Cyberattacks

× Clear Filters
65 Articles
Digital generated image of multi coloured data against black background.

Confronting Gendered Harm in Cyberspace is not a Matter of Social Justice — It’s a National Security Imperative

Despite the worsening cyber threat landscape, U.N. cyber norms remain gender-blind, undermining States' ability to protect all citizens.
A red outline of the map of Austria laid over a blue chipboard.

Austria’s Progressive Stance on Cyber Operations and International Law

Austria's position is likely to influence ongoing international efforts to establish norms and principles that govern State conduct in cyberspace, potentially leading to more robust…
Futuristic circuit board on a dark blue background.

Software Backdoor is a Wakeup Call for Cybersecurity

As shown by the xz backdoor, relying on luck is not a sustainable cybersecurity strategy when much of the world depends on secure software.
Aerial Top View Red Oil Ship Tanker Full Speed

Key Questions in U.S. Cyber Attack on “Iranian Spy Ship”

What was the nature of the operation? How is Iran likely to respond? What are the implications for conflict escalation, or de-escalation?
President Biden and Vice President Harris speak at a podium in front of a sign titled "Artificial Intelligence"

Biden’s Executive Order on AI Gives Sweeping Mandate to DHS

The Biden administration's new executive order gives the DHS a wide-ranging portfolio of responsibilities related to artificial intelligence.
A constellation of Elon Musk's SpaceX Starlink satellites fly above Zaporizhzhia

Digital Tech Companies in War: What is the Law? What are the Risks?

Tech companies need to be familiar with IHL to protect their employees, properties, and surrounding civilians during armed conflict.
Computer code with individual words highlighted different colors.

Bugs in the Software Liability Debate

In the debate over software liability, a negligence standard requires research and must not lean only on avoiding "known vulnerabilities."
Futuristic data screen and hologram world map

The Year of Section 702 Reform, Part I: Backdoor Searches

Requiring a warrant for U.S. person queries honors the balance between security and liberty struck in the Fourth Amendment and ensures that Section 702 can’t be used to get around…
Blue futuristic monitor with information data

Poland’s Position on International Law and Cyber Operations: Sovereignty and Third-Party Countermeasures

Poland's positions push the discussion forward on contested areas of law.
Futuristic digital circuit background with a glowing dotted and line.

Regulating Artificial Intelligence Requires Balancing Rights, Innovation

"The United States should do what it has done for generations now when it comes to innovative thought and be a world leader ensuring AI supports society by providing the most benefits…
Futuristic, blue server room with the flowing people and data.

AcidRain Malware and Viasat Network Downtime in Ukraine: Assessing the Cyber War Threat

Russia's disruption of the Viasat network in Ukraine should be a wakeup call for policymakers.
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…
1-12 of 65 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: