INTELLIGENCE > Hot Spots > Russia


« Back to News

2022-05-04

Five Eyes Warn Of Russian Cyber Attacks

Five Eyes intelligence call for immediate action by critical infrastructure organisations to “prepare for and mitigate potential cyber threats”.

2022-04-20

Microsoft Removes Domains Used For Cyber Attacks On Ukraine

Fancy Bear: Microsoft has seized control of seven domains used by Russian threat actors for attacks that targeted digital access in Ukraine.

2022-04-19

Russia’s AI Plans Might Not Survive The Ukraine War

Russian ambitions to become a leader in Artificial Intelligence are being frustrated by Western sanctions and global high-tech isolation.

2022-04-18

The Ukraine War - By Satellite, Internet & Phone

Technology can serve a vital purpose in this conflict, facilitating the exposure of Russian propaganda & accelerating efforts to defeat their forces. 

2022-04-13

Cyber Criminals Volunteer For War In Ukraine

Hacking Groups Hit Critical Infrastructure: Anonymous in one corner and Conti in the other as cyber criminals take sides in the Ukraine conflict.

2022-04-11

Russia Hacked Ukrainian Satellite Communications

The Viasat KA band satellite was hit by a sophisticated cyber attack that wiped devices on the same day that Russia's invasion of Ukraine began.

2022-04-05

Cyber Security Lessons From The Ukraine War

Network Security Is Vital: The war in Ukraine serves as a clear example of how cyber warfare will play a major role in future conflicts. 

2022-04-12

Anonymous Hackers Aim To Undermine Russia

Anonymous has declared a cyber war on Russia and is busy with a bombardment of cyber attacks in retaliation for the invasion of Ukraine.

2022-04-01

Germany Warns About Russian Anti-Virus Software

Germany's cyber security authority has issued a warning against using anti-virus software from the Russia-based service supplier Kaspersky.

2022-03-29

Conti Operates Like A Sophisticated Corporation

Hidden In Plain Sight: Staff think they are working for a legitmate Russian High-Tech firm, but in reality it is a notorious ransomware group.

2022-03-22

PressReader Suffers Cyber Attack

PressReader had opened free access to its newspaper and magazine content inside Ukraine. Then it was struck by a crippling cyber attack.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

CENTRI Technology

CENTRI Technology

CENTRI provide a standards-based security platform for the Internet of Things.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.