Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Tech/Cyber

Winning the Innovation Race: Why America’s Allies Are the Key to Beating Beijing

OPINION — Precision U.S. airstrikes against Iran’s nuclear program last June demonstrate American technological prowess built on decades of 20th [...] More

The Latest

Forget Guerrillas and IEDs - The Next Asymmetric War Will Be Engineered

OPINION — For most of modern history, asymmetric conflict conjured a familiar image: guerrillas in the hills, insurgents planting roadside bombs, or [...] More

A Deniable Attack with Strategic Precision: Why the Red Hat Breach Looks More Like Statecraft Than Mere Crime

EXPERT PERSPECTIVE — The timing was no coincidence.As the U.S. federal government ground to a halt at 12:01 a.m. EDT on October 1, 2025, a [...] More

National Cyber Defenses at Risk as Key Programs Expire Amid Government Shutdown

OPINION — Ransomware attacks conducted by criminals are persistently hitting airports, schools, and 911 dispatch centers, while foreign adversaries [...] More

Lawmakers ‘Bullseye and Bait’ in AI-Driven Deepfake Campaigns

OPINION — Elected officials are both the bullseye and the bait for AI-driven influence campaigns launched by foreign adversaries. They are targeted [...] More

Telecom Bust Near the UN Reveals New National Security Vulnerability

Telecom Bust Near the UN Reveals New National Security Vulnerability

DEEP DIVE — When Secret Service agents swept into an inconspicuous building near the United Nations General Assembly late last month, they weren’t [...] More

The Hidden Leverage of Digital Chokepoints

EXPERT PERSPECTIVE — When we think about the arteries of global power, images of oil pipelines or shipping lanes often come to mind. They are [...] More

Former U.S. Cyber Chief: Crowdsource Cyber Defense

EXPERT INTERVIEW — Riyadh’s Global Cybersecurity Forum (GCF) in Saudi Arabia kicked off last week under the theme “Scaling Cohesive Advancement in [...] More

Special Report: Nat Sec EDGE 2025

Special Report: Nat Sec EDGE 2025

The Cipher Brief's Special Report on Nat Sec EDGE 2025The Nat Sec EDGE 2025 conference took place June 5–6, 2025 in Austin, Texas.ForewordThe 2025 [...] More

Ukraine’s Great Cyber Heist

Ukraine’s Great Cyber Heist

DEEP DIVE -- For more than a decade, Moscow honed a shadow playbook — blending disinformation, ransomware, supply-chain sabotage, and quiet cyber [...] More

As Cyber Threats Grow, the Clock Ticks on a Critical Cybersecurity Law

As Cyber Threats Grow, the Clock Ticks on a Critical Cybersecurity Law

DEEP DIVE – The onslaught of cyberattacks against the U.S. and U.S. businesses has not let up and the clock is ticking on reauthorizing a new bill [...] More

Drones are Funding Russia's War Against Ukraine

OPINION — The war in Ukraine has evolved into a complex geopolitical conflict, shaped not only by military strategy but by global economic [...] More

Inside Ukraine's Innovation Under Fire

Cipher Brief exclusive: Retired CW5 Joey Gagnard details how Ukrainian commanders are rewriting the rulebook on tech, tactics, and survival.EXPERT [...] More