TECHNOLOGY > > Hackers


« Back to News

2021-06-23

Negotiating Ransom: To Pay Or Not?

Factors to consider when responding to a ransom demand include the readiness of your backup network & data, insurance and customer reaction.

2021-06-22

Airline Supply Chain Attacks Carried Out By Chinese Hackers

The attack on aviation supply chain company SITA was widespread and has had an impact on multiple passenger airlines, some as yet untraced.

2021-06-22

DarkSide May Not Stay Dark For Long

The DarkSide hackers allegedly disbanded after carrying out the Colonial Pipeline ransom attack, but could come back soon under a different name.

2021-06-16

NCSC Focus On Ransomware Attacks

Early Warning: A free NCSC service designed to inform British organisations of potential ransom attacks at the earliest possible stage.

2021-06-14

FBI Recover Ransom Paid To Pipeline Hackers

The FBI has recovered most of the $4.4 million ransom payment made to Russian hackers after a cyber attack on the largest fuel pipeline in the US.

2021-06-14

Singapore Is The Cyber Attack Hotspot

Leading cyber security firms agree that Singapore is the regional focus for being both the source and the target of growing threat activity.

2021-06-07

Russian Hackers Targeting International Aid Groups

Intelligence Gathering Effort : An estimated 3,000 email accounts at more than 150 different organisations have been attacked this month.

2021-06-07

US Media Group In Latest Ransom Attack

Live streams for radio and TV stations owned by the Cox Media Group have been knocked offline in an undisclosed ransom attack.

2021-06-01

Preventing Ransomware Attacks

The chances of ransomware infection can be significantly reduced by security software and by paying sufficient attention to some basic rules.

2021-05-31

Ransomware And Its Criminal Use

Ransomware attackers are ferocious. If you haven’t been attacked yet, it’s not a matter of if, but when. Be prepared. Defend, backup and protect.

Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

WEBINAR: Shifting Your Network Security Architecture To The Cloud

WEBINAR: Shifting Your Network Security Architecture To The Cloud

Thursday, July 8, 2021 - In this webinar, SANS and AWS Marketplace will discuss how to adapt network security architecture and control implementation to a cloud-based model.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Information Network Security Agency (INSA)

Information Network Security Agency (INSA)

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Alion Science & Technology

Alion Science & Technology

Alion Science and Technology delivers advanced engineering, IT and operational solutions to strengthen national security and drive business results.

Signal Advance

Signal Advance

Signal Advance has developed a system to improve response time performance in signal detection for applications including medical, industrial control and cybersecurity.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.