TECHNOLOGY > > Hackers


« Back to News

2021-04-14

Cyber Attacks Target SAP Applications

Attackers are better informed about many organisation’s SAP systems than some of their internal teams, who have a limited time to respond.

2021-04-13

Iran Nuclear Plant Hit By Cyber Attack

Iran's newly equipped Uranium nuclear facility at Natanz has been hit by a cyber attack and blames Israel's Mossad spy agency, who don't deny it.

2021-04-13

N. Korean Hacking Group Is Targeting Security Researchers

A convincing fake cyber security company is being used to target skilled security researchers working on vulnerability R&D with malware.

2021-04-09

Credentials Phishing Attacks

Attackers are adapting and have some new tactics to serve up credential phishing pages as way to bypass existing Office365 detection measures.

2021-04-09

Half A Billion LinkedIn Members Found For Sale

LinkedIn Sliced Open: IDs, names and email addresses comprise a massive archive of stolen data, placing 500 million LinkedIn users at risk.

2021-04-07

FatFace Pays $2million Ransom To Cyber Criminals

Mugged: Criminals agreed to discount their ransom to save the victim from bankruptcy. Then they offered their advice on better cyber security.

2021-04-06

Over 500m Facebook Users' Data Posted On A Hacking Website

The personal information of about half a billion Facebook users, including their phone numbers, have been posted to a website used by hackers.

2021-03-29

Avoiding Arrest: Cyber Criminals Share Dark Web Secrets

On the Dark Web there are many secrets to be found, including insights into what criminals advise each other to say and do in case they get caught.

2021-03-24

Secure Your Personal Email & Social Media Accounts

Social Media Hacks: Facebook, Instagram and Snapchat were the most reported platforms on which people had their accounts compromised.

2021-03-23

British Companies Compromised By Exchange Email Hacking

Hundreds of UK company email servers have been hacked in the Microsoft Exchange breach and many are not even aware they are victims.

Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

WEBINAR: How To Build A Detection And Response Strategy For Insider Threats

WEBINAR: How To Build A Detection And Response Strategy For Insider Threats

Thursday, 19 August, 2021 - In this webinar, SANS and AWS Marketplace will overview building a detection and threat hunting workflow, focusing on preventing insider activity.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

NetScout

NetScout

NetScout services provide a single view into the performance and health of all your servers, services, applications, and networks, so you can quickly pinpoint and resolve problems.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

IAFCI provides services and an environment within which information about financial fraud, fraud investigation and fraud prevention methods can be collected and exchanged.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.