Search results

21 – 30 of 186
Expert briefing
Publication date: 20 August 2018

Lesser-known cyber players.

Details

DOI: 10.1108/OXAN-DB236921

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 25 April 2018

Although Orangeworm is not believed to be state-backed, governments are prioritising the development of offensive cyberweapons but deploying them in different ways. These range…

Expert briefing
Publication date: 26 October 2023

The country’s renowned cyberespionage and surveillance capabilities were to some extent undermined by Hamas’s low-tech communications and misdirection. The conflict, so far, has…

Details

DOI: 10.1108/OXAN-DB282928

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 27 October 2016

The role of proxy actors on the internet.

Details

DOI: 10.1108/OXAN-DB214573

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 20 April 2021

This comes as the spotlight intensifies on the vulnerability disclosure process of private firms as well as of US intelligence agencies, and the balance between public and…

Details

DOI: 10.1108/OXAN-DB260958

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 23 July 2020

Although public 'naming and shaming' has become a common practice since the 2017 WannaCry malware attack, damaging cyber campaigns show no signs of decreasing.

Expert briefing
Publication date: 23 July 2021

This follows the ransomware attack on Colonial Pipeline in May. As criminal and state-sponsored cyberattacks intensify, the administration is focusing on threats to US critical…

Details

DOI: 10.1108/OXAN-DB263000

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 9 December 2016

He added that there has been a "striking increase" in cyber operations credited to Russian hacking group 'Fancy Bear', also known as APT 28. Advanced persistent threats (APT), a…

Expert briefing
Publication date: 16 April 2015

The threats and capabilities of UAE in cyber security.

Details

DOI: 10.1108/OXAN-DB198982

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 16 February 2024

These routers can compromise US critical infrastructure. This indicates that Chinese cyber operations are shifting from espionage to disruption.

Details

DOI: 10.1108/OXAN-DB285284

ISSN: 2633-304X

Keywords

Geographic
Topical
21 – 30 of 186