FREE TO VIEW


« Back to News

2024-09-17

US Healthcare Firm Loses 22GB of Data

Stolen & Leaked: The 3AM Ransomware group is claiming responsibility for stealing the Personal Health Information of 464,000 patients.

2024-09-18

Britain Convenes An International Cyber Skills Conference

Protection & Defence: Britain is bringing western countries together to discuss the cyber security threats that face nations around the world.

2024-09-18

Meta Bans Russian Media From Facebook

Meta is banning Russian state media networks, saying that they carry out influence operations and evade detection on its social media platforms. 

2024-09-12

Which US States Are Most At Risk From Cyber Attacks? 

Colorado, New York, Nevada & California Top The List: Three out of four companies in the US are found to be at risk of a material cyber attack.

2024-09-17

Attack On Transport For London Exposed Passenger Bank Details

Teenager Arrested: 30,000 staff passwords exposed, plus bank account details of 5,000 passengers, including account numbers and sort codes.

2024-09-17

Who Are The Top 10 Cyber Security Companies? [extract]

The business of cyber security is consolidating with major participants making power moves like acquisitions & innovation. Big money is at stake.

2024-09-13

The US Education Sector Is Under Siege

Over 75% of organisations in the US education sector detected a cyber attack on their infrastructure over the last year, up from 69% in 2023.

2024-09-16

What Android Users Need To Know About New Malware

SpyAgent: A new Android mobile malware which targets mnemonic keys by scanning your device for recognisable images. By Oliver Devane

2024-09-10

The Impact Of 5G On iGaming

5G technology accelerates data transfer speeds, resulting in higher quality gaming visuals and more in-depth mechanics for casino games.

2024-09-16

Mental Health Provider Has Exposed Patient Data

No Password Protection: The 5.3 terabytes of exposed data included critical personal details about patients, going far beyond therapy sessions.

2024-09-16

Russian Hackers Exploit Mobile Browser Vulnerabilities

Researchers identify multiple campaigns exploiting Internet browsers flaws using methods very like those first developed by NSO Group.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

Insurica

Insurica

INSURICA is a full-service insurance agency built upon a tradition of integrity, industry leadership, and excellence.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.