TECHNOLOGY > > Hackers


« Back to News

2022-01-29

Canadian Government Ministry Under Attack

Canada's critical infrastructure operators are told to prepare for Russian state-sponsored cyber threats as the foreign ministry comes under attack.

2022-01-25

Ransomware Attack On Moncler

Italian luxury brand Moncler refused to pay ransom when its order processing system was disabled, resulting in a vengeful dump of employee data.

2022-01-24

SAAS Malware Used To Attack Crypto Wallets

Cheap and easy-to-use malware available on Dark Web markets means that it has never been easier for cyber criminals to steal crypto currencies.

2022-01-24

Red Cross Hacked - Half A Million Victims At Risk

Hackers targeted an external server company that stores names, locations & contact information gathered from 60 Red Cross societies worldwide.

2022-01-21

Chinese APT Hackers Used Log4Shell Exploit To Target Academic Institution

Specific steps you can take to ensure your security online & avoid tangling with hacker groups exploiting Log4j security flaws. By Ulrike Niemann

2022-01-18

Corporate Cyber Attacks Up 50% Last Year

2021 saw a 50% increase in cyber attacks per week on corporate networks compared to 2020, peaking in December, largely due to Log4J exploits. 

2022-01-19

WhisperGate: Russia Responsible For Cyber Attacks On Ukraine

Update: Russia is responsible for malware attacks, defacing websites & leaving numerous infected Ukraine Government computers wiped.

2022-01-17

REvil Cyber Ransomware Gang Members Arrested

REvil Has Ceased To Exist: Russian law enforcement has dismantled the notorious ransomware group and made over a dozen arrests.

2022-01-14

North Korean Hackers Stole $400m In Crypto Currency

North Korean cyber criminals have had a record year in 2021, launching attacks on crypto currency platforms, investment firms & centralised exchanges.

2022-01-14

Ukraine Government Hit By Massive Cyber Attacks

"Be Afraid And Expect The Worst": Ukrainian government websites hijacked & plastered with threatening messages as Russian hackers get busy.

2022-01-12

SIM Swapping Attacks Caused T-Mobile Breach

T-Mobile Incident Report: SIM swapping makes it possible for attackers to take control of a target's mobile phone number.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.