TECHNOLOGY > > Hackers


« Back to News

2018-07-25

Trump / Putin Summit Was A Magnet For Hackers

The Helsinki meeting between Presidents Trump and Putin was as big a magnet for hackers as the Singapore summit with Kim Jong-un.

2018-07-21

Trump Blames Obama For Russian Cyber-Attack

US President Donald Trump has blamed Barack Obama for failing to prevent Russia’s 2016 cyber-attack on democratic email servers.

2018-08-08

Crypto-Mining Hits 42% Of Organisations Worlwide

Criminals are using cloud infrastructure to target organisations with crypto-mining malware to develop illegal revenue streams.

2018-08-07

Hackers Paid Big Money To Improve Cybersecurity

Hackers are being paid big bounties by business and government agencies to discover bugs and to protect platforms, products and consumers.

2018-07-25

Chinese Hackers Target Cambodian Elections

Chinese spies are targeting Cambodian government institutions, opposition party members & media in advance of national elections.

2018-07-26

Suspected Russian Hackers Attack ProtonMail

ProtonMail's encrypted network has been under sustained pressure caused by DDoS attacks traced to a group claiming to have ties with Russia.

2018-07-24

Hacking Via The Cloud

Chinese hackers launched a big 2017 espionage campaign targeting cloud service supplier’s networks, rather than attacking companies directly.

2018-07-18

Weaponising Stolen Data

A new frontier in cyber threats could be the illicit use of critical infrastructure to manipulate data to weaponise it in new and unexpected ways.

2018-07-17

Putin Says Russia The Target Of 25m World Cup Cyber Attacks

Putin: "Almost 25m cyber attacks and other criminal acts on the information structures in Russia, linked...to the World Cup, were neutralised"

2018-07-16

The Mueller Investigation Identifies Russian Spies

US Intelligence agencies stand vindicated as Special Prosecutor Mueller indicts agents of the Russian military for 2016 electoral interference.

2018-07-16

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

Ukraine's intelligence chiefs are convinced Russia is committed to using de-stabilising cyber attacks as tools to extend its international influence.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.