NEWS > Cybersecurity News


« Back to News

2022-03-07

Mark Zuckerberg's Vision: How AI Will Unlock The Metaverse

The metaverse, a futuristic idea of virtual environments where users can work, socialise and play, will ultimately replace the mobile Internet.

2022-03-07

Update: The Online War In Ukraine

As events in Ukraine move quickly, it has become clear that this is the first armed conflict to use the Internet as an alternative front-line.

2022-03-04

Ukraine Targeted With Ghostwriter Phishing Campaign

An intense phishing campaign on Ukraine is linked to a Belarussian hacking group known to have attacked Poland and other EU member nations.

2022-03-02

Extortion: Most British Firms Pay The Ransom

British companies are the most likely to pay cyber criminals, with over 80% of businesses paying ransomware demands, twice the global average.

2022-03-01

E-Commerce Site Exposed Children Worldwide

A cloud data store was left accessible without authentication controls in place, exposing the sensitive data of hundreds of thousands of customers.

2022-03-01

Toyota Shut Down Japanese Plants In A Supply Chain Attack

Toyota's car manufacturing operations shutdown by “system failures at a domestic supplier” resulting from a targeted supply chain attack.

2022-03-03

British Schools At Risk Of Cyber Attacks

Three quarters of Head Teachers believe their school faces an increased risk of being exposed to a cyber incident because of remote learning.

2022-02-25

CYRIN Enters A Strategic Alliance With Cyber Ireland

The company behind CYRIN Cyber Range and Munster Technological University have agreed a strategic partnership for workforce training in Ireland.

2022-01-26

Online Daters Must Protect Themselves Against Fraud

Looking For Love: Online Dating has caused heartbreak for many, with over £90 million stolen through fraud and deception last year.

2022-01-25

Making Open-Source Software Safer

Open-source software has unique security challenges, because of its widespread use and the fact its security maintenance is reliant on volunteers.

2022-01-24

SAAS Malware Used To Attack Crypto Wallets

Cheap and easy-to-use malware available on Dark Web markets means that it has never been easier for cyber criminals to steal crypto currencies.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

TempoCap

TempoCap

TempoCap is a European growth-stage technology fund with offices in London and Berlin. We invest across a variety of high- growth sectors including cybersecurity.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.