Hackers for Hire
Bottom Line Up Front The investigation into the hacking of Amazon founder Jeff Bezos’ phone demonstrates how private firms have developed sophisticated electronic espionage […] More
Bottom Line Up Front The investigation into the hacking of Amazon founder Jeff Bezos’ phone demonstrates how private firms have developed sophisticated electronic espionage […] More
Today, the U.S. Department of Justice revealed indictments for nine Iranian hackers and the U.S. Treasury sanctioned these same individuals as well as one entity, […] More
Revealing the identities of intelligence officials – a practice known as doxing – could become more common among nation-states, directed in particular at the clandestine […] More
One of the opening rounds of an information war between the Kremlin and a democratic country came from Melvin Redick, a fake Facebook account designed […] More
On Wednesday, the Department of Homeland Security (DHS) issued a binding directive compelling all federal civilian departments and agencies to identify and develop a plan […] More
Americans are suffering from an undiagnosed condition. Overwhelmed and outmatched by the allure, complexity, and insecurity of networked technologies, we’ve been left confused and compromised […] More
Few were paying attention, but the CIA did something groundbreaking in 2015. For the first time since before man walked on the moon, the Agency […] More
One of the emerging trends in today’s expanding cyber espionage landscape has been China’s emergence as the leading practitioner of economic cyber espionage. What does […] More
It has been three years since the Obama Administration publically indicted five Chinese military officials for hacking U.S. companies, a move that prompted negotiations to […] More
When Beijing got the word that the United States was accelerating the deployment of its Terminal High Altitude Area Defense (THAAD) system to South Korea […] More
Russian cyber operations are widely discussed and reported on today. Conversations frequently range from how the Russian government hacked the Democratic National Committee (DNC) to […] More
False flag operations have been routine ploys in espionage and warfare for centuries. Now they have turned up in cyber operations. The Cipher Brief spoke […] More
How can a government, or a company, determine who launched a cyber attack? Attribution becomes even more difficult when the attackers disguise themselves as others. […] More
A false flag operation – pretending to be someone else while conducting spycraft or warfare – is an age-old tactic. With the advent of cyber […] More
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the […] More
In September 2015, Chinese President Xi Jinping and President Barack Obama reached an agreement that neither nation would “conduct or knowingly support cyber-enabled theft of […] More
With just a few weeks left until French voters head to the polls, far-right presidential candidate Marine Le Pen made her way to Moscow for […] More
Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud services and devices […] More
In the world of network security, the term air gap refers to a situation in which the computer network is physically separated from other networks, […] More
Search