TECHNOLOGY > > Hackers


« Back to News

2025-07-28

Chinese Cyberespionage Group Targeting Critical Infrastructure

Fire Ant: Advanced capabilities to infiltrate and conduct espionage campaigns, avoiding detection and multi-layered traditional security measures.

2025-07-25

Clorox Sues Cognizant For £300m Alleging Negligence

Breach Enabled By Password Reset Failure: Helpdesk staff allegedly reset an employee’s password for a hacker without verifying their identity.

2025-07-28

Serious Security Problems With Microsoft’s SharePoint Servers

Update: Chinese hackers have exploited vulnerabilities in on-premises MS SharePoint document servers. Cloud-based services are not affected.

2025-07-23

Fancy Bears Get Busy

Best known for hacking US elections, spies from Russia's military intelligence agency, the GRU, are "running a campaign to destabilise Europe"

2025-07-22

The New Face Of Phishing

Hackers use OneNote to deliver embedded malware or credential‑stealing links, all concealed beneath an apparently legitimate appearance.

2025-07-22

Sophisticated Malware Targets US Accounting Firm

A novel crypter named “Ghost Crypt” was used to deliver PureRAT malware, using an advanced obfuscation and a technique called “Process Hypnosis.”

2025-07-19

Fancy Bear's Anatomy: Tactics, Techniques & Procedures

APT28: New research delivers critical insights on TTPs, highlighting the importance of strong proactive defences against this formidable adversary.

2025-07-15

Gambling Websites Under Attack

Flutter Entertainment: The Paddy Power and Betfair online sports betting platforms have been been hacked, affecting 800,000 users.

2025-07-14

Louis Vuitton Customer Data Hacked

Luxury brand LVMH has disclosed that its UK operation has been attacked, with customer names, contact details & purchase histories stolen.

2025-07-11

Scattered Spider Attacks - Four Arrested

British  police have made arrests for the cyber attacks that have caused disruption at M&S, the Co-op, luxury store Harrods and the Qantas airline.

2025-07-08

Qantas Contacted By Perpetrator Of Massive Customer Data Breach

While the breach has been attributed to the prolific hacking collective known as Scattered Spider, Qantas has not confirmed the nature of the contact.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

Insurica

Insurica

INSURICA is a full-service insurance agency built upon a tradition of integrity, industry leadership, and excellence.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

Arcfield

Arcfield

Arcfield protects the nation and its allies through innovations in systems engineering and integration, space and mission launch assurance, cybersecurity, and missile support.

RANE Network

RANE Network

RANE is a global risk intelligence company that provides critical insights and analysis to more efficiently anticipate, monitor, and respond to emerging threats.

NAM-CSIRT

NAM-CSIRT

NAM-CSIRT is a team established to contribute to the security and stability of critical infrastructure and critical information infrastructure of the Republic of Namibia.