GOVERNMENT > Law Enforcement


« Back to News

2021-09-28

Europol Breaks Open Mafia Cyber Crime Group

The Mafia group were using hackers specialised in latest-generation phishing and in the use of social-engineering techniques to steal $12million.

2021-09-28

Telegram Is Where Cyber Criminals Do Business

A rapidly growing network of criminals are using the encrypted messaging app Telegram to buy, sell and share stolen data and hacking tools.

2021-09-27

Cyber Crime Just Keeps On Growing

Emerging technologies including the Internet of Things, Artificial Intelligence & Cloud Computing are powering growth of large scale cyber crime.

2021-09-13

Ransomware: One Percent Makes A Big Impact

Ransomware As A Service: The FBI has issued an unprecedented warning about the One Percent Group that rents out Cobalt Strike malware.

2021-09-10

Police Get New Tools To Process Digital Evidence

The explosion of data on computers and other devices causes problems for investigators. A new Cloud based forensic tool can speed things up.

2021-09-03

FBI & CISA Advice On Ransomware Attacks

Damaging ransomware attacks often occur on holidays and over weekends with companies in the food & agricultural sector at particularly high risk.

2021-08-20

Hackers Give Back Half Of $600m In Stolen Crypto Currencies

Hackers who stole $600 million in crypto currencies from PolyNet have returned half the money. It is still the most costly hack in history.

2021-08-20

Vaccine Passport Scams

Action Fraud: Britain's online crime reporting portal has issued a warning about fake National Health Service emails offering a 'Vaccine Passport".

2021-08-13

One Million Stolen Credit Cards Hit The Dark Web

The Russian cyber criminal group AllWorld.Cards has released 1 million stolen credit cards on to the Dark Web to sell payment credentials online.

2021-08-11

Stolen: Over $600 Million In Crypto Currencies

Decentralised Finance: $273m in Ethereum, $253m in Binace Smart Chain tokens and $85m in other currency looted from a blockhain exchange.

2021-08-09

Looking For Love May Have Unexpected Consequences

Warning: Be cautious when using dating platforms as evidence reveals criminals have successfully conned over £15 million from unsuspecting lovers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

VNT Software

VNT Software

VNT's vision is to change the way complex IT problems are resolved by predicting business disruptions before they occur.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Bugv

Bugv

Bugv is a crowdsourcing cybersecurity platform powered by human intelligence where we connect businesses with cyber security experts, ethical hackers, bug bounty hunters from all around the world.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.