INTELLIGENCE > > International


« Back to News

2024-01-18

A Rolling Campaign Of Russian Inspired DDoS Attacks

NoName Hacktivists: HTTPs-based attack vectors designed to consume targets' bandwidth & resources using a standard DDoS tool.

2023-11-28

Spy Agencies Are Hiring Via LinkedIn

Chinese espionage agencies are using fake LinkedIn accounts to try to recruit US citizens with access to government & commercial secrets.

2023-11-07

Online Conflict In Gaza & Ukraine

The use of cyber warfare techniques has fast become integral to the Gaza conflict, adding a layer of complexity to an already difficult situation. 

2023-10-25

Intelligence Chiefs Accuse China Of IP Theft & Online Deception

Cognitive Warfare: China understands the power of social media to shape perceptions of events. Also, how to carry out online espionage.

2023-10-25

The Information War In Gaza & Israel

Disinformation & Hate Speech: In the absence of reliable news on events in Gaza, social media has been playing a big part in filling the gaps.

2023-09-11

Elon Musk Withheld Starlink Over Crimea

Electric Cars, Space Exploration, Neurotechnology & Social Media Are Not Enough: Elon Musk decides to intervene in geopolitics.

2023-09-04

Hackers Target Satellites 

Timing Systems, GPS & Communications: Orbital satellites keep the world running smoothly but have just the same vulnerability as ground facilities.

2023-08-14

Understanding Malvertising Attacks

Lack of awareness, plus easier access to AI tools, provides the perfect cocktail for even inexperienced threat actors to exploit. By Tom McVey

2023-08-03

Chinese Spies Used Forged Validation Tokens To Access Government Emails

Chinese hackers breached email accounts at numerous organisations, including US government agencies, to intercept secret information.

2023-07-24

Cyber War, Intelligence, Malware & Espionage

Digital disruption is sweeping through the world’s second-oldest profession, Spying, and it is altering all aspects of intelligence collection.

2023-06-02

How To Counter Covert Action In The Digital Age

The case of Iran shows that countering covert action in the digital age requires persistence. Also, it's unlikely to stop. By James Shires 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

Software Factory

Software Factory

Software Factory develops custom-built high-performance software solutions and products for applications including industrial cyber security.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Dreamlab Technologies

Dreamlab Technologies

Dreamlab specialises in securing critical IT infrastructures. We offer qualitative support and advice for managing your infrastructure and cyber security needs.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Accurics

Accurics

Accurics enables self-healing cloud native infrastructure by codifying security throughout your development lifecycle.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

PeoplActive

PeoplActive

PeoplActive is an IT consulting and recruitment services organization with leading capabilities in digital, cloud and security.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.