NEWS > Cybersecurity News


« Back to News

2024-05-15

XZ Utils: A Fable on Proactive Risk Management

The recent attack on the XZ compression tool shows how important it is for companies to manage risks in their open-source software. By Ilkka Turunen

2024-05-15

The Ransomware Arms Race

How Can Organisations Stay Ahead?: Seven cybersecurity experts give their insights into how organisations can tackle this relentless threat. 

2024-05-13

Cyber Attacks On The British Education Sector Trending

British education has been a prime target for years and recent data confirms that the sector is not keeping up with current attack techniques. 

2024-05-13

Dell Hacked - 49m Customers Exposed 

Menelik At Work: If you have been a Dell customer in the past seven years, it’s likely that your customer data is on the Dark Web now.

2024-05-13

Stolen NHS Data Published On The Dark Web

Extortion: More than 1TB of sensitive patient and staff data has been made available for download, with a threat to release a further 3TB.

2024-05-10

Mobile Gambling - Sportsbooks Face Growing Fraud

Risk & Return: Mobile betting App users face a growing threat from fraud and their operators should take steps to protect them. By Elie Shuggi

2024-05-10

LockBit Resurrection

LockBit’s official Dark Net website is reactivated by law enforcement as the Russian gang leader is identified as Dmitry Khoroshev.

2024-05-08

Securing Critical Infrastructure

Bridging the Gap In OT Cybersecurity Governance: NIS2 compliance is vital to improving critical infrastructure resilience. By Gareth Pritchard

2024-05-13

Notorious Cyber Criminal Sentenced

Ransom_Man: A notorious hacker has been jailed for blackmailing 33,000 psychotherapy patients after stealing their personal medical notes.

2024-05-08

Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers

A Silent Invisible War: Israel has been developing its defences against cyber attacks, to function like the Iron Dome against missile attacks.

2024-05-08

Microsoft Reforms ‘Weak’ Cyber Security Strategy

Do Security: Microsoft's reputation for security is suffering after criticism of the company’s weak cyber practices and lax corporate culture.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Samsung Knox

Samsung Knox

Samsung Knox brings multi-layered defence-grade security to your business’s smartphones and tablets.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Flatt Security

Flatt Security

Flatt Security is a cyber security startup based in Japan providing security assessments and other cyber security services.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

UNS Inc.

UNS Inc.

UNS is a top services partner for multiple leaders in the global cybersecurity industry – we do business in 40 countries, including the United States, Canada, Chile, and Colombia.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.