NEWS > Cybersecurity News


« Back to News

2024-08-28

Hacker Kills Himself

Hacker Fakes His Death To Avoid Child Support: He became officially registered as a deceased person in many government databases.

2024-08-28

US Proposes New Cyber Security Standards For Aviation

Aircraft are increasingly designed to be connected to both internal & external data networks, rendering them more vulnerable to cyber threats.

2024-08-28

California's Controversial AI Bill Will Soon Be Law

California’s AI Act is important as it will set the precedent for state guidelines across the US, laying down rules for developers working on GenAI.

2024-08-27

RansomHub Have A Tool That Neutralises EDR

Endpoint Detection & Response Threat: Organisations are recommended to enable extra tamper protection on their endpoint security defences.

2024-08-27

Telegram Messaging Platform Founder Arrested

Billionaire CEO Pavel Durov is under arrest in France on multiple charges of fraud, drug trafficking & organized crime being carried out on Telegram.

2024-08-27

China & Russia In Technology Collaboration

Western sanctions have directly affected Russia’s technology supply chain, forcing it find critical technology like computer chips elsewhere.

2024-08-24

Chinese Attacks On Russian Government Agencies 

CloudSorcerer: Someone is attacking Russian government and infrastructure using a sophisticated tool associated with Chinese hackers.

2024-08-23

WhatsApp Is A Vehicle For Illegal Content

Encrypted Child Sexual Abuse Imagery: A conflict between the need for enforceable child protection measures and rights to user privacy.

2024-08-22

Threat Intelligence: Most Prevalent Malware Rankings

The Usual Suspects: The top Malware families, exploited Vulnerabilities, mobile Malwares, Ransomware groups and attacked industry sectors.

2024-08-20

APT42: Iranian Hackers At Work

State-sponsored hackers from Iran are busy ramping up targeted phishing campaigns and fake news operations to undermine the US elections.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.