Cyber Advisory Board Experts on Threats to the U.S. Grid
Cipher Brief Cyber Advisory Board members offer their views on threats to the U.S. power grid, as interviewed by Cipher Brief Publisher and CEO Suzanne […] More
Cipher Brief Cyber Advisory Board members offer their views on threats to the U.S. power grid, as interviewed by Cipher Brief Publisher and CEO Suzanne […] More
Bottom Line: Maturing under Tehran’s tutelage, Hezbollah’s hackers are quickly learning the art of cyber warfare. The formidable militant organization is increasingly turning its attention […] More
The range of ferocious offensive cyber attacks by revisionist and rogue powers in recent years makes clear that the U.S. and its allies are fully […] More
When we think of arms races, we are naturally drawn to the physical: missiles, satellites, fighter jets, submarines and aircraft carriers. While those assets are […] More
Bottom Line: Since 2016, the North Korean regime has shown its hand as a state sponsor of cybercrime by targeting international financial institutions, engaging in […] More
Bottom Line: Cyber vigilantes and “hacktivists” increasingly fill the void left by governments in combating terrorist activity online. While such politically motivated non-state hackers are […] More
We may be frustrated by the state of cybersecurity today, with the attackers getting better and more audacious year after year, but defenders would be […] More
Cybersecurity researchers have discovered two major software vulnerabilities in the Intel microprocessors inside the vast majority of all computers. Dubbed “Meltdown” and “Spectre,” the vulnerabilities […] More
Not a day goes by that Americans don’t wake to the news of a new cyber intrusion affecting private sector or government networks, whether major […] More
Bottom Line: U.S. cyber defenders know how to take down botnets – networks of computers that have been hacked to act as one – but […] More
For this last week of 2017, we asked our experts to look ahead at key national security issues. NSA veteran Rick Ledgett offers some cybersecurity lessons […] More
The launch of Bitcoin futures trading is a good moment to consider the cyber and wider security issues raised by this and other cryptography-based currencies. It is […] More
The Federal Communications Commission (FCC) voted 3-2 on Thursday to dismantle their authorities to enforce net neutrality rules that prohibit internet service providers, such as […] More
The introduction of armed unmanned aerial vehicles (UAVs) permanently altered the modern battlefield. New technological advances in drone technology could do it again: from advanced […] More
Russian President Vladimir Putin has sought to exploit open and free U.S. cyberspace, which serves as a force multiplier for commerce and freedom of expression, […] More
Revealing the identities of intelligence officials – a practice known as doxing – could become more common among nation-states, directed in particular at the clandestine […] More
Terrorist groups are expanding their use of the internet beyond mere messaging and disseminating operational know-how, slowly adding a cyber-hacking toolset that could one day […] More
It was almost a devastatingly effective cyber-heist. Hackers compromised the Kathmandu-based NIC Asia Bank this fall, fraudulently transferring $4.4 million to destinations in at least […] More
Search