TECHNOLOGY > > Hackers


« Back to News

2021-12-15

Stolen: Personal Details Of 80k Australian Government Employees

Over 80,000 South Australian government workers had their private data stolen in a ransomware attack & their employer is getting the blame.

2021-12-14

Volvo Falls Victim To Hackers

Hackers have stolen an undisclosed amount of research and development data from car maker Volvo, in what might be a possible ransom attack.

2021-12-07

Multiple Location Supermarket Suffers Supply Chain Attack

Total IT Outage: 300 Spar convenience stores in the UK have been knocked offline, unable to process card payments as their IT supplier is attacked.

2021-12-06

NSO Spyware Used To Hack The State Department

NSO Group’s spyware has been used by an unknown assailant to hack the mobile phones of at least nine United States State Department employees.

2021-11-30

Britain Is Fighting A Ransomware Epidemic

The NCSC has tackled a record number of cyber incidents over the past year and ransomware attacks from Russia are the dominant feature.

2021-11-30

Worldwide Cyber Security Threats

Cyber security threats, risks & challenges share many common factors in exploiting vulnerabilities, but vary significantly from one country to another.

2021-11-29

Spyware - Apple Starts Legal Action Against NSO Group

The controversial and secretive NSO Group is accused of using its powerful spyware in a concerted attack on Apple's customers, products & servers.

2021-11-29

Trojan Malware Installed On Millions Of Android Devices

Users of over nine million Android devices have installed dozens of games from Huawei that have a trojan malware designed to collect personal data. 

2021-11-26

Ransomware, Iranian Hackers & Pornography

Cyber Crime Trends: Ransomware criminals have taken advantage of widespread remote working to launch increasingly sophisticated attacks.

2021-11-22

British Students Learn About Ethical Hacking

Career Opportunities: Training to becoming a Certified Ethical Hacker (CEH) can be a smart career move and skilled practitioners are very well paid.

2021-11-22

Nobelium - Long Term Threat Activity

Microsoft Warning: Russia hackers are trying to gain long-term, systematic access to the US technology supply chain for surveillance and disruption.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Grupo CFI

Grupo CFI

Grupo CFI is the largest Spanish network of data protection and cybersecurity professionals.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.

Black Alps

Black Alps

Black Alp's mission is to promote cybersecurity through the organization of dedicated events.

Minimus

Minimus

Minimus, a pioneering application security startup, offers a groundbreaking platform that eliminates over 95% of Common Vulnerabilities and Exposures (CVEs) from software supply chains.