GOVERNMENT > Law Enforcement


« Back to News

2021-07-30

Twitter Celebrity Hack Suspect Arrested

Hackers took control of public figures' accounts to send a series of tweets asking followers to transfer crypto currency to a specific Bitcoin wallet.

2021-07-19

Ransomware Gang REvil Is Cancelled

The strange disappearance of the public-facing websites affiliated with Russia-linked REvil follows shortly after a string of big ransomware incidents.

2021-07-14

British Police Double Down On CyberAlarm

A free police-led monitoring tool helps business users understand malicious online activity and improve their security and cyber resilience.

2021-06-29

2021 - Inside The Dark Web

A short guide on how you can access those hidden sectors of the internet that provide users the anonymity to explore a range of criminal options.

2021-06-28

Cyber Police Crack Hacker Group

Ukraine's Cyber Police have exposed a ransomware group responsible for a string of attacks and the extortion and theft of $500 million.

2021-06-23

Global Police Operation Closes Fake Pharma Websites

A global policing operation has led to the closure of over 100,000 websites and online marketplaces selling fake pharmaceuticals worth over $23m.

2021-06-23

Negotiating Ransom: To Pay Or Not?

Factors to consider when responding to a ransom demand include the readiness of your backup network & data, insurance and customer reaction.

2021-06-16

Why Is It So Difficult To Convict Cyber Criminals?

Law enforcement agencies often fail to bring cyber criminals to justice and even when suspects are caught, it is rare for them to be convicted.

2021-06-14

FBI Recover Ransom Paid To Pipeline Hackers

The FBI has recovered most of the $4.4 million ransom payment made to Russian hackers after a cyber attack on the largest fuel pipeline in the US.

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

2021-06-07

Fake Finance Apps Focus On Theft

Fake banking, trading and crypto-currency apps are being used by criminals to steal money and financial information from unsuspecting users.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Synopsys

Synopsys

Synopsys is a global leader in electronic design automation and semiconductor IP and is growing its leadership in software quality and security solutions.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Swiss CyberSecurity

Swiss CyberSecurity

Swiss CyberSecurity is a non-profit group based in Geneva, set up to provide information and as a forum for discussion of topics related to CyberSecurity.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.