INTELLIGENCE > > International


« Back to News

2018-03-22

African Union HQ Building Bugged

Allegations of embedded espionage at the African Union’s HQ might prompt leaders to be more cautious about Chinese investment proposals.

2018-03-05

Russian Spies Hacked The Korean Olympics

Russian military spies hacked hundreds of computers at the Pyeongchang Olympic Games in a “false-flag” operation, US analysts claim.

2018-02-20

Discover Your Inner Spy

Spyscape: New York has a new museum, designed by a British intelligence officer, giving visitors a taste of life as a secret agent.

2018-02-16

Inspired: China Measures Citizens' Trustworthiness

China is exploring how AI & Big Data can be used to monitor social media interactions and has plans to assign citizens a 'social-reliability' rating.

2018-02-15

Islamic State Likely To Switch To Cyber Warfare

Along with other terrorist groups IS are turning to the cybercrime underworld to secure tools to carry out attacks on critical infrastructure.

2018-01-19

Russian Troops Use Missiles & Cyber To Counter 'swarm of drones'

The Russian military says it has fought off an attack by a swarm of drones launched by jihadists against its Tartus airbase in Syria.

2018-01-09

Canada’s Electronic Spies Unleashed

Sweeping new powers are proposed to enable Canada's security establishment to eavesdrop and launch offensive operations. Not everyone is happy.

2018-01-02

When Terrorists Learn How to Hack

Terrorist groups are expanding their use of the Internet beyond disseminating operational know-how. They are building threatening new hacking tools.

2017-12-29

Chinese Hacker Groups Shift Focus To India

Experts at FireEye say they expect to see Chinese APT groups focusing more attacks on India in 2018.

2017-12-22

US Defense Contractors Stole Images From UK Secret Surveillance Station

In a major embarrassment to US & UK military authorities, architects disclosed top secret images of the RAF Croughton SIGINT interception centre.

2017-12-22

Ethiopian Cyber Spies Left Clues Behind

The Ethiopian government used spyware acquired from an Israeli company to spy on dissidents. Unfortunately, they didn't read the instructions.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.