INTELLIGENCE > Hot Spots > Iran


« Back to News

2018-05-25

An Iranian Hacker Confesses

Understanding the hierarchy of Iran's hackers offers insight into how to defend against the prospect of attacks from the Islamic Republic.

2018-05-14

Iran Likely To Retaliate With Cyberattacks

The experts at Recorded Future say Iran could swiftly deliver cyberattacks against Western business following US withdrawal from a nuclear treaty.

2018-03-29

US Imposes Cyber Sanctions On Iran

Iran is protesting about US sanctions imposed on 10 citizens and a tech firm accused of cyber attacks on at least 320 universities worldwide.

2018-04-10

Iranian Hackers Adopt New Methods

An Iranian espionage group has been using new malware and data exfiltration techniques in recent attacks, say the experts at Nyotron.

2018-03-26

The Resurgent Cyber Threat From Iran

Iran's army of hackers are emboldened and skilled at carrying out surveillance operations and sophisticated attacks beyond its borders.

2018-02-05

Iran Adopts Russian Style CyberWar Tactics

The Iranian regime has deployed cyber trolls and online bots to push back against online dissent and influence social media trends.

2018-01-17

Iran’s Internal Conflict Plays Out On Social Media

Disinformation, Bots, #Hashtag wars. The civil unrest on the streets of Iran is being mirrored on social media, where government and protesters clash.

2018-01-15

Iran’s Cyber Capabilities

Offensive cyber operations have become a core tool of Iranian statecraft, gathering information against enemies at home and abroad.

2018-01-12

Iran’s Cyberwar Could Infiltrate Your Mailbox

Iran’s police crackdown on protesters could affect almost anyone who has been in contact with dissident groups, even people only distantly linked.

2018-01-05

Iran Turns Off The Internet

Iranians have taken to using VPNs and building apps to bypass their government's measure to cut off the internet to suppress protests.

2017-12-28

Iranian Hackers Have Infiltrated US Infrastructure

Iranian hacking group APT34 appear to have burrowed deep, targeting US financial, energy, telecommunications and chemicals companies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

S21sec

S21sec

S21sec is a leading European pure play cybersecurity consultancy, services and solutions provider.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.