Intelligence

British intelligence warns cyber threat to critical infrastructure is increasing (Alexander Martin – The Record)

The threat posed by hackers to critical infrastructure in Britain is increasing, leaving a “widening gap” between the potential for harm and the collective...

Hackers using fake summonses in attacks on Ukraine’s defense sector (Daryna Antoniuk – The Record)

Hackers have been sending fake summons emails purportedly from Ukrainian courts to target the country’s government, military and defense sector in a new cyberespionage...

Agentic AI: Does the Future of Warfare Look Autonomous? (The Soufan Center)

Agentic warfare, a military model in which autonomous and semi-autonomous systems are deployed to facilitate or drive planning, logistics, operations, and intelligence, is set...

Fibre-optic drones reshape Ukraine’s technological war (David Kirichenko – Lowy The Interpreter)

Fibre-optic drones have taken a more central role on the battlefields in Ukraine. Frontline soldiers describe the conflict as a war of drones and...

In cybersecurity, people are the weak point (Annie-Mei Forster and Saja English – ASPI The Strategist)

While cybersecurity professionals often focus on firewalls, encryption and software vulnerabilities, the real battleground is human psychology. While organisations remain fixated on digital defences,...

Sources of scale: US and Indo-Pacific allies’ defence-industrial cooperation (Rupert Schulenburg – IISS)

Washington and its Indo-Pacific allies have been working to expand their defence-industrial cooperation, particularly in missile co-production and co-development. These efforts are intended to...

Rethinking Cyber Deterrence in a Multipolar World (Louise Marie Hurel and Gareth Mott – RUSI)

Geopolitical tensions in cyberspace are escalating. There is an urgent need to reassess how the cyber domain can support broader deterrence strategies. However, the...

‘Critical’ firmware-level vulnerabilities found in laptops commonly used by security specialists (Alexander Martin – The Record)

Security researchers on Tuesday detailed a series of vulnerabilities that could allow hackers to steal sensitive data from devices using Broadcom’s ControlVault, a special...

Active infrastructure for Candiru spyware linked to Hungary, Saudi Arabia (Suzanne Smalley – The Record)

Researchers have found new infrastructure believed to be used by the spyware manufacturer Candiru to attack computers through Windows malware. The research, released by Recorded...

Latest articles