TECHNOLOGY > > Hackers


« Back to News

2021-08-23

T-Mobile Customers Affected By Massive Breach

T-Mobile has admitted to a sophisticated attack and now the stolen personal data of as many as 54 million US customers could be up for sale.

2021-08-20

Hackers Give Back Half Of $600m In Stolen Crypto Currencies

Hackers who stole $600 million in crypto currencies from PolyNet have returned half the money. It is still the most costly hack in history.

2021-08-11

Stolen: Over $600 Million In Crypto Currencies

Decentralised Finance: $273m in Ethereum, $253m in Binace Smart Chain tokens and $85m in other currency looted from a blockhain exchange.

2021-08-09

Hackers Steal UK Firearms Data

A breach at a leading website for buying and selling shotguns & rifles raises concern that legal gun owners could be targeted by criminals.

2021-08-02

Saudi Aramco Faces $50m Ransom Demand

Aramco has lost 1 TB of company data and the hackers are demanding a $50 million ransom in cryptocurrency to restore the files.

2021-07-30

Twitter Celebrity Hack Suspect Arrested

Hackers took control of public figures' accounts to send a series of tweets asking followers to transfer crypto currency to a specific Bitcoin wallet.

2021-07-28

Ransomware Often Begins With Phishing

Phishing is the delivery mechanism of choice for ransomware and these are critical problems every organisation must address in order to keep secure.

2021-07-28

Royal Cyber Security Significantly Increased

Queen Elizabeth has appointed a CISO to increase the royal family's cyber security as the risk of unauthorised access to their data grows.

2021-07-26

The Semiconductor Shortage Is Causing Cyber Security Problems

The global shortage of semiconductors increases the risk of the use of counterfeit parts with serious implications for data loss and IP theft.

2021-07-24

Heads Of State On NSO Spyware List

French President Emmanuel Macron leads a list of 14 heads of state targeted for hacking by clients of the Israeli mobile spyware firm NSO Group.

2021-07-19

Ransomware Gang REvil Is Cancelled

The strange disappearance of the public-facing websites affiliated with Russia-linked REvil follows shortly after a string of big ransomware incidents.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.