TECHNOLOGY > > Hackers


« Back to News

2019-02-18

Chinese Hackers Go After Norwegian Businesses

Chinese hackers APT10 have stolen data from a Norwegian cloud software security company, according to experts at Recorded Future & Rapid7.

2019-02-13

UK Student Loans Company In The Crosshairs

Cyber criminals are using malware, malicious emails and fake calls in attempts to access confidential financial data belonging to students.

2019-02-12

The Top 5 Malware Attack Types

Nearly 20% of cyber-attacks reported to the UK Information Commissioner last year were malware-related and the total number is increasing.

2019-02-07

Going Postal: ‘We Have Sent You a Message’

Don't be fooled by the latest email fraud campaign pretending to be from the US Postal Service and aimed at infecting your computer with malware.

2019-02-06

N. Korea Could Expand Cyber Espionage Activities

In response to the stifling effects of international sanctions, N Korea's hackers could become more important to the regime than ever before.

2019-02-05

The Biter Bit: Secret Russian Files Are Leaked

The transparency advocacy group DDoSecrets has released 175 gigabytes of hacked Russian documents detailing the 'dark side' of the Kremlin.

2019-02-01

Geo-Political Tensions Are Fuelling Cyber Attacks

Carbon Black's latest Threat Report reveals just how sophisticated attackers have become in evolving to remain undetected.

2019-01-31

Cyber Criminals Are Aiming At Business

Last year was the time when cybercriminals definitely realised businesses are juicier targets than individuals.

2019-01-25

Australian Defence Chief Issues Cybercrime Warning

Australia's military chief has warned European officials of the ever-present threat posed by cyber espionage and intellectual property theft.

2018-12-20

EU Diplomatic Communications 'Targeted by Hackers'

Hackers successfully targeted the European Union's diplomatic communications over a period of several years, The New York Times reports.

2019-01-11

Breaking Down Five 2018 Breaches

Data breaches soared in 2018. This might be that since GDPR came into force firms are more likely to report attacks. It does not mean they are safer.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

SecurityHQ

SecurityHQ

SecurityHQ (formerly known as Si Consult) is a Global Managed Security Service Provider (MSSP) that monitors networks 24/7, to ensure complete visibility and protection against your cyber threats.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).

Breez Security

Breez Security

Breez Security's mission is to address the increasingly complex and ever evolving challenges of identity security.