TECHNOLOGY > > Hackers


« Back to News

2025-05-02

Harrods Of London Comes Under Attack

London's famous luxury department store is the third major British retailer to confirm an attempted cyber attack, in what looks like concerted action.

2025-05-01

Co-op Shuts Down IT Systems After Attempted Hack

Another Big UK Retailer Targeted: The Co-op took preventive measures to protect its systems, shutting down business services for teams running stores.

2025-05-13

The Attack On M&S Reverberates Three Weeks Later

Update: Problems at M&S continue after a ransomware attack disrupted online services, internal systems and breached customer data.

2025-04-28

Chinese Hackers Exploiting Ivanti Connect Secure Vulnerability 

Ivanti has confirmed that a stack-based buffer overflow in Ivanti Connect Secure, Policy Secure & ZTA Gateways can lead to remote code execution.

2025-05-07

Chinese Hackers Undertaking A Global Infiltration Campaign 

Update: Chinese attackers have mapped critical infrastructure in preparation for future disruptions across twelve countries and twenty industries.

2025-04-18

Hackers Claim They Are Selling FortiGate Firewall Access

Zero-Day Vulnerability: The exploit appears to target versions of Fortinet's FortiOS, which was found to be susceptible to authentication bypass flaws.

2025-04-21

For Sale: Cheap DIY Cyber Crime Kits

Ransomware tools are being sold on the Dark Web for one-time use, allowing inexperienced amateurs to get into cybercrime for as little as $25.

2025-04-14

North Korean Hackers For Hire

By pretending to be legitimate remote workers to get jobs in US and EU companies, nation-state hackers aim to carry out financial fraud and IP theft.

2025-04-05

Oracle Cloud Now Admits To Having Been Hacked

Update: Oracle Cloud has confirmed that it was breached in an attack which affected an obsolescent platform still being used in healthcare.

2025-04-02

BlackLock Hackers Hacked

Experts at Resecurity have penetrated its Data Leak Site and fatally disrupted the prolific Ransomware As A Service cyber crime group.

2025-03-31

MS Windows Zero Day Vulnerability Widely Exploited

Update: A known security flaw in Microsoft Windows has been used by numerous state-sponsored groups for data theft and espionage since 2017.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

ClamAV

ClamAV

ClamAV is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security.

Enaviya Information Technologies

Enaviya Information Technologies

Enaviya offer a comprehensive set of manual and automated software testing services adhering to standard quality assurance for best practices and processes.