ISIS Video Adds More Terror In Spain

ISIS have released a new video threatening Spain with more terrorist attacks. The extremists vow to reconquer 'Al-Andalus' for the ‘caliphate’ in the first ever ISIS video made in Spain.

Al-Andalus, was what the Iberian Peninsula was called, when it was ruled by Muslims for five centuries until their defeat in 1492.

In the three-minute video, a militant says, in Spanish: ‘Allah willing, Al-Andalus will become again what it was, part of the caliphate. Spanish Christians, don’t forget the Muslim blood spilt during the Spanish inquisition.

‘We will take revenge for your massacre, the one you are carrying out now against Islamic State.’ Another man then appears, with his face covered, and says: ‘Our war with you will continue until the world ends.’ He adds: ‘Leave this war. Leave the union of Christians. If not, we will never ever leave you alone.’

The video, which reportedly was put together by an ISIS propaganda outlet and was titled ‘The Conquest of Barcelona’ was released on Wednesday 23rd August on encrypted messaging service Telegram.

Telegram is the same encrypted messaging app ISIS supporters used to praise the Barcelona van attack last week, which ISIS claimed responsibility for.

The extremists in the video have since been identified as Abu Layth Al-Qurtubi from Spain’s Cordoba region and Abu Salman Al-Andalusi, from the Spanish province of Andalusia.

Metro:

Terrorism, A Sea Change In Tactics:

Learning About ISIS Intentions Using Open Source Intelligence:

 

« UK Deal With EU On Post-Brexit Data Sharing
'Killer Robot' Warfare Is Coming Closer. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

CliffGuard Cybersecurity

CliffGuard Cybersecurity

CliffGuard Cybersecurity deliver comprehensive services designed to protect your organization from the ever-evolving landscape of cyber threats.