GOVERNMENT > Law Enforcement


« Back to News

2022-08-23

BlackByte Ransomware Group Have An Update

Version 2.0: Blackbyte are back with advanced new extortion techniques that include a data leak website modelled on Lockbit.

2022-08-23

Technology To Combat Human Trafficking

AI, Facial Recognition & Blockchain: There are a growing number of ways in which technology can be applied to combat human trafficking.

2022-08-16

Why You Must Report A Cyber Attack

Once you’ve suffered a cyber attack, most of the damage has been done. But ignoring your regulatory obligations will only make things worse.

2022-08-15

$3 Million Romance Fraudster Arrested

#YourAccountYourCrime: Police make a high profile arrest as Interpol launches a new campaign warning of the dangers of romance scams.

2022-08-09

US Federal Court Court IT Systems Breached

Hackers and other criminals may have had access to documents across the US Court Electronic Records and Case Management systems.

2022-08-01

Over One Hundred Arrests In Business Email Compromise Swoop

Members of the criminal group included computer experts, who created the phishing domains and carried out a sophisticated email fraud.

2022-07-25

FBI Issues A Warning To Users Of Crypto Currency Apps

The FBI has released an advisory warning crypto currency investors and firms to be wary of fraudulent apps that aim to steal money from victims. 

2022-07-12

Chainalysis Crypto Theft Hotline

Crypto Incident Response: The service is for victims of a hack or ransomware attack in which crypto currency is either demanded or stolen.

2022-06-20

British Defence Ministry Gets A Quantum Computer

The British government has got its first quantum computer to process complex calculations at high speed, focused on military applications.

2022-06-24

Preventing Exploitation Of Digital Images Of Children

Digital Fingerprints: Online mages of child sexual abuse are a daunting challenge for practitioners working in the field of child sexual abuse.

2022-06-23

For Sale: Academic Credentials

The FBI is warning universities & colleges that illegally obtained user accounts & other credentials are available for sale on the Dark Web. 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

Deepwatch

Deepwatch

deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

Ascent Cyber

Ascent Cyber

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.