TECHNOLOGY > > Hackers


« Back to News

2020-06-27

Companies Are Coughing Up Ransom To Recover Their Data

One in six of those attacked with malware have surrendered by paying out the ransom following a data breach. One firm paid over £70million.

2020-06-27

Amazon Web Services Fights Off Massive DDoS Attack

Amazon's online cloud, which provides the infrastructure on which many websites rely, has defended itself against the largest DDoS attack ever.

2020-06-26

How Hackers Invade Your Computer

Hacking attempts are aimed at the most vulnerable, insecure computers that can be hijacked and used to launch many other attacks.

2020-06-24

Australia Assaulted By Severe State-Backed Cyber Attacks

Australia has not directly accused China and yet the scale, nature of the targeting and the signature methods used all point one direction.

2020-06-23

Beware Trojan Mobile Banking Apps

The FBI advises users to exercise extreme caution when downloading banking Apps to mobile devices, as they could hide 'malicious intent'.

2020-06-19

The Future Of Ransomware Is In The Cloud

Ransomware has become a multibillion dollar industry for cyber criminals, who are staring to focus on the fast-growing Cloud computing sector.

2020-06-17

Hackers Are Targeting Coronavirus Research

State-backed cyber attackers are trying to steal data from universities and research institutes involved in coronavirus vaccine research.

2020-06-17

Maritime Cyber Attacks Quadruple

Ageing shipping infrastructure, complex supply chains and the effects of lockdown combine to make the shipping industry highly vulnerable.

2020-06-15

Nuclear Missile Contractor Hacked

Hackers have stolen confidential documents from a US firm which provides critical support for the country's Minuteman III nuclear deterrent.

2020-06-12

Attacks On Anti-Racism Sites Surge

Anti-racism groups have experienced a large increase in DDoS attacks, from near-zero to over 120 million blocked requests in the past week.

2020-06-12

Popular Types Of Phishing Emails

There was a 667% spike in email phishing attacks in March and the best way to guard against phishing scams is early detection.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

Romanian Association for Electronic Industry & Software (ARIES)

Romanian Association for Electronic Industry & Software (ARIES)

ARIES is the Romanian Association for Electronic Industry and Software, the biggest and most influental organization created for the IT&C industry in Romania.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.