FREE TO VIEW


« Back to News

2022-08-23

BlackByte Ransomware Group Have An Update

Version 2.0: Blackbyte are back with advanced new extortion techniques that include a data leak website modelled on Lockbit.

2022-08-23

Technology To Combat Human Trafficking

AI, Facial Recognition & Blockchain: There are a growing number of ways in which technology can be applied to combat human trafficking.

2022-08-23

Ransomware Used Against Albania Linked To Iran

Roadsweep & Zeroclear: Albania's experience highlights the vulnerability of IT infrastructure that lacks resilience against sophisticated malware.

2022-08-22

Lazarus Targets FinTech Engineers With MacOS Malware

Lazarus group is using a malicious macOS exploit to impersonate Coinbase with fake job posting to lure unwitting workers in the FinTech sector.

2022-08-19

Artificial Intelligence Can Improve Cyber Security

Essential: Effective AI can save money and reduce the risk of breaches as organisations face an ever expanding number of vulnerable endpoints.

2022-08-20

Ukraine Knocks Out A Russian Bot Network

Ukraine's security services claim to have stopped a network operating over a million bot accounts distributing fake news to destabilise the nation. 

2022-08-22

Re-strategising Resilience In The Remote Working Age

It’s time to stop adding tools and complexity and start building security operations where cyber security experts are truly empowered. By Rob Smith

2022-08-22

Protecting Medical Devices From Cyber Attacks

Medical Device Cyber Security: Medical devices need robust cyber security which is critical in retaining patient trust in health care technology. 

2022-08-19

Blockchain Auditors Say $4m Crypto Theft Enabled By Logging Tech

A $4 million hack on several crypto currency wallet providers is attributed to a misconfiguration in a widely-used event-logging technology.

2022-08-17

Killnet Turn Their Attention To Lockheed Martin

Hackers targeted the supply of Lockheed Martin's advanced HIMARS rocket artillery supplied to Ukraine for use against Russian invaders.

2022-08-17

CISA & ACSC Name 2021’s Top Malware

New Capabilities & Evading Detection. The top malware types include RATs, banking Trojans, information stealers and ransomware. 

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

VectorUSA

VectorUSA

VectorUSA is a premier technology solution provider. We design, build and maintain cybersecurity, data center, wireless and managed solutions – transforming business needs into technology solutions.

IPKeys Cyber Partners

IPKeys Cyber Partners

IPKeys Cyber Partners, together with the IPKeys Power Partners unit, provide Cyber Security and CIP Compliance for utilities, grid operators and public safety organization across the USA.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

Shieldworkz

Shieldworkz

Shieldworkz secure Operational Technology environments and protect businesses with best-in-class professional services and cyber security solutions.