TECHNOLOGY > > Hackers


« Back to News

2021-05-14

Pipeline Hack: Biden Issues An Executive Order

This Order will change the way businesses communicate with government about cybersecurity and compels IT providers to share information.

2021-05-11

Critical Pipeline Network Shut Down By Hackers

UPDATE: A pipeline which supplies 45 percent of the US East coast fuel supply has been shut down by hackers following a ransom attack.

2021-04-30

Hackers Threaten To Publish Police Informant Data

Washington DC police is "aware of unauthorised access on our server" and has received a ransom demand threatening to name their informants.

2021-04-28

SolarWinds Campaign Even Wider Than First Thought

Discovery of additional command-and-control servers used in the SolarWinds exploit shows the attack was much broader than previously known.

2021-04-27

The US Suffers Multiple Attacks By Russian Hackers

Nation-state threat actors from Russia are actively targeting and exploiting five publicly known vulnerabilities to compromise US networks.

2021-04-23

Significant Growth In State-Sponsored Cyber Attacks

It’s increasingly common for cyber attacks to have a state-sponsored element, with countries going online to wage covert warfare on others.

2021-04-15

Cyber Crime In 2021: How Hackers Are Evolving

Cyber criminals have to constantly develop sophisticated attacks to fit new trends, while upgrading existing attacks to avoid detection.

2021-04-14

Cyber Attacks Target SAP Applications

Attackers are better informed about many organisation’s SAP systems than some of their internal teams, who have a limited time to respond.

2021-04-13

Iran Nuclear Plant Hit By Cyber Attack

Iran's newly equipped Uranium nuclear facility at Natanz has been hit by a cyber attack and blames Israel's Mossad spy agency, who don't deny it.

2021-04-13

N. Korean Hacking Group Is Targeting Security Researchers

A convincing fake cyber security company is being used to target skilled security researchers working on vulnerability R&D with malware.

2021-04-09

Credentials Phishing Attacks

Attackers are adapting and have some new tactics to serve up credential phishing pages as way to bypass existing Office365 detection measures.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.