TECHNOLOGY > > Hackers


« Back to News

2025-02-04

Lessons Learned From The Salt Typhoon Hacks

Relying On Detection Is Not Enough: Businesses need to be on the front foot and stop these attacks at the source. By Danny Jenkins

2025-01-21

Ukrainian Hackers Attack Russian Financial Services

550TB Of Data Destroyed: Russia's leading online trading platform, Roseltorg, has been attacked by a pro-Ukraine hacking group, Yellow Drift.

2025-01-20

Data Broker Discloses A Major Breach Of App User Data

Misappropriated Access Key: Hacked data appears to have originated in thousands of smartphone apps, including Tinder, Grindr and Candy Crush.

2025-01-15

British Government Will Ban Payment For Ransom Attacks 

Deterring Cyber Crime: The intention is to make public sector & infrastructure organisations less attractive targets for ransomware gangs.

2025-01-07

Hacker Sentenced For Stealing Coldplay's Music

Convicted: Unreleased music from pop music artists including Coldplay and singers Bebe Rexha & Shawn Mendes were stolen and sold.

2025-01-03

Hackers Deploy Malicious Chrome Extensions

Supply Chain Attack: A large-scale hacking campaign targeting Chrome extensions has affected customers of a leading cyber security firm.

2024-12-27

IoT Devices Infected With Pre-Installed Malware

BadBox: Android malware embedded in the device’s firmware, which enables interception of private credentials & can install other malicious software.

2024-12-16

Termite Hacked Blue Yonder 

Termite: A previously unknown ransomware gang has claimed responsibility for an attack on a leading supply chain software company.

2024-12-17

Diversity Is Key To Combating Gen-AI Hackers

Hiring practices should prioritise candidates with diverse skills & non-traditional backgrounds, broadening the talent pool. By Andrea Cullen

2024-12-11

Ransomware Criminals Claim To Have Stolen Deloitte's Data

Brain Cipher: Spear phishing specialists say they have hacked the leading multinational professional services firm. Deloitte say otherwise.

2024-12-11

British NHS Hospitals Under Attack

A Ceaseless Target: Ransom attacks on three Liverpool hospitals are just the latest in a series against NHS healthcare organisations in 2024.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

IT Band Systems

IT Band Systems

IT Band Systems is an international provider of IT products and services including web server monitoring and web security consulting.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

GeoComply

GeoComply

GeoComply provides fraud prevention and cybersecurity solutions that detect location fraud and help verify a user's true digital identity.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.