INTELLIGENCE > Hot Spots > China


« Back to News

2025-02-01

How Does DeepSeek Compare With Other Chatbot AI Tools?

Don't Talk About Tiananmen: Easy to use and mostly accurate, DeepSeek censors itself when answering questions about subjects banned in China.

2025-01-28

China's DeepSeek AI Has Shaken The US Tech Industry 

The sudden emergence of a small Chinese startup capable of rivalling Silicon Valley’s top companies challenges assumptions about US AI technology.

2025-01-22

Cyber Threat Forecast 2025 Part One - North America

Part 1 of a 4-part series that will forecast the international cyber threat landscape in 2025, beginning with North America. By Craig Watt

2025-01-20

Remote Deletion Of Malware Enforced On Thousands Of Computers 

The US Justice Dept. has confirmed completion of an operation ordering removal of PlugX Chinese malware infecting over 4,000 computers.  

2025-01-20

Salt Typhoon - The Chinese Telecom Hack

What's Next?: Their attacks have impressed by the skill, persistence and ability of Salt Typhoon hackers to embed in computer networks.

2025-01-17

President Biden’s Final Cyber Security Executive Order  

Parting Shot: It Is unclear how much of Joe Biden’s last-minute directive to strengthen US national cyber security will be embraced by Donald Trump.

2025-01-01

Chinese Hackers Penetrated The US Treasury

The US Treasury Dept. has disclosed that it has fallen victim of what it describes as a ‘major cyber security incident’ which it blames on China.

2024-12-31

China Complains About US Cyber Attacks

Pot, Kettle, Black: US Intelligence agencies are accused of hacking Chinese technology companies to extract commercial secrets and other IP.

2024-12-27

IoT Devices Infected With Pre-Installed Malware

BadBox: Android malware embedded in the device’s firmware, which enables interception of private credentials & can install other malicious software.

2024-12-13

Chinese Firm Sanctioned For Potentially Lethal Cyber Attacks

Sichuan Silence: A Chinese cyber security firm has been sanctioned by the US for attacks exploiting a software vulnerability in corporate firewalls.

2024-12-05

US Telecoms Customer Data Stolen By Chinese Hackers 

Salt Typhoon: Dozens of companies have been penetrated, including at least eight major US telecoms & broadband infrastructure firms.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BTWorks

BTWorks

BTWorks provides identity management and anti-phishing / smishing solutions for web and mobile apps.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Health Sector Cybersecurity Coordination Center (HC3) - USA

Health Sector Cybersecurity Coordination Center (HC3) - USA

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.

Cloudbox

Cloudbox

Cloudbox build and maintain a highly secure, compliant IT infrastructure for our clients – with total peace of mind – so they can focus on the market.