Behind Enemy Lines: Inside the Operations of Russia’s Elite Cyber Espionage Units
Vladimir Putin's rise to power and his tenure as Russia's president have been marked by a unique blend of political acumen, strategic…
A catch-all for topics related to cybersecurity.
Vladimir Putin's rise to power and his tenure as Russia's president have been marked by a unique blend of political acumen, strategic…
This article delves into the works of 13 prominent authors from China. Summaries of articles about the other countries will follow in…
Imagine a vast library where every book, article, and piece of information is meticulously organized, easily accessible, and interconnected. This is the…
A Backdoor Trojan called by same antivirus firms 'Beaugrit' which has been active since 2017, has been identified beaconing out to a…
In 2023, total losses reported to the IC3 by those over the age of 60 topped $3.4 billion, an almost 11% increase…
I was encouraged to find out that the most popular AI applications are actually extensions of existing tried and true tools that…
We will see a dangerous escalation in the use of AI by attackers in 2024 Q3. Attackers have developed increasingly sophisticated AI-powered…
One of the main benefits of using STIX and TAXII for law enforcement threat intelligence sharing is the ability to standardize the…
Common Transactive Services permits energy consumers and producers to interact through energy markets by simplifying actor interaction with any market.
OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.