Google finds nation-state hackers abusing Gemini AI for target profiling, phishing kits, malware staging, and model ...
The United States urgently needs a virtual cybersecurity academy to train cyber defenders for national security, according to the Internet Security Alliance (ISA). It noted in a recent update to its ...
Several nation-state groups are now advancing an operational model where cyber reconnaissance feeds directly into kinetic targeting. “We’re seeing a fundamental shift in how nation-state actors ...
In a report published on February 12, ahead of the Munich Security Conference, Google Threat Intelligence Group (GTIG) and Google DeepMind shared new findings on how cybercriminals and nation-state ...
China has leveled serious accusations against the United States National Security Agency, alleging a coordinated cyberattack campaign targeting the country’s National Time Service Center. Chinese ...
When malicious code is engineered not for ransom but for ruin, the very continuity of government is at stake. Wiper malware has emerged as a favored ...
Cyber-related sanctions alone do not typically disrupt cyber malicious activities, but they can “toxify” networks of malicious actors, according to new research. A report, published on October 28 by ...
In April 2007, the Baltic nation of Estonia woke up to one of the world's first major cyber-attacks on civil society carried out by a state. A series ...
A common thread running through many of the biggest cyberattacks and data breaches in 2025 was a lack of visibility by organizations into their own IT systems—a weakness that attackers exploited again ...
“Crossing the Rubicon” means passing a point of no return. The idiom comes from Julius Caesar illegally leading his army across the river Rubicon in 49 B.C., an act that sparked the Roman civil war ...
Forbes contributors publish independent expert analyses and insights. Serial technology CEO covering all things IT & Tech. Every year I conduct a year end review to understand the patterns that shaped ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results