TECHNOLOGY > > Hackers


« Back to News

2024-05-10

LockBit Resurrection

LockBit’s official Dark Net website is reactivated by law enforcement as the Russian gang leader is identified as Dmitry Khoroshev.

2024-05-08

Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers

A Silent Invisible War: Israel has been developing its defences against cyber attacks, to function like the Iron Dome against missile attacks.

2024-05-07

British Military Personnel Data Hacked

Personal details of thousands of serving British soldiers, sailors and air force members have been exposed in a data breach at a payroll system.

2024-05-02

Attacks Against Cisco Firewall Platforms

Detected: A new targeted malware campaign exploiting zero-day flaws in Cisco networking gear to deliver custom malware and enable data theft.

2024-05-01

Volkswagen Hacked, Critical Data Stolen

Thousands of documents about research in engine & electric vehicle technology were exfiltrated, going undetected for at least five years.

2024-05-01

Russian Hackers Are A Global Threat

Sandworm: Mandiant report on widespread operations and exploits of sabotage & electoral interference serving Russian geopolitical interests.

2024-04-22

Phishing-as-a-Service Platform LabHost  Is Turned Over

One of the most popular phishing-as-a-service platforms has been smashed in a law enforcement operation coordinated by Europol.

2024-04-17

Iranian Hackers Targeted Israel’s Radar Systems

An Iranian hacking group named Handala has published a statement on social networks, claiming that they penetrated Israel's radar defences.

2024-04-15

Iranian Hackers Attack US Water Supplies

The White House says recent attacks by Iranian hackers on US water infrastructure are a loud wake-up call to the water & utilities industries.

2024-04-17

Hackers Using YouTube To Deliver Malware

Malicious User Accounts: Data stealing malware is being delivered via YouTube disguised as pirated software and video game cracks.

2024-04-15

DoS Attacks That Can Crash Web Servers With Ease

HTTP/2 Continuation Flood: A new DoS attack method poses a severe threat by sending a sequence of CONTINUATION frames without END_HEADERS.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

White Tuque

White Tuque

A new way to protect your organization. White Tuque is your partner in identifying threats, understanding your risk, and ensuring your business remains resilient.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.