NEWS > Cybersecurity News


« Back to News

2024-06-27

Malware Targeting Smart TVs

Pandoraspear malware, which targets smart TVs running an open-source Android OS, has jumped into the top 10 most widely detected malware list.

2024-06-28

Music Rights Owners Want Payment From AI Platforms

The music industry is joining a growing number of claims by authors & news organisations disputing the right of AI firms to use their work.

2024-06-27

The Rising Threat Of Deepfakes

Exploring The Security Challenges & Opportunities Of AI: Realistic deepfake images, audio, & video, are a growing threat. By Sam Peters

2024-06-26

LockBit Claims It Hacked The US Federal Reserve

LockBit claims to have stolen 33 terabytes of confidential data from the US Federal Reserve, but security researchers are expressing doubt.

2024-06-26

Hacker, Spy, Or Journalist?

The enigmatic founder of Wikileaks, Julian Assange, returns to Australia a free man after pleading guilty to only one US charge of espionage.

2024-06-25

Hackers Use Windows Backdoor To Deliver BadSpace

Fake Browser Update: A multi-stage attack chain involving an infected website, a command-and-control server, and a JScript downloader.

2024-06-25

Cyber Security Staff Burnout Costs Firms $600m A Year

Work-related stress, fatigue, illness and burnout are making cybersecurity professionals less productive, costing $millions.

2024-06-25

AI & Cloud Are At The Intersection Of Cyber Security

Check Point’s 2024 Cloud Security Report: Cloud threats are growing with increasing concerns over emerging risks & zero-day attacks.

2024-06-24

Large - Scale Supply Chain Hack On Auto Industry

Hackers who disabled the software systems of a company that provides services to thousands of US car dealerships are demanding ransom.

2024-06-24

US Blocks Leading Cybersecurity Firm Kaspersky

Three Month Deadline: Kaspersky will no longer be able to sell it’s software or provide updates to software already in use by US customers.

2024-06-24

Facebook Phishing Emails Are Targeting Businesses

Be Aware: Fraudsters are increasingly inventive in finding ways to trick people into giving away their money & sensitive personal information. 

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

Carbide

Carbide

Carbide (formerly Securicy) breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

MassMutual Ventures

MassMutual Ventures

Mass Mutual ventures backs companies building category-defining businesses in markets including enterprise software, digital health, cybersecurity, and fintech.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

CyberE71

CyberE71

CyberE71 is an ambitious initiative serving as an umbrella for the UAE’s cybersecurity innovation ecosystem.

Cyber Overwatch

Cyber Overwatch

Cyber Overwatch holds your hand, giving you the tools to detect threats, monitor your cyber footprint, and secure your organisation, before attackers strike.