Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Cyber Attack

Defending Against a Digital Storm: How to Stop China's Cyber 'Typhoons'

Defending Against a Digital Storm: How to Stop China's Cyber 'Typhoons'

DEEP DIVE — The “Salt Typhoon,” “Volt Typhoon” and “Silk Typhoon” cyber espionage campaigns have become symbols of China’s efforts to hack U.S. [...] More

The Latest

Exclusive Interview: The Growing Scope of America's Cyber Security Threats

Exclusive Interview: The Growing Scope of America's Cyber Security Threats

SUBSCRIBER+EXCLUSIVE INTERVIEW – With a new Homeland Security task force underway, designed to examine threats posed by both Beijing and ever-more [...] More

Australia Under Cyber Siege

Australia Under Cyber Siege

EXPERT PERSPECTIVE — Australia has suffered enormous back-to-back cyberattacks in recent months. The first major attack hit Optus, Australia’s [...] More

The U.S. Needs a Stronger Cyber Defense Against Russia

The U.S. Needs a Stronger Cyber Defense Against Russia

Paul Kolbe, Director, Intelligence Project, Harvard University's Belfer Center for Science and International Affairs[rebelmouse-image 60322628 [...] More

Iran and Israel Continue Their Shadow Conflict in Cyberspace

Bottom Line Up FrontIsraeli cyberattacks against Iran are intended to send a signal, as a means of pushing back against Iran’s actions in Syria and [...] More

How Cyber Gray-Ops Became the New Norm in the Middle East

How Cyber Gray-Ops Became the New Norm in the Middle East

Cyber-enabled information operations in the Gulf, such as the one that seemingly spurred the ongoing feud between Qatar and its neighbors, represent [...] More

Information Warfare and the Gulf Dispute

The use of cyber capabilities to influence geopolitical confrontations has become more and more common. Even those countries who are not major global [...] More

Covertly Removing Data From Air-Gapped Networks

In the world of network security, the term air gap refers to a situation in which the computer network is physically separated from other networks, [...] More

Jumping the Air Gap: How to Breach Isolated Networks

Jumping the Air Gap: How to Breach Isolated Networks

Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud [...] More

A Cipher Exclusive Q&A With Matt Olsen on Russian Hacking

The White House is looking to take a “proportional” response to Russia’s alleged hacking of U.S. political party organizations and effort to [...] More

Forewarned is Forearmed: Confronting Adversaries in Cyberspace

Forewarned is Forearmed: Confronting Adversaries in Cyberspace

The risk of attack or theft from cyber-enabled actors has been made extremely clear to both private businesses and governments. The last few years [...] More

Latin America: The New Frontier for Cyber Attacks

Latin America: The New Frontier for Cyber Attacks

Latin America and the Caribbean (LAC) is the new frontier for cyber attacks, a crime that costs the world up to $575 billion a year, according to a [...] More

An Opportunity for Bad Actors

Online hackers are increasingly targeting Latin America, with Brazil, Argentina, and Mexico most at risk. The Cipher Brief talked with Pablo Dubois, [...] More