FREE TO VIEW


« Back to News

2024-12-13

Phishing Attacks Target Ukraine’s Defence Sector

A new Russian phishing campaign designed to infiltrate Ukrainian military & security networks, to gather intelligence & disrupting combat operations. 

2024-12-13

Chinese Firm Sanctioned For Potentially Lethal Cyber Attacks

Sichuan Silence: A Chinese cyber security firm has been sanctioned by the US for attacks exploiting a software vulnerability in corporate firewalls.

2024-12-13

Speciality Bakery Chain Hacked 

Krispy Kreme Donuts: A major cyber attack disrupted systems which resulted in lost production at the leading specialist bakery and retail outlet.

2024-12-12

What Security Features Are Essential In BPM Software To Protect Sensitive Data?

Effective business process management goes beyond spotting discrepancies. Good BPM software tools can streamline processes & maximize output.

2024-12-12

Strengthening Britain's Cyber Defences

Robust Regulation & Proactive Measures: Are current regulations good enough to tackle the sophisticated threats the UK faces today? By Rahul Tyagi

2024-12-18

Trump 2.0: Cyberwarfare To Reach New Heights

With a realignment in world power dynamics, Trump's USA faces serious challenges for global cybersecurity throughout 2025. By Craig Watt

2024-12-11

FBI & CISA Advice - Use Encrypted Messaging

In response to the threat from Salt Typhoon's exploits, US mobile and broadband users are advised to adopt fully encrypted messaging services.

2024-12-11

Ransomware Criminals Claim To Have Stolen Deloitte's Data

Brain Cipher: Spear phishing specialists say they have hacked the leading multinational professional services firm. Deloitte say otherwise.

2024-12-11

British NHS Hospitals Under Attack

A Ceaseless Target: Ransom attacks on three Liverpool hospitals are just the latest in a series against NHS healthcare organisations in 2024.

2024-12-10

The Football Season Is In Full Swing & So Are Cybercriminals

The stakes are high, not just for fans but also for the clubs & sporting organisations that form the backbone of their sport. By Spencer Starkey

2024-12-11

Managing Zero-Day Vulnerabilities In The Real World

Mitigating Risks: Zero-day vulnerabilities present a huge risk for organizations, pulling DevSecOps teams in different directions. By Randall Degges

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

Stealthbits Technologies

Stealthbits Technologies

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

United Nations Office of Counter-Terrorism (UNOCT)

United Nations Office of Counter-Terrorism (UNOCT)

UNOCT provides UN Member States with the necessary policy support of the UN Global Counter-Terrorism Strategy, and wherever necessary, expedites delivery of technical assistance.