INTELLIGENCE > Hot Spots > China


« Back to News

2022-10-19

British Spy Chief Warns Of The Threat From China

Britain's GCHQ spy agency chief says Western countries face a "huge threat" from China exploiting tech dominance to control its own citizens.

2022-09-15

The NSA Hacked Huawei Long Ago

The NSA penetrated Huawei's network technology ten years ago and can likely take steps to restrict & prevent any damaging or malicious activity.

2022-09-12

US Tech Firms Forbidden To Manufacture In China

Technology firms that have had US federal funding will be prevented from creating advanced technology factories in China for at least a decade.

2022-09-05

Chinese Internet Companies Required To Disclose Algorithm Data

Chinese Internet firms including Alibaba, Tencent & Tiktok's owner ByteDance have supplied details of their critical algorithms to China's regulator.

2022-08-08

Taiwan's Government Websites Attacked Just Before Pelosi’s Visit

Sending A Message: Taiwan’s presidential office and other agencies were attacked a few hours before US House Speaker Nancy Pelosi’s arrival.

2022-06-13

Warning: Chinese Cyber Attacks

US security agencies say Chinese state-sponsored threat actors are actively targeting telecoms across a wide range of network service providers.

2022-06-20

The Internet & Freedom Of The Press

The Internet was conceived as a borderless network permitting the free flow of information around the world, but barriers and controls are proliferating.

2022-02-07

News Corp. Journalists Hacked

Chinese hackers are suspected of targeting US and British newspaper journalists in an operation to get access to intelligence from their sources.

2022-01-21

Chinese APT Hackers Used Log4Shell Exploit To Target Academic Institution

Specific steps you can take to ensure your security online & avoid tangling with hacker groups exploiting Log4j security flaws. By Ulrike Niemann

2021-12-01

British Spies Must Adapt to Survive

Britain's secret spy agency will have to become “more open to stay secret” and work with tech companies to counter threats from China and Russia.

2021-10-25

US Cyber Security ‘Kindergarten’ Compared To China

Pentagon CSO Quits: China is heading towards global dominance in AI due to the relatively slow pace of innovation in the United States. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.