GOVERNMENT > Law Enforcement


« Back to News

2021-10-29

Police Arrest 150 Suspects In Dark Web Operation

Europol's Operation DarkHunTOR has made many arrests and recovered millions of euros in cash and Bitcoin, as well as drugs and guns.

2021-10-27

CISA, FBI & NSA Issue Ransomware Warning Alert

US federal agencies urge organisations to implement immediate actions outlined in the joint advisory to defend against Conti ransomware.

2021-10-26

GCHQ Boss Says Ransomware Attacks Have Doubled In A Year

Ransomware attacks have become increasingly popular with cyber criminal as they are “largely uncontested” and highly profitable.

2021-10-15

British Police IT Systems Cannot Cope With Cyber Crime

Barely 3% of cyber crimes come to the attention of Britain's police forces, whose computer & IT systems are often old and obsolete.

2021-10-15

Ukraine Police Arrest Botnet Attack Controller

Arrested: A suspected botnet operator responsible for controlling an automated network of 100,000 compromised machines to launch DDoS attacks. 

2021-10-11

Britain's COVID - Driven Online Crime Wave

A recent survey reveals over 15 million (29%) of Britons feel unsafe online and 21% report they have been a victim of online identity theft.

2021-10-06

Ransomware Is The Number One Threat

Over one-third of organisations worldwide have experienced a ransomware attack targeting access to systems or data in the previous 12 months

2021-10-04

Students Warned Of Tax Refund Frauds

In the past year almost one million people reported fraud attempts to HMRC and over 900,000 students with part time jobs could be at risk.

2021-09-30

Treason: Top Cyber Security Executive Arrested

The CEO of top Russian cyber security company Group IB, has been arrested on suspicion of state treason, punishable by up to 20 years in jail.

2021-09-28

Europol Breaks Open Mafia Cyber Crime Group

The Mafia group were using hackers specialised in latest-generation phishing and in the use of social-engineering techniques to steal $12million.

2021-09-28

Telegram Is Where Cyber Criminals Do Business

A rapidly growing network of criminals are using the encrypted messaging app Telegram to buy, sell and share stolen data and hacking tools.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Chatham House Cyber Conference

Chatham House Cyber Conference

14 June 2023 - Connect with cyber security experts and senior policymakers to explore the role of cyber security in the global economy and how to deliver an open and secure internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

Netgear

Netgear

Netgear provide networking, storage and security solutions including Backup & Disaster Recovery and secure BYOD connectivity.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.