(21.8.2018) In a showcase of trust and confidence, GCHQ provided the GCT (GCHQ Certified Training) accreditation to EC-Council’s globally renowned Certified Ethical Hacker (C|EH) and Certified Security Analyst (ECSA) programs. This recognition is a feather in the cap for EC-Council’s much sought-after credentials, which are among the most comprehensive programs in the field of Vulnerability Assessment and Penetration Testing.
Many intelligence agencies including the Pentagon, FBI, the US Army, and most Fortune 500 companies prefer the C|EH program to enhance the knowledge and skills of their security personnel. Over the years, more than 200,000 cyber professionals were trained and certified with what has become the standard norm for hiring authorities as well as security champions.
(28.2.2018) Israeli military’s intelligence branch, known as “Unit 8200,” told the Australian authorities about a hidden explosive device destined for an Etihad Airways flight leaving Sydney for Abu Dhabi last July.
Earlier this month, the German weekly Der Spiegel reported on Israel’s role in helping Germany and European countries in combating Islamist terror. It revealed that Israel is part of a covert multinational counter-terrorism operation named “Gallant Phoenix” that gathers intelligence on Islamic State war criminals returning from the Middle East to Europe.
Unlike NSO, Candiru is more conservative in its choice of customers. Most of them are in Western Europe and none of them are from Africa. In fact, the company reportedly doesn’t sell equipment to Israel, although that is for business – not political – reasons, they say.
“For example, if Germany needs offensive cyber equipment for some national security matter, it will develop it in-house without question,” explained one source, who asked not to be identified. “But if it needs to contend with human trafficking from Turkey, for instance, it will buy cyber gear from an outside source where the issue is less sensitive.”
(12.9.2014) I assumed a role in which people are called “targets”, and those people who really interest us are in no sense terrorists, but rather generally normative people – who interest us because of their roles, so that we can obtain more intelligence and achieve greater access. We take advantage of the capabilities that we have over these people in order to put ourselves at ease. We take advantage of the impact that we have on their lives. Sometimes it involves truly harming a person’s life, or their soul. I mean extortion whereby they must hide things from people around them. It can really screw up their lives. It made me feel omnipotent.
Candiru, named after an Amazon fish known to parasitize the human urethra, recruits heavily from 8200 intelligence unit and sells offensive tools for hacking computer systems
A US indictment unsealed on Thursday in unison with a series of British statements accused Chinese hackers of obtaining unauthorised access to the computers of at least 45 entities, including commercial and defence technology companies and US government agencies such as Nasa and the US navy.
(7.4.2018) In his testimony last month to the U.K. Parliament, Cambridge Analytica whistleblower Christopher Wylie threw an Israeli private intelligence firm known as Black Cube under the bus.
Wylie claimed that Cambridge Analytica hired Black Cube to hack Nigerian president Muhammadu Buhari.