NEWS > Cybersecurity News


« Back to News

2022-08-03

Publicly Reported Ransomware Incidents Are Just The Tip Of An Iceberg

ENISA 2022 Threat Landscape Report: Ransomware is one of the most devastating types of cyber attacks, yet is going widely unreported.

2022-08-02

Google Chrome Extension Used To Steal Emails

SHARPEXT: A N. Korean threat group is using a malicious browser extension to steal emails from Google Chrome users while they read their webmail.

2022-07-26

Magecart Attacks Hit Hundreds Of US Restaurants

50,000 Payment Cards Compromised: Online ordering platforms have become a high-value target for criminals using Magecart e-skimmer attacks.

2022-07-25

FBI Issues A Warning To Users Of Crypto Currency Apps

The FBI has released an advisory warning crypto currency investors and firms to be wary of fraudulent apps that aim to steal money from victims. 

2022-07-20

Two Million Extortion Emails Blocked Every Day

Researchers are warning of a proliferation of extortion emails, reporting that these typically have a sexual theme and demand payment in Bitcoin.

2022-07-20

A New Era of Ransomware

Governments can learn from recent attacks in Costa Rica how they can protect themselves from future ransomware threats. By Deryck Mitchelson

2022-07-12

Elon Musk Isn't Buying Twitter

Musk says he wants to back out of the $44B deal because Twitter has failed to provide enough information about fake & spam accounts. 

2022-07-06

Quantum Sensors Have Arrived

Ultra-precise time-keeping is the most important quantum-sensing achievement to date, adding precision to all other forms of sensing. 

2022-07-06

Global Government Spending On IT To Grow 5%

Global government IT spending is forecast to be $565.7 billion in 2022, an increase of 5% from 2021, and cloud solutions will take a bigger share.

2022-07-11

CISA Detects Many New Cyber Security Vulnerabilities

CISA has detected 36 new vulnerabilities in frequent use by cyber criminals as attack vectors posing significant risks to government & business.

2022-07-08

Future Phishing Attacks Will Use Generative Machine Learning

Phishing attacks will get more sophisticated as criminals turn to Machine Learning techniques that can analyse datasets & generate attack vectors.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

NTIC Cyber Center - USA

NTIC Cyber Center - USA

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

Teal

Teal

Teal provides exceptional managed IT solutions for small- to medium-sized organizations that value real partnerships and elevated security.