GOVERNMENT > Law Enforcement


« Back to News

2023-02-16

Illegal Crypto Transactions Reach A New Peak

There were more than $20 billion worth of illegal transactions using crypto currency in 2022, an increase of 11% from the $18bn in 2021.

2023-02-20

Cyber Criminals' Earnings Fall As More Ransom Victims Refuse Payment 

Despite increased attacks criminals have experienced a 40% drop in their earnings, as more victims are refusing to pay the ransom demanded.

2023-02-16

Policing Digital Crime

The criminal use of digital media, digital devices and social media means that policing is arguably facing some of its greatest challenges.

2023-02-15

Crackdown On Ransomware Criminals

Exposed & Sanctioned: The UK & US are tackling the Russian cyber criminals behind some of the most damaging ransomware attacks ever.

2023-02-08

Cyber Crime Is The World’s Third Largest Economy

Damage Totaling $8 Trillion Worldwide In 2023: If cybercrime were measured as a country it would be the 3rd largest economy.

2023-02-02

FBI Infiltrates Ransomware Group

The FBI infiltrated the notorious Hive ransomware group over seven months to block its attempts to extort funds from over a thousand victims.

2023-01-23

War In Ukraine Drives A Decline In Stolen Cards

Russia's failing invasion of Ukraine led to a 62% decrease in stolen payment card records, attributed to a crackdown on domestic cyber criminals.

2023-01-20

Europol Arrest Crypto Currency Fraud Gang

The fraud worked using advertisements posted on social media to lure victims to fake investment websites operated by cyber criminals.

2023-01-13

The FBI’s Advice On Ransomware

Part of the FBI's mission is to raise awareness about ransomware, using its global intelligence network to help victims respond and recover.

2023-01-09

Why We Should Worry About A War On Cybercrime

Critical Infrastructure: Cyber attacks are transitioning from being an issue of enterprise security to one of risk to public safety. By Will Dixon

2022-12-05

Ransomware Gang Makes $100 Million

Over 1,300 Organisations Extorted Since 2021: Education and healthcare institutions are among those targeted by the Hive ransomware group.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Maryville Online - Cybersecurity Program

Maryville Online - Cybersecurity Program

The Cybersecurity Program at Maryville Online is designed to help students reach opportunities in cybersecurity leadership and management through an entirely online curriculum.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

HexaTrust

HexaTrust

The HEXATRUST club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity, cloud confidence and digital trust.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.