INTELLIGENCE > Hot Spots > Iran


« Back to News

2019-05-29

Is The US Planning A Cyber Attack On Iran?

A pre-emptive cyber-attack could be be a way for the US to hit Iran, without the need for attacks using conventional forces.

2019-03-01

US Under Attack By Chinese & Iranian Hackers

Geopolitics pay out in cyberspace as attacks from Iran and China reflect disagreements between nation states on sanctions and trade.

2018-12-11

Iran Using Websites To Spread Fake News

More than 70 websites found that push Iranian propaganda to 15 countries as part of a political influence operation.

2018-11-21

Stuxnet 2.0 - Iran Says Israel Has Launched New Cyber Attacks

Iran’s chief of civil defense recently claimed that the Iranian government had fought off what he described as a new version of Stuxnet.

2018-11-08

Iran Admits To Being Hit By Cyber Attack

Iran’s strategic infrastructure networks have reportedly come under an extensive and powerful cyber-attack. Who would do that?.

2018-11-12

How Did Iran Find CIA Spies? They Googled It!

A covert channel used for communicating with CIA sources was exposed and infiltrated by Iranian intelligence in 2009.

2018-09-19

Iran Targets Kurds With Spyware

Malware collects the target's mobile data including contact lists, phone call records, SMS messages, geo-location, photos, voice messages and more.

2018-09-17

Iranian Hackers Target Universities For Secret Research

Iranian hackers target academic institutions as part of a major campaign to steal unpublished research and obtain intellectual property.

2018-09-04

Iranian Political Influence Campaign Goes Global

Iranian influence operations targeting internet users worldwide are significantly bigger than previously identified.

2018-05-25

An Iranian Hacker Confesses

Understanding the hierarchy of Iran's hackers offers insight into how to defend against the prospect of attacks from the Islamic Republic.

2018-05-14

Iran Likely To Retaliate With Cyberattacks

The experts at Recorded Future say Iran could swiftly deliver cyberattacks against Western business following US withdrawal from a nuclear treaty.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Protocol 46

Protocol 46

Prortocol 46 deliver an affordable, simple, holistic cyber security solution, enabling customers to understand and mitigate cyber risk.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

Inside-Out Defense

Inside-Out Defense

Inside-Out Defense is a privilege governance platform built for Continuous Validation of Trust. We make it possible to govern access privileges in real-time across your multi and hybrid environments.