GOVERNMENT > Law Enforcement


« Back to News

2022-07-12

Chainalysis Crypto Theft Hotline

Crypto Incident Response: The service is for victims of a hack or ransomware attack in which crypto currency is either demanded or stolen.

2022-06-20

British Defence Ministry Gets A Quantum Computer

The British government has got its first quantum computer to process complex calculations at high speed, focused on military applications.

2022-06-24

Preventing Exploitation Of Digital Images Of Children

Digital Fingerprints: Online mages of child sexual abuse are a daunting challenge for practitioners working in the field of child sexual abuse.

2022-06-23

For Sale: Academic Credentials

The FBI is warning universities & colleges that illegally obtained user accounts & other credentials are available for sale on the Dark Web. 

2022-06-22

REvil Have Returned - Or Have They?

Criminals claiming to be from the extinct ransomware gang are targeting Akamai customers with a DDoS attack, demanding Bitcoin.

2022-06-01

Major League Cyber Criminal Arrested

A multi-agency operation marks a big step forward in internationally coordinated efforts to address the increasingly global nature of cyber crime.

2022-05-30

Can A Cybercrime Convention For All Be Achieved?

International Rules: A new UN cybercrime treaty process is raising strong awareness about one of the biggest global challenges. By Joyce Hakmeh

2022-05-28

Fraud Online & On The Telephone

Courier Fraud: Criminals passing off as a bank, police officer or ISP are targeting vulnerable women to steal their cash and valuables.

2022-05-24

Vishing Attacks Reach All Time High

Vishing (voice phishing) cases have increased almost 550 percent over the last twelve months with hundreds of thousands of cases detected.

2022-05-16

Investment Scams Are Increasing

Britain's financial regulator is warning people to beware of fake financial advisers offering investment schemes via online meeting platforms.

2022-05-03

Lapsus$ Hackers Targeted T-Mobile

Teenage Rampage: The Lapsus$ hacking group got acces to T-Mobile’s source code using stolen credentials, before their final arrest.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

sic[!]sec

sic[!]sec

sic[!]sec provide products and services for web application security.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.