TECHNOLOGY > > Hackers


« Back to News

2025-07-02

NimDoor: North Korea’s Latest Cyber Exploit Targets Crypto

A Sophisticated Campaign: N. Korean hackers blend social engineering, novel persistence mechanisms & cross-platform coding to infiltrate targets.

2025-07-01

Swiss Health Foundation Cyber Attack Exposes Federal Data

Ransomware Strike Hits Radix: A breach by the Sarcoma ransomware group has leaked 1.3TB of data, raising concerns over government security.

2025-06-28

Notorious Hacker ‘IntelBroker’ Arrested

British Hacker Charged In Global Cybercrime Scheme: Law enforcement agencies are making progress by targeting Dark Web cybercrime forums.

2025-06-23

Ransomware Trends In May 2025

A Persistent Plague: 31% of attacked enterprises halt operations, 40% downsize staff, and 60% of SMEs close within six months.

2025-06-23

Pakistan’s Cyber Offensive: APT36 Targets Indian Defence

Transparent Tribe: A social engineering campaign exploiting ID credentials to deliver malicious payloads, infiltrate systems & gather intelligence.

2025-06-20

Three Million Records Exposed In Passion.io Data Breach

The exposure poses significant cyber risks, particularly for social engineering and phishing attacks, which account for 98% of cybercrimes.

2025-06-03

Cartier Confirms Customer Data Exposure

The Luxury jewelry retailer has disclosed a security breach in a customer notification, following unauthorized system access & data exposure.

2025-05-27

Cyber Attack On Adidas Highlights A Rising Tide Of Retail Sector Threats

Global sportswear giant Adidas becomes the latest high-profile target in a surge of cyberattacks affecting major retailers worldwide.

2025-05-26

IAM Failures: Lessons From 2025’s Biggest Breaches

The Threat Of Poor IAM: Breaches at M&S, Co-op & Harrods have a common factor - weak Identity Access Management. By Sidra Mobeen

2025-06-16

Understanding Identity & Access Management

The Front Door Of Cyber Defence: IAM is becoming the essential first line of defence against cyberattacks targeting identities. By Sidra Mobeen

2025-06-02

Scattered Spider Hackers Get Busy

Scattered Spider Targeting Retailers: The cybercrime group linked to multiple high-profile retail breaches increasing its international activities.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Caldew Consulting

Caldew Consulting

Caldew specialise in providing information assurance and cyber security consultancy, covering the full spectrum of the security life cycle.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

OriginalMy

OriginalMy

OriginalMy is a cybersecurity startup, focussed on digital governance and information authentication. Its mission is to prove authenticity using state-of-the-art cryptography and blockchain technology

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.

Neqst

Neqst

Neqst is an investment firm specialising in profitable growth companies within the Nordic software and IT-services sectors.