INTELLIGENCE > > International


« Back to News

2020-10-23

Russian Spies Attacked Olympic Games With Malware

Russia’s GRU military intelligence are known to use the most destructive malware and now stand accused of hacking the 2020 Olympic Games.

2020-10-19

The Emerging Domain Of Cyber War

Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons.

2020-10-06

International Police Sting Operation Disrupts The Dark Web

Operation DisrupTor has successfully targeted both buyers and sellers of illicit goods on the Dark Web to end the 'golden age' of cyber crime.

2020-10-05

British Spies Find Big Software Problems With Huawei

GCHQ's investigation of Huawei equipment widely used in the UK's telecoms networks has discovered a "nationally significant" vulnerability.

2020-10-06

Cyber Warfare Creates Ghosts In Our Machines

Cyber weapons are accessible to anyone with the right computer expertise, not just governments. This changes the nature of armed conflict.

2020-08-17

NSA And FBI Warn Of Russian Linux Malware

Drovorub malware is a full-featured piece of Linux malware to infiltrate networks, steal confidential information and execute malicious commands.

2020-08-04

China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders by espionage and theft.

2020-07-21

Cyber Warfare, Intelligence & Malware

Spies Are Redundant: Digital disruption is sweeping through the world of espionage and is fundamentally changing intelligence gathering.

2020-07-20

Hackers Targeting Turkey & Syria With Spyware

Watering hole attacks against the Kurdish community in Syria and Turkey for intelligence exfiltration purposes are using new tools & tactics.

2020-06-29

China Launches A Wave Of Attacks On India

A surge in incidents of hacking, injecting malware through spam mails, DDoS and other exploitation of vulnerabilities against websites across India.

2020-06-29

Julian Assange Faces New Criminal Charges

The indictment includes an accusation that the WikiLeaks founder conspired with LulzSec hackers to steal classified files from secret US databases.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.