NEWS > Cybersecurity News


« Back to News

2024-04-24

US Legislators Want TikTok's Chinese Owners To Divest 

Election Year: TikTok could be banned in the US over urgent concerns about user data& electoral influence if the Chinese owners don't sell their stake.

2024-04-23

EU Threatens TikTok Lite With Suspension

Money-for-Views: The European Union has demanded TikTok provide more information about a new app that pays users to watch videos.

2024-04-22

Phishing-as-a-Service Platform LabHost  Is Turned Over

One of the most popular phishing-as-a-service platforms has been smashed in a law enforcement operation coordinated by Europol.

2024-04-18

The Cyber Security Skills Gap Is A Chicken & Egg Problem

New Starter Jobs: Openings for experienced candidates outnumber those for entry level positions by a ratio of two to one. By Jamal Elmellas

2024-04-17

Iranian Hackers Targeted Israel’s Radar Systems

An Iranian hacking group named Handala has published a statement on social networks, claiming that they penetrated Israel's radar defences.

2024-04-22

Cyber Threats To British Elections

Election Year: British voters are facing a significant increase in nation-state hacking activities, fake news and disinformation in 2024.

2024-04-15

Iranian Hackers Attack US Water Supplies

The White House says recent attacks by Iranian hackers on US water infrastructure are a loud wake-up call to the water & utilities industries.

2024-04-22

British Businesses Must Do More To Protect Themselves

British businesses - especially small ones - are responding poorly to the challenge of preventing, detecting or responding to data breaches.

2024-04-17

Hackers Using YouTube To Deliver Malware

Malicious User Accounts: Data stealing malware is being delivered via YouTube disguised as pirated software and video game cracks.

2024-04-15

DoS Attacks That Can Crash Web Servers With Ease

HTTP/2 Continuation Flood: A new DoS attack method poses a severe threat by sending a sequence of CONTINUATION frames without END_HEADERS.

2024-04-11

City Of Leicester Council Attacked

Britain's Leicester City Council has suffered a sophisticated attack by a known ransomware group after evidence was posted on the Dark Web.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

EasyDMARC

EasyDMARC

EasyDMARC deliver the most comprehensive product for anyone who strives to build the most secure possible defence system for their email ecosystem.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.