FREE TO VIEW


« Back to News

2025-01-01

Chinese Hackers Penetrated The US Treasury

The US Treasury Dept. has disclosed that it has fallen victim of what it describes as a ‘major cyber security incident’ which it blames on China.

2025-01-02

Volkswagen Suffers A Massive Data Breach

The personal information of 800,000 VW electric vehicle owners, including location data and contact details, was left exposed for months.

2025-01-03

Artificial Intelligence Presents Urgent Risks

Potentially Very Dangerous Technology: An eminent scientist is warning that AI could wipe out the human race within the next decade.

2025-01-03

Hackers Deploy Malicious Chrome Extensions

Supply Chain Attack: A large-scale hacking campaign targeting Chrome extensions has affected customers of a leading cyber security firm.

2024-12-31

China Complains About US Cyber Attacks

Pot, Kettle, Black: US Intelligence agencies are accused of hacking Chinese technology companies to extract commercial secrets and other IP.

2024-12-27

IoT Devices Infected With Pre-Installed Malware

BadBox: Android malware embedded in the device’s firmware, which enables interception of private credentials & can install other malicious software.

2024-12-31

Ireland - The EU's Data Repository

The growth of the cloud storage sector in Ireland is so rapid that it is threatening the country’s legally binding commitments to 'Net-Zero'.

2025-01-02

Cybersecurity: What Can We Expect In 2025?

The prospect is for continued turbulence, shaped by evolving attack vectors, regulatory pressures & geopolitical conflict. By Vincent Lomba

2024-12-27

Means, Motives & Opportunities

Relentless Cyber Criminals: Exploring the risk factors that will drive cyber attacks and the threats they will generate in 2025. By Kurt Thomas

2024-12-30

Cybersecurity Measures To Enhance Data Security In 2025

As we enter 2025, here are four predictions for organisations who want to take steps to protect themselves from cyber attacks. By Rick Goud

2024-12-31

What Are The Key Trends That Will Shape Tech In 2025?

Weaponised AI & Compliance: Executives at NinjaOne identify four key trends that will shape the technology industry in 2025 and beyond. 

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Cloudbrink

Cloudbrink

Cloudbrink is purpose-built to deliver the industry’s highest performance connectivity to remote and hybrid workers, anywhere in the world.

QRC Assurance & Solutions

QRC Assurance & Solutions

QRC is a PCI QSA, QPA, ISO accredited, CPA and CERT-IN empanelled organization with vast experience in conducting certification, regulatory audits, pen testing services, training and more.

Synergetika

Synergetika

Synergetika is a leading pure-play Privileged Access Management (PAM) consultancy and systems integrator.