TECHNOLOGY > > Hackers


« Back to News

2021-05-15

Pipeline Ransom Has Been Paid

Darkside hackers have been paid $5 million to restore operations after a ransom attack paralysed fuel supplies across the US Eastern seaboard.

2021-05-14

Ransomware Attack On Ireland's Health Service

The Irish Health Service Executive has shut down IT systems and cancelled appointments after attempts to access data following a ransom attack.

2021-05-19

Maritime Shipping Is An Ideal Target For Ransom

The maritime industry is dependent on just-in-time supply chains, often with outdated technology, making an attractive target for cyber criminals.

2021-05-14

Pipeline Hack: Biden Issues An Executive Order

This Order will change the way businesses communicate with government about cybersecurity and compels IT providers to share information.

2021-05-11

Critical Pipeline Network Shut Down By Hackers

UPDATE: A pipeline which supplies 45 percent of the US East coast fuel supply has been shut down by hackers following a ransom attack.

2021-04-30

Hackers Threaten To Publish Police Informant Data

Washington DC police is "aware of unauthorised access on our server" and has received a ransom demand threatening to name their informants.

2021-04-28

SolarWinds Campaign Even Wider Than First Thought

Discovery of additional command-and-control servers used in the SolarWinds exploit shows the attack was much broader than previously known.

2021-04-27

The US Suffers Multiple Attacks By Russian Hackers

Nation-state threat actors from Russia are actively targeting and exploiting five publicly known vulnerabilities to compromise US networks.

2021-04-23

Significant Growth In State-Sponsored Cyber Attacks

It’s increasingly common for cyber attacks to have a state-sponsored element, with countries going online to wage covert warfare on others.

2021-04-15

Cyber Crime In 2021: How Hackers Are Evolving

Cyber criminals have to constantly develop sophisticated attacks to fit new trends, while upgrading existing attacks to avoid detection.

2021-04-14

Cyber Attacks Target SAP Applications

Attackers are better informed about many organisation’s SAP systems than some of their internal teams, who have a limited time to respond.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

ACPL Systems

ACPL Systems

We offer leading-edge technology solutions, expert professional and managed services and proven methodologies to ensure your data is protected and business risks are reduced.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.

Adsigo

Adsigo

Adsigo AG is your reliable and professional partner for all topics concerning PCI certification, compliance and information security.

VPNBlade

VPNBlade

VPNBlade is your go-to resource for expert reviews and advice on VPN services.