TECHNOLOGY > > Hackers


« Back to News

2024-03-01

Ransomware: The True Cost To Business

Paying Ransom Does Not Work: Organisations should really focus on detection & prevention tactics before a damaging attack happens.

2024-02-26

Data Leak Exposes China’s Hackers For Hire 

Nation-State Hackers Exposed: I-Soon has abilities to breach foreign governments, infiltrate social media accounts & hack personal computers.

2024-03-19

The Surge In Ransomware & AI Defence Innovations

Ransomware Evolution: Investing in stronger defences with AI-powered and cloud-delivered cyber security is key to protect against the new threats.

2024-02-22

Rhysida Ransomware Cracked & Decrypted

A Cyber Security Dilemma: A decyrptor tool that helps victims recover from a Rhysida malware infection will alert the hackers to try harder.

2024-03-18

Cyber Criminals Use CAPTCHA To Spread Malware

Dark Gate: Legal advertising tools like CAPTCHA are being used by cyber criminals to track victims response to infectious malware links.

2024-03-12

Deepfakes Deployed In Mobile Banking Malware Attacks

GoldPickaxe: Mobile malware that collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication.

2024-03-06

Russian Military Botnet Dismantled

The US Department of Justice has disrupted a botnet controlled by the Russia state-sponsored hackers, Forest Blizzard - aka Fancy Bear.

2024-02-21

Lockbit's Website Taken Down By Law Enforcement

Update: Lockbit provided ransomware-as-a-service to a global network of hackers, supplying the tools needed to carry out attacks.

2024-02-20

23andMe Sparks A Rethink About Safeguarding Critical Data

On-Premises Vs Hybrid Cloud Strategies: A key question for many organisations today is that of where and how they host their data. By Mark Grindey

2024-02-23

British Library Still In Recovery

The British Library is using 'work around arrangements' to make critical payments to authors as it struggles to recover from a ransom attack.

2024-02-20

Malicious Microsoft Cloud Account Takeover Campaign

Cyber Criminals Follow Businesses Into The Cloud: Basic corporate account credentials are a lucrative potential source of money & further exploits.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

CTM360

CTM360

CTM360® is a Cyber Security subscription service offering 24 x 7 x 365 Cyber Threat Management for detecting and responding to cyber threats.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Vantea SMART

Vantea SMART

Vantea SMART have decades of experience in cybersecurity resulting in an approach of proactive prevention - Security by Design and by Default.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.