INTELLIGENCE > > International


« Back to News

2019-10-21

Lost Russian Cyber Spies Return

The clandestine Russian cyber espionage group known as 'The Dukes' disappeared almost 3 years ago. Now, they are back.

2019-10-01

N. Korean Hackers Attacking Cash Machines In India

DTrack: Hackers with ties to North Korea have developed a new malware variation to steal data from cards inserted into ATM machines in India.

2019-09-30

Rogue States Are Funding Stateless Hackers

Retired NSA Chief says cyber-attacks are more likely to come from criminals funded by US enemies than from the enemies themselves.

2019-09-10

Cyber War In The Middle East Is Escalating

Hacking groups with links to Iran are the latest threat making the Persian Gulf one of the world’s most active theatres of cyber warfare.

2019-09-09

Stuxnet Virus Attack Details Emerge

An enduring mystery has surrounded the Stuxnet virus attack that targeted Iran’s nuclear program. It turns out to have been an inside job.

2019-09-05

NATO Will Retaliate

Cyberspace is the new battleground and making NATO cyber ready, well-resourced, well-trained, and well-equipped to fight back, is a top priority.

2019-09-04

A New Era Of Malware

NotPetya has ushered in a new era of implant-enabled malware where public opinion is as much the target as traditional IT systems.

2019-08-19

US Releases Malware Linked To N. Korean Hacking Group

Electric Fish: US Cyber Command has released samples of malware that they say are linked to N. Korean hackers from the Lazarus Group.

2019-08-16

United Nations Investigating N Korean Cyber Attacks

S. Korea was hard hit by ten attacks by N. Korean hackers. India had three, Bangladesh and Chile were hit by three attacks plus 13 more countries.

2019-07-26

Cyberwar: Covert Cyber Attack Campaign Is Underway

A M.East cyberwar is running at full speed. Networks are being probed, weaknesses and vulnerabilities tested, offensive actions planned.

2019-06-25

A New Age of Warfare

Cyber war operations are being conducted out of sight, classified, unattributed and increasingly beyond the control of political leaders.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.