Recently, as part of their investigations into illegal wiretapping, Greek authorities raided an office of an Israeli company behind the Predator spyware, as well as five other companies believed to be connected in some capacity. ...
Analysis
The Quantum Cybersecurity Preparedness Act passed the Senate last week (on Friday, December 16th) and is ready for the President's signature. The bill is an outgrowth of National Security Memorandum 8 (NSM8): “Improving the Cybersecurity ...
Analysis
The Ukraine conflict has unleashed wiper malware variants that are being used against both Ukraine and Russia. The onset of the crisis saw the deployment of a series of wiper attacks of varying levels of ...
Analysis
During my opening remarks for OODAcon this year, I noted several moments where the advancement of technology has taken me by surprise including the DARPA cyber grand challenge finale at Def Con and the images ...
Analysis
A recent article in Lawfare highlighted the increasing role of the private sector in a nation’s cyber defense posture during periods of armed conflict. Specifically, the article emphasized Microsoft’s role in defending not only Ukraine, ...
Analysis
The volume of cyber-related information is daunting to say the least. A “cyber professional” can encompass a multitude of functions and disciplines ranging in technicality. Skills include but are not limited to network security, network ...
Analysis
Recently, China published a white paper entitled “Jointly Build a Community with a Shared Future in Cyberspace”presenting its vision of creating an international community with a shared future in cyberspace. The document highlighted the successes ...
Analysis
Leading up to and during its invasion of Ukraine, Russian cyber attacks have been well documented and tracked and have included standard offensives such as DDoS, malware, and phishing to impact their targets. Indeed, according ...
Analysis
There is little doubt that cyber attacks are used by both state and nonstate actors a medium to support their geopolitical views and positions during times of regional and global crisis. The Ukraine conflict has ...
Analysis
Chinese state-sponsored cyber espionage is nothing notable as Beijing has been long engaged in the most expansive cyber-enabled data theft operation for the past decade. However, its recent activities targeting Russia’s military industries is rather ...
Analysis