TECHNOLOGY > > Hackers


« Back to News

2021-04-15

Cyber Crime in 2021: How Hackers Are Evolving

Cyber criminals have to constantly develop sophisticated attacks to fit new trends while upgrading existing attacks to avoid detection.

2021-04-14

Cyber Attacks Target SAP Applications

Attackers are better informed about many organisation’s SAP systems than some of their internal teams, who have a limited time to repsond.

2021-04-13

Iran Nuclear Plant Hit By Cyber Attack

Iran's newly equipped Uranium nuclear facility at Natanz has been hit by a cyber attack and blames Israel's Mossad spy agency, who don't deny it.

2021-04-13

N. Korean Hacking Group Is Targeting Security Researchers

A convincing fake cyber security company is being used to target skilled security researchers working on vulnerability R&D with malware.

2021-04-09

Credentials Phishing Attacks

Attackers are adapting and have some new tactics to serve up credential phishing pages as way to bypass existing Office365 detection measures.

2021-04-09

Half A Billion LinkedIn Members Found For Sale

LinkedIn Sliced Open: IDs, names and email addresses comprise a massive archive of stolen data, placing 500 million LinkedIn users at risk.

2021-04-07

FatFace Pays $2million Ransom To Cyber Criminals

Mugged: Criminals agreed to discount their ransom to save the victim from bankruptcy. Then they offered their advice on better cyber security.

2021-04-06

Over 500m Facebook Users' Data Posted On A Hacking Website

The personal information of about half a billion Facebook users, including their phone numbers, have been posted to a website used by hackers.

2021-03-29

Avoiding Arrest: Cyber Criminals Share Dark Web Secrets

On the Dark Web there are many secrets to be found, including insights into what criminals advise each other to say and do in case they get caught.

2021-03-24

Secure Your Personal Email & Social Media Accounts

Social Media Hacks: Facebook, Instagram and Snapchat were the most reported platforms on which people had their accounts compromised.

Perimeter 81

Directory of Suppliers

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Rambus Security Division

Rambus Security Division

Rambus Security Division solutions span areas including tamper resistance, content protection, network security, mobile payment, smart ticketing, and trusted provisioning services.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.