NEWS > Cybersecurity News


« Back to News

2025-07-02

Qantas Falls Victim As Scattered Spider Targets Aviation

A third-party customer service platform was breached, exposing names, email addresses, phone numbers, dates of birth, and Frequent Flyer numbers.

2025-06-30

Iranian Hackers Attack After US Air Strikes

Iranian hackers are reported to have hit US banks, defence contractors and oil industry companies after the US attacks on its nuclear facilities.

2025-06-30

US Seeks To Ban 'Adversarial AI'

US legislators are proposing a law to block Chinese AI systems like DeepSeek over the perceived risks to national security & data privacy.

2025-06-27

Sixty One Million Verizon Records Found On Web Forum

Alleged Verizon Data Breach: The exposed data reportedly includes first and last names, gender, dates of birth and tax IDs.

2025-06-25

NATO Allies Pledge 1.5% Of GDP To Boost Cybersecurity & Protect Critical Infrastructure

Mounting geopolitical tension and the growing sophistication of cyber threats are driving a significant shift in how NATO defines defence expenditure.

2025-06-23

Ransomware Trends In May 2025

A Persistent Plague: 31% of attacked enterprises halt operations, 40% downsize staff, and 60% of SMEs close within six months.

2025-06-21

Israel-Iran Conflict Escalates With Surging Cyber Attacks & Disinformation

Cyberspace Remains A Key Battlefield: Patriotic hacktivists, online propagandists and opportunistic cybercriminals are piling in to the cyberwar.

2025-06-23

Pakistan’s Cyber Offensive: APT36 Targets Indian Defence

Transparent Tribe: A social engineering campaign exploiting ID credentials to deliver malicious payloads, infiltrate systems & gather intelligence.

2025-06-20

Three Million Records Exposed In Passion.io Data Breach

The exposure poses significant cyber risks, particularly for social engineering and phishing attacks, which account for 98% of cybercrimes.

2025-06-16

A British Initiative To Secure AI System Development

By addressing security at every stage, the proposed new standard helps avoid costly redesigns, protecting users and their data from harm.

2025-06-18

The Future For Internet Search Lies In AI

By enhancing search capabilities through advanced AI models, users can redefine how they interact with the Internet in their online search.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

North West Cyber Resilience Centre (NWCRC)

North West Cyber Resilience Centre (NWCRC)

The North West Cyber Resilience Centre is a trusted, not-for-profit venture between Greater Manchester Police and Manchester Digital.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Intertec Systems

Intertec Systems

Intertec Systems is an award-winning, global IT solutions and services provider that specializes in digital transformation, cybersecurity, sustainability, and cloud services.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.