🏴

Geopolitics

State-sponsored attacks and advanced persistent threats

164 articles

Kinetic strike, cyber impact: Analyzing the Ukrainian drone attack on Russia's Nizhny Novgorod oil refinery

A deep-dive analysis of the Ukrainian drone attack on a Russian oil refinery, exploring its impact on critical infrastructure and cyber-physical secur

6 min readMay 3

Ukrainian drone strikes on Russian oil refineries signal a new era of hybrid warfare

A detailed analysis of how Ukrainian drone strikes on Russian oil refineries exemplify a new form of hybrid warfare, blending cyber intelligence with

6 min readMay 3

The silent strike: How cyberattacks on energy infrastructure define the war in Ukraine

While physical strikes on Russian oil dominate headlines, a silent war against Ukraine's energy grid reveals the blueprint for modern hybrid warfare.

6 min readMay 3

China-linked hackers target Asian governments, NATO state, journalists, and activists

A newly identified China-aligned hacking group, SHADOW-EARTH-053, is targeting Asian governments, a NATO member, journalists, and activists in a broad

6 min readMay 2

Germany suspects Russia is behind Signal phishing that targeted top officials

German officials were targeted in a Signal phishing campaign suspected to be from Russia. The attack used social engineering to bypass security.

6 min readApr 29

Suspected Silk Typhoon hacker extradited to U.S. in COVID-19 espionage case

Xu Zewei, an alleged member of the Chinese state-sponsored group Silk Typhoon (APT41), faces U.S. charges for attacks on COVID-19 research entities.

6 min readApr 29

Alleged Chinese state hacker extradited to the US to face espionage and fraud charges

Xu Zewei, an alleged member of the Chinese state-sponsored hacking group APT41, has been extradited to the US to face charges of cyber espionage and f

6 min readApr 29

The persistent cyber war: Four years into the Ukraine invasion

Four years after Russia's full-scale invasion, a relentless cyber war continues to target Ukraine's critical infrastructure, government, and civilians

6 min readApr 28

The digital ghost of Chornobyl: How the NotPetya cyberattack was a dress rehearsal for war

A deep dive into the 2017 NotPetya cyberattack, a destructive wiper disguised as ransomware that crippled Ukraine and caused $10B in global damages.

6 min readApr 28

Researchers identify Fast16 sabotage malware that pre-dates Stuxnet

Discovered by Dragos, the Fast16 malware targets Siemens PLCs and likely represents an early, less-sophisticated attempt to sabotage Iran's nuclear pr

6 min readApr 27

A dozen allied agencies say China is building covert hacker networks out of everyday routers

A joint warning from a dozen allied nations describes how Chinese state-sponsored hackers are using everyday routers to build covert networks inside c

5 min readApr 27

Anatomy of a heist: The White House's persistent charge of Chinese AI theft

A deep dive into the persistent U.S. accusations of China's industrial-scale AI theft, detailing the technical methods, impact, and defensive measures

6 min readApr 26

A new digital wall? Analyzing the proposed Trump crackdown on Chinese AI exploitation

A potential Trump administration plans to restrict Chinese access to U.S. AI. We analyze the technical mechanisms, global impact, and how to prepare.

5 min readApr 24

China’s cyber capabilities now equal to the US, warns Dutch intelligence

Dutch intelligence agencies warn that China's cyber capabilities now match the US, using sophisticated techniques that often go undetected by defender

6 min readApr 23

Ukraine's cyber front: Analyzing Russia's relentless digital assault

A deep dive into the relentless cyber warfare waged by Russia against Ukraine, detailing the malware, key attacks, and global impact of the digital fr

6 min readApr 21

The invisible front: Analyzing Russia's relentless cyberwar against Ukraine

A deep dive into Russia's persistent cyber campaign against Ukraine, detailing the wiper malware, critical infrastructure attacks, and defensive lesso

6 min readApr 21

The anatomy of a phantom menace: Why a hypothetical Axios attack is a real warning for supply chain security

A hypothetical attack on the Axios library serves as a stark warning about real-world software supply chain vulnerabilities and makes a compelling cas

7 min readApr 21

Ukraine's robotic army: Analyzing the cyber attack surface of 25,000 frontline UGVs

Ukraine's plan to deploy 25,000 ground robots is a strategic masterstroke, but it creates a vast new cyber attack surface vulnerable to hacking and EW

7 min readApr 20

Anatomy of a deception: How a fake Ukraine war headline reveals a timeless cyber threat

A fake Reddit headline about the Ukraine war reveals a classic social engineering tactic. Learn how threat actors use deception and how to stay safe.

6 min readApr 20

Crypto exchange Grinex blames Western spies for $13m theft

Russian crypto-exchange Grinex claims Western intelligence was behind a $13m heist, but a lack of evidence has drawn skepticism from security experts.

5 min readApr 20

Ukraine confirms suspected APT28 campaign targeting prosecutors and anti-corruption agencies

Ukraine's CERT-UA confirms a Russian APT28 campaign used Roundcube webmail exploits to spy on prosecutors and anti-corruption officials.

5 min readApr 20

Beyond the battlefield: An analysis of Russia's cyber war against Ukraine

A deep dive into the relentless cyber war waged by Russia against Ukraine, detailing the wiper malware, satellite attacks, and global security implica

6 min readApr 20

The new red button: How a hacked social media account could trigger global conflict

A single malicious post from a compromised account of a world leader could manipulate markets or ignite geopolitical conflict. This analysis explores

7 min readApr 19

A digital battlefield: analyzing Russia's cyber warfare in Ukraine

A deep dive into Russia's cyber warfare against Ukraine, detailing the key attacks, threat actors, and technical methods used in this hybrid conflict.

6 min readApr 19