While there is nothing that will stop Chinese cyber operations, increased threat and intelligence information-sharing, remediation, attribution, and more importantly, disrupting its cyber networks might just be a successful combination to stem the flow. And ...
Analysis
In late January 2023, Kaspersky Lab published a report on dark web ads looking for specialized skilled individuals. The company researched the job offers in the underground for over 30 months and found that criminals ...
Analysis
Recently, the World Economic Forum (WEF) – an international nongovernmental and lobbying organization – met in Davos, Switzerland to discuss risks facing the global community in 2023. Among the threats identified in its comprehensive The ...
Analysis
According to a report on the Cost of Internet Shutdowns, there were 114 major outages across 23 countries in 2022 impacting around 700 million people (although another source puts that figure as high as 4.2 ...
Analysis
There is increasing focus for U.S. Cyber Command (CYBERCOM) to try and replicate the ability of the U.S. Special Operations Command (SOCOM) – the unified combatant command with the mission of overseeing the special operations ...
Analysis
China’s economic aspirations are well known, and some experts believe China is in a rush to decouple itself from the U.S. economy, as it seeks its continued rise shifting focus from “economic growth to economic ...
Analysis
Since the late 1990s, geopolitics have increasingly become a driver of hostilities between nation states and their non-state sympathizers. Hostile cyber attacks have been influential in expressing one state’s views against another during periods of ...
Analysis
Recently, as part of their investigations into illegal wiretapping, Greek authorities raided an office of an Israeli company behind the Predator spyware, as well as five other companies believed to be connected in some capacity. ...
Analysis
The Quantum Cybersecurity Preparedness Act passed the Senate last week (on Friday, December 16th) and is ready for the President's signature. The bill is an outgrowth of National Security Memorandum 8 (NSM8): “Improving the Cybersecurity ...
Analysis
The Ukraine conflict has unleashed wiper malware variants that are being used against both Ukraine and Russia. The onset of the crisis saw the deployment of a series of wiper attacks of varying levels of ...
Analysis