TECHNOLOGY > > Hackers


« Back to News

2018-07-26

Suspected Russian Hackers Attack ProtonMail

ProtonMail's encrypted network has been under sustained pressure caused by DDoS attacks traced to a group claiming to have ties with Russia.

2018-07-24

Hacking Via The Cloud

Chinese hackers launched a big 2017 espionage campaign targeting cloud service supplier’s networks, rather than attacking companies directly.

2018-07-18

Weaponising Stolen Data

A new frontier in cyber threats could be the illicit use of critical infrastructure to manipulate data to weaponise it in new and unexpected ways.

2018-07-17

Putin Says Russia The Target Of 25m World Cup Cyber Attacks

Putin: "Almost 25m cyber attacks and other criminal acts on the information structures in Russia, linked...to the World Cup, were neutralised"

2018-07-16

The Mueller Investigation Identifies Russian Spies

US Intelligence agencies stand vindicated as Special Prosecutor Mueller indicts agents of the Russian military for 2016 electoral interference.

2018-07-16

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

Ukraine's intelligence chiefs are convinced Russia is committed to using de-stabilising cyber attacks as tools to extend its international influence.

2018-07-12

Fake Dating Apps Infiltrate Israeli Military

Hamas has a sophisticated spyware operation designed to trick Israeli Defense Force soldiers into downloading malicious apps.

2018-07-07

Cybercrime & Terrorism Threaten South Africa

S Africa needs more advanced gadgets to detect early danger signals and its intelligence service needs more well-trained agents in the field.

2018-07-09

China Escalates Hacks On The US

Submarines, Satellites & More. China's nation state hackers have reorganized and retooled to become even more effective at digital espionage.

2018-07-06

Theft & Subsequent Re-Use of Cyber Weapons

A year has passed since two widespread and very destructive attacks, both using offensive cyber tools created by the NSA and then stolen.

2018-07-03

Inside The Chinese-Hacking Underground

The experts at Flashpoint know how to identify & characterise the exploits of Chinese hacking groups distinct from those of other nations.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

inBay Technologies

inBay Technologies

inBay Technologies' idQ Trust as a Service (TaaS) is a unique and innovative SaaS that eliminates the need for user names and passwords.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Innefu Labs

Innefu Labs

Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.