TECHNOLOGY > > Hackers


« Back to News

2015-06-22

Top 6 Hacking Tools Security Teams Should Know About

Black Hat or White Hat: Here are the top 6 hacking tools that every security professional ought to know about.

2015-06-22

The Ever-evolving Cyber Threat to Planes

Professional hackers claim airline computer systems are riddled with weaknesses that allow a breach via the in-flight entertainment system.

2015-06-21

Hackers Invade Hospital Networks

Hackers penetrate secure hospital networks, collecting valuable information, by targeting medical devices.

2015-06-21

Magnitude Exploit Kit Adobe Flash Player Vulnerability

An example of how cybercriminals rapidly take advantage of recently-patched vulnerabilities through exploit kits.

2015-06-16

Hackers Offered $1k for Vulnerabilites Found in Drupal 8

The Drupal security team are turning to white hat hackers to get higher levels of security.

2015-06-16

Flash Player Attacked in Latest Cyber-Crime

Hackers' persistent attacks on Adobe Flash Player's obsolete editions get worse.

2015-06-16

Russia Hacked The German Parliament

The German government says the hack of the Bundestag came from Russia in a state-sponsored attack.

2015-06-15

North Korea Threatens US with Cyberattacks

North Korea has responded to reports that it was the target of a Stuxnet cyber attack by threatening a cyber attack against the U.S.

2015-06-15

Russian Hackers Posed as ISIS to Hack French TV Channel

French authorities believe a group of Russian-sponsored hackers known as APT28 are behind the TV5 Monde’s attack & framed the CyberCaliphate.

2015-06-13

Second Hack of US Federal Records

14 million current & former US government employees have had their personal information exposed to hackers.

2015-06-09

US Stuxnet Attack Against N. Korea Failed

Fail: Stuxnet virus used to attack North Korea's nuclear weapons program five years ago.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

RubinBrown

RubinBrown

RubinBrown LLP is a leading accounting and professional consulting firm. The RubinBrown name and reputation are synonymous with experience, integrity and value.

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

Cytex

Cytex

Cytex is the All-in-One solution for SMB data protection & compliance needs.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.