NEWS > Cybersecurity News


« Back to News

2025-03-25

23andMe Goes Bankrupt Following Disastrous Data Breach

Millions of people will find that their DNA data has been put up for sale, as the human genetics company enters Chapter 11 administration.

2025-03-25

Ukraine Railway Systems Attacked By Russian Hackers

A systematic, complex, and multi-level attack has taken down the national railway's online portal, rendering the sale of tickets online impossible.

2025-03-24

Hidden Risks In The The Global Supply Chain

Even the most security-conscious companies are vulnerable to weaknesses in their supply chain. They must work harder to close security gaps.

2025-03-24

Britain Plans To Use  AI To Run Public Services

Making Artificial Intelligence Work For The People: The British government aims to harness AI technology and drive public sector efficiency.

2025-03-24

Cybercrime Exploits Slave Labour

Victims are forced to manage fake Facebook profiles of women and post comments designed to lure wealthy individuals into fraudulent payments.

2025-03-24

Britain's Cyber Security Industry Is Growing

The UK cyber security sector is a strong growth market, generating £13bn in revenue in 2024 and employing 67,000 people across the country.

2025-03-14

Patented Technology For Secure Banking

Global Collaborations Engine: Lloyds Banking Group has received a patent for its cyber security technology tool, designed to remove false positives.

2025-03-18

Amazon Launches A Quantum Semiconductor Chip

Cat Qubits: Named Ocelot, the chip aims to deal with one of the major problems for quantum computer development - to make them error free.

2025-03-18

Guidance Is Coming, But Hackers Aren’t Waiting

Supply Chain Risks: Indirect access points through suppliers are an attractive vector for cybercriminals and it needs a solution. By Ed Bartlett

2025-03-17

Medusa Ransomware Attacks Focus On Critical Infrastructure

Double Extortion: Even if the victim organisation can recover their encrypted files, they still face the threat of their sensitive data being leaked.

2025-03-17

What Apple's Standoff With The UK Government Means For Your Data

Privacy On The Line: Creating a lawful mechanism for backdoor access means creating risks for everyone else. By Paul Holland

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Commonwealth Cybercrime Initiative (CCI)

Commonwealth Cybercrime Initiative (CCI)

The CCI unites 35 international organisations contributing to multidisciplinary programmes in Commonwealth countries. These organisations form the CCI Consortium.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.

Harmonia Holdings Group

Harmonia Holdings Group

Harmonia Holdings Group was born in 2006 with the vision to bring innovation and change to the federal IT sector.

Acuvity

Acuvity

Acuvity is the most comprehensive AI security and governance platform for your employees and applications. Secure your GenAI adoption with confidence.

Maltiverse

Maltiverse

Maltiverse is a threat intelligence platform that provides security teams with high-fidelity threat data and malicious IOCs to enhance detection and response.