TECHNOLOGY > > Hackers


« Back to News

2022-08-17

Cyber Attack On London Crypto Exchange

Crypto Currency Exchange Under DDoS Siege: Britain's NCSC cyber security agency is investigating a suspected Russian revenge attack.

2022-08-12

Cyber Attacks On Port of Los Angeles Have Doubled

40 Million Attacks Each Month: The port of Los Angeles is working with the FBI’s Cyber Resilience Centre to prevent attacks & improve security. 

2022-08-10

Mercenary Cyber Spies For Hire

Professional Services: The threat posed by private firms with cyber capabilities that rival the world’s most skilled spy agencies is not widely known.

2022-08-10

Update: British NHS Confirms A Damaging Software Attack

The incident is more extensive than first thought to be and it emerges that some patient information will not be available online for weeks.

2022-08-09

US Federal Court Court IT Systems Breached

Hackers and other criminals may have had access to documents across the US Court Electronic Records and Case Management systems.

2022-08-08

Taiwan's Government Websites Attacked Just Before Pelosi’s Visit

Sending A Message: Taiwan’s presidential office and other agencies were attacked a few hours before US House Speaker Nancy Pelosi’s arrival.

2022-08-08

Cyber Attack On NHS Software Services

NHS Hotline Goes Offline: An extended software outage affecting non-emergency 111 telephone and other services was caused by a cyber attack.

2022-08-04

Github Supply Chain Attack

Somebody cloned over 35,000 Github repositories and kept them identical to the original source code, with the addition of malicious code.

2022-08-02

Google Chrome Extension Used To Steal Emails

SHARPEXT: A N. Korean threat group is using a malicious browser extension to steal emails from Google Chrome users while they read their webmail.

2022-08-02

Mercenary Hacking Group Selling Spyware

Subzero Spyware: Microsoft have discovered a powerful exploit being used to hack law firms, banks and strategic consultancies around the world.

2022-08-02

For Sale: 5.4m Twitter Users’ Data

Devil In The Detail: The information for sale allegedly comprises phone numbers & email addresses, including celebrities and numerous companies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

PAS Global

PAS Global

PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological Universiy (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Reliance ACSN

Reliance ACSN

Reliance ACSN managed security and consultancy services support organisations throughout the challenges of assurance, awareness, detection, response and prevention.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.