INTELLIGENCE > > International


« Back to News

2024-01-18

A Rolling Campaign Of Russian Inspired DDoS Attacks

NoName Hacktivists: HTTPs-based attack vectors designed to consume targets' bandwidth & resources using a standard DDoS tool.

2023-11-28

Spy Agencies Are Hiring Via LinkedIn

Chinese espionage agencies are using fake LinkedIn accounts to try to recruit US citizens with access to government & commercial secrets.

2023-11-07

Online Conflict In Gaza & Ukraine

The use of cyber warfare techniques has fast become integral to the Gaza conflict, adding a layer of complexity to an already difficult situation. 

2023-10-25

Intelligence Chiefs Accuse China Of IP Theft & Online Deception

Cognitive Warfare: China understands the power of social media to shape perceptions of events. Also, how to carry out online espionage.

2023-10-25

The Information War In Gaza & Israel

Disinformation & Hate Speech: In the absence of reliable news on events in Gaza, social media has been playing a big part in filling the gaps.

2023-09-11

Elon Musk Withheld Starlink Over Crimea

Electric Cars, Space Exploration, Neurotechnology & Social Media Are Not Enough: Elon Musk decides to intervene in geopolitics.

2023-09-04

Hackers Target Satellites 

Timing Systems, GPS & Communications: Orbital satellites keep the world running smoothly but have just the same vulnerability as ground facilities.

2023-08-14

Understanding Malvertising Attacks

Lack of awareness, plus easier access to AI tools, provides the perfect cocktail for even inexperienced threat actors to exploit. By Tom McVey

2023-08-03

Chinese Spies Used Forged Validation Tokens To Access Government Emails

Chinese hackers breached email accounts at numerous organisations, including US government agencies, to intercept secret information.

2023-07-24

Cyber War, Intelligence, Malware & Espionage

Digital disruption is sweeping through the world’s second-oldest profession, Spying, and it is altering all aspects of intelligence collection.

2023-06-02

How To Counter Covert Action In The Digital Age

The case of Iran shows that countering covert action in the digital age requires persistence. Also, it's unlikely to stop. By James Shires 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

securitycurrent

securitycurrent

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

Viakoo

Viakoo

Viakoo is an Enterprise IoT Applications Management company providing performance, security, and compliance. Viakoo enables you to be proactive in maintaining cyber hygiene and protecting your network

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.