FREE TO VIEW


« Back to News

2025-04-28

Chinese Hackers Exploiting Ivanti Connect Secure Vulnerability 

Ivanti has confirmed that a stack-based buffer overflow in Ivanti Connect Secure, Policy Secure & ZTA Gateways can lead to remote code execution.

2025-04-25

Traditional Cyber Insurance Isn’t Built For AI-Driven Attacks

Malicious Actors: As AI evolves, so does cybercrime - often outpacing the ability of businesses or insurers to respond effectively. By Randy Sadler 

2025-04-24

M&S Chaos: Leading British Retail Chain Attacked

Contactless payments have failed with many shoppers facing frustration at the checkout, as the company struggles to recover from a cyber attack.

2025-04-24

Apple & Meta Fined €700m By EU Commission

Breaches Of Digital Markets Act: Consumer choice and misuse of personal data are the key regulatory issues behind imposition of major penalties.

2025-04-24

How CISOs Can Speak The Language Of Risk & Resilience 

Boardroom Lingo & Accountability: The most effective CISOs today aren’t just securing infrastructure, they’re securing trust. By Tim Grieveson

2025-04-24

The Leading Israeli Cyber Security Companies [extract]

Israel is a powerhouse in the cyber security domain, with numerous start-ups, established companies, research institutions & government initiatives. 

2025-04-28

Quantum Computing Utility Will Be Achieved Within A Decade

Challenges in technical development, talent acquisition & executive-level understanding remain be overcome to support quantum development.  

2025-04-23

European Military & Government Data Networks Targeted

Russia is using sophisticated phishing methods to attack European governments & military data networks, using Remote Desktop Protocol.

2025-05-07

Chinese Hackers Undertaking A Global Infiltration Campaign 

Update: Chinese attackers have mapped critical infrastructure in preparation for future disruptions across twelve countries and twenty industries.

2025-04-22

Google's Online Advertising Technology Ruled Illegal

Monopoly Power: Google faces the possibility of US courts ordering it to sell assets or change its business practices to avoid anti-trust violations.

2025-04-23

The FBI Has Lost Track Of Its Hacking Tools

The FBI is secretive about its use of hacking tools, with very little information available about what the tools are, or what they are used for.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Rule4

Rule4

Rule4 is a global professional services firm that provides practical, real-world knowledge and solutions in areas including cybersecurity, AI, Machine Learning and industrial control systems.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Argentra

Argentra

Argentra is a specialist engineering company, we have years of experience developing custom security software and providing security risk consulting.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.

Aurva

Aurva

Aurva are a team of engineers, product thinkers, and security minds who believe that data security should be simple, powerful, and built for speed.