INTELLIGENCE > Hot Spots > Iran


« Back to News

2018-04-10

Iranian Hackers Adopt New Methods

An Iranian espionage group has been using new malware and data exfiltration techniques in recent attacks, say the experts at Nyotron.

2018-03-26

The Resurgent Cyber Threat From Iran

Iran's army of hackers are emboldened and skilled at carrying out surveillance operations and sophisticated attacks beyond its borders.

2018-02-05

Iran Adopts Russian Style CyberWar Tactics

The Iranian regime has deployed cyber trolls and online bots to push back against online dissent and influence social media trends.

2018-01-17

Iran’s Internal Conflict Plays Out On Social Media

Disinformation, Bots, #Hashtag wars. The civil unrest on the streets of Iran is being mirrored on social media, where government and protesters clash.

2018-01-15

Iran’s Cyber Capabilities

Offensive cyber operations have become a core tool of Iranian statecraft, gathering information against enemies at home and abroad.

2018-01-12

Iran’s Cyberwar Could Infiltrate Your Mailbox

Iran’s police crackdown on protesters could affect almost anyone who has been in contact with dissident groups, even people only distantly linked.

2018-01-05

Iran Turns Off The Internet

Iranians have taken to using VPNs and building apps to bypass their government's measure to cut off the internet to suppress protests.

2017-12-28

Iranian Hackers Have Infiltrated US Infrastructure

Iranian hacking group APT34 appear to have burrowed deep, targeting US financial, energy, telecommunications and chemicals companies.

2017-10-30

Iran Responsible For Cyber Attack On British Parliament

A sustained attack that compromised over 90 MPs Email accounts is thought to be Iran’s first act of cyberwarfare against Britain.

2017-10-09

Iranian Hackers Linked To Malware

Iran has earned a reputation for aggressive state-sponsored hacking, stealing data from corporate and government networks around the world.

2017-03-03

Iran Cyber Attacks on Saudi Arabia

After a four-year hiatus, Iran recently resumed destructive cyber-attacks against Saudi Arabia in what US officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional US ally.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.

Octopus Cybersecurity

Octopus Cybersecurity

Octopus VAR is a Validation, Analysis and Reporting tool that gives risk managers and CISOs a powerful control mechanism and a deep view of operational risks.