GOVERNMENT > Law Enforcement


« Back to News

2021-06-29

2021 - Inside The Dark Web

A short guide on how you can access those hidden sectors of the internet that provide users the anonymity to explore a range of criminal options.

2021-06-28

Ukraine Cyber Police Crack Hacker Group

Ukraine's Cyber Police have exposed a ransomware group responsible for a string of attacks and the extortion and theft of $500 million.

2021-06-23

Global Police Operation Closes Fake Pharma Websites

A global policing operation has led to the closure of over 100,000 websites and online marketplaces selling fake pharmaceuticals worth over $23m.

2021-06-23

Negotiating Ransom: To Pay Or Not?

Factors to consider when responding to a ransom demand include the readiness of your backup network & data, insurance and customer reaction.

2021-06-16

Why Is It So Difficult To Convict Cyber Criminals?

Law enforcement agencies often fail to bring cyber criminals to justice and even when suspects are caught, it is rare for them to be convicted.

2021-06-14

FBI Recover Ransom Paid To Pipeline Hackers

The FBI has recovered most of the $4.4 million ransom payment made to Russian hackers after a cyber attack on the largest fuel pipeline in the US.

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

2021-06-07

Fake Finance Apps Focus On Theft

Fake banking, trading and crypto-currency apps are being used by criminals to steal money and financial information from unsuspecting users.

2021-06-02

Online Fraud Costs British Investors £63m

Over 12 months 5,039 reports of investment fraud made reference to a social media platform, with over a third of complaints involving Instagram.

2021-05-31

Ransomware And Its Criminal Use

Ransomware attackers are ferocious. If you haven’t been attacked yet, it’s not a matter of if, but when. Be prepared. Defend, backup and protect.

2021-05-15

Pipeline Ransom Has Been Paid

Darkside hackers have been paid $5 million to restore operations after a ransom attack paralysed fuel supplies across the US Eastern seaboard.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Evolve Secure Solutions

Evolve Secure Solutions

Evolve Secure Solutions is a security focused managed services provider serving private and public customers across the UK.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resilience

Resilience

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.