NEWS > Cybersecurity News


« Back to News

2024-05-20

Cyber Tensions & Capabilities In Asia

Governments across the Asia-Pacific region are racing to develop their cyber capabilities in order to ensure their future security and prosperity.

2024-05-17

The Ransomware Threat Landscape Is Diversifying

Ransomware & Digital Extortion: The frequency of attacks is going up, partly driven by smaller new threat groups becoming more active.

2024-05-16

The Global Corporate Digital Security Landscape

Suspicious Internal Activity: Attackers persistently seek to infiltrate organisations by abusing the trust inherent in vendor-client connections.

2024-05-07

The US Has A New Global Cyber Security Strategy

After years of escalating threats from China, Russia and cyber criminals, the US wants to build up international cyber security cooperation.

2024-05-07

British Military Personnel Data Hacked

Personal details of thousands of serving British soldiers, sailors and air force members have been exposed in a data breach at a payroll system.

2024-05-02

Attacks Against Cisco Firewall Platforms

Detected: A new targeted malware campaign exploiting zero-day flaws in Cisco networking gear to deliver custom malware and enable data theft.

2024-05-03

Germany Threatens Russia With 'Consequences' For 2023 Cyber Attack

The German government now has clear evidence that Russian state-sponsored hackers Fancy Bear made an “intolerable” attack in 2023.

2024-05-01

Volkswagen Hacked, Critical Data Stolen

Thousands of documents about research in engine & electric vehicle technology were exfiltrated, going undetected for at least five years.

2024-05-13

Defending Space Assets From Emerging Threats

Urgent challenges exist in securing space-based technologies against cyber threats and risks to critical infrastructure. By Sylvester Kaczmarek

2024-05-01

Russian Hackers Are A Global Threat

Sandworm: Mandiant report on widespread operations and exploits of sabotage & electoral interference serving Russian geopolitical interests.

2024-04-30

The NCSC Appoints A New Chief

Richard Horne has been appointed the new CEO of the British National Cyber Security Centre, joining the board of the GCHQ spy agency.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.

RedLattice

RedLattice

RedLattice are at the cutting edge of tool development and AI-assisted vulnerability research in cybersecurity.