TECHNOLOGY > > Hackers


« Back to News

2025-07-02

Qantas Falls Victim As Scattered Spider Targets Aviation

A third-party customer service platform was breached, exposing names, email addresses, phone numbers, dates of birth, and Frequent Flyer numbers.

2025-07-02

NimDoor: North Korea’s Latest Cyber Exploit Targets Crypto

A Sophisticated Campaign: N. Korean hackers blend social engineering, novel persistence mechanisms & cross-platform coding to infiltrate targets.

2025-07-01

Swiss Health Foundation Cyber Attack Exposes Federal Data

Ransomware Strike Hits Radix: A breach by the Sarcoma ransomware group has leaked 1.3TB of data, raising concerns over government security.

2025-06-28

Notorious Hacker ‘IntelBroker’ Arrested

British Hacker Charged In Global Cybercrime Scheme: Law enforcement agencies are making progress by targeting Dark Web cybercrime forums.

2025-06-23

Ransomware Trends In May 2025

A Persistent Plague: 31% of attacked enterprises halt operations, 40% downsize staff, and 60% of SMEs close within six months.

2025-06-23

Pakistan’s Cyber Offensive: APT36 Targets Indian Defence

Transparent Tribe: A social engineering campaign exploiting ID credentials to deliver malicious payloads, infiltrate systems & gather intelligence.

2025-06-20

Three Million Records Exposed In Passion.io Data Breach

The exposure poses significant cyber risks, particularly for social engineering and phishing attacks, which account for 98% of cybercrimes.

2025-06-03

Cartier Confirms Customer Data Exposure

The Luxury jewelry retailer has disclosed a security breach in a customer notification, following unauthorized system access & data exposure.

2025-05-27

Cyber Attack On Adidas Highlights A Rising Tide Of Retail Sector Threats

Global sportswear giant Adidas becomes the latest high-profile target in a surge of cyberattacks affecting major retailers worldwide.

2025-06-16

Understanding Identity & Access Management

The Front Door Of Cyber Defence: IAM is becoming the essential first line of defence against cyberattacks targeting identities. By Sidra Mobeen

2025-06-02

Scattered Spider Hackers Get Busy

Scattered Spider Targeting Retailers: The cybercrime group linked to multiple high-profile retail breaches increasing its international activities.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

NANO Corp

NANO Corp

At NANO Corp, we keep your network visible, understandable, operational and secure with state-of-the-art technology.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.

KIT365

KIT365

KIT365 aim to protect organisations against cyber security attacks, by mitigating the risk to their systems and information, and protecting their data and reputation.