TECHNOLOGY > > Hackers


« Back to News

2024-04-17

Iranian Hackers Targeted Israel’s Radar Systems

An Iranian hacking group named Handala has published a statement on social networks, claiming that they penetrated Israel's radar defences.

2024-04-15

Iranian Hackers Attack US Water Supplies

The White House says recent attacks by Iranian hackers on US water infrastructure are a loud wake-up call to the water & utilities industries.

2024-04-17

Hackers Using YouTube To Deliver Malware

Malicious User Accounts: Data stealing malware is being delivered via YouTube disguised as pirated software and video game cracks.

2024-04-15

DoS Attacks That Can Crash Web Servers With Ease

HTTP/2 Continuation Flood: A new DoS attack method poses a severe threat by sending a sequence of CONTINUATION frames without END_HEADERS.

2024-04-11

City Of Leicester Council Attacked

Britain's Leicester City Council has suffered a sophisticated attack by a known ransomware group after evidence was posted on the Dark Web.

2024-04-04

Exposed - Seventy Million AT&T Customers Personal Data

Addresses, Social Security Numbers & Passcodes: Around 73 million AT&T customers personal data has been leaked online.

2024-04-04

Cambridge University Medical IT System Hacked

Biomedical researchers at Cambridge University have been unable to access computer systems due to suspected "malicious activity".

2024-03-25

Scottish Health Service Patient Data Hacked & Stolen

The National Health Service in Scotland has been targeted in a "focused and ongoing" cyber attack that might compromise critical patient data.

2024-03-25

France Suffers Massive Data Breach

Mega Data Breach: Over 50% of the French population’s personal data has been stolen in a cyber attack, with as many as 43 million citizens affected.

2024-03-18

Belgium’s Duvel Beer Hit By Ransom Attack

No Beer: Four breweries owned by Belgian beer firm Duvel have come to a halt after a cyber attack.

2024-03-19

US Law Firm Suffers Large Scale Breach

A California law firm has disclosed that it has lost the sensitive personal information of more than 326,000 individual clients.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.

Simpson Associates

Simpson Associates

Simpson Associates is a Data Transformation and managed services provider that helps organisations gain valuable insights from their data and make better-informed decisions.

Seezo

Seezo

Seezo leverages Gen AI to make world-class AppSec accessible to every engineering team.