Hackers

A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. While "hacker" can refer to any skilled computer programmer, the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.

Source: en.wikipedia.org

US Sanctions Chinese Government Contractor Employing Flax Typhoon Hackers
US Sanctions Chinese Government Contractor Employing Flax Typhoon Hackers
January 03, 2025  |  Cybersecurity

The United States imposed sanctions on Beijing-based cybersecurity company Integrity Technology Group, which is a People’s Republic of China (PRC) government contractor, saying the company...

READ MORE >
What 2024’s Worst Cyberattacks Say About Security in 2025
What 2024’s Worst Cyberattacks Say About Security in 2025
December 27, 2024  |  Cybersecurity

Cybersecurity took center stage in 2024 as some of the most sophisticated and damaging attacks in history underscored the vulnerabilities of an increasingly digital operating...

READ MORE >
Yearlong Cyberattack Targets Security Workers
Yearlong Cyberattack Targets Security Workers
December 15, 2024  |  Cybersecurity

The year of the cyberattack is apparently not going to end quietly. Get the Full Story Complete the form to unlock this article and enjoy...

READ MORE >
BEC and Phishing Attacks Surge, Exploiting New Domain Names
BEC and Phishing Attacks Surge, Exploiting New Domain Names
December 06, 2024  |  Cybersecurity

Technology begets opportunity, for both successful companies and fraudsters. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access...

READ MORE >
Ongoing Salt Typhoon Hacking Campaign Targets Americans’ Call Record Metadata
Ongoing Salt Typhoon Hacking Campaign Targets Americans’ Call Record Metadata
December 04, 2024  |  Cybersecurity

Chinese hacking group Salt Typhoon reportedly has stolen the call record metadata of a “large number” of Americans. Get the Full Story Complete the form...

READ MORE >
As Supply Chains Go Digital, Cybersecurity Must be Strongest Link
As Supply Chains Go Digital, Cybersecurity Must be Strongest Link
November 27, 2024  |  Cybersecurity

Cyber breaches, not coal in their stocking, is what businesses are worried about this holiday season. Get the Full Story Complete the form to unlock...

READ MORE >
T-Mobile Spots and Ejects Possible ‘Salt Typhoon’ Hackers on Its Network
T-Mobile Spots and Ejects Possible ‘Salt Typhoon’ Hackers on Its Network
November 27, 2024  |  Security & Fraud

Unusual activity on T-Mobile network devices reportedly alerted the company to a breach. Get the Full Story Complete the form to unlock this article and enjoy unlimited...

READ MORE >
T-Mobile Network Reportedly Breached in Chinese Hacking Campaign
T-Mobile Network Reportedly Breached in Chinese Hacking Campaign
November 17, 2024  |  Cybersecurity

T-Mobile was reportedly hacked in a recent cyberespionage attack on American and international telecommunications companies. Get the Full Story Complete the form to unlock this...

READ MORE >
How 21st Century CISOs Balance AI Risks Against Rewards
How 21st Century CISOs Balance AI Risks Against Rewards
November 14, 2024  |  Artificial Intelligence

Artificial intelligence is a double-edged sword for modern enterprises. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access...

READ MORE >