INTELLIGENCE > Hot Spots > Iran


« Back to News

2019-06-11

Iranian Fake News Websites Exposed

'Endless MayFly' is an Iran-aligned network of inauthentic websites and online personas used to spread false and divisive information.

2019-05-17

Iranian Cyber-Espionage Exposed

Revealed: An Iranian hacking team's lists of its victims, attack strategies, alleged areas of access & employee lists relevant to espionage systems.

2019-05-29

Is The US Planning A Cyber Attack On Iran?

A pre-emptive cyber-attack could be be a way for the US to hit Iran, without the need for attacks using conventional forces.

2019-03-01

US Under Attack By Chinese & Iranian Hackers

Geopolitics pay out in cyberspace as attacks from Iran and China reflect disagreements between nation states on sanctions and trade.

2018-12-11

Iran Using Websites To Spread Fake News

More than 70 websites found that push Iranian propaganda to 15 countries as part of a political influence operation.

2018-11-21

Stuxnet 2.0 - Iran Says Israel Has Launched New Cyber Attacks

Iran’s chief of civil defense recently claimed that the Iranian government had fought off what he described as a new version of Stuxnet.

2018-11-08

Iran Admits To Being Hit By Cyber Attack

Iran’s strategic infrastructure networks have reportedly come under an extensive and powerful cyber-attack. Who would do that?.

2018-11-12

How Did Iran Find CIA Spies? They Googled It!

A covert channel used for communicating with CIA sources was exposed and infiltrated by Iranian intelligence in 2009.

2018-09-19

Iran Targets Kurds With Spyware

Malware collects the target's mobile data including contact lists, phone call records, SMS messages, geo-location, photos, voice messages and more.

2018-09-17

Iranian Hackers Target Universities For Secret Research

Iranian hackers target academic institutions as part of a major campaign to steal unpublished research and obtain intellectual property.

2018-09-04

Iranian Political Influence Campaign Goes Global

Iranian influence operations targeting internet users worldwide are significantly bigger than previously identified.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.