NEWS > Cybersecurity News


« Back to News

2025-03-03

British Healthcare Provider Investigating Ransom Claims

Medusa Ransomware: British healthcare provider suffered a suspected ransom attack involving theft of two terabytes of confidential data.

2025-03-03

Salt Typhoon Exploited Cisco Vulnerabilities

Salt Typhoon hackers gained access to core US telecoms infrastructure through Cisco devices, then used that infrastructure to extract information.

2025-03-04

Cyber Criminals Can Clone Branded Websites

Darcula PhaaS v3: New SAAS tools enable criminals to build advanced phishing kits that can target any branded website at the click of a button.

2025-02-25

Grok 3 - The Latest AI Reasoning Model

Grok 3 has a powerful AI agent called Deep Search, plus a pre-trained model capable of matching the performance of OpenAI's Chat GPT-4.

2025-02-25

A New Threat To Biometric Security

New Threats To Biometric Security: Advanced forms of synthetic identity are a critical challenge for both businesses & government. By Paul Magee

2025-02-23

Is This The Biggest Hack In History?

Hackers Steal $1.5bn In Cryptocurrency: Bybit, a crypto currency firm based in Dubai, says that hackers penetrated a single Ethereum account.

2025-02-23

Apple Removes Data Protection For Users In Britain

Encrypted Cloud Data: Apple will comply with a UK government order, where it will no longer be possible to activate Advanced Data Protection.

2025-02-23

Ransomware Trends & Top Six Predictions For 2025

Key Trends: Ransomware threats are expected to escalate in 2025, with cybercriminals adopting more sophisticated tactics to maximize their impact.

2025-02-21

AI Cracks A Long Term Scientific Mystery

Superbug Antibiotic Resistance: A Google AI tool has solved a scientific problem which has puzzled microbiologists for a decade in just 48 hours.

2025-02-19

British Agencies Target Russian Cyber Crime Network

A Russian cyber crime syndicate responsible for facilitating ransomware attacks around the world is the target of sanctions by UK law enforcement.

2025-02-18

TikTok Returns To US App Stores

President Trump allows TikTok back into Apple and Google App stores in the US, contradicting an earlier Supreme Court ruling to ban it.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

BUI

BUI

BUI is a global technology consultancy and Cloud Solution Provider specialising in cloud, security, and networking solutions for mid-market and enterprise-level business across the world.

Sourcepoint

Sourcepoint

Sourcepoint offers enterprise-grade privacy automation for complex, dynamic compliance challenges.