NEWS > Cybersecurity News


« Back to News

2024-04-29

Facing The Quantum Challenge

The End Of Encryption: The potential of quantum computing is undeniable, but so is the threat it poses to our digital security. By Jason Soroko

2024-04-24

US Legislators Want TikTok's Chinese Owners To Divest 

Election Year: TikTok could be banned in the US over urgent concerns about user data& electoral influence if the Chinese owners don't sell their stake.

2024-04-23

EU Threatens TikTok Lite With Suspension

Money-for-Views: The European Union has demanded TikTok provide more information about a new app that pays users to watch videos.

2024-04-22

Phishing-as-a-Service Platform LabHost  Is Turned Over

One of the most popular phishing-as-a-service platforms has been smashed in a law enforcement operation coordinated by Europol.

2024-04-18

The Cyber Security Skills Gap Is A Chicken & Egg Problem

New Starter Jobs: Openings for experienced candidates outnumber those for entry level positions by a ratio of two to one. By Jamal Elmellas

2024-04-17

Iranian Hackers Targeted Israel’s Radar Systems

An Iranian hacking group named Handala has published a statement on social networks, claiming that they penetrated Israel's radar defences.

2024-04-24

Cyber Threats To British Elections

Election Year: British voters are facing a significant increase in nation-state hacking activities, fake news and disinformation in 2024.

2024-04-15

Iranian Hackers Attack US Water Supplies

The White House says recent attacks by Iranian hackers on US water infrastructure are a loud wake-up call to the water & utilities industries.

2024-04-22

British Businesses Must Do More To Protect Themselves

British businesses - especially small ones - are responding poorly to the challenge of preventing, detecting or responding to data breaches.

2024-04-17

Hackers Using YouTube To Deliver Malware

Malicious User Accounts: Data stealing malware is being delivered via YouTube disguised as pirated software and video game cracks.

2024-04-15

DoS Attacks That Can Crash Web Servers With Ease

HTTP/2 Continuation Flood: A new DoS attack method poses a severe threat by sending a sequence of CONTINUATION frames without END_HEADERS.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

National Cybersecurity Hub South Africa

National Cybersecurity Hub South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Aiuken Cybersecurity

Aiuken Cybersecurity

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

CyberSN

CyberSN

CyberSN matches cybersecurity professionals to jobs and removes the pain from job searching and hiring.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

NWN Corp

NWN Corp

NWN Corporation is a leading Cloud Communications Service Provider (CCSP) focused on transforming the customer and workspace experience for commercial, enterprise and public sector organizations.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

Quantropi

Quantropi

Quantropi is bound to be the standard for quantum-secure data communications – forever unbreakable, no matter what.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.