Leading up to and during its invasion of Ukraine, Russian cyber attacks have been well documented and tracked and have included standard offensives such as DDoS, malware, and phishing to impact their targets. Indeed, according ...
Analysis
There is little doubt that cyber attacks are used by both state and nonstate actors a medium to support their geopolitical views and positions during times of regional and global crisis. The Ukraine conflict has ...
Analysis
Chinese state-sponsored cyber espionage is nothing notable as Beijing has been long engaged in the most expansive cyber-enabled data theft operation for the past decade. However, its recent activities targeting Russia’s military industries is rather ...
Analysis
Recent reporting indicates that the Kingdom of Saudi Arabia has been investing substantially in Israeli cyber companies that produce offensive cyber tools and weapons. Per these findings, its presumed that the use of such technology ...
Analysis
There is so much about these cybersecurity bilateral agreements that are not known, as few of the agreements have been fully made public with most known about them coming from public statements. At best, coverage ...
Analysis
The term “splinternet” refers to the increasingly balkanization of the Internet, where the cyber domain is dividing due to a variety of reasons to include but not limited to technology, commerce, nationalism, politics, among others. ...
Analysis
The true expanse of China’s cyber power is visible in the current geopolitical climate that has China at odds with the United States, and the world consumed by an ongoing conflict in Ukraine, as well ...
Analysis
The Department of Homeland Security recently published a joint advisory along with the Federal Bureau of Investigation (FBI) and the Department of Treasury on suspected North Korean state-sponsored ransomware campaign implementing the Maui malware. The ...
Analysis
A recent report revealed several private sector Indian companies that have been involved in using corporate cyber espionage tactics against entities involved in litigation in an effort to influence their outcomes. What started off as ...
Analysis
Recently, the U.S. Senate put forth a bill that would require annual briefings on the relationship between CYBERCOM and the NSA, with concerns being expressed how a dual-hatted leadership impacts either organization. These annual reports ...
Analysis