INTELLIGENCE > > USA


« Back to News

2023-11-28

Spy Agencies Are Hiring Via LinkedIn

Chinese espionage agencies are using fake LinkedIn accounts to try to recruit US citizens with access to government & commercial secrets.

2023-10-20

Revealed: CIA Using TwitterX To Recruit Spies

A fault on the CIA’s official TwitterX account has been exploited by a cyber security researcher to hijack a channel used for recruiting spies.

2023-10-04

China Accuses The US Of Spying On Huawei

Huawei Compromised & Data Stolen: The escalating conflict between the US and China over technology and security issues reaches a new level.

2023-09-26

US National Cyber Security Strategy Moves On

The White House already has a new national cyber strategy. So does CISA and the Pentagon. Now, the US State Department wants one too.

2023-09-20

Chinese Hackers Have Been Reading US Government Emails

An advanced Chinese spying campaign that involved breaches of Government & Legislature emails went undetected for months.

2023-08-29

NIS2 Regulations Are Coming – Are You Ready?

EU Network & Information Security Rules: Tighter rules and tougher sanctions will apply to more organisations than before. By Graham Hawkey

2023-07-31

Software Faults Ground F-35 Warplanes

The US Defense Department will stop accepting some newly built F-35 multirole jets as delays in upgrading the aircraft continue.

2023-07-03

The CIA Has A Social Media Campaign Just For Russians

The campaign includes a new CIA channel on Telegram - a widely used social media network that offers a source of unfiltered news in Russia.

2023-06-19

US Government Agencies Attacked By Russian Criminals

Update: Clop Ransom Campaign Spreads Across US: Johns Hopkins & Georgia universities, plus federal agencies hit by MOVEit vulnerability.

2023-05-01

‘Tyrannical IT’ Is A Critical Threat

Misinformation & Disinformation: Authoritarian countries increasingly rely on digital tools to suppress dissent both inside & beyond their borders.

2023-04-19

TikTok Will Comply With US Law

Under intense pressure, the parent company of TikTok, ByteDance, says that it will 'continue to protect' US user data from access by China.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Chainkit

Chainkit

Chainkit detects adversarial anti-forensic tampering techniques that attackers use to evade detection and prolong dwell times inside a system.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.