NEWS > Cybersecurity News


« Back to News

2025-06-30

Iranian Hackers Attack After US Air Strikes

Iranian hackers are reported to have hit US banks, defence contractors and oil industry companies after the US attacks on Iranian nuclear facilities.

2025-06-30

US Seeks To Ban 'Adversarial AI'

US legislators are proposing a law to block Chinese AI systems like DeepSeek over the perceived risks to national security & data privacy.

2025-06-27

Sixty One Million Verizon Records Found On Web Forum

Alleged Verizon Data Breach: The exposed data reportedly includes first and last names, gender, dates of birth and tax IDs.

2025-06-25

NATO Allies Pledge 1.5% Of GDP To Boost Cybersecurity & Protect Critical Infrastructure

Mounting geopolitical tension and the growing sophistication of cyber threats are driving a significant shift in how NATO defines defence expenditure.

2025-06-23

Ransomware Trends In May 2025

A Persistent Plague: 31% of attacked enterprises halt operations, 40% downsize staff, and 60% of SMEs close within six months.

2025-06-21

Israel-Iran Conflict Escalates With Surging Cyber Attacks & Disinformation

Cyberspace Remains A Key Battlefield: Patriotic hacktivists, online propagandists and opportunistic cybercriminals are piling in to the cyberwar.

2025-06-23

Pakistan’s Cyber Offensive: APT36 Targets Indian Defence

Transparent Tribe: A social engineering campaign exploiting ID credentials to deliver malicious payloads, infiltrate systems & gather intelligence.

2025-06-20

Three Million Records Exposed In Passion.io Data Breach

The exposure poses significant cyber risks, particularly for social engineering and phishing attacks, which account for 98% of cybercrimes.

2025-06-16

A British Initiative To Secure AI System Development

By addressing security at every stage, the proposed new standard helps avoid costly redesigns, protecting users and their data from harm.

2025-06-18

The Future For Internet Search Lies In AI

By enhancing search capabilities through advanced AI models, users can redefine how they interact with the Internet in their online search.

2025-06-18

Maritime Cyber Security Is Too Weak

Attackers don’t always go for the bridge - they go for the inbox. Protecting maritime assets requires a layered cyber security framework & training.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.

CyberRey

CyberRey

CyberRey is a leading distributor of comprehensive cybersecurity solutions, empowering organizations of all sizes to thrive in the digital age.

SGNL

SGNL

SGNL redefines identity-first security by integrating business context, closing critical gaps, and transforming how enterprises manage privileged access for a secure, adaptive future.