How Ukraine’s Internet Can Fend Off Russian Attacks
The besieged country’s complex internet infrastructure has evolved to promote resiliency.
How Ukraine’s Internet Can Fend Off Russian Attacks Read MoreThe besieged country’s complex internet infrastructure has evolved to promote resiliency.
How Ukraine’s Internet Can Fend Off Russian Attacks Read MoreOn Friday, online access was curtailed by both Russian censors and Western businesses as the war in Ukraine became a reason for moves that limited free access to the Internet.
A new iron curtain is descending across Russia’s Internet Read MorePosts that glorify war and those that criticize Russia are getting quietly deleted, as platforms are pressured to walk a thin line.
The War in Ukraine Is Keeping Chinese Social Media Censors Busy Read MoreWashington has sanctioned Russian cybersecurity firm Positive Technologies. US intelligence reports claim it provides hacking tools and runs operations for the Kremlin.
The $1 billion Russian cyber company that the US says hacks for Moscow Read MoreSoldiers and tanks may care about national borders. Cyber doesn’t.
How a Russian cyberwar in Ukraine could ripple out globally Read MoreSecurity researchers have found signs that the pervasive hacking and misinformation campaign comes not from Moscow but from Minsk.
‘Ghostwriter’ Looks Like a Purely Russian Op—Except It’s Not Read MoreThe Kremlin’s web of nonstate hackers can wreak just as much havoc as Putin’s government.
Russia’s Cyber Threat to Ukraine Is Vast—and Underestimated Read MoreAs troops amass on Ukraine’s border, civilians capture it all on camera. Online sleuths are now unpacking the details.
If Russia Invades Ukraine, TikTok Will See It Up Close Read MoreUnderstanding just how extensive and coordinated Russia’s operations against the West are represents the first step in confronting—and defeating—Putin’s increased aggression, particularly as it becomes clear that the 2016 election interference was just a starting point.
A Guide to Russia’s High Tech Tool Box for Subverting US Democracy Read MoreRoman Dobrokhotov has been playing a dangerous game for a Russian reporter: identifying agents of the GRU military intelligence agency.
The Russian Sleuth Who Outs Moscow’s Elite Hackers and Assassins Read MoreThe White House was quick to publicly blame Russia for a cyberattack against Ukraine, the latest sign that cyber attribution is a crucial tool in the American arsenal.
The US is unmasking Russian hackers faster than ever Read MoreChina has increasingly relied on contractors for its hacking, which opens the door to all kinds of criminal behavior.
How China’s Hacking Entered a Reckless New Phase Read MoreThe full extent of the SolarWinds hack and Hafnium’s attack on Microsoft Exchange Server may never be known.
China’s and Russia’s Spying Sprees Will Take Years to Unpack Read MoreThe country’s cyber forces have raked in billions of dollars for the regime by pulling off schemes ranging from A.T.M. heists to cryptocurrency thefts. Can they be stopped?
The Incredible Rise of North Korea’s Hacking Army Read MoreWe learned that we cannot afford to wait for cyber attacks to affect our military networks. We learned that defending our military networks requires executing operations outside our military networks. The threat evolved, and we evolved to meet it.
How to Compete in Cyberspace Read MoreFew national-security threats are as potent—or as nebulous—as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not.
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Read MoreAn oral history of a devastating strike that hasn’t happened yet.
Imagine the US was just hit with a cyberattack. What happens next? Read MoreFrom Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers Read MoreThe message shared perhaps the worst possible news Oh could have received at that exact moment: Something was shutting down every domain controller in the Seoul data centers, the servers that formed the backbone of the Olympics’ IT infrastructure.
The Untold Story of the 2018 Olympics Cyberattack, the Most Deceptive Hack in History Read MoreCyber Strategy: Summary, 2018
U.S. Department of Defense
“American prosperity, liberty, and security depend upon open and reliable access to information. The Internet empowers us and enriches our lives by providing ever-greater access to new knowledge, businesses, and services. Computers and network technologies underpin U.S. military warfighting superiority by enabling the Joint Force to gain the information advantage, strike at long distance, and exercise global command and control.”
DoD Cyber Strategy – 2018 Read More