GOVERNMENT > National


« Back to News

2020-07-08

Online Shoppers Have Lost Over £16m To Lockdown Fraud

Action Fraud say over 16,000 people were victims of online fraud since the beginning of lockdown, with young people the most at risk.

2020-07-07

Who Actually Did Leak CIA Cyber Weapons Data?

The largest known data theft in CIA history occurred because an employee took advantage of weak security. And It wasn't Edward Snowden.

2020-07-07

Coronvirus Phishing Campaign Targets Six Nations

N. Korea has instructed the hacker group, Lazarus, to mount a targeted international phishing campaign to steal crypto-currency.

2020-07-20

Hackers Targeting Turkey & Syria With Spyware

Watering hole attacks against the Kurdish community in Syria and Turkey for intelligence exfiltration purposes are using new tools & tactics.

2020-07-15

Australia To Spend Another A$1billion On Cyber Security

Australia has announced a massive cyber security investment to combat a wave of 'unattributable' and damaging cyber-attacks. Whos' next?

2020-07-14

Fake News & Democracy In The Philippines

Legitimate news organisations are struggling to adapt to rapid technological change and tough economic circumstances in the Fake News era.

2020-07-06

Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

A cyber attack is thought to have caused a fire at Iran's Natanz nuclear enrichment facility, after a failed attempt to poison Israel's water supply.

2020-07-03

Hong Kongers Erase Their Digital Footprints

Hong Kong residents hurry to alter their digital footprints or remove their presence entirely from social media to escape new Chinese security law.

2020-06-29

China Launches A Wave Of Attacks On India

A surge in incidents of hacking, injecting malware through spam mails, DDoS and other exploitation of vulnerabilities against websites across India.

2020-06-25

First Winners Of £10m British Cyber Security Fund

Universities in Glasgow and Birmingham will share a £10million investment fund aimed at reducing errors and security flaws targeted by hackers.

2020-06-24

Australia Assaulted By Severe State-Backed Cyber Attacks

Australia has not directly accused China and yet the scale, nature of the targeting and the signature methods used all point one direction.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Encore Media Group

Encore Media Group

Encore Media Group provide an international enterprise technology event series exploring IoT, Blockchain AI, Big Data, 5G, Cyber Security and Cloud.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

BlackSignal Technologies

BlackSignal Technologies

BlackSignal Technologies provides cybersecurity, digital signal processing and electronic warfare products to help DOD and IC agency customers counter near-peer threats and security challenges.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.

DuploCloud

DuploCloud

DuploCloud offers an end-to-end DevOps software platform for dev teams that don’t have dedicated DevOps engineers and augments those that do.