TECHNOLOGY > Hackers


« Back to News

2020-04-20

Addressing Cyber Threats With Positive Action

Cyber criminals are getting much better, reaching a level of sophistication as good as some of the larger organisations that they are aiming to attack.

2020-04-20

Security Advice For Using Video Conference Tools

Remote working is moving some threats toward the top of the risk list. Here is some security advice to keep your business cyber secure.

2020-04-17

Quantum Computing, Hackers & The Internet of Things

Quantum computing is still in its development stage but its potential to enable interaction between humans and the IoT is uniquely powerful.

2020-04-17

Personal Data Of 115m Pakistanis For Sale

A massive data dump containing personal information of 115 million Pakistani mobile phone users is for sale on the dark web.

2020-04-15

APT Hackers Turn On China

DarkHotel: Powerful hackers are engaged in an intense espionage campaign against Chinese government agencies grappling with COVID-19.

2020-04-14

Marriott Hotels - Millions Hacked Again

Careless: After the first incident in 2018 Marriott says it has now lost personal data for as many as 5.2 million guests in a second giant breach.

2020-04-09

Spear Phishing Threats & Trends

A highly targeted form of email account crime, spear phishing is designed to trap well-researched victims and is a growing threat to business.

2020-04-13

Cyber Attacks Up 500% In A Month

Most of the world is trying to deal with the COVID-19 pandemic, but hackers are not under a lockdown as phishing and other attacks surge.

2020-04-06

Zoom-Bombing Hijackers

FBI Warning: Unwanted guests intruding on video conferences for malicious purposes has significantly increased during the pandemic.

2020-04-01

Beware Spoofing Attacks

Spoofing Is No Joke: Eleven types of spoofing attack that every security professional should know about. By David Balaban

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

SAVAGE IO

SAVAGE IO

Savage IO designs, manufactures, and sells high-performance storage, networking, and server systems for demanding IT environments.

KN-CERT

KN-CERT

National Computer Emergency Response Team of the Republic of Korea.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Zenedge

Zenedge

Zenedge offers total security for Web applications and networks, identifying threat actors and stopping malicious traffic from reaching your servers.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Zeichner Risk Analytics (ZRA)

Zeichner Risk Analytics (ZRA)

ZRA is a small business with over 20 years of experience in cybersecurity, risk management, program management, strategic planning, and law and policy.

Innosphere

Innosphere

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.