TECHNOLOGY > > Hackers


« Back to News

2019-07-29

Lancaster University Hit By Data Thieves

Lancaster University has suffered a sophisticated and malicious phishing attack which has resulted in breaches of student and applicant data.

2019-07-22

Russian FSB Hacked: "Largest data breach in its history"

Hackers have successfully targeted Russia's Federal Security Service in possibly "the largest data leak in the history of Russian intelligence."

2019-07-17

US Cyber Strike On Iran Is A Step Change

A military action was diverted into a cyber action: Modern warfare could increasingly look like a loss of connectivity, rather than a loss of life.

2019-07-16

Croatian Government Targeted By Mystery Hackers

Croatian officials are spear-phished with an innovative technique that looks like the malware distribution platform used to disrupt Crimea.

2019-07-16

Vietnam’s Top Hacking Group Uses Sloppy Code

OceanLotus group is notorious for using carefully crafted tools to breach Vietnamese companies in the manufacturing and hospitality sectors.

2019-07-11

US Electoral Infrastructure Is Wide Open To Hackers

Most US electronic voting systems are nothing but bare-bone, decade old computer systems that lack even rudimentary endpoint security.

2019-07-10

Police Forensic Firm Has Paid Ransom

Ransom Paid: The leading provider of forensic analysis to British law enforcement agencies is slowly restoring service after a crippling attack.

2019-07-09

China’s Dirty Secret - Intellectual Property Theft

Hackers have stolen masses of corporate and government secrets, with the aim to improve Chinese business and economic competitiveness.

2019-07-04

Iran’s Cyber Threat to Germany

Tehran is emerging as a major cyber security threat to Germany and the West, the German intelligence service has warned.

2019-07-03

30% Of Business Leaders Would Pay Ransom

A third of organisations would consider paying a ransom to an attacker instead of investing in cybersecurity, as they believe it is cheaper.

2019-07-03

Malboard Exploit Mimics A User’s Keystrokes

Malware researchers have developed a new attack method which avoids detection by mimicing a user’s personalised keystroke characteristics.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

GlitchSecure

GlitchSecure

GlitchSecure helps companies secure their products and infrastructure through real-time continuous security testing.