TECHNOLOGY > > Hackers


« Back to News

2024-06-26

LockBit Claims It Hacked The US Federal Reserve

LockBit claims to have stolen 33 terabytes of confidential data from the US Federal Reserve, but security researchers are expressing doubt.

2024-06-25

Hackers Use Windows Backdoor To Deliver BadSpace

Fake Browser Update: A multi-stage attack chain involving an infected website, a command-and-control server, and a JScript downloader.

2024-06-24

Large - Scale Supply Chain Hack On Auto Industry

Hackers who disabled the software systems of a company that provides services to thousands of US car dealerships are demanding ransom.

2024-06-24

Facebook Phishing Emails Are Targeting Businesses

Be Aware: Fraudsters are increasingly inventive in finding ways to trick people into giving away their money & sensitive personal information. 

2024-06-21

Hackers Publish Stolen Blood Test Data From London Hospitals

The group behind the recent Snynnovis attack that is disrupting operations at several major hospitals in London has published stolen data online.

2024-06-18

Chinese Hackers Have A Global Impact

Chinese state-sponsored hackers gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a known critical security flaw.

2024-06-12

Kinsing Malware Attacks Analysed

A Critical Threat: Kinsing targets cloud infrastructure, exploiting misconfigurations to rapidly spread attacks across numerous popular applications.

2024-06-20

London Hospitals Held To Ransom

Update - £50million Ransom: Qilin cyber crime group has demanded payment from the affected London Hospitals unable to access critical services.

2024-06-10

The Major AI Threats Cyber Security Teams Must Deal With

The Big Five: Cyber threats are shaping the future, with a focus on the increasingly sophisticated use of AI by attackers as well as defenders.

2024-06-10

Business Is Responding To AI Cyber Security Threats

Firefighting: Cyber security teams are rapidly changing their strategies to keep pace with emerging AI-based threats targeting businesses.

2024-06-05

Hackers Target Healthcare

Serious breaches have very dangerous implications for the healthcare industry, sharpening the focus on how to protect medical data.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

National Security Agency (NSA)

National Security Agency (NSA)

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

Rwanda Information Society Authority (RISA)

Rwanda Information Society Authority (RISA)

RISA is at the forefront of all ICT project implementation, research, infrastructure and innovation within the ICT sector in Rwanda.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.