NEWS > Cybersecurity News


« Back to News

2024-07-31

Semperis Ransomware Risk Report Highlights Alarming Trends

Board-level Engagement & Continuous Vigilance: Ransomware has a devastating impact and there is an urgent need for better cyber resilience.

2025-07-30

Unravelling Silk Typhoon’s Capabilities

China’s Cyber Web: Detailed analysis by SentineOne reveals the growing threat of state-backed cyber actors exploiting software vulnerabilities.

2025-07-30

A Guide To Taming Agentic AI Risks

Securing the Future: A detailed threat taxonomy identifying key vulnerabilities such as memory poisoning, tool misuse & cascading hallucination.

2025-08-01

Women's Dating App Hacked

Tea Dating Advice: An app enabling women to anonymously ask, or warn each other, about men they can do a background check on, has been hacked.

2025-08-02

President Trump's AI Action Plan

The US hopes to maintain its edge over China, with both superpowers investing heavily in AI to secure economic & military superiority.

2025-07-29

Persistent Threats & The Growing Role Of AI In Cloud Security

A dual dynamic - where AI empowers both attackers and defenders - demonstrates the urgency for organisations to adopt robust countermeasures.

2025-07-28

Chinese Cyberespionage Group Targeting Critical Infrastructure

Fire Ant: Advanced capabilities to infiltrate and conduct espionage campaigns, avoiding detection and multi-layered traditional security measures.

2025-07-28

VPN Demand Surges As British Online Safety Law Takes Effect

Law Enforces Age Verification: A 1,400% surge in VPN sign-ups, as users seek to bypass child protection restrictions, raises privacy concerns.

2025-07-23

Fancy Bears Get Busy

Best known for hacking US elections, spies from Russia's military intelligence agency, the GRU, are "running a campaign to destabilise Europe"

2025-07-22

The New Face Of Phishing

Hackers use OneNote to deliver embedded malware or credential‑stealing links, all concealed beneath an apparently legitimate appearance.

2025-07-22

Sophisticated Malware Targets US Accounting Firm

A novel crypter named “Ghost Crypt” was used to deliver PureRAT malware, using an advanced obfuscation and a technique called “Process Hypnosis.”

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.

Cyberr

Cyberr

We’re transforming cybersecurity recruitment with Cyberr Intelligence – the AI-driven platform that connects top cybersecurity talent, both freelance and permanent, with leading employers worldwide.