TECHNOLOGY > > Hackers


« Back to News

2020-06-08

Hackers Targeting Both Trump & Biden Presidential Campaigns

Deja-Vu All Over Again: Foreign hackers have targeted the email accounts of staff working on both of the US 2020 Presidential campaigns.

2020-06-05

Taiwan's Entire Population Database Stolen

It is very unusual for an entire nation’s database to be leaked but the secret details of 20m Taiwanese citizens have appeared on the Dark Web.

2020-06-03

Do Not Underestimate Iran’s Cyber Threat

Iran is a cyber superpower and has been focusing its efforts on the proposition that future conflicts will require advanced cyber capabilities.

2020-06-02

German Critical Infrastructure At Risk Of Russian Hacking

Russian hackers have a special intrusion technique to target the computer  systems used by industrial firms to manage critical infrastructure.

2020-06-01

Ethical Hackers Have Earned $100m

Bug bounty platform HackerOne has announced that it has paid out $100m in rewards to white-hat hackers around the world to date.

2020-05-27

Iran In The Firing Line

There is a persistent cyber conflict in the M. East and the region is at the forefront of experiments with new online weapons with Iran at the centre.

2020-05-26

Hacked ChatBooks Photo Data For Sale

Data consisting of 15 million user records has been stolen from a photo print service company and can now be found for sale on the Dark Web.

2020-05-26

Hackers Succeed In Doing More Harm Than Insiders

Verizon's 2020 Data Breach Report finds that 70% of breaches derive from external action, with organised crime accounting for 55% of these.

2020-05-21

German Government Hit By Russian Hackers

Chancellor Angela Merkel has evidence she was targeted by hackers working for Russian military intelligence. Not for the first time.

2020-05-20

Nine Million EasyJet Customers Hacked

British budget airline EasyJet admits that customer data, email addresses and travel details of 9 million customers have been hacked & stolen.

2020-05-19

EU Parliament Suffers A Major Attack

An Indian cyber security company has discovered a major data breach exposing private data of numerous members of the European Parliament.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Blackwall

Blackwall

Blackwall (formerly BotGuard) is a security infrastructure company focused on protecting web ecosystems from automated threats, while optimizing performance for hosting environments.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.