Cyberattacks

× Clear Filters
72 Articles
A faceless hacker running malware on a laptop

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats

For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.
Security padlock and circuit board

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015

Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.
The Just Security Podcast

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security

The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.
Visualization of cybersecurity

Unlocking Justice: A Policy Roadmap for Victims of Spyware

To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.
Visualization of cybersecurity

What It Takes to Stop the Next Salt Typhoon

A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming

The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
Digital generated image of multi coloured data against black background.

Confronting Gendered Harm in Cyberspace is not a Matter of Social Justice — It’s a National Security Imperative

Despite the worsening cyber threat landscape, U.N. cyber norms remain gender-blind, undermining States' ability to protect all citizens.
A red outline of the map of Austria laid over a blue chipboard.

Austria’s Progressive Stance on Cyber Operations and International Law

Austria's position is likely to influence ongoing international efforts to establish norms and principles that govern State conduct in cyberspace, potentially leading to more robust…
Futuristic circuit board on a dark blue background.

Software Backdoor is a Wakeup Call for Cybersecurity

As shown by the xz backdoor, relying on luck is not a sustainable cybersecurity strategy when much of the world depends on secure software.
Aerial Top View Red Oil Ship Tanker Full Speed

Key Questions in U.S. Cyber Attack on “Iranian Spy Ship”

What was the nature of the operation? How is Iran likely to respond? What are the implications for conflict escalation, or de-escalation?
President Biden and Vice President Harris speak at a podium in front of a sign titled "Artificial Intelligence"

Biden’s Executive Order on AI Gives Sweeping Mandate to DHS

The Biden administration's new executive order gives the DHS a wide-ranging portfolio of responsibilities related to artificial intelligence.
1-12 of 72 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: