INTELLIGENCE > US


« Back to News

2017-10-06

Russian Spies Used Kaspersky Anti-V To Hack NSA

Sources claim Russian hackers accessed top secret NSA data via the private computer of a contractor using Kaspersky software.

2017-09-27

Cybersecurity Investigations After US Naval Collision

Probing for potential cyber intrusions will become a standard procedure following unexplained collision damage to a US guided missile destroyer.

2017-09-14

FBI Wants To Ditch Kaspersky

The FBI seem to think the Kaspersky cybersecurity company is a Russian stooge that can't be trusted with protecting America's critical infrastructure.

2017-09-27

Fake Facebook Ads Surged During The US Presidential Election

Facebook now admits that fake accounts probably operated from Russia bought thousands of divisive advertisements on during the 2016 US election.

2017-09-13

Will The CIA Be Run By Robots…?

The intelligence community has been eyeing artificial intelligence and machine learning to replace the routine tasks analysts perform.

2017-08-14

Who Are The Shadow Brokers?

The indications point to intelligence insiders who are either current or former US intelligence community contractors.

2017-08-02

CIA Malware Unveiled

Wikileaks' latest release of CIA secret exploits include previously unknown malware developed by major US defence contractor, Raytheon.

2017-07-27

Trump Tells US Cyber Command To Get More Aggressive

The Trump administration is pushing forward with its plan to make US Cyber Command increase the nation’s offensive and defensive cyber capabilities.

2017-07-27

NSA Has Done Little To Prevent The Next Edward Snowden

When he walked out of the NSA with some of its most secret files, the agency didn't have a list of people who had privileged access to its networks.

2017-07-17

WikiLeaks Reveal CIA Credentials Malware

Both WannaCry and Petya ransomware attack waves are thought to originate in stolen NSA exploits. Wikileaks reveals there are many more.

Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

Thursday, Jan 28, 2021 - Join this webinar to learn how to improve your Cloud Threat Intelligence (CTI) program by gathering critical cloud-specific event data in the AWS Cloud.

Loggly

Loggly

Loggly provides a cloud-based log management solution to help identify and solve operational problems quickly.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Snyk

Snyk

Snyk enables developers and enterprise security to continuously find & fix vulnerabilities on open source code.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp.) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.