NEWS > Cybersecurity News


« Back to News

2025-07-30

Unravelling Silk Typhoon’s Capabilities

China’s Cyber Web: Detailed analysis by SentineOne reveals the growing threat of state-backed cyber actors exploiting software vulnerabilities.

2025-07-30

A Guide To Taming Agentic AI Risks

Securing the Future: A detailed threat taxonomy identifying key vulnerabilities such as memory poisoning, tool misuse & cascading hallucination.

2025-08-01

Women's Dating App Hacked

Tea Dating Advice: An app enabling women to anonymously ask, or warn each other, about men they can do a background check on, has been hacked.

2025-08-02

President Trump's AI Action Plan

The US hopes to maintain its edge over China, with both superpowers investing heavily in AI to secure economic & military superiority.

2025-07-29

Persistent Threats & The Growing Role Of AI In Cloud Security

A dual dynamic - where AI empowers both attackers and defenders - demonstrates the urgency for organisations to adopt robust countermeasures.

2025-07-28

Chinese Cyberespionage Group Targeting Critical Infrastructure

Fire Ant: Advanced capabilities to infiltrate and conduct espionage campaigns, avoiding detection and multi-layered traditional security measures.

2025-07-28

VPN Demand Surges As British Online Safety Law Takes Effect

Law Enforces Age Verification: A 1,400% surge in VPN sign-ups, as users seek to bypass child protection restrictions, raises privacy concerns.

2025-07-23

Fancy Bears Get Busy

Best known for hacking US elections, spies from Russia's military intelligence agency, the GRU, are "running a campaign to destabilise Europe"

2025-07-22

The New Face Of Phishing

Hackers use OneNote to deliver embedded malware or credential‑stealing links, all concealed beneath an apparently legitimate appearance.

2025-07-22

Sophisticated Malware Targets US Accounting Firm

A novel crypter named “Ghost Crypt” was used to deliver PureRAT malware, using an advanced obfuscation and a technique called “Process Hypnosis.”

2025-07-30

Checking Emails On Holiday Puts You At Risk

Holidays Are Coming: British tourists are risking exposure to cyber threats by accessing work emails outside a secure workplace environment.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company providing cyber security services tailored to meet the evolving needs of organizations worldwide.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Cyborg Security

Cyborg Security

Cyborg Security is a team of threat hunters, threat intelligence analysts, and security researchers from across North America.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.