GOVERNMENT > Law Enforcement


« Back to News

2021-10-29

Police Arrest 150 Suspects In Dark Web Operation

Europol's Operation DarkHunTOR has made many arrests and recovered millions of euros in cash and Bitcoin, as well as drugs and guns.

2021-10-27

CISA, FBI & NSA Issue Ransomware Warning Alert

US federal agencies urge organisations to implement immediate actions outlined in the joint advisory to defend against Conti ransomware.

2021-10-26

GCHQ Boss Says Ransomware Attacks Have Doubled In A Year

Ransomware attacks have become increasingly popular with cyber criminal as they are “largely uncontested” and highly profitable.

2021-10-15

British Police IT Systems Cannot Cope With Cyber Crime

Barely 3% of cyber crimes come to the attention of Britain's police forces, whose computer & IT systems are often old and obsolete.

2021-10-15

Ukraine Police Arrest Botnet Attack Controller

Arrested: A suspected botnet operator responsible for controlling an automated network of 100,000 compromised machines to launch DDoS attacks. 

2021-10-11

Britain's COVID - Driven Online Crime Wave

A recent survey reveals over 15 million (29%) of Britons feel unsafe online and 21% report they have been a victim of online identity theft.

2021-10-06

Ransomware Is The Number One Threat

Over one-third of organisations worldwide have experienced a ransomware attack targeting access to systems or data in the previous 12 months

2021-10-04

Students Warned Of Tax Refund Frauds

In the past year almost one million people reported fraud attempts to HMRC and over 900,000 students with part time jobs could be at risk.

2021-09-30

Treason: Top Cyber Security Executive Arrested

The CEO of top Russian cyber security company Group IB, has been arrested on suspicion of state treason, punishable by up to 20 years in jail.

2021-09-28

Europol Breaks Open Mafia Cyber Crime Group

The Mafia group were using hackers specialised in latest-generation phishing and in the use of social-engineering techniques to steal $12million.

2021-09-28

Telegram Is Where Cyber Criminals Do Business

A rapidly growing network of criminals are using the encrypted messaging app Telegram to buy, sell and share stolen data and hacking tools.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

SANS CyberStart

SANS CyberStart

SANS CyberStart is a unique and innovative suite of tools and games designed to introduce children and young adults to the field of cyber security.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

Careerjet

Careerjet

Careerjet is a leading online job search engine with a large presence worldwide, sourcing millions of job ads from thousands of websites from all over the world in areas including Cybersecurity.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.