INTELLIGENCE > > International


« Back to News

2023-08-14

Understanding Malvertising Attacks

Lack of awareness, plus easier access to AI tools, provides the perfect cocktail for even inexperienced threat actors to exploit. By Tom McVey

2023-08-03

Chinese Spies Used Forged Validation Tokens To Access Government Emails

Chinese hackers breached email accounts at numerous organisations, including US government agencies, to intercept secret information.

2023-07-24

Cyber War, Intelligence, Malware & Espionage

Digital disruption is sweeping through the world’s second-oldest profession, Spying, and it is altering all aspects of intelligence collection.

2023-06-02

How To Counter Covert Action In The Digital Age

The case of Iran shows that countering covert action in the digital age requires persistence. Also, it's unlikely to stop. By James Shires 

2023-05-29

Spy Agencies Warn Of New Threats From Chinese Hackers

Volt Typhoon: The Five Eyes group of western intelligence agencies has issued a notice detailing the nature of the threat from Chinese hackers.

2023-05-18

Iranian Government Uses Android Malware For Mobile Surveillance

BouldSpy: Covertly installed Android spyware used to monitor arms shipments, surveil dissident & minority groups, alcohol and drugs trafficking.

2023-04-26

Selling Digital Insecurity

Offensive cyber capabilities pose a significant threat to international security. Such capabilities can also cause significant damage.

2023-03-08

Cyberwar: Lessons From Ukraine

AI, OSINT, the IoT & Social Media: The tools that increasingly run the digital world have quickly been repurposed to have destructive physical effects.

2023-02-22

European & American Hackers Attack China

Hacked: Chinese experts say that sensitive information, source code and databases of critical Chinese information systems have been exposed.

2023-02-20

Technology Is Disrupting Intelligence & Espionage

New Surveillance Tools Use AI & Quantum: The power balance in the spy world is changing and closed societies have gained the edge.

2023-01-24

Ukraine Signs Cyber Security Deal With NATO

The cyber security collaboration gives Ukraine access to NATO’s malware information sharing platform, along with 'enhanced cyber cooperation'.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

National Security Agency (NSA)

National Security Agency (NSA)

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.