Firewalls Apart From Traditional Firewalls?

In today's complex cybersecurity landscape, organizations need advanced protection to safeguard their networks & data from sophisticated threats.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Government Communications Headquarters (GCHQ) - UK

Government Communications Headquarters (GCHQ) - UK

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risk insurance.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

AdviserCyber

AdviserCyber

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers.

Intraframe US

Intraframe US

Intraframe US is a cybersecurity company in Memphis, specializing in Digital Forensics Incident Response and Managed IT services. We provide SMBs with a 24/7 SOC for proactive Cyber Threat Management.

EpicCyber

EpicCyber

Since 2011, Epic Cyber has pioneered the integration of enterprise cloud technology.