TECHNOLOGY > > Hackers


« Back to News

2024-03-05

Malawi's Passport System Breached

'Technical Glitch': Malawi's government has taken the step of suspending issuing any passports after a breach at the immigration service.

2024-03-01

Ransomware: The True Cost To Business

Paying Ransom Does Not Work: Organisations should really focus on detection & prevention tactics before a damaging attack happens.

2024-02-26

Data Leak Exposes China’s Hackers For Hire 

Nation-State Hackers Exposed: I-Soon has abilities to breach foreign governments, infiltrate social media accounts & hack personal computers.

2024-03-19

The Surge In Ransomware & AI Defence Innovations

Ransomware Evolution: Investing in stronger defences with AI-powered and cloud-delivered cyber security is key to protect against the new threats.

2024-02-22

Rhysida Ransomware Cracked & Decrypted

A Cyber Security Dilemma: A decyrptor tool that helps victims recover from a Rhysida malware infection will alert the hackers to try harder.

2024-03-18

Cyber Criminals Use CAPTCHA To Spread Malware

Dark Gate: Legal advertising tools like CAPTCHA are being used by cyber criminals to track victims response to infectious malware links.

2024-03-12

Deepfakes Deployed In Mobile Banking Malware Attacks

GoldPickaxe: Mobile malware that collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication.

2024-03-06

Russian Military Botnet Dismantled

The US Department of Justice has disrupted a botnet controlled by the Russia state-sponsored hackers, Forest Blizzard - aka Fancy Bear.

2024-02-21

Lockbit's Website Taken Down By Law Enforcement

Update: Lockbit provided ransomware-as-a-service to a global network of hackers, supplying the tools needed to carry out attacks.

2024-02-20

23andMe Sparks A Rethink About Safeguarding Critical Data

On-Premises Vs Hybrid Cloud Strategies: A key question for many organisations today is that of where and how they host their data. By Mark Grindey

2024-02-23

British Library Still In Recovery

The British Library is using 'work around arrangements' to make critical payments to authors as it struggles to recover from a ransom attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.