Geopolitics
State-sponsored attacks and advanced persistent threats
164 articles
Kinetic strike, cyber impact: Analyzing the Ukrainian drone attack on Russia's Nizhny Novgorod oil refinery
A deep-dive analysis of the Ukrainian drone attack on a Russian oil refinery, exploring its impact on critical infrastructure and cyber-physical secur
Ukrainian drone strikes on Russian oil refineries signal a new era of hybrid warfare
A detailed analysis of how Ukrainian drone strikes on Russian oil refineries exemplify a new form of hybrid warfare, blending cyber intelligence with
The silent strike: How cyberattacks on energy infrastructure define the war in Ukraine
While physical strikes on Russian oil dominate headlines, a silent war against Ukraine's energy grid reveals the blueprint for modern hybrid warfare.
China-linked hackers target Asian governments, NATO state, journalists, and activists
A newly identified China-aligned hacking group, SHADOW-EARTH-053, is targeting Asian governments, a NATO member, journalists, and activists in a broad
Germany suspects Russia is behind Signal phishing that targeted top officials
German officials were targeted in a Signal phishing campaign suspected to be from Russia. The attack used social engineering to bypass security.
Suspected Silk Typhoon hacker extradited to U.S. in COVID-19 espionage case
Xu Zewei, an alleged member of the Chinese state-sponsored group Silk Typhoon (APT41), faces U.S. charges for attacks on COVID-19 research entities.
Alleged Chinese state hacker extradited to the US to face espionage and fraud charges
Xu Zewei, an alleged member of the Chinese state-sponsored hacking group APT41, has been extradited to the US to face charges of cyber espionage and f
The persistent cyber war: Four years into the Ukraine invasion
Four years after Russia's full-scale invasion, a relentless cyber war continues to target Ukraine's critical infrastructure, government, and civilians
The digital ghost of Chornobyl: How the NotPetya cyberattack was a dress rehearsal for war
A deep dive into the 2017 NotPetya cyberattack, a destructive wiper disguised as ransomware that crippled Ukraine and caused $10B in global damages.
Researchers identify Fast16 sabotage malware that pre-dates Stuxnet
Discovered by Dragos, the Fast16 malware targets Siemens PLCs and likely represents an early, less-sophisticated attempt to sabotage Iran's nuclear pr
A dozen allied agencies say China is building covert hacker networks out of everyday routers
A joint warning from a dozen allied nations describes how Chinese state-sponsored hackers are using everyday routers to build covert networks inside c
Anatomy of a heist: The White House's persistent charge of Chinese AI theft
A deep dive into the persistent U.S. accusations of China's industrial-scale AI theft, detailing the technical methods, impact, and defensive measures
A new digital wall? Analyzing the proposed Trump crackdown on Chinese AI exploitation
A potential Trump administration plans to restrict Chinese access to U.S. AI. We analyze the technical mechanisms, global impact, and how to prepare.
China’s cyber capabilities now equal to the US, warns Dutch intelligence
Dutch intelligence agencies warn that China's cyber capabilities now match the US, using sophisticated techniques that often go undetected by defender
Ukraine's cyber front: Analyzing Russia's relentless digital assault
A deep dive into the relentless cyber warfare waged by Russia against Ukraine, detailing the malware, key attacks, and global impact of the digital fr
The invisible front: Analyzing Russia's relentless cyberwar against Ukraine
A deep dive into Russia's persistent cyber campaign against Ukraine, detailing the wiper malware, critical infrastructure attacks, and defensive lesso
The anatomy of a phantom menace: Why a hypothetical Axios attack is a real warning for supply chain security
A hypothetical attack on the Axios library serves as a stark warning about real-world software supply chain vulnerabilities and makes a compelling cas
Ukraine's robotic army: Analyzing the cyber attack surface of 25,000 frontline UGVs
Ukraine's plan to deploy 25,000 ground robots is a strategic masterstroke, but it creates a vast new cyber attack surface vulnerable to hacking and EW
Anatomy of a deception: How a fake Ukraine war headline reveals a timeless cyber threat
A fake Reddit headline about the Ukraine war reveals a classic social engineering tactic. Learn how threat actors use deception and how to stay safe.
Crypto exchange Grinex blames Western spies for $13m theft
Russian crypto-exchange Grinex claims Western intelligence was behind a $13m heist, but a lack of evidence has drawn skepticism from security experts.
Ukraine confirms suspected APT28 campaign targeting prosecutors and anti-corruption agencies
Ukraine's CERT-UA confirms a Russian APT28 campaign used Roundcube webmail exploits to spy on prosecutors and anti-corruption officials.
Beyond the battlefield: An analysis of Russia's cyber war against Ukraine
A deep dive into the relentless cyber war waged by Russia against Ukraine, detailing the wiper malware, satellite attacks, and global security implica
The new red button: How a hacked social media account could trigger global conflict
A single malicious post from a compromised account of a world leader could manipulate markets or ignite geopolitical conflict. This analysis explores
A digital battlefield: analyzing Russia's cyber warfare in Ukraine
A deep dive into Russia's cyber warfare against Ukraine, detailing the key attacks, threat actors, and technical methods used in this hybrid conflict.























