The fact that attribution -especially against states – is even done with any confidence is surprising given that those that attributing both herald the sophistication associated with state actors while at the same time citing ...
Analysis
Recent reporting reveals that both state and non state cyber actors are actively targeting critical infrastructures with impunity. What does this mean for the future?
Analysis
Recently, a Russian cybersecurity company published a report on nation-state offensive cyber campaigns that have been targeting Russia in 2023. Perhaps more surprising were the alleged sources of this activity, using telemetry data from Russia’s largest telecom to ...
Analysis
It appears that more countries are looking to replicate offensive cyber defense, drawing up their own strategies and policies, or else are already engaged in joint hunt forward operations. Examine this in detail here.
Analysis
There have been growing warnings in recent years about the risks of professional networks being used for espionage. More here.
Analysis
While many of the hacktivist groups seem at this point unsophisticated in how they are conducting their operations, there are those that are more capable and more experienced.
Analysis
In April 2023, the European Union (EU) officialized the text of its USD 1.2 billion Cyber Solidarity Act (CSA), regulations designed to strengthen common EU detection, situational awareness, and response to cyber incidents, particularly as cyber operations ...
Analysis
Recently, the International Committee of the Red Cross(ICRC) released ethical guidelines for civilian hackers and hacktivists to consider prior to engaging in armed conflicts. The eight recommendations are based on humanitarian law-based rules in order to protect civilians ...
Analysis
This post provides observations and compelling views on the threat of intrusive surveillance technologies.
Analysis
This post provides insights into some major elements in the US government concerned with countering foreign malign influence, highlighting some overlaps and possible discontinuities.
Analysis