Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Cybercrime

A Deniable Attack with Strategic Precision: Why the Red Hat Breach Looks More Like Statecraft Than Mere Crime

EXPERT PERSPECTIVE — The timing was no coincidence.As the U.S. federal government ground to a halt at 12:01 a.m. EDT on October 1, 2025, a [...] More

The Latest

How Public and Private Entities Can Fight Cybercrime

OPINION — For years, cybercrime was dismissed as an afterthought. Indeed, it wasn’t long ago that the FBI leadership famously dismissed it as [...] More

Going Undercover to Catch Cybercriminals

Our friends at The Record talked recently with Richard LaTulip, a former Secret Service Special Agent who spent time undercover to better understand [...] More

Cybercrime Lurks in the Shadows of Pyongyang’s Olympic Charm Offensive

Cybercrime Lurks in the Shadows of Pyongyang’s Olympic Charm Offensive

Bottom Line: While North Korea has put on a friendly face during the Olympic Games taking place along its southern border, the country’s hackers [...] More

When Terrorists Learn How to Hack

When Terrorists Learn How to Hack

Terrorist groups are expanding their use of the internet beyond mere messaging and disseminating operational know-how, slowly adding a cyber-hacking [...] More

Ghosts in the Machine that Can Rob You Blind

It was almost a devastatingly effective cyber-heist. Hackers compromised the Kathmandu-based NIC Asia Bank this fall, fraudulently transferring $4.4 [...] More

Heading Off State-Sponsored Hacker Attacks

Time and time again companies, organizations, and government agencies have proven that they can’t completely secure their computer networks from [...] More

Day 4: Dispatch from RSA Conference

Day 4: Dispatch from RSA Conference

This week I am attending the RSA Conference, a global convention bringing together government and business approaches to secure the digital channels [...] More

Day 3: Dispatch from RSA Conference

Day 3: Dispatch from RSA Conference

This week I am attending the RSA Conference, a global convention bringing together government and business approaches to secure the digital channels [...] More

Changes Under Rule 41 Will Not Become “the New Normal”

The U.S. Department of Justice has made new changes to Rule 41 of the Federal Rules of Criminal Procedure, changing venue provisions for obtaining a [...] More

Yahoo: Who is Responsible for the Hack?

Yahoo has announced hackers, believed to be state-sponsored, stole data on around 500 million users in 2014. The Cipher Brief’s Kaitlin Lavinder [...] More

The Blurring Line Between Cyber and Physical Threats

The Blurring Line Between Cyber and Physical Threats

Every day, the line between cyber-threats and physical threats grows thinner – blurring the crucial distinction between attacks on networks and [...] More

Cyber Crime

Scott Kessler and Eric Rachner are the co-founders of Secure Senses Inc, which provides human intelligence-based cybersecurity services. In an [...] More