INTELLIGENCE > Hot Spots > Russia


« Back to News

2023-03-13

A Warning From Ukraine About Russian Hackers

Gamaredon: Customised malware implants that can exfiltrate files of specific extensions, steal user credentials & screenshots of victims' computers.

2023-03-08

Cyberwar: Lessons From Ukraine

AI, OSINT, the IoT & Social Media: The tools that increasingly run the digital world have quickly been repurposed to have destructive physical effects.

2023-02-15

Crackdown On Ransomware Criminals

Exposed & Sanctioned: The UK & US are tackling the Russian cyber criminals behind some of the most damaging ransomware attacks ever.

2023-02-14

Russian Cyber Attack Disrupts Earthquake Aid 

Killnet hackers launched a DDoS attack which has disrupted communication with NATO aircraft flying earthquake aid to Turkey and Syria.

2023-02-13

New Russian Malware Targets Ukraine 

Graphiron: The crisis between Ukraine, NATO & Russia includes aggressive rhetoric, nuclear threats, critical infrastructure sabotage & cyber attacks.

2023-02-03

Latvia's Defence Ministry Targeted  

AKA Primitive Bear: A Russian hacking group called Gamaredon has been delivering a phishing attack on Latvia’s Ministry of Defence.

2023-01-30

Ukraine Claims Russian Cyber Attacks Are War Crimes

The cyber domain has no borders, allowing attackers to instantly reach across the world, which makes it vital to hold Russia's hackers accountable.

2023-01-26

Ukraine’s Security Agency Says Russian Cyber Attacks Are Increasing

There has been a 300% increase in Russian cyber attacks against Ukraine, with Russian hackers coordinating their operations with missile strikes.

2023-01-26

NCSC Alert: British Journalists & Politicians Are Hacking Targets

Russian and Iranian government-linked hackers are focusing on British politicians & journalists, aiming to get access to their email accounts.

2023-01-24

Ukraine Signs Cyber Security Deal With NATO

The cyber security collaboration gives Ukraine access to NATO’s malware information sharing platform, along with 'enhanced cyber cooperation'.

2023-01-23

War In Ukraine Drives A Decline In Stolen Cards

Russia's failing invasion of Ukraine led to a 62% decrease in stolen payment card records, attributed to a crackdown on domestic cyber criminals.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.