INTELLIGENCE > > International


« Back to News

2020-10-27

Russia's Hackers Are Masters Of Cyber Warfare

The British and US indictments of the 'Sandworm' group of military hackers reveals the extensive reach and power of professional cyber soldiers.

2020-10-23

Russian Spies Attacked Olympic Games With Malware

Russia’s GRU military intelligence are known to use the most destructive malware and now stand accused of hacking the 2020 Olympic Games.

2020-10-19

The Emerging Domain Of Cyber War

Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons.

2020-10-06

International Police Sting Operation Disrupts The Dark Web

Operation DisrupTor has successfully targeted both buyers and sellers of illicit goods on the Dark Web to end the 'golden age' of cyber crime.

2020-10-05

British Spies Find Big Software Problems With Huawei

GCHQ's investigation of Huawei equipment widely used in the UK's telecoms networks has discovered a "nationally significant" vulnerability.

2020-10-06

Cyber Warfare Creates Ghosts In Our Machines

Cyber weapons are accessible to anyone with the right computer expertise, not just governments. This changes the nature of armed conflict.

2020-08-17

NSA And FBI Warn Of Russian Linux Malware

Drovorub malware is a full-featured piece of Linux malware to infiltrate networks, steal confidential information and execute malicious commands.

2020-08-04

China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders by espionage and theft.

2020-07-21

Cyber Warfare, Intelligence & Malware

Spies Are Redundant: Digital disruption is sweeping through the world of espionage and is fundamentally changing intelligence gathering.

2020-07-20

Hackers Targeting Turkey & Syria With Spyware

Watering hole attacks against the Kurdish community in Syria and Turkey for intelligence exfiltration purposes are using new tools & tactics.

2020-06-29

China Launches A Wave Of Attacks On India

A surge in incidents of hacking, injecting malware through spam mails, DDoS and other exploitation of vulnerabilities against websites across India.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

IS Decisions

IS Decisions

IS Decisions provide solutions to secure, control & audit user access to Microsoft Windows Server-based networks.

Global Forum on Cyber Expertise (GFCE)

Global Forum on Cyber Expertise (GFCE)

GFCE is a global platform for countries, international organizations and private companies to exchange best practices and expertise on cyber capacity building.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Augmenta Cyber Security

Augmenta Cyber Security

Augmenta is a value driven preferred partner in assisting customers with complete cyber security solutions.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.