GOVERNMENT > Law Enforcement


« Back to News

2022-12-05

Ransomware Gang Makes $100 Million

Over 1,300 Organisations Extorted Since 2021: Education and healthcare institutions are among those targeted by the Hive ransomware group.

2022-11-23

Ransomware Attacks Linked to FIN7

The criminals behind Black Basta ransomware have been linked to hacking exploits conducted by a prolific hacking group known as FIN7.

2022-10-31

Ed Sheeran's Music Pirate Jailed

Spirdark: A hacker has been convicted for copyright theft after stealing 1,263 unreleased songs by 89 artists and selling them on the Dark Web.

2022-10-21

Former Uber Security Chief Convicted

 A US court has ruled that paying ransom to recover stolen data is a criminal offence, which landing one high profile CISO in a lot of trouble.

2022-10-10

How Police Officers Are Tackling The Data Backlog With Digital Forensics

Collaborative Tools: Police forces struggle with unprecedented volumes of data & digital forensics processes need modernizing. By Harsh Behl

2022-08-23

BlackByte Ransomware Group Have An Update

Version 2.0: Blackbyte are back with advanced new extortion techniques that include a data leak website modelled on Lockbit.

2022-08-23

Technology To Combat Human Trafficking

AI, Facial Recognition & Blockchain: There are a growing number of ways in which technology can be applied to combat human trafficking.

2022-08-16

Why You Must Report A Cyber Attack

Once you’ve suffered a cyber attack, most of the damage has been done. But ignoring your regulatory obligations will only make things worse.

2022-08-15

$3 Million Romance Fraudster Arrested

#YourAccountYourCrime: Police make a high profile arrest as Interpol launches a new campaign warning of the dangers of romance scams.

2022-08-09

US Federal Court Court IT Systems Breached

Hackers and other criminals may have had access to documents across the US Court Electronic Records and Case Management systems.

2022-08-01

Over One Hundred Arrests In Business Email Compromise Swoop

Members of the criminal group included computer experts, who created the phishing domains and carried out a sophisticated email fraud.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Chatham House Cyber Conference

Chatham House Cyber Conference

14 June 2023 - Connect with cyber security experts and senior policymakers to explore the role of cyber security in the global economy and how to deliver an open and secure internet.

Sapphire

Sapphire

Sapphire provides solutions designed to protect your infrastructure, assets, data and users against current and emerging threats. We are founders of the National Information Security Conference (NISC)

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

Bunifu Technologies

Bunifu Technologies

Bunifu Technologies is an Information Security and Custom Software Development Company.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.