INTELLIGENCE > > International


« Back to News

2025-03-18

Geopolitics, Nation-State Hackers & Cyberwar

As geopolitical tensions are rising, state-sponsored hackers are intensifying their efforts, targeting defence & government institutions.

2025-02-15

Thai Police Arrest Russian Hackers

Phobos Ransomware: Hackers stole $16m through ransomware attacks targeting Swiss & US targets, affecting over 1,000 victims worldwide.

2025-02-05

Cyber Threat Forecast Part 2 - India   

Strained relations across South Asia, as well as between India & nation-states further afield, threatens an explosion of cyber activity. By Craig Watt

2025-01-22

Cyber Threat Forecast 2025 Part One - North America

Part 1 of a 4-part series that will forecast the international cyber threat landscape in 2025, beginning with North America. By Craig Watt

2024-11-27

Russian State-Sponsored Hacking Extends Worldwide

A damaging Russian espionage campaign has been striking government agencies and other institutions in Central Asia, Ukraine & NATO members.

2024-11-21

The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape

Geopolitical pressures in one part of the world can have an unexpected impact on the cybersecurity of organisations far away. By Bob Hayes

2024-11-01

Canada Accuses India Of Using Spyware To Track Separatists

Canada's main spy agency says it has found evidence of the Indian government using illicit spyware to track & intercept Sikh separatists.

2024-10-09

2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

USA 2024 Elections: Hostile nation pose a serious foreign influence threat, sowing discord & division amongst US citizens.. By Craig Watt 

2024-09-24

Remote Pager Attack Begins A New Era Of Warfare

Lethal explosive devices precisely targeted members of Hezbollah, an anti-Israel military organization, controlled by the government of Iran.

2024-09-24

British Security Agency Accuses Russian Military Of Cyber Sabotage 

Unit 29155: The Russian military has been undertaking computer network operations for the purposes of espionage, sabotage & reputational harm.

2024-08-05

Cyber Crime Hothouses In Myanmar

Slave Labour: Online fraud in Southeast Asia is continuing to grow, with organised crime syndicates generating an estimated $64 billion annually.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

WebSec

WebSec

WebSec is a cybersecurity firm based in Amsterdam (NL) and Wyoming (US), specializing in offensive security services including penetration testing, red teaming, and tailored security assessments.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.