TECHNOLOGY > > Hackers


« Back to News

2023-09-19

The Slots Fall Silent

Update: Casinos in Las Vegas and other US locations have been held to ransom, with every area of business affected, from reservations to gaming.

2023-09-11

British Voters Wide Open To Attack

Outdated Systems & Software: The British Electoral Commission failed the basic Cyber Essentials security test just before being hacked.

2023-09-07

The Unique TTPs Attackers Use To Target APIs

Application Programming Interfaces are the gateways to key data, and attackers will go to extraordinary lengths to compromise them. By Andy Mills

2023-09-06

LockBit Hacked British Military Data 

Details are emerging about how LockBit got access to top secret military data via a metal fence manufacturer running 20-year-old software.

2023-09-05

Hackers Hit British Defence Ministry

Supply Chain Hack: Top secret security information on British military & intelligence sites has been leaked by hackers linked to Russia.

2023-09-04

Hackers Target Satellites 

Timing Systems, GPS & Communications: Orbital satellites keep the world running smoothly but have just the same vulnerability as ground facilities.

2023-08-29

Cyber Security Firm Dragos Targeted By Hackers

An unsuccessful attempt to extort one cyber security firm involved not merely a risk to data security, but a very personal threat to the CEO's family.

2023-08-22

LinkedIn Accounts Hacked & Ransomed

Victims have turned to social media in their attempts to regain access to their accounts, complaining about the response from LinkedIn support.

2023-07-22

Shell Confirms Supply Chain Attack

MOVEit: Shell is one of a number of leading organisations that has been hacked & its data compromised by cyber criminals known as Cl0p.

2023-07-22

Russian Hackers Hit Ukrainian Security Services

Active & Dangerous Threat: Russian state-sponsored hackers named Gamaredon have attacked thousands of Ukraine government computers.

2023-08-04

Generative AI Tools Help Criminals Launch More Sophisticated Attacks

WormGPT: Even attackers with limited skills can use this technology, making it an accessible tool for a broader spectrum of cyber criminals.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.