NEWS > Cybersecurity News


« Back to News

2023-08-01

Who Practices Digital Safety Better, Mac Or Windows Users?

Microsoft Vs. Apple: Despite ever-evolving changes in the cyber security landscape, many people still hold outdated ideas about digital safety.

2023-07-13

A Perfect Storm For Cybercrime

Geopolitical Instability & Economic Uncertainty: Agility and flexibility are key, as threat actors are always evolving. By Fabien Rech

2023-07-14

A “Whole-of-Society" Approach To Cyber Crime

Active Cyber Defence: Britain's NCSC was notified of a suspicious email or website every five seconds in 2022 - that's 7.1m suspicious incidents.

2023-07-07

Discovered - High Risk Vulnerabilities Affecting A Leading Building Management System

Common Vulnerabilities & Exposures: An unintended vulnerability, built into the operating system, might allow attackers remote access.

2023-07-03

Thousands Of WordPress Sites Exposed 

Ultimate Member Plugin: Over 200,000 WordPress sites have a newly found security defect, leaving them dangerously exposed to hackers.

2023-06-29

Today’s CISO: How The Role Has Evolved

A Transformational Role: CISOs are integral to fundamental business decisions and are now entitled to a seat at the boardroom table. By Frank Kim

2023-06-28

Browser-Based Social Engineering Trends

Watchguard's latest report shows three of the four new malware threats originated in China and Russia with living-off-the-land attacks on the rise.

2023-06-26

Employees To Blame For 70% Of Corporate Data Breaches

The Remote Work Time Bomb: Organisations must rebuild a culture that ensures everyone has a security-first mindset, wherever they’re working.

2023-06-27

Canada Challenges Meta Over Access To News

Meta has announced it will shut down access to news on Facebook and Instagram in Canada in a dispute over payment to local sources.

2023-06-29

British Universities Vulnerable To Credentials Fraud

Two Million Breached Credentials: British universities are at high risk of cyber security breaches caused by attacks launched using stolen identities.

2023-08-07

Email Impersonation Attacks Reach All-Time High

Email impersonation comprises over 90% of threats observed in corporate inboxes and almost all of those are credentials-based theft attacks.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Association of Information Security Professionals (AISP)

Association of Information Security Professionals (AISP)

The Association of Information Security Professionals (AISP) represents the interests of information security professionals in Singapore.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

TR-CERT (USOM)

TR-CERT (USOM)

TR-CERT (Ulusal Siber Olaylara Müdahale Merkezi - USOM) is the national Computer Emergency Response Team of Turkey.

Sariya Information Technology

Sariya Information Technology

Sariya Co. Ltd. is a leading provider of value-added digital services and solutions, founded in 2002 in Saudi Arabia as a part of Al Kuhaimi Group.

DefensX

DefensX

DefensX turns your go-to browser into a secure digital workspace paired with robust Web Data Loss Protection and AI Data Protection.