Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Cyber Espionage

Hackers for Hire

Bottom Line Up FrontThe investigation into the hacking of Amazon founder Jeff Bezos’ phone demonstrates how private firms have developed [...] More

The Latest

Network Take: U.S. Kaspersky Ban Sends Serious Signal to Russia

Network Take: U.S. Kaspersky Ban Sends Serious Signal to Russia

On Wednesday, the Department of Homeland Security (DHS) issued a binding directive compelling all federal civilian departments and agencies to [...] More

The United States of Cyber Debility

Americans are suffering from an undiagnosed condition. Overwhelmed and outmatched by the allure, complexity, and insecurity of networked [...] More

The CIA’s Officer of the Future

Few were paying attention, but the CIA did something groundbreaking in 2015. For the first time since before man walked on the moon, the Agency [...] More

Chinese Industrial Spies Cast a Wider Net

Chinese Industrial Spies Cast a Wider Net

One of the emerging trends in today’s expanding cyber espionage landscape has been China’s emergence as the leading practitioner of economic cyber [...] More

Chinese Cyber-Spies Target Asian Neighbors

It has been three years since the Obama Administration publically indicted five Chinese military officials for hacking U.S. companies, a move that [...] More

China Reaches into its Cyber Toolkit to Wage Economic Warfare

When Beijing got the word that the United States was accelerating the deployment of its Terminal High Altitude Area Defense (THAAD) system to South [...] More

Camouflaged Aggression: A Strategic Shift in Russia’s Cyber Activity

Russian cyber operations are widely discussed and reported on today. Conversations frequently range from how the Russian government hacked the [...] More

When States Pretend to be Terrorists or Hacktivists in Cyberspace

False flag operations have been routine ploys in espionage and warfare for centuries. Now they have turned up in cyber operations. The Cipher Brief [...] More

Looking for a Smoking Gun Behind a False Flag Attack

How can a government, or a company, determine who launched a cyber attack? Attribution becomes even more difficult when the attackers disguise [...] More

How Spy Agency Hackers Pose As – Anybody

How Spy Agency Hackers Pose As – Anybody

A false flag operation – pretending to be someone else while conducting spycraft or warfare – is an age-old tactic. With the advent of cyber [...] More

Why Beijing is Curbing Industrial Spying on the West

In September 2015, Chinese President Xi Jinping and President Barack Obama reached an agreement that neither nation would “conduct or knowingly [...] More

China Pivots its Hackers from Industrial Spies to Cyber Warriors

China Pivots its Hackers from Industrial Spies to Cyber Warriors

China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces [...] More