NEWS > Cybersecurity News


« Back to News

2022-03-10

A Cyber Attack On NATO Could Trigger Article 5

In the era of 'hybrid warfare' will NATO respond to a cyber attack on a member state in the same way as it would to an armed miiltary attack?

2022-03-08

Microsoft Exchange Exploited By ‘Cuba’

The Cuba ransomware gang target vulnerabilities on public-facing Microsoft Exchange software to detect susceptible networks.

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2022-03-08

Russia Threatens To Block Wikipedia

Don't Mention Ukraine: The national media regulator, Roskomnadzor, says that if editors don't comply, it will block all of Wikipedia from Russia

2022-03-08

Phishers Are Moving In On LinkedIn

Criminals are using LinkedIn to steal your data. If you get sent a link to LinkedIn.com via email, SMS/text or instant message, don't click on it.

2022-03-07

Mark Zuckerberg's Vision: How AI Will Unlock The Metaverse

The metaverse, a futuristic idea of virtual environments where users can work, socialise and play, will ultimately replace the mobile Internet.

2022-03-07

Update: The Online War In Ukraine

As events in Ukraine move quickly, it has become clear that this is the first armed conflict to use the Internet as an alternative front-line.

2022-03-04

Ukraine Targeted With Ghostwriter Phishing Campaign

An intense phishing campaign on Ukraine is linked to a Belarussian hacking group known to have attacked Poland and other EU member nations.

2022-03-02

Extortion: Most British Firms Pay The Ransom

British companies are the most likely to pay cyber criminals, with over 80% of businesses paying ransomware demands, twice the global average.

2022-03-01

E-Commerce Site Exposed Children Worldwide

A cloud data store was left accessible without authentication controls in place, exposing the sensitive data of hundreds of thousands of customers.

2022-03-01

Toyota Shut Down Japanese Plants In A Supply Chain Attack

Toyota's car manufacturing operations shutdown by “system failures at a domestic supplier” resulting from a targeted supply chain attack.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SecPoint

SecPoint

SecPoint provides products to secure & protect your network from remote and local attacks.

Materna Radar Cyber Security

Materna Radar Cyber Security

Radar Cyber Security is the only European supplier of Managed Detection & Response who provides its services based on inhouse developed technology.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Applied Security (APSEC)

Applied Security (APSEC)

APSEC provides products and services in the areas of encryption, digital signature, authentication and data loss prevention.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Sectra Communications

Sectra Communications

Sectra successfully develops and sells cutting-edge solutions in the expanding niche segments of medical IT and cybersecurity.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.