TECHNOLOGY > Hackers


« Back to News

2020-01-28

Greece And Turkey In Conflict

Greek government websites, including the the Ministry of Foreign Affairs, have been knocked offline with a Turkish hacking group suspected.

2020-01-28

Travelex Slowly Recovering From Ransomware Attack

Travelex has restored some of its systems after a crippling malware attack, but is declining to say if it has paid the hackers a ransom.

2020-01-24

Electric Grids Targeted For Cyber Attacks

Some of the world's most dangerous hackers have zeroed in on the US power sector and the risk of a destructive attack is going up.

2020-01-20

New York’s Albany Airport Pays Ransom

Albany County Airport Authority has given in and paid the ransom demanded to release its systems from a crippling Sodinokibi malware attack.

2020-01-16

Travelex Ransom Demand Is Doubled

Pay £6m: Hackers double down on their ransom demand to restart the financial services business' systems as the shutdown enters a third week.

2020-01-13

North Korean Hackers Specialise In Financial Theft

N. Korean hacking groups have been stealing $billions using fake financial services companies to defraud banks and cryptocurrency exchanges.

2020-01-08

GozNym Malware Hackers Sentenced

Jailed: Three members of an international organised cybercrime group who used the GozNym banking Trojan to steal $100 million.

2020-01-07

Cyber Criminals Demand Ransom From Travelex

Hackers are holding foreign exchange company Travelex to ransom after a cyber-attack forced the firm to turn off all computer systems for 4 days.

2020-01-07

N.Korean Hackers Are Working With European Criminals

There is growing evidence that cyber criminals in Eastern Europe and skilled state-backed spies in North Korea are finding ways to work together.

2019-12-20

Cyber Spying, Digital Theft & Espionage

Malware spies form armies of nefarious hackers from around the world who use cyber warfare methods for economic, political, or military gain.

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

International Cyber Security Protection Alliance (ICSPA)

International Cyber Security Protection Alliance (ICSPA)

The International Cyber Security Protection Alliance is a not-for-profit org supporting law enforcement units globally in their fight against cybercrime.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

Cybonet

Cybonet

Cybonet is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cyber security threats.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.