TECHNOLOGY > > Hackers


« Back to News

2022-01-19

WhisperGate: Russia Responsible For Cyber Attacks On Ukraine

Update: Russia is responsible for malware attacks, defacing websites & leaving numerous infected Ukraine Government computers wiped.

2022-01-17

REvil Cyber Ransomware Gang Members Arrested

REvil Has Ceased To Exist: Russian law enforcement has dismantled the notorious ransomware group and made over a dozen arrests.

2022-01-14

North Korean Hackers Stole $400m In Crypto Currency

North Korean cyber criminals have had a record year in 2021, launching attacks on crypto currency platforms, investment firms & centralised exchanges.

2022-01-14

Ukraine Government Hit By Massive Cyber Attacks

"Be Afraid And Expect The Worst": Ukrainian government websites hijacked & plastered with threatening messages as Russian hackers get busy.

2022-01-12

SIM Swapping Attacks Caused T-Mobile Breach

T-Mobile Incident Report: SIM swapping makes it possible for attackers to take control of a target's mobile phone number.

2022-01-05

Pegasus Spyware & Not-For-Profit Cyber Security - What Are The Risks?

It's never been more important for charities to prioritise their cyber security, especially for those involved in humanitarian efforts. By Kitty Bates.

2022-01-03

NSO Spyware Used To Hack Political Leaders In Poland

Spyware from NSO Group has been used in the hack of leading opposition politicians in Poland, in the latest instance of covert surveillance.

2022-01-03

Cyber Attack On Britain’s Defence Academy

A damaging attack on Britain's national Defence Academy, possibly by Russia or China, is an indication of how modern warfare is evolving.

2022-01-03

Malicious Joker App Gets Half A Million Downloads

Joker Malware is a persistent threat that infects legitimate apps then steals from users by subscribing them to unwanted subcription services.

2022-01-03

Belgium’s Military Suffer From Log4j Attack

The Belgian Defence Ministry's computer network is being restored to full operation following an attack delivered via Log4shell vulnerabilities.

2021-12-21

Stealthy Malware Hiding Behind An Invalid Date

e-Commerce At Risk: A highly sophisticated malware targeting online stores, CronRAT is undetected by many antivirus engines.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

Zurich

Zurich

Zurich is a leading multi-line insurer providing a wide range of property and casualty, and life insurance products and services in more than 210 countries and territories.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Synechron

Synechron

Synechron is a leading global digital consulting firm, providing innovative technology solutions for business.

Nyx Security Solutions

Nyx Security Solutions

Nyx is committed to excellence in embedded cybersecurity, delivering top-tier secure design, development, and penetration testing services that meet and exceed industry standards.

PMSLTech

PMSLTech

Discover emerging trends and digital innovations to launch, grow, and scale your venture successfully.

Maro

Maro

The web is a dark and dangerous place. Step into the light with the first cognitive security platform that makes human risk visible, actionable, and shapeable.