TECHNOLOGY > > Hackers


« Back to News

2018-03-16

North Korea's Cyber Soldiers Are Concealed Abroad

Defectors from N Korea reveal the nation's hackers are in fact mostly based outside the country to give the regime enhanced deniability.

2018-03-15

Russia Warns UK Against Cyber Retaliation

Britain could launch a cyber attack in retaliation for the alleged use of a nerve agent in an assassination attempt on Russians in the UK.

2018-03-06

N Korea Is A Bigger Cyber Threat Than Russia

North Korea poses a more considerable cyber-attack threat to the international community than Russia, say the experts at CrowdStrike.

2018-03-09

Russian Hacker False Flags Work - Even After They're Exposed

False Flag identities for nation-state hackers are just as standard a part of the toolkit as phishing links and infected Microsoft Office attachments.

2018-03-12

Cyber Criminals Catch Up With Nation-States

The trickle-down effect of advanced “military-grade” tools is seeing the gap between cyber-criminal & nation state attack capabilities closing.

2018-03-09

UK Think Tanks Hacked by Groups in China

Crowdstrike disclose a number of hacks on high profile UK think tanks by China-based groups dating from last year.

2018-03-02

N Korean Hacking Widens To Target Multinationals

Reaper: North Korea's newest hacker army was busy attacking neighbouring states but is turning its attention to international corporations.

2018-03-01

North Korea's Cyber Army Has A New Battalion

The experts at FireEye have identified a new unit of N Korea's hacker army named APT37, capable of sophisticated international attacks.

2018-02-27

Millions Of Compromised Accounts Discovered On The Dark Web

Researchers at Hacked-DB have found a massive trove of data containing login credentials of millions of users on the dark web.

2018-02-26

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

Without disclosing hard evidence, the US intelligence establishment are united in accusing the Chinese telecoms giant of cyber espionage.

2018-02-20

A Search Tool That Allows Anyone To Access Cloud Documents

Buckhacker is a hacking tool that trawls unsecured cloud server platforms. Companies using them are at risk of losing control of their data.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

Sistem Integra (SISB)

Sistem Integra (SISB)

SISB provide IT Security Infrastructure & Development, Mechanical & Electrical Services, Fire Safety & Detection Services, Facilities Management & Application Development.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

DeviQA

DeviQA

DeviQA provide best-in-class quality assurance services to companies of all sizes.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.