Cyber War, Intelligence, Malware & Espionage [extract]

Cyber War, Intelligence Malware & Espionage


Student Report: This article is exclusive to premium subscribers For unrestricted website access please Subscribe: £5 monthly / £50 annual.


Digital disruption is sweeping through the world’s second-oldest profession, Spying, and it is altering all aspects of intelligence collection and action. Many forms of cyber attacks are now common, including zero-day exploits, malware, phishing, man-in-the-middle attacks, and denial of service attacks.

Intelligent agents known as malware are rapidly becoming the tool of choice for nations, criminals, and terrorists in finding the high ground of the 21st Century’s cyber battlefields.

Malware

Malware is making information control the capital of peace and the currency of cyber war. There is a realisation that the hero’s and jobs for action spy agents are becoming redundant. Cyberspace can now be used to monitor and spy on the seas, skies, streets and individuals.  

  • Drones can be used to assassinate, machines can spy on systems, people and even on a leader’s mobile conversations, texts and emails.
  • AI can be used to monitor the intelligence services information and their correspondence open sources and classified information. All can be collected and analysed by machines.

The reputed second oldest profession will soon have far fewer jobs than in the past as HUMINT transforms to AIMINT.

(Full article length: 5,100 words)

To continue reading please Subscribe

« Ransomware: A Security Guide [extract]
Is Your Business Ready For The Inevitable Cyberattack? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.