TECHNOLOGY > > Hackers


« Back to News

2022-02-23

Protect Your Organisation - Know Your Enemy

Being able to identify, protect, detect, respond to and recover from threats is vital. Know your enemy, your battlefield & yourself. By Ryan Weeks

2022-03-01

Increasing Use Of Encryption For Malicious Purposes

Older Servers Are More Vulnerable: Attackers have dicovered the correlation between poor HTTPS configurations and a vulnerable web server.

2022-02-17

Ukraine Defence Ministry & Banks Under Cyber Attack

The Ukraine Stratcom Centre says that 'false flag' attacks on its Defence Ministry and two banking websites are intended to spread alarm & confusion.

2022-02-16

Qbot Malware Can Read Your Email

Despite its age, Qbot malware has been continually developed and continues to be a dangerous and persistent threat to organisations.

2022-02-15

Russian Cyber Attacks On Ukraine Increase

Cyber attacks will form part of a broad campaign if Russia invades Ukraine, with malware and online disinformation among the weapons deployed.

2022-02-17

California College Ransomware Attack

Personal data of faculty & students at a California community college has been exposed and IT systems crippled in a “sophisticated” attack.

2022-02-19

Vodafone Portugal Has Been Hacked

A “deliberate and malicious” cyber attack targeting Vodafone Portugal succeeded in knocking mobile networks offline across the country.

2022-02-15

British Foreign Office Hacked

Britain's Foreign, Commonwealth and Development Office needed 'urgent support' when unidentified hackers got inside their network systems.

2022-02-15

Ransomware Attacks On Transport & Logistics Centres

Planes, Ships & Automobiles: In separate incidents, several European transport & logistics hubs have suffered similar ransomware attacks.

2022-02-11

A Quick Guide To Remote Code Execution (RCE)

When someone takes remote control of your computer there is a real risk that malware is being installed without your knowledge. By Madeline Miller

2022-02-07

Beware PowerPoint Files With Hidden Malware

Socially Engineered Email: The latest covert method that threat actors are using to target desktop users is through trusted sofware applications.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

QNAP Systems

QNAP Systems

QNAP Systems, Inc. delivers world class network attached storage (NAS) and network video recorder (NVR) solutions.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Hexiosec

Hexiosec

Hexiosec (formerly Red Maple Technologies) is a technical consultancy and product company founded and run by engineers from the UK Intelligence and Defence communities.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

CESAR

CESAR

CESAR is one of the premier R+D and innovation centers in Brazil and a designated Cybersecurity Competence Center.