TECHNOLOGY > > Hackers


« Back to News

2025-01-20

Data Broker Discloses A Major Breach Of App User Data

Misappropriated Access Key: Hacked data appears to have originated in thousands of smartphone apps, including Tinder, Grindr and Candy Crush.

2025-01-15

British Government Will Ban Payment For Ransom Attacks 

Deterring Cyber Crime: The intention is to make public sector & infrastructure organisations less attractive targets for ransomware gangs.

2025-01-07

Hacker Sentenced For Stealing Coldplay's Music

Convicted: Unreleased music from pop music artists including Coldplay and singers Bebe Rexha & Shawn Mendes were stolen and sold.

2025-01-03

Hackers Deploy Malicious Chrome Extensions

Supply Chain Attack: A large-scale hacking campaign targeting Chrome extensions has affected customers of a leading cyber security firm.

2024-12-27

IoT Devices Infected With Pre-Installed Malware

BadBox: Android malware embedded in the device’s firmware, which enables interception of private credentials & can install other malicious software.

2024-12-16

Termite Hacked Blue Yonder 

Termite: A previously unknown ransomware gang has claimed responsibility for an attack on a leading supply chain software company.

2024-12-17

Diversity Is Key To Combating Gen-AI Hackers

Hiring practices should prioritise candidates with diverse skills & non-traditional backgrounds, broadening the talent pool. By Andrea Cullen

2024-12-11

Ransomware Criminals Claim To Have Stolen Deloitte's Data

Brain Cipher: Spear phishing specialists say they have hacked the leading multinational professional services firm. Deloitte say otherwise.

2024-12-11

British NHS Hospitals Under Attack

A Ceaseless Target: Ransom attacks on three Liverpool hospitals are just the latest in a series against NHS healthcare organisations in 2024.

2024-12-09

New Zealand Warns Of Impending Mass Hacking Operation

New Zealand’s national security agency is warning of a mass hacking operation underway by the Chinese Salt Typhoon hacking group.

2024-12-05

US Telecoms Customer Data Stolen By Chinese Hackers 

Salt Typhoon: Dozens of companies have been penetrated, including at least eight major US telecoms & broadband infrastructure firms.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.