The Power of Botnets: Amplifying Crime, Disinformation, and Espionage
Imagine an army of computers, acting under the instructions of a criminal syndicate, terrorist group, or foreign government. The sheer size of this network of […] More
Imagine an army of computers, acting under the instructions of a criminal syndicate, terrorist group, or foreign government. The sheer size of this network of […] More
With the proliferation of smart devices connected to the public internet the population of botnets – networks of compromised devices that can be leveraged for […] More
As governments and industries try to understand the ever-evolving landscape of cyber threats to civilian nuclear power plants, it is becoming clear that property and […] More
A zero-day, meaning a tool used to exploit a newly discovered computer vulnerability, alone does not make an attack. It is but one element of […] More
The modern data center is evolving like few ever thought possible, and this progression is in play across the public and private sector for good […] More
Russian cyber operations are widely discussed and reported on today. Conversations frequently range from how the Russian government hacked the Democratic National Committee (DNC) to […] More
A false flag operation – pretending to be someone else while conducting spycraft or warfare – is an age-old tactic. With the advent of cyber […] More
False flag operations have been routine ploys in espionage and warfare for centuries. Now they have turned up in cyber operations. The Cipher Brief spoke […] More
How can a government, or a company, determine who launched a cyber attack? Attribution becomes even more difficult when the attackers disguise themselves as others. […] More
Zero-day vulnerabilities — security flaws in commercial software or hardware for which developers haven’t devised a patch — have existed since the dawn of the […] More
The problem of stolen credentials is a well-known threat in the security industry. But knowing something is a problem and understanding the full scope are […] More
Few topics lend themselves to more polemics than government collection and exploitation of zero-day vulnerabilities, or security flaws in commercial software and hardware not yet […] More
With the seemingly constant barrage of leaks revealing the U.S. intelligence community’s hacking capabilities, many are wondering where government draws the line between priorities of […] More
Wikileaks’ “Vault7” disclosure last month of apparent CIA hacking tools marked the third recent incident in which an inadvertent public release of alleged government hacking […] More
The Russian effort to influence the 2016 election will remain front-and-center as the House and Senate Intelligence Committee continue their probe and the FBI moves […] More
The top counterintelligence priorities of the United States government are insider threats, protecting critical infrastructure, and supply chain security, according to National Counterintelligence Executive Bill […] More
Estonia, both a European Union and NATO member, shares an entire eastern border with Russia but remains firmly embedded in the Western defense alliance. Mariin […] More
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the […] More
Search