NEWS > Cybersecurity News


« Back to News

2024-02-27

Deepfake 'Face Swap' Attacks Trending

Deepfake attacks using misleading “face swap” technology, with the aim to bypass remote identity verification, have increased sevenfold in 2023.

2024-02-23

British Library Still In Recovery

The British Library is using 'work around arrangements' to make critical payments to authors as it struggles to recover from a ransom attack.

2024-02-20

Malicious Microsoft Cloud Account Takeover Campaign

Cyber Criminals Follow Businesses Into The Cloud: Basic corporate account credentials are a lucrative potential source of money & further exploits.

2024-02-09

Facebook Changed the World

Global Social Impact: By monetising its users' personal data, Facebook proved that collecting our likes and dislikes is extremely lucrative.

2024-02-12

Static Application Security Testing: Trends & Predictions For 2024

SAST: Finding security vulnerabilities in source code early in the development lifecycle, makes it easier and cheaper to fix any issues.

2024-02-09

Chinese Hacking Campaign Targets US Critical Infrastructure

Widespread Offensive Cyber Operations: Chinese hackers are implanting malware to disrupt daily life, were the US and China ever to go to war.

2024-02-09

Bolstering Resilience In The Age Of Expanding Threats

Prioritization: Amid the exponential rise in vulnerabilities the era of addressing every single vulnerability has become obsolete. By Howard Goodman

2024-02-05

Military Service Is An Ideal Background For A Cybersecurity Career

Addressing The Cybersecurity Talent Shortfall: Recruiters can tap into the rich diversity of skills offered by Armed Forces veterans. By Chip Daniels

2024-02-05

On Trend - Hybrid Cloud Strategies

Cloud Repatriation: Many IT leaders are returning their network systems to on-premises infrastructure, due to unexpected security & cost issues.

2024-01-31

Lush Employee Data Stolen

Passport Scans: The Akira ransom gang claims to have stolen 110 GB of critical employee data from the international cosmetics business.

2024-01-30

AI Adoption: The Overlooked Existential Risk

Despite many fears, Generative A is being safely deployed across many sectors and will drive enormous long term value. By Adrian Joseph

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.