TECHNOLOGY > > Hackers


« Back to News

2025-04-28

Chinese Hackers Exploiting Ivanti Connect Secure Vulnerability 

Ivanti has confirmed that a stack-based buffer overflow in Ivanti Connect Secure, Policy Secure & ZTA Gateways can lead to remote code execution.

2025-05-07

Chinese Hackers Undertaking A Global Infiltration Campaign 

Update: Chinese attackers have mapped critical infrastructure in preparation for future disruptions across twelve countries and twenty industries.

2025-04-18

Hackers Claim They Are Selling FortiGate Firewall Access

Zero-Day Vulnerability: The exploit appears to target versions of Fortinet's FortiOS, which was found to be susceptible to authentication bypass flaws.

2025-04-21

For Sale: Cheap DIY Cyber Crime Kits

Ransomware tools are being sold on the Dark Web for one-time use, allowing inexperienced amateurs to get into cybercrime for as little as $25.

2025-04-14

North Korean Hackers For Hire

By pretending to be legitimate remote workers to get jobs in US and EU companies, nation-state hackers aim to carry out financial fraud and IP theft.

2025-04-05

Oracle Cloud Now Admits To Having Been Hacked

Update: Oracle Cloud has confirmed that it was breached in an attack which affected an obsolescent platform still being used in healthcare.

2025-04-02

BlackLock Hackers Hacked

Experts at Resecurity have penetrated its Data Leak Site and fatally disrupted the prolific Ransomware As A Service cyber crime group.

2025-03-31

MS Windows Zero Day Vulnerability Widely Exploited

Update: A known security flaw in Microsoft Windows has been used by numerous state-sponsored groups for data theft and espionage since 2017.

2025-03-25

Taiwanese Hackers Accused Of Attacking China

There have been attacks targeting China's key infrastructure, including power grids, water supplies & telecommunications networks, since 2023.

2025-03-18

Guidance Is Coming, But Hackers Aren’t Waiting

Supply Chain Risks: Indirect access points through suppliers are an attractive vector for cybercriminals and it needs a solution. By Ed Bartlett

2025-03-17

Medusa Ransomware Attacks Focus On Critical Infrastructure

Double Extortion: Even if the victim organisation can recover their encrypted files, they still face the threat of their sensitive data being leaked.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

360° Online Brand Protection

360° Online Brand Protection

360° Online Brand Protection have developed a response to monitor counterfeiting and piracy activity at the online point of sale.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Ultra Intelligence & Communications (Ultra I&C)

Ultra Intelligence & Communications (Ultra I&C)

Ultra Intelligence & Communications provides critical, tactical capabilities that inform decision making in the most challenging environments.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.