ecently, more than 35 nations have signed a new international agreement to collaborate on reigning in the “hacker for hire” commercial market, in which private interests sell tools and services to support offensive cyber activities.
Analysis
Recent reporting indicates that U.S. Cyber Command (CYBERCOM) is in the middle of restructuring the organization and the forces that support it in order to best position the command to address the changing cyber threat landscape. The strategy ...
Analysis
“Trust us” is no longer an acceptable response from the very government entities sworn to protect the people of the country.
Analysis
While it is promising to see that these areas are being addressed at the highest levels of government, there is still one glaring omission that has yet to be treated with the same level of ...
Analysis
A former Federal Bureau of Investigation (FBI) special agent published an article in which he states that misinformation and not tampering with election systems remains the primary threat against U.S. elections. More here.
Analysis
The fact that attribution -especially against states – is even done with any confidence is surprising given that those that attributing both herald the sophistication associated with state actors while at the same time citing ...
Analysis
Recent reporting reveals that both state and non state cyber actors are actively targeting critical infrastructures with impunity. What does this mean for the future?
Analysis
Recently, a Russian cybersecurity company published a report on nation-state offensive cyber campaigns that have been targeting Russia in 2023. Perhaps more surprising were the alleged sources of this activity, using telemetry data from Russia’s largest telecom to ...
Analysis
It appears that more countries are looking to replicate offensive cyber defense, drawing up their own strategies and policies, or else are already engaged in joint hunt forward operations. Examine this in detail here.
Analysis
There have been growing warnings in recent years about the risks of professional networks being used for espionage. More here.
Analysis