GOVERNMENT > Law Enforcement


« Back to News

2022-05-03

Lapsus$ Hackers Targeted T-Mobile

Teenage Rampage: The Lapsus$ hacking group got acces to T-Mobile’s source code using stolen credentials, before their final arrest.

2022-04-29

FBI Is Looking For BlackCat

Wanted: IP addresses, Bitcoin addresses, transaction IDs, communications and a sample of an encrypted file to catch prolific criminals.

2022-04-20

Police Shut Down RaidForums Hackers

The notorious hacking marketplace, RaidForums, has been shut down and its infrastructure seized in a major Europol operation.

2022-04-20

Remote Access Scams Open The Door To Thieves

British users lost £50m in remote access scams where victims are tricked into handing over control of their computer or smartphone to criminals.

2022-04-05

Multimillion-Dollar Business Email Fraud Gang Arrested

Operation Eagle Sweep targeted fraudsters responsible for stealing from five hundred US victims and causing losses totaling $51 million. 

2022-04-19

Beware Crypto Donation Requests For Ukraine

Fraud Warning: Cyber criminals have been detected soliciting donations using fake messages to exploit the Ukraine conflict with Russia.

2022-03-15

Hacker Behind Kaseya Ransomware Attack Extradited

An alleged key member of the REvil ransomware group, responsible for the Kaseya hack, has been extradited to the US to face charges.

2022-02-11

Online Fraud Is A British Security Nightmare

Crime Epidemic: Britain has become a target destination for global fraudsters, to a level where it can be considered a threat to national security.

2022-02-04

Cyber Criminals Frustrated By Russian Crypto Currency Rules

How To Spend It: New restrictions on using crypto currencies are making life more difficult for Russia's prolific ransomware specialists.

2022-02-01

Ransomware Attack On French Ministry of Justice

It is a mistake to think that national goverenment agencies are more skilled at protecting their critical data than the private sector.

2022-01-19

Europol Is Told To Delete Its 'Big Data Ark'

The EU data protection regulator has ordered Europol to destroy six years worth of crime reports, hacked phones records & other intelligence.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Communications Security Establishment (CSE) - Canada

Communications Security Establishment (CSE) - Canada

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

Panasonic Automotive Systems

Panasonic Automotive Systems

Panasonic Automotive Systems brings together security technologies and human resources cultivated across an extensive range of businesses into the automotive field.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.