TECHNOLOGY > > Hackers


« Back to News

2023-06-15

Analysing XeGroup’s Arsenal Of Cyberattack Methods

Highly Evasive Adaptive Threat Techniques: A new class of cyber threats that evade the usual range of protective tools & analysis. By Brett Raybould

2023-06-13

Manchester University Hacked

One of the UK's largest and most successful education & research centres has been breached with some of its critical data exposed.

2023-06-10

Play Ransomware Gang Attack A Spanish Bank

PlayCrypt: The latest high-profile attack conducted by a ransomware group which is becoming widely known for its file encryption exploits.

2023-06-07

Update: BBC, British Airways & Boots In Supply Chain Attack

CLOP: Hackers found a software vulnerability to penetrate a growing number of UK firms in a major supply chain exploit. Now they want ransom.

2023-07-12

Iranian Hackers Using Windows Kernel Driver

Agrius Threat Group: Iranian hackers are using a new Windows kernel driver called Wintapix to get unauthorized access to targeted systems.

2023-06-05

Take Practical Measures To Avoid An Attack

The Common Threat: Failing to implement basic cyber security measures and not training your people presents an open door to hackers.

2023-05-31

Microsoft 365 Under Threat From A New Phishing Tool

‘Greatness’: A sophisticated Phishing-as-a-Service tool deployed against manufacturing, healthcare & technology companies that use Microsoft 365.

2023-05-30

Deepfakes Are A Growing Threat

Left unregulated, entire populations could have their opinions influenced by deepfakes delivering disinformation and distorting true events.

2023-05-20

$10M Reward For Arrest Of Russian Hacker

Wanted: Mikhail Pavlovich Matveev is believed to be the originator of the Zeus banking Trojan and Cryptolocker ransomware attack. 

2023-05-16

ABB Struck By Black Basta Ransomware

Hundreds of computers have been compromised as a result of a ransomware attack on the Windows Active Directory used by ABB. 

2023-05-15

Which Sectors Are Top Targets For Cyber Crime?

Banks, Healthcare & Food Retailers: The latest threat intelligence from Blackberry found 60% of all attacks targeting these three key industries.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

D3 Security

D3 Security

D3's Smart SOAR platform is at the forefront of the security automation revolution, helping clients around the world to rapidly identify, analyze, and resolve advanced threats.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.