INTELLIGENCE > > International


« Back to News

2019-08-19

US Releases Malware Linked To N. Korean Hacking Group

Electric Fish: US Cyber Command has released samples of malware that they say are linked to N. Korean hackers from the Lazarus Group.

2019-08-16

United Nations Investigating N Korean Cyber Attacks

S. Korea was hard hit by ten attacks by N. Korean hackers. India had three, Bangladesh and Chile were hit by three attacks plus 13 more countries.

2019-07-26

Cyberwar: Covert Cyber Attack Campaign Is Underway

A M.East cyberwar is running at full speed. Networks are being probed, weaknesses and vulnerabilities tested, offensive actions planned.

2019-06-25

A New Age of Warfare

Cyber war operations are being conducted out of sight, classified, unattributed and increasingly beyond the control of political leaders.

2019-06-20

The Spycraft Revolution

Forget James Bond: The business of spying and espionage is facing tremendous technological, political, legal, social, and commercial changes.

2019-05-14

WhatsApp Penetrated By Spyware

Hackers have installed surveillance software on phones and other appliances exploiting a major weakness in Facebook’s WhatsApp messenger.

2019-05-21

Israel Hits Back At Hamas Cyber Attackers

As more details emerge, it is thought to be the first instance of retaliation with physical military action in real time against a cyber-attack.

2019-05-08

Mossad Needs Cyber Experts

Israel's national intelligence agency, known as Mossad, is looking for more highly- trained experts for its operational arm.

2019-05-07

Five Eyes Intelligence Chiefs Point The Finger

International Intelligence Chiefs agree that attributing blame for attacks by nation-state hackers can improve security awareness.

2019-04-02

New Zealand Reconsiders Mass Surveillance

After the mass murders in Christchurch, NZ politicians are talking about resuming a wide ranging mass surveillance program.

2019-03-26

US Surveillance System Exposed By Snowden Goes Dormant

A US surveillance programme whose forerunner was exposed by Edward Snowden has not been used for six months and is unlikely to be renewed.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab

NUS-Singtel Cyber Security R&D Lab conducts research into predictive security analytics.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Vizius Group

Vizius Group

The Vizius Group are a think tank of cybersecurity consultants who understand the mechanics and business value of risk reduction.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

RecoLabs

RecoLabs

Reco’s proprietary AI technology dynamically maps business interactions within your collaboration tools to identify sensitive assets shared and uncover incidents that are relevant to your business.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.