Beyond Hyperbole: The Evolving Subdiscipline of Cyber Conflict Studies |
System Problems |
Conflict & War |
2020 |
10 Notable Cyber Attacks on Government Agencies |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
Mexico is one of the top victims of cyberattacks in Latin America |
System State, System Problems |
Governance & Institutions |
2022 |
Air Force Intensifies Cyber Security With Large Weapons Systems |
Scientific & Technology Responses |
Conflict & War |
2022 |
U.S. Space Force ramps up cybersecurity spending |
System State, Scientific & Technology Responses |
Conflict & War |
2023 |
Synthetic Data Is About To Transform Artificial Intelligence |
System Problems |
Cybersecurity & Sustainability |
|
China's cyber assault on Taiwan |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
10 Notable Cyber Attacks on Government Agencies |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
FBI arrests 21-year-old Air Force guardsman in Pentagon leak case |
System Problems |
Cyber-IR |
2023 |
Security leaders weigh in on school district ransomware attack |
System State |
Governance & Institutions |
2023 |
Africa in the news: Ethiopia, Nigeria, and internet control updates |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2021 |
Why Does the Global Spyware Industry Continue to Thrive? Trends, Explanations, and Responses |
System State, System Problems, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Phase-based Tactical Analysis of Online Operations |
System State, System Problems, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
African Union Bugged by China: Cyber Espionage as Evidence of Strategic Shifts |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2018 |
How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2017 |
The Three Top Issues to Address for the Global Cybercrime Treaty |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2023 |
Once More, With Feeling: Security Research Should Not Be Chilled by Uncertainty in Copyright Law |
Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2020 |
Cyberattack on Critical Infrastructure: Russia and the Ukrainian Power Grid Attacks |
System State |
Conflict & War |
2017 |
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks |
System State |
Governance & Institutions |
2022 |
CYBER DEFENSE ACROSS THE OCEAN FLOOR The Geopolitics of Submarine Cable Security |
System State, System Problems |
Cyber-IR, Governance & Institutions, Conflict & War |
2021 |
Targeted Human Trafficking – The Wars between Proxy and Surrogated Economy |
Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2022 |
Constructing Norms for Global Cybersecurity |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2016 |
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities |
System State, System Problems |
Cybersecurity & Sustainability |
2023 |
BingBang – A New Bing Vulnerability that Can be Exploited Without Executing a code |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
Lazarus Subgroup Targeting Apple Devices with New RustBucket macOS Malware |
System Problems |
Conflict & War |
2023 |
Cracking 2.3M Attackers-Supplied Credentials: What Can We Learn from RDP Attacks |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
A review on cybersecurity vulnerabilities for unmanned aerial vehicles |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2017 |
CyberSecurity considerations for an interconnected self-driving car system of systems |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2017 |
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
Drones for smart cities: Issues in cybersecurity, privacy, and public safety |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2016 |
U.S. Unveils New Cybersecurity Strategy with Tighter Regulations |
System Problems |
Cyber-IR, Governance & Institutions |
2023 |
Hackers Take Control of Government-Owned Satellite in Alarming Experiment |
System Problems |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Cyber Security: Global Food Supply Chain at Risk from Malicious Hackers |
System Problems, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions |
2022 |
Chinese Hackers Using MgBot Malware to Target International NGOs in Mainland China |
System State |
Conflict & War |
2023 |
New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks |
System Problems |
Cybersecurity & Sustainability |
2023 |
Iranian Hackers Launch Sophisticated Attacks Targeting Israel with PowerLess Backdoor |
System State |
Conflict & War |
2023 |
Analysis | The Perilous Path to a New Cybercrime Treaty. |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
New Dark Web Market Styx Focuses on Financial Fraud Services |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
US Cyber Officials Make Urgent Push to Warn Businesses about Vulnerabilities to Hackers |
System Problems |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Cyber risk and cybersecurity: a systematic review of data availability |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
Beyond the Hype: AI in your SOC |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2020 |
Cybersecurity for the IoT: How trust can unlock value |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets |
System State |
Cyber-IR, Conflict & War |
2023 |
Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Default |
System Problems |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
HIDE AND SEEK Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries |
Socio-economic & Political Responses |
Cyber-IR |
2018 |
Google Cloud Threat Horizons Report 2023 |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
IBM Security X-Force Threat Intelligence Index 2023 |
System Problems, Scientific & Technology Responses |
Governance & Institutions |
2023 |
Cybersecurity & Innovation: The Key to a Secure Future |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2021 |
The Cost of a Data Breach for Government Agencies |
System Problems |
Cyber-IR |
2022 |
Recommendations to Defend America’s Election Infrastructure |
Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2019 |