TECHNOLOGY > > Hackers


« Back to News

2021-06-07

US Media Group In Latest Ransom Attack

Live streams for radio and TV stations owned by the Cox Media Group have been knocked offline in an undisclosed ransom attack.

2021-06-01

Preventing Ransomware Attacks

The chances of ransomware infection can be significantly reduced by security software and by paying sufficient attention to some basic rules.

2021-05-31

Ransomware And Its Criminal Use

Ransomware attackers are ferocious. If you haven’t been attacked yet, it’s not a matter of if, but when. Be prepared. Defend, backup and protect.

2021-05-23

Will Governments Ban Ransom Payments To Hackers?

Britain's ex-NCSC chief is just one expert who is urging governments to ban ransomware payments to prevemt criminals profiteering from their attacks.

2021-05-23

New Zealand Health Service Is Under Attack

Full Outage: The crippling attack on Ireland's healthcare system has some characeristcs that suggest it is being repeated in New Zealand.

2021-05-19

Russian Hackers Have Updated Their Techniques

Russia's hackers are technologically sophisticated & highly capable, with well-developed abilities to target almost any organisation around the world.

2021-05-18

Ireland’s Health Service Won't Pay Ransom

Ireland's Health Service has ruled-out giving in to hackers' ransom demands as healthcare systems struggle to deal with a significant cyber attack.

2021-05-18

Russian Spy Chief Says SolarWinds Was An Inside Job

The head of Russia’s Foreign Intelligence Service, Sergei Naryshkin, says that Western intelligence undertook the SolarWinds cyber attack operation.

2021-05-17

UPDATE: Ransom Attack On Irish Health Service Continues

Health service IT systems could take days to return to normal after being shutdown following the worst ever cyber crime attack on the Irish State.

2021-05-15

Pipeline Ransom Has Been Paid

Darkside hackers have been paid $5 million to restore operations after a ransom attack paralysed fuel supplies across the US Eastern seaboard.

2021-05-14

Ransomware Attack On Ireland's Health Service

The Irish Health Service Executive has shut down IT systems and cancelled appointments after attempts to access data following a ransom attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Secura

Secura

The Secura Cyber Security and Intelligence system predicts and prevents security threats by discovering hidden patterns through the meticulous analysis of large amounts of data.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.