TECHNOLOGY > > Hackers


« Back to News

2023-11-10

Halting The Rise Of Ransomware

How Zero Trust Can Mean Zero Loss: Encryption & backups are critical to taking the sting out of hackers’ ransom demands. By John Michael

2023-11-07

Online Conflict In Gaza & Ukraine

The use of cyber warfare techniques has fast become integral to the Gaza conflict, adding a layer of complexity to an already difficult situation. 

2023-11-06

Phishing Is The Hackers' Favourite Tool

Phishing is often the first stage of a larger attack, leading to data breaches, malware, ransom, identity theft & other serious consequences. 

2023-10-26

Big Medical Diagnostic Company Exposed To Data Breach

Millions Of Sensitive Patient Records Exposed: Security researcher Jeremiah Fowler discovered an unprotected database of 12m records.

2023-10-23

Iranian State Sponsored Hackers On The Attack

Undetected Malware: Capable of intercepting MS Exchange to compromise incoming email, as well as upload & download files from the infected host.

2023-10-13

DNA Testing Service 23andMe Hacked

20m Pieces of User Data Stolen: Information lost includes names, usernames, profile photos, geographical location & genetic ancestry results.

2023-10-16

Electric Vehicles: The Hacking Risks 

As the world transitions to electric vehicles, there are numerous risks to consider, not only the vehicles, but in the charging network & elsewhere.

2023-10-10

Sony Falls Victim To CLop Ransom Attack

Sony Interactive Entertainment has confirmed that the personal information of thousands of former & current employees has been exposed.

2023-10-08

Industrial Control Systems Company Held To Ransom

Update: An international supplier of building technology & control systems has been attacked by the 'Dark Angels' ransomware gang.

2023-10-02

British Royal Family's Website Targeted 

KillNet Go After King Charles: Russian hackers have claimed responsibility for a DoS attack, knocking the British royal website offline.

2023-09-26

Quadruple Extortion  Ransomware

Phases Of The Extortion Cycle: Criminals are getting more focused, specialized & effective in maximizing the ransom they extract from their victims.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

IABG

IABG

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity. The leading Risk Assessment Platform for Critical Infrastructure.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Ark Infotech

Ark Infotech

Ark Infotech is a provider of cloud management services, selective support services, and technology solutions.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.

Cure53

Cure53

Cure53 offers classic black-box penetration tests (zero-knowledge) as well as white-box tests and code audits.