TECHNOLOGY > > Hackers


« Back to News

2022-08-10

Mercenary Cyber Spies For Hire

Professional Services: The threat posed by private firms with cyber capabilities that rival the world’s most skilled spy agencies is not widely known.

2022-08-10

Update: British NHS Confirms A Damaging Software Attack

The incident is more extensive than first thought to be and it emerges that some patient information will not be available online for weeks.

2022-08-09

US Federal Court Court IT Systems Breached

Hackers and other criminals may have had access to documents across the US Court Electronic Records and Case Management systems.

2022-08-08

Taiwan's Government Websites Attacked Just Before Pelosi’s Visit

Sending A Message: Taiwan’s presidential office and other agencies were attacked a few hours before US House Speaker Nancy Pelosi’s arrival.

2022-08-08

Cyber Attack On NHS Software Services

NHS Hotline Goes Offline: An extended software outage affecting non-emergency 111 telephone and other services was caused by a cyber attack.

2022-08-04

Github Supply Chain Attack

Somebody cloned over 35,000 Github repositories and kept them identical to the original source code, with the addition of malicious code.

2022-08-02

Google Chrome Extension Used To Steal Emails

SHARPEXT: A N. Korean threat group is using a malicious browser extension to steal emails from Google Chrome users while they read their webmail.

2022-08-02

Mercenary Hacking Group Selling Spyware

Subzero Spyware: Microsoft have discovered a powerful exploit being used to hack law firms, banks and strategic consultancies around the world.

2022-08-02

For Sale: 5.4m Twitter Users’ Data

Devil In The Detail: The information for sale allegedly comprises phone numbers & email addresses, including celebrities and numerous companies.

2022-07-25

Lives Are At Stake As More US Hospitals Are Hacked

The potentially devastating consequences for medical facilities may be one of the reasons hackers have identified them as a high-profile target. 

2022-07-15

Suspicions That Explosion At US Gas Export Terminal Caused By Russian Hackers

Was the Freeport Liquified Natural Gas explosion that forced Europe to keep buying Russian gas a Control System cyber attack? By Joe Weiss

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

PureCyber

PureCyber

PureCyber (formerly Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Global Cyber Risk (GCR)

Global Cyber Risk (GCR)

Global Cyber Risk is a technology and advisory services firm that provides first tier cybersecurity services to both large corporations and small and mid-sized businesses.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Gigit

Gigit

Gigit’s Service portfolio focuses on your business’ needs and the integration of comprehensive cybersecurity policies, plans, procedures, and practices into your business culture and operations.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

AdvIntel

AdvIntel

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts.

GM Sectec

GM Sectec

GM Sectec is the world's largest independent Cyber Defense and Fraud Prevention firm laser focused on payment security.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Soteria Cybersecurity

Soteria Cybersecurity

Soteria is your trusted Cybersecurity Partner in IT and OT.

Utilize

Utilize

Utilize is an award-winning technology company with over 25 years of industry expertise, we support hundreds of businesses across London and the South East.

BreachRx

BreachRx

BreachRx is the first intelligent incident response management platform that provides operational resilience for the entire enterprise.