INTELLIGENCE > > International


« Back to News

2024-01-18

A Rolling Campaign Of Russian Inspired DDoS Attacks

NoName Hacktivists: HTTPs-based attack vectors designed to consume targets' bandwidth & resources using a standard DDoS tool.

2023-11-28

Spy Agencies Are Hiring Via LinkedIn

Chinese espionage agencies are using fake LinkedIn accounts to try to recruit US citizens with access to government & commercial secrets.

2023-11-07

Online Conflict In Gaza & Ukraine

The use of cyber warfare techniques has fast become integral to the Gaza conflict, adding a layer of complexity to an already difficult situation. 

2023-10-25

Intelligence Chiefs Accuse China Of IP Theft & Online Deception

Cognitive Warfare: China understands the power of social media to shape perceptions of events. Also, how to carry out online espionage.

2023-10-25

The Information War In Gaza & Israel

Disinformation & Hate Speech: In the absence of reliable news on events in Gaza, social media has been playing a big part in filling the gaps.

2023-09-11

Elon Musk Withheld Starlink Over Crimea

Electric Cars, Space Exploration, Neurotechnology & Social Media Are Not Enough: Elon Musk decides to intervene in geopolitics.

2023-09-04

Hackers Target Satellites 

Timing Systems, GPS & Communications: Orbital satellites keep the world running smoothly but have just the same vulnerability as ground facilities.

2023-08-14

Understanding Malvertising Attacks

Lack of awareness, plus easier access to AI tools, provides the perfect cocktail for even inexperienced threat actors to exploit. By Tom McVey

2023-08-03

Chinese Spies Used Forged Validation Tokens To Access Government Emails

Chinese hackers breached email accounts at numerous organisations, including US government agencies, to intercept secret information.

2023-07-24

Cyber War, Intelligence, Malware & Espionage

Digital disruption is sweeping through the world’s second-oldest profession, Spying, and it is altering all aspects of intelligence collection.

2023-06-02

How To Counter Covert Action In The Digital Age

The case of Iran shows that countering covert action in the digital age requires persistence. Also, it's unlikely to stop. By James Shires 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Social-Engineer Inc

Social-Engineer Inc

Social-Engineer is a consulting and training company specializing in the science of social engineering in the context of digital security.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

SoftwareONE

SoftwareONE

SoftwareONE is a leading global provider of end-to-end software and cloud technology solutions.

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!