GOVERNMENT > Law Enforcement


« Back to News

2024-04-22

Phishing-as-a-Service Platform LabHost  Is Turned Over

One of the most popular phishing-as-a-service platforms has been smashed in a law enforcement operation coordinated by Europol.

2024-03-28

Beware Of Online Fraud When Booking Your Summer Holiday

April is a key time of year for the travel industry as consumers start to make summer holiday plans. This also provides fraudsters an opportunity.

2024-03-08

$15m Bounty To Identify LockBit Bosses

A huge reward is being offered for information leading to the identification or location of any of the leaders of the LockBit ransomware gang.

2024-04-15

British Police Are Innovating With Data Analytics

Insights That Lead To Actionable Decisions: Data analytics is playing an increasingly prominent role in police forces around the world.

2024-03-12

Wireless Security In Smart Homes Is Vulnerable

Home security devices that connect directly to a domestic WiFi network or a smart home hub can be jammed, rendering remote alarms useless.

2024-02-23

A European Cybercrime Breakthrough Is Only Half The Battle

The First Rule Of Cybercrime Is That No One Goes To Prison: Cybercrime is global in nature but criminal laws are intensely local. By Emily Taylor

2024-02-21

Lockbit's Website Taken Down By Law Enforcement

Update: Lockbit provided ransomware-as-a-service to a global network of hackers, supplying the tools needed to carry out attacks.

2024-02-16

British Police, AI & The Fight Against Cyber Crime 

The fraud and cybercrime landscape is going to be profoundly transformed by AI. A top British Police officer answers some key questions.

2024-01-08

Abduction & Extortion Goes Online

Cyber Kidnapping: Criminals coerce a victim to stage their own kidnapping and film it, providing blackmail material against their own families.

2023-12-18

Online Fraud Is Driven By Human Trafficking

Billion Dollar Criminal Exploits: Victims are lured through fake job ads and forced to commit online financial crimes on an industrial scale.

2023-11-15

The Dark Web Encompasses Both Criminal & Legal Activities

The term Dark Web sounds ominous and it is that part of the Internet comprising websites you can't access through the usual web browsers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

Nineteen Group

Nineteen Group

Nineteen Group delivers major-scale exhibitions within the security, fire, emergency services, health and safety, facilities management and maintenance engineering sectors.

SoftwareONE

SoftwareONE

SoftwareONE is a leading global provider of end-to-end software and cloud technology solutions.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.