TECHNOLOGY > > Hackers


« Back to News

2016-08-11

‘Dropping Elephant’ Is A New Cyber Espionage Group

Kaspersky Lab is monitoring a new cyber espionage group which has a high success rate despite using only low tech attacks.

2016-08-17

Ransomware Hackers Are Getting More Advanced

Hackers are using increasingly advanced techniques of the kind more commonly seen in cyber-espionage.

2016-08-15

James Bond - Pen Tester

Pen-testing can use deception to counter spear-phishing and other superficially benign threats.

2016-08-04

Clinton Campaign Confirm Mystery Hackers Accessed Data

Is Russia using hackers to influence the outcome of the US Presidential election and is the US using proxies to retaliate?

2016-07-27

Cyber-Attack Takes Down Pokémon Go

Hacking group going by the name of PoodleCorp has claimed responsibility for a massive DDoS attack which brought down Pokémon Go.

2016-07-27

Ransomware: Should You Pay The Ransom?

Security professionals dread the day when they learn that ransomware has infiltrated their network and started encrypting files & drives.

2016-07-25

Criminals Invent Clever New Way To Plant Banking Malware

Watering Hole Attack: Malicious executable bug contained inside a file that installed a legitimate administrative tool.

2016-07-25

Civil Liberties Group Crashes Thailand Government Website

A cyber-attack by a Thai group opposed to the “Single Gateway” brought down a major government website.

2016-07-21

Russia Claims ‘Increase in Cyberattacks by West Spies’

The Kremlin worries that its government agencies are under increasing western attack, and is concerned about skill shortages in government.

2016-07-20

Hackers Target Thousands of GMails

Google Alert: “Government-backed hackers may be trying to steal your password,”

2016-07-20

Ukraine Crisis Fits Cyber War Narrative

It looks like there is a direct connection between the geopolitical climate in combat torn Ukraine and the increase in cybercriminal activity.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Daon

Daon

Daon offers a universal biometric authentication platform for mobile devices.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.