INTELLIGENCE > > International


« Back to News

2020-03-11

Cyber Crime Methods Are Evolving

Criminals are quickly developing new tools and techniques to take advantage of changes in the ways consumer and businesses behave.

2020-02-24

Hamas Hackers Use New Malware

Hamas, the Islamist political group that runs Gaza, are using new high-tech malware in campaigns against the local Palestinian Authority.

2020-02-25

Russia Denies That It Attacked Georgia

Georgia says that Russian military intelligence has launched a massive cyber-attack on their government and business organisations.

2020-02-18

Top Australian Spy Condemns Britain's Huawei Decision

The outgoing Head of the Australian Signals Directorate spy agency says that Britain is mistaken to think it can trust Huawei's 5G network.

2020-02-10

The Geopolitics Of Cybersecurity

Reading List: The technological transformation emerging from cyberspace is like nothing else before. Dr. Jayshree Pandya looks at the issues.

2020-02-06

Leaked Report: The United Nations Was Hacked

Major Meltdown: Hackers invaded the UN’s computer network in Geneva and Vienna in a spying operation that has been kept secret.

2020-01-20

Can A 5G Network Really Be Secure?

Governments in Australia, Britain and Germany are in difficulty over the choice of technology suppliers to establish their national 5G networks.

2020-01-11

Unintended Consequences As Iran Admits It Destroyed Ukrainian Passenger Jet

Iran's Cyberwar Effort: Some minor cyber attacks on US websites, a largely harmless missile strike and now, 167 innocent people killed by 'mistake'.

2020-01-10

British National Cyber Security Chief Steps Down

Ciaran Martin will leave the National Cyber Security Centre (NCSC) in the summer, almost four years after founding the organisation.

2019-11-19

North Korea Hacked India's Moon Mission

The Indian Space Research Organisation (ISRO) was attacked by hackers when it was on its mission to land a spacecraft on the Moon.

2019-10-28

False Flag: Russian Hackers Hijack An Iranian Group

Russian hackers used Iranian cyber tools and digital infrastructure to attack government and industry groups in dozens of countries.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Direct Recruiters Inc

Direct Recruiters Inc

Direct Recruiters is a relationship-focused search firm that assists IT Security and Cybersecurity companies with recruiting high-impact talent.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Apollo Information Systems

Apollo Information Systems

Apollo is a value-added reseller that provides our clients with the complete set of cybersecurity and networking services and solutions.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.