Bottom Line: While North Korea has put on a friendly face during the Olympic Games taking place along its southern border, the country’s hackers continue to engage in global cybercrime campaigns that seek to fill the coffers of the ruling regime in the background – with the latest hacking campaign ...

Terrorist groups are expanding their use of the internet beyond mere messaging and disseminating operational know-how, slowly adding a cyber-hacking toolset that could one day rival that of criminal or state-sponsored hacking. To date attacks have included website defacement, doxing of personally identifiable information, and distributed denial of service (DDoS) ...

It was almost a devastatingly effective cyber-heist. Hackers compromised the Kathmandu-based NIC Asia Bank this fall, fraudulently transferring $4.4 million to destinations in at least six other countries, according to local media reports. All but $580,000 of the funds were recovered by mid-November, after Nepal asked the destination countries to ...

Time and time again companies, organizations, and government agencies have proven that they can’t completely secure their computer networks from hackers – particularly nation-states with the resources to pursue access persistently. Instead of focusing solely on network defense, the United States can adopt a deterrence strategy that dissuades foreign governments ...

This week I am attending the RSA Conference, a global convention bringing together government and business approaches to secure the digital channels people depend on every day. To catch up on what has been buzzing in the public presentations and private corridors of this year’s RSA Conference, check out my ...

This week I am attending the RSA Conference, a global convention bringing together government and business approaches to secure the digital channels people depend on every day. To catch up on what has been buzzing in the public presentations and private corridors of this year’s RSA Conference, check out my ...

The U.S. Department of Justice has made new changes to Rule 41 of the Federal Rules of Criminal Procedure, changing venue provisions for obtaining a search warrant. The Cipher Brief sat down with David O’Neil, a Partner at the firm Debevoise & Plimpton and former acting Assistant Attorney General of ...

Yahoo has announced hackers, believed to be state-sponsored, stole data on around 500 million users in 2014. The Cipher Brief’s Kaitlin Lavinder spoke with Vitali Kremez, a Senior Analyst at cyber intelligence company Flashpoint, about the hack. The Cipher Brief: Is it possible, given the scale of the hacking, that ...

Every day, the line between cyber-threats and physical threats grows thinner – blurring the crucial distinction between attacks on networks and attacks on materials objects. 225,000 Ukrainians learned this in January of 2016 when they lost power following a cyber-attack on a Ukrainian power grid. The rise of the Internet ...

Scott Kessler and Eric Rachner are the co-founders of Secure Senses Inc, which provides human intelligence-based cybersecurity services. In an interview with the Cipher Brief, they indicated that “hacking as a service” is on the rise in the Russian hacker community, and that the scale of the problem this represents ...