Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] TIME SENSITIVITY IN CYBERWEAPON REUSABILITY - DTICSingle-use means that once the cyberweapon is used, the vulnerability will be patched and can no longer be exploited. Perishable means that cyberweapons become.
-
[2]
Cyber Warfare - RANDCyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information ...
-
[3]
The Real Story of Stuxnet - IEEE SpectrumFeb 26, 2013 · Update 13 June 2025: The attacks on Iranian nuclear facilities are the latest in a two-decade campaign by the Israeli military and ...
-
[4]
An Unprecedented Look at Stuxnet, the World's First Digital WeaponNov 3, 2014 · In January 2010, inspectors with the International Atomic Energy Agency visiting the Natanz uranium enrichment plant in Iran noticed that ...
-
[5]
[PDF] Stuxnet and Its Hidden Lessons on the Ethics of CyberweaponsIn 2010, computer programmers around the world noticed a strange kind of cyber attack—although it had global reach, it was highly targeted and very ...
-
[6]
[PDF] GAO-19-128, WEAPON SYSTEMS CYBERSECURITY: DOD Just ...Oct 9, 2018 · The Department of Defense (DOD) faces mounting challenges in protecting its weapon systems from increasingly sophisticated cyber threats.
-
[7]
Use of Force in Cyberspace | Congress.govNov 29, 2024 · There are presently no internationally accepted criteria for determining whether a nation state cyberattack is a use of force equivalent to an armed attack.<|separator|>
-
[8]
Full article: Cyber-Weapons - Taylor & Francis OnlineFeb 29, 2012 · Remarkably, even the US Department of Defense Dictionary of ... An example of a definition that is too narrow is: 'A cyber weapon is ...
-
[9]
Limiting the undesired impact of cyber weapons - Oxford AcademicMar 31, 2017 · A note on terminology: For purposes of this article, a cyber weapon is defined to be a software-based IT artifact or tool that can cause ...Denial Of Service Attacks · Why These Attacks Stayed... · Technical Issues In...
-
[10]
[PDF] Is Cyber Deterrence Possible? - DoDMerriam-Webster defines an attack as “to act violently against (someone or something).” In the cyber domain, the “someone” is US citizens or allies while the “ ...
-
[11]
(PDF) Cyberweapons: power and the governance of the invisibleCyberweapons are malicious software entities deployed to cause harm to adversaries' computer networks and systems. They threaten the integrity and functionality ...
-
[12]
Defining offensive cyber capabilities - ASPIJul 4, 2018 · ... military objectives in, or through, cyberspace. They can be used ... cyber weapon; it is nonsensical to label Powershell as a cyber weapon.
-
[13]
What is a cyberweapon? - HuntressTypes of cyberweapons · 1. Destructive Malware · 2. Espionage Tools · 3. Disruptive Tools (e.g., DDoS) · 4. ICS and SCADA Targeting Tools · 5. Ransomware for ...Missing: classification | Show results with:classification
-
[14]
[PDF] Defining a Class of Cyber Weapons as WMD: An Examination of the ...Their rationale was the seemingly nascent state of cyber weapon policy and strategy develop- ment. ... Department of Defense, Quadrennial Defense Review, ( ...
-
[15]
What is Cyber Warfare | Types, Examples & Mitigation - Imperva7 Types of Cyber Warfare Attacks · Espionage · Sabotage · Denial-of-service (DoS) Attacks · Electrical Power Grid · Propaganda Attacks · Economic Disruption · Surprise ...
-
[16]
What is Cyber Espionage? Types & Examples - SentinelOneAug 11, 2025 · Cyber Warfare: These are cyber-offensive operations that are designed to be highly disruptive or destructive. Attacks are supposed to cause ...
-
[17]
Cyberwarfare: The new frontlines - Cybersecurity GuideApr 28, 2025 · The key difference between cyberwar and cybercrime lies in the objectives and resources of the combatants, though the weapons and scale can be ...Missing: distinction sponsorship
-
[18]
What are state-sponsored cyber attacks? | F‑SecureFeb 21, 2025 · State-sponsored cyber attacks are malicious digital operations carried out by hackers who are either directly employed by a government or indirectly funded by ...
-
[19]
Cyberweapons: Capability, Intent and Context in CyberdefenseNov 14, 2017 · To effectively designate a cybertool as a cyberweapon the context of a particular tool's use must be considered. That context must include an ...
-
[20]
In Cyber, Differentiating Between State Actors, Criminals Is a BlurMay 14, 2021 · "The line between nation-state and criminal actors is increasingly blurry as nation-states turn to criminal proxies as a tool of state power, ...
-
[21]
Cyber Warfare: From Attribution to Deterrence - Infosec InstituteOct 3, 2016 · The reality demonstrates that the problem of attribution is exceedingly complex and is not always solvable, this means that in a cyber warfare ...
-
[22]
[PDF] Cyber Attribution and State ResponsibilityJul 21, 2021 · Cyber attribution is whether a cyberattack should be attributed to a state, and if so, what are the legal consequences. There is little ...
-
[23]
[PDF] Comparing Cyber Weapons to Traditional Weapons Through the ...Countries in the West seem more interested in defining cyber weapons in terms of their destructive effects. This may stem from the influence of military ...<|control11|><|separator|>
-
[24]
"Classification of Cyber Capabilities and Operations" by Jeffrey T ...Jul 1, 2019 · This analysis leads to the conclusion that cyber capabilities cannot logically be categorized as weapons or means of cyber warfare.
-
[25]
The Future of Warfighting: Integrated Cyber Weapons - Booz AllenIn addition, a modular architecture can provide flexible, reusable components that offer speed to mission, faster upgrades, and scalability for any complexity.
-
[26]
What are Zero-day Attacks? - SentinelOneAug 20, 2025 · Zero-day attacks exploit unknown software vulnerabilities prior to patch releases. Discover attack vectors, response techniques, and defense techniques.
-
[27]
Crash (exploit) and burn: Securing the offensive cyber supply chain ...Jun 25, 2025 · Zero-day vulnerabilities are issues or weaknesses (“bugs”) in software or hardware, typically unknown to the vendor and for which no fix is ...
-
[28]
Wiper malware explained: How it works and why it's so devastatingJul 7, 2025 · A newly discovered wiper malware, PathWiper, was deployed in Ukraine in June 2025 via legitimate endpoint administration tools.Missing: SCADA manipulation
-
[29]
Command and Control (C&C) Attacks Explained - CrowdStrikeJul 19, 2023 · Advanced Persistent Threat (APT), An advanced persistent threat is a sophisticated, sustained cyberattack where an intruder establishes an ...
-
[30]
Command and control of cyber weapons - ResearchGateIn the present paper we discuss the dangers of deploying and controlling intelligent cyber weapons in a unified setting, considering these weapons as ...
-
[31]
[PDF] Reflections on Cyberweapons Controls - FacultyCyberweapons, like viruses, are generally unregulated, unlike physical weapons. They are becoming increasingly abundant, powerful, and easy to use, with many ...
-
[32]
Cyber weapons: 4 defining characteristics - Route FiftyJun 4, 2015 · ... definition for a cyber weapon: A campaign that may combine multiple ... Department of Defense (Civilian), Department of Defense ...
-
[33]
Cyberweapon | Research Starters - EBSCOBrief History. The early years of the commercial Internet were marked by multiple examples of viruses and other forms of malware that circulated on a mass scale ...
- [34]
-
[35]
Stuxnet: The world's first cyber weapon | FSIFeb 3, 2015 · Stuxnet was the name given to a highly complex digital malware that targeted, and physically damaged, Iran's clandestine nuclear program from 2007.Missing: facts | Show results with:facts
-
[36]
The Unique Characteristics of Cyber Weapons - Atlantic CouncilMay 20, 2013 · A cyberweapon can be software designed to manipulate industrial control functions, it can also be hardware flaws introduced into critical systems.
-
[37]
A matter of time: On the transitory nature of cyberweaponsSmeets examines the “transitory” nature of cyberweapons and the implications of that nature. He focuses on the fact that cyberweapons, once used for the ...Missing: limitations efficacy spillover risks dependency containment
-
[38]
Significant Cyber Incidents | Strategic Technologies Program - CSISThis timeline records significant cyber incidents since 2006, focusing on cyber attacks on government agencies, defense and high tech companies, or economic ...Missing: empirical | Show results with:empirical
-
[39]
Stuxnet and the Limits of Cyber Warfare - ResearchGateAug 6, 2025 · The findings provide actionable insights for cyber risk management professionals, enabling more effective threat assessment, improved ...
-
[40]
Innovation Timeline | DARPAThe Air Combat Evolution (ACE) program achieved the first-ever in-air tests of AI algorithms autonomously flying an F-16 against a human-piloted F-16 in within- ...
-
[41]
The Farewell Dossier - CSI - CIADuping the Soviets: The Farewell Dossier. By Gus W. Weiss. Introduction. During the Cold War, and especially in the 1970s, Soviet intelligence carried out a ...
-
[42]
(PDF) The Evolution of Viruses and Worms - ResearchGateComputer viruses and network worms have evolved through a continuous series of innovations, leading to the recent wave of fast-spreading and dangerous worms.<|separator|>
-
[43]
Morris Worm - FBIIn 1988, a graduate student unleashed the first major attack on the Internet and became the first person convicted of a new type of crime.Missing: details | Show results with:details
-
[44]
[PDF] (U) "MOONLIGHT MAZE" - National Security ArchiveApr 15, 1999 · Notably, the intruder(s) was active on 12/25/1998, a weekday, but was not active on 1/7-8/1999, both weekdays and Orthodox Christmas ...
-
[45]
How a cyber attack transformed Estonia - BBC NewsApr 27, 2017 · The 2007 attacks came from Russian IP addresses, online instructions were in the Russian language and Estonian appeals to Moscow for help ...
-
[46]
[PDF] Analysis of the 2007 Cyber Attacks against Estonia from the InfThe 2007 Estonia cyber attacks, lasting 22 days, were politically motivated, using DoS/DDoS attacks, targeting web, email, and DNS servers, and included vital ...
-
[47]
Hybrid Threats: 2007 cyber attacks on EstoniaJun 6, 2019 · In 2007, Estonia faced a coordinated cyber attack, likely Russian-motivated, with DDoS attacks on various targets, and was accompanied by ...
-
[48]
Stuxnet | Definition, Origin, Attack, & Facts - BritannicaOct 10, 2025 · Stuxnet, a computer worm, discovered in June 2010, that was specifically written to take over certain programmable industrial control ...
-
[49]
Stuxnet explained: The first known cyberweapon | CSO OnlineAug 31, 2022 · Stuxnet is a powerful computer worm designed by US and Israeli intelligence that to disable a key part of the Iranian nuclear program.
-
[50]
Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment ...Dec 22, 2010 · In late 2009 or early 2010, Iran decommissioned and replaced about 1,000 IR-1 centrifuges in the Fuel Enrichment Plant (FEP) at Natanz, ...
-
[51]
Natanz Enrichment Complex - The Nuclear Threat InitiativeAccording to IAEA reports, between the end of 2009 and early 2010 Iran decommissioned and replaced approximately 1,000 centrifuges at Natanz due to damage from ...
-
[52]
Stuxnet may have destroyed 1000 centrifuges at NatanzDec 24, 2010 · Stuxnet may have destroyed 1,000 centrifuges at Natanz. Malicious computer virus accelerated, wrecked motors and may have decommissioned uranium ...
-
[53]
Cyber-Attack Against Ukrainian Critical Infrastructure - CISAJul 20, 2021 · During the cyber-attacks, malicious remote operation of the breakers was conducted by multiple external humans using either existing remote ...
-
[54]
2015 Ukraine Electric Power Attack, Campaign C0028Sep 27, 2023 · 2015 Ukraine Electric Power Attack was a Sandworm Team campaign during which they used BlackEnergy (specifically BlackEnergy3) and KillDisk to target and ...
-
[55]
Industroyer: A cyber-weapon that brought down a power gridJun 13, 2022 · It's been five years since ESET researchers released their analysis of the first ever malware that was designed specifically to attack power ...
-
[56]
2016 Ukraine Electric Power Attack, Campaign C0025Mar 31, 2023 · 2016 Ukraine Electric Power Attack was a Sandworm Team campaign during which they used Industroyer malware to target and disrupt distribution substations.
-
[57]
The Attack on Colonial Pipeline: What We've Learned & What ... - CISAMay 7, 2023 · On May 7, 2021, a ransomware attack on Colonial Pipeline captured headlines around the world with pictures of snaking lines of cars at gas stations across the ...
-
[58]
Iran strengthened cyber capabilities after Stuxnet: U.S. generalJan 18, 2013 · Iran responded to a 2010 cyber attack on its nuclear facilities by beefing up its own cyber capabilities, and will be a "force to be ...
-
[59]
Update: Destructive Malware Targeting Organizations in UkraineApr 28, 2022 · This joint Cybersecurity Advisory (CSA) between the Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation ...
-
[60]
Ukraine Suffered More Wiper Malware in 2022 Than Anywhere, EverFeb 22, 2023 · in 2022, Ukraine saw far more specimens of “wiper” malware than in any previous year of Russia's long-running cyberwar targeting Ukraine—or, for ...
-
[61]
Cyber Operations Tracker - Council on Foreign RelationsThe cyber operations tracker categorizes all instances of publicly known state-sponsored cyber activity since 2005.Targeting of Hungary's foreign... · Ukrainian IT Army · Flax Typhoon · Volt Typhoon
-
[62]
Cyber Operations during the Russo-Ukrainian War - CSISJul 13, 2023 · This edition of the On Future War series uses an empirical analysis of attributed Russian cyber operations in Ukraine to extrapolate future scenarios.<|separator|>
-
[63]
From Georgia to Ukraine: Seventeen Years of Russian Cyber ...Jul 30, 2025 · Since the war, Moscow has used nine new families of wiper malware and two new ransomware variants, targeting more than one hundred Ukrainian ...
-
[64]
Stuxnet Definition & Explanation - KasperskyIn the early 2000s, Iran was widely thought to be developing nuclear weapons at its uranium enrichment facility at Natanz. Iran's nuclear facilities were air- ...
-
[65]
Israeli Test on Worm Called Crucial in Iran Nuclear DelayJan 15, 2011 · They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran's nuclear ...
-
[66]
[PDF] The History of Stuxnet: Key Takeaways for Cyber Decision MakersNatanz successfully delayed the Iranian nuclear program for at least a year and demonstrated the power of a nation-state grade cyber weapon; there was no ...
-
[67]
Stuxnet worm 'targeted high-value Iranian assets' - BBC NewsSep 23, 2010 · One of the most sophisticated pieces of malware detected probably targeted "high value" infrastructure in Iran, experts tell the BBC.Missing: discovery | Show results with:discovery<|separator|>
-
[68]
[PDF] Stuxnet - CCDCOEStuxnet is a piece of malware which has been written expressly for targeting industrial systems, not personal computers, and this is one of its several ...
-
[69]
A Silent Attack, but Not a Subtle One - The New York TimesSep 26, 2010 · SAN FRANCISCO. AS in real warfare, even the most carefully aimed weapon in computer warfare leaves collateral damage. The Stuxnet worm was ...Missing: spillover | Show results with:spillover
-
[70]
Cyberwar on Iran Won't Work. Here's Why. | Cato InstituteAug 21, 2017 · Later assessments said the computer worm damaged only about 980 centrifuges (at the time, one-fifth of the total at the Natanz plant), and ...<|separator|>
-
[71]
Petya Ransomware | CISAFeb 15, 2018 · Microsoft Windows operating systems. Overview. This Alert has been updated to reflect the U.S. Government's public attribution of the ...
-
[72]
How the NotPetya attack is reshaping cyber insurance | BrookingsDec 1, 2021 · ... cyberattack that would go on to do $10 billion of damage globally. ... NotPetya is one of the most closely studied cyberattacks in history.
-
[73]
Shamoon (2012) - International cyber law: interactive toolkitSep 17, 2021 · Shamoon was able to spread from an infected machine to other computers on the network, so that over 30.000 computers of Aramco were infected.
-
[74]
The Cyber Attack on Saudi Aramco: Survival - Taylor & Francis OnlineApr 3, 2013 · On 15 August 2012, the computer network of Saudi Aramco was struck by a self-replicating virus that infected as many as 30000 of its ...
-
[75]
An Overview of the Increasing Wiper Malware Threat | FortiGuard LabsApr 28, 2022 · In parallel with the war in Ukraine, cybersecurity researchers have witnessed a sudden increase in the number of wiper malware deployments.
-
[76]
Advanced Persistent Threat Compromise of Government Agencies ...Apr 15, 2021 · CISA is investigating other initial access vectors in addition to the SolarWinds Orion supply chain compromise. ... supply-chain-attack-solarwinds ...
-
[77]
SolarWinds Supply Chain Attack | FortinetLearn about the SolarWinds cyber attack, including how it happened, who was involved, and how your company can improve its enterprise security.
-
[78]
Why the SolarWinds Hack Is a Wake-Up CallMar 9, 2021 · The sweeping cyber espionage campaign shows how sophisticated adversaries can bypass even well-defended targets.Missing: goals | Show results with:goals
-
[79]
The 8 Key Lessons From the SolarWinds Attacks - SOCRadarOct 31, 2023 · Nation-state threat actors breached the supply chain of SolarWinds to infiltrate its customers including US government agencies and Fortune 500 companies.
-
[80]
Silk Typhoon targeting IT supply chain | Microsoft Security BlogMar 5, 2025 · Microsoft Threat Intelligence identified a shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions like remote ...
-
[81]
Microsoft reveals Silk Typhoon supply chain attack | SC MediaMar 5, 2025 · China-backed espionage group Silk Typhoon is leveraging supply chain attacks against IT and cloud services providers to spy on downstream ...
-
[82]
PRC State-Sponsored Actors Compromise and Maintain Persistent ...Feb 7, 2024 · PRC state-sponsored cyber actors are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against US critical ...
-
[83]
Command History - U.S. Cyber CommandUnited States Cyber Command (USCYBERCOM), the nation's unified combatant command for the cyberspace domain, turned ten years old in 2020.
-
[84]
Proportionality in International Humanitarian Law: A Principle and a ...Oct 24, 2022 · Proportionality plays a key role in international humanitarian law (IHL). It is essential to regulating the conduct of hostilities.
-
[85]
U.S., Israel Attack Iranian Nuclear Targets—Assessing the DamageJun 25, 2025 · The United States joined Israel's bombing campaign of Iran's nuclear program. A clear picture of the damage inside Iran—and the state of its ...
-
[86]
What is Israel's secretive cyber warfare unit 8200? - ReutersSep 18, 2024 · Unit 8200 is the equivalent of the US National Security Agency or Britain's GCHQ, and is the largest single military unit in the Israel Defence Forces.
-
[87]
Hezbollah pager attack puts spotlight on Israel's cyber warfare Unit ...Sep 20, 2024 · The mass pager attack against Hezbollah in Lebanon has turned the spotlight on Israel's secretive Unit 8200, the Israel Defense Forces' intelligence unit.
-
[88]
The Impact of Israeli Cyber Operations on HezbollahApr 2, 2025 · Israel has executed an array of cyber-attacks against Hezbollah that have disrupted the group's communication systems, carried out cyber espionage, and ...
-
[89]
[PDF] Cyber Threat Activity Related to the Russian Invasion of UkraineFollowing Russia's invasion of Ukraine on 24 February 2022, likely Russian threat actors conducted several disruptive and destructive computer network attacks ...
-
[90]
21.5 Million Breached In Second OPM Hack; Director Resigns - IAPPJuly 9, 2015:OPM announces 21.5 million individuals affected in second breach. All SF86s filled out since 2000 have been compromised. IAPP Logo ...
-
[91]
[PDF] China Threat Snapshot - Homeland Security CommitteeOct 1, 2024 · PRC theft of U.S. IP is extensive, estimating between $300 billion and $600 billion annually. This is about $4,000 to $6,000 per American family ...
-
[92]
Survey of Chinese Espionage in the United States Since 2000 - CSISThis updated survey is based on publicly available information and lists 224 reported instances of Chinese espionage directed at the United States since 2000.
-
[93]
A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear ...Mar 15, 2018 · Government officials and cybersecurity experts in Saudi Arabia and the United States attributed the 2012 Shamoon attack to Iranian hackers.
-
[94]
Update on Sony Investigation - FBIDec 19, 2014 · The FBI would like to provide an update on the status of our investigation into the cyber attack targeting Sony Pictures Entertainment (SPE).
- [95]
-
[96]
Doxing and Defacements: Examining the Islamic State's Hacking ...Apr 22, 2019 · ... propaganda with the ability and intent to carry out destructive cyber attacks.” While the flow of terrorist content online and the ...
-
[97]
In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks HavocMay 25, 2019 · A leaked NSA cyberweapon, EternalBlue, has caused billions of dollars in damage worldwide. A recent attack took place in Baltimore, the agency's own backyard.
-
[98]
IntelBrief: When Cyberweapons Escape - The Soufan CenterMay 29, 2019 · The National Security Agency (NSA) lost control of a cyberweapon known as EternalBlue in 2017, which appeared online after it was leaked by a group known as ' ...
-
[99]
Criminals used leaked NSA cyberweapon in crippling ransomware ...May 13, 2017 · The attackers exploited a software bug that was also used by U.S. spies, and patched by Microsoft in March.Missing: repurposing | Show results with:repurposing
-
[100]
Middle East Cyber Escalation: From Hacktivism to Sophisticated ...Jun 23, 2025 · This report analyzes both the broader hacktivist ecosystem and the critical, advanced operations that pose immediate risks to regional security and civilian ...
-
[101]
Non-State Cyber Actors in the 12-Day War – The Gray Zone of ...Jul 25, 2025 · For example, by some estimates, there are now upwards of 170 “hacking groups” targeting Israel and 55 targeting Iran, with hostile operations ...
-
[102]
The 5×5—Non-state armed groups in cyber conflict - Atlantic CouncilOct 26, 2022 · Non-state organizations native to cyberspace, like patriotic hacking collectives and ransomware groups, continue to impact geopolitics ...
-
[103]
[PDF] Are Cyber Weapons Effective Military Tools? - INSSCyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the.
-
[104]
Cyber Weapons Are Not Created Equal - U.S. Naval InstituteThe truth is that meaningful offensive weapons incur the high cost while the defender can easily and cost-effectively protect through good information practices ...Missing: attributes scalability
-
[105]
[PDF] Cyberweapons: Leveling the International Playing FieldThere are multiple comparative advantages of cyberweapons over air strikes. The first and most compelling is cost. Cyberweapons cost a fraction of the cost of ...
-
[106]
The Asymmetric Nature of Cyber Warfare - USNI NewsOct 14, 2012 · Cyber operations are asymmetric in that the build-up to a confrontation may be undetectable, and once it has occurred, it could be impossible to determine its ...
-
[107]
Why the Future of Cyber Operations Will Be Covert - NDU PressJul 27, 2022 · The net benefits of indirect cyber operations are a potential outlet for actors to compete in a nonlethal way, continuing the trend of ...
-
[108]
Cyber Effects in Warfare: Categorizing the Where, What, and WhyAug 1, 2024 · This paper introduces a novel analytical framework to assess offensive cyber operations based on the circumstances of their use across the different phases of ...
-
[109]
Cyberweapons: A Growing Threat to Strategic Stability in the Twenty ...Jan 21, 2019 · The development of cyberweapons is inextricably linked to the growing role of intelligence in cyberspace as a factor affecting strategic ...
-
[110]
Stuxnet cyberworm heads off US strike on Iran - The GuardianJan 16, 2011 · A computer worm, Stuxnet, was known last year to have been inserted into the Iranian nuclear operation and Iran admitted its programme had been delayed.
-
[111]
The Benefits and Risks of Extending Weapons Deliveries to the ...Dec 2, 2022 · Furthermore, international partners' strategic cyber weapons could complement conventional capabilities by helping to slow down a hostile ...
-
[112]
Strategic aspects of cyberattack, attribution, and blame - PNASFeb 27, 2017 · Attribution of cyberattacks has strategic and technical components. We provide a formal model that incorporates both elements and shows the ...
-
[113]
Facilitating Informed Cyberattack Attributions: The PACT ModelMisattribution can lead to serious consequences, potentially escalating to kinetic warfare. However, attribution remains a significant challenge due to the ...
-
[114]
The Untold Story of NotPetya, the Most Devastating Cyberattack in ...Aug 22, 2018 · Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world.
-
[115]
Cyber Attacks in Perspective: Cutting Through the HyperboleJun 25, 2024 · This article is part of Project Cyber, which explores and characterizes the myriad threats facing the United States and its allies in cyberspace.<|separator|>
-
[116]
The Long-Term Threats Posed by the Vault 7 Leaks - CybereasonThe Vault 7 leaks, which focus on methods rather than tools and exploits, can potentially have longer-term consequences for information security.
-
[117]
Vault 7 and the Future of Cyber Warfare: The CIA's Digital Arsenal ...Feb 1, 2025 · This paper examines the technological, ethical, and geopolitical ramifications of Vault 7, analyzing how the leak escalated the cyber arms race, ...
-
[118]
The Market in Zero-Day Exploits - LawfareJul 14, 2013 · Today's New York Times, brings a rich article by Nicole Perlroth and David Sanger on the growing market in zero-day exploits.
-
[119]
[PDF] Curbing the Market for Cyber WeaponsIn response to the compensation offered to vulnerability researchers by other buyers, software companies were induced to begin paying researchers for their.
-
[120]
[PDF] World Gone Cyber MAD: How “Mutually Assured Debilitation” Is the ...For this reason it is logi- cally more stable and potentially peaceful to have a system of deterrence that is structured mutually across major powers, giving no ...Missing: parity | Show results with:parity
-
[121]
U.S. Cyber Deterrence: Bringing Offensive Capabilities into the LightSep 7, 2022 · As proposed above, clarifying acceptable norms while strengthening DCO capabilities could reduce some of the risk associated with retaliation.Missing: parity | Show results with:parity
- [122]
-
[123]
[PDF] Analysis of the Cyber Attack on the Ukrainian Power GridMar 18, 2016 · The attack impacted 225,000 customers ... The cyber attacks in Ukraine are the first publicly acknowledged incidents to result in power outages.<|separator|>
-
[124]
NotPetya Ransomware Attack Cost Shipping Giant Maersk Over ...Aug 16, 2017 · NotPetya-related costs contributed to a $264 million quarterly loss despite revenues rising from $8.7 billion to $9.6 billion year-over-year.
-
[125]
NotPetya still roils company's finances, costing organizations $1.2 ...For Maersk, though, NotPetya was a revenue issue as well as a cybersecurity one. The attack cost the company between $250 million and $300 million in third- ...
-
[126]
[PDF] NotPetya: A Columbia University Case StudyIn June 2017, they launched an unprecedented cyber attack to retaliate ... “The Untold Story of NotPetya, the Most Devastating Cyberattack in History.
-
[127]
Industrial Control Systems | Cybersecurity and Infrastructure ... - CISAA cybersecurity challenge unique to ICS is brownfield deployments, which refer to the integration of new technologies or systems into existing “legacy” ...
-
[128]
Legacy systems are the Achilles' heel of critical infrastructure ...Jul 8, 2024 · Legacy systems are the Achilles' heel of critical infrastructure cybersecurity ... systems (CWS) aimed at reducing cybersecurity vulnerabilities.Missing: sources | Show results with:sources
-
[129]
"War Without Harm": China's Hybrid Warfare Playbook Against TaiwanSep 16, 2025 · Each phase presents distinct threats requiring its own tailored solutions, all while contributing to an overarching strategy of resilience and ...
-
[130]
China's hybrid threats against Taiwan's Pacific alliesJul 10, 2025 · Hybrid threats encompass a range of operations that combine cyber intrusions, manipulation of influence, economic pressure, and the spread of ...Missing: tensions | Show results with:tensions
-
[131]
The AI Cyber War: Microsoft Warns of Escalating State-Sponsored ...Oct 17, 2025 · The current trend points to an accelerating "AI arms race," where both attackers and defenders are leveraging AI, creating a constantly shifting ...
-
[132]
Stuxnet and the Limits of Cyber Warfare: Security StudiesStuxnet, the computer worm which disrupted Iranian nuclear enrichment in 2010, is the first instance of a computer network attack known to cause physical ...Missing: validating posture
-
[133]
Stuxnet: A Digital Staff Ride - Modern War Institute - West PointMar 8, 2019 · Stuxnet, the first recognized cyberattack to physically destroy key infrastructure—Iranian enrichment centrifuges in Natanz ...Missing: posture | Show results with:posture
- [134]
-
[135]
[PDF] Article 2(4) Contents - OFFICE OF LEGAL AFFAIRS |All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any ...
-
[136]
The Evolving Interpretation of the Use of Force in Cyber OperationsNov 25, 2024 · Article 2(4) of the UN Charter lies at the heart of legal discourse surrounding the use of force in cyberspace. A cornerstone of international ...
-
[137]
Cyber Attacks as "Force" Under UN Charter Article 2(4)This article examines one slice of that legal puzzle: the UN Charter's prohibitions of the threat or use of "force" contained in Article 2(4).
-
[138]
8 Cyber Conflict and the Thresholds of War - Oxford AcademicCyber operations that are designed to cause a physical, destructive outcome are usually referred to as “cyber attacks.”10 One example of a cyber attack is the ...
- [139]
-
[140]
The Tallinn Manual - CCDCOEThe Tallinn Manual 2.0, published in 2017, built on that work by considering the rules of international law governing cyber incidents that states encounter on a ...
-
[141]
Tallinn Manual 2.0 on the International Law Applicable to Cyber ...Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Search within full text.
-
[142]
[PDF] The Tallinn Manual 2.0: Highlights and Insights - Georgetown LawThe Tallinn Manual 2.0 addresses international law application to cyber activities, both in and out of armed conflict, unlike the first manual which focused on ...
-
[143]
The Application of International Law in Cyberspace: Gaps in Existing ...Dec 3, 2024 · This article explores these challenges and the gaps they create within the framework of international law as applied to cyberspace examining existing ...
-
[144]
[PDF] Cyberwarfare and International Law - UNIDIR35 The focus of the present analysis, however, are the restraints imposed by existing international law on cyberwarfare and not the international ...
-
[145]
[PDF] Legal Challenges in the Realm of Cyber Warfare - NYU JILPCyber warfare has posed many legal challenges that range from the application of the existing international law of armed conflict to regulating the use of ...
-
[146]
Modern Cyber Warfare and International Law – Cornell Law ReviewAug 20, 2025 · Cyber warfare is particularly significant among the various “grey zones” in international law. While other areas may also present complex legal ...
-
[147]
About the Convention - Cybercrime - The Council of EuropeThe Budapest Convention is more than a legal document; it is a framework that permits hundreds of practitioners from Parties to share experience and create ...
-
[148]
Advancing Cyber Norms Unilaterally: How the U.S. Can Meet its ...After negotiations and stalemates in the UN GGE and OEWG processes, the Paris Call is arguably the best available tool for a wide range of actors to interact on ...Missing: stalemate | Show results with:stalemate
-
[149]
The false promise of cyber conventions: Why the West is losing and ...Sep 15, 2023 · To safeguard accountability and liberal values in cyberspace, the U.S. and Europe must refocus and strengthen their cyber diplomacy efforts.
-
[150]
Avoiding Deadlock Ahead of Future UN Cyber Security NegotiationsAug 31, 2023 · In July, RUSI participated in the UN Open-Ended Working Group negotiations as part of the ongoing work on Responsible Cyber Behaviour.
-
[151]
New UN permanent mechanism on cybersecurity is saddled with old ...Sep 4, 2025 · Unresolved differences over cyber norms, international law, and stakeholder participation limit the global mechanism's potential.Missing: stalemate 2023-2025
-
[152]
Five Russian GRU Officers and One Civilian Charged for Conspiring ...Sep 5, 2024 · The indictment alleges that these GRU hackers and their co-conspirator engaged in a conspiracy to hack into, exfiltrate data from, leak ...
-
[153]
Four Russian Government Employees Charged in Two Historical ...Mar 24, 2022 · Four Russian Government Employees Charged in Two Historical Hacking ... hackers who threaten our critical infrastructure with cyber-attacks.
- [154]
-
[155]
A survey of cyber threat attribution: Challenges, techniques, and ...The attribution of cyber threats operates within a complex interplay of legal, technical, and geopolitical factors, presenting persistent challenges for ...
-
[156]
The Ethics of Cyberweapons in Warfare - FacultyThe risk of collateral damage in cyberspace. "Collateral damage" or accidental harm to civilians is a key issue in both ethics and laws of warfare.
-
[157]
Cyber Security Hall of Famer Dorothy Denning Discusses the Ethics ...Jun 4, 2013 · The reason for this moral obligation is that cyber weapons reduce both the risk to one's own military and the harm to one's adversary and non- ...Missing: hazards | Show results with:hazards
-
[158]
[PDF] Shadows of Stuxnet: recommendations for U.S. policy on critical ...The malware was a cyber weapon, programmed to destroy the industrial machinery utilized for uranium enrichment. Stuxnet was soon dissected and diagnosed as a.
-
[159]
Stuxnet Raises 'Blowback' Risk In Cyberwar - NPRNov 2, 2011 · The Stuxnet computer worm successfully damaged centrifuges at a nuclear facility in Iran. Now, officials responsible for defending U.S. ...
-
[160]
Stuxnet: The Paradigm-Shifting Cyberattack, Implications and way ...Dec 2, 2024 · Stuxnet's ethical consequences are quite concerning. For example, the sovereignty of a state is violated by this type of cyberattack.
-
[161]
Why we need philosophy and ethics of cyber warfareJun 16, 2022 · Cyber-attacks are neither victimless nor harmless and can lead to unwanted, disproportionate damage which can have serious negative consequences.
-
[162]
18. Distinctive ethical challenges of cyberweapons - ElgarOnlineThe Stuxnet cyberattack on Iran11 provides an example of a problematic cyberattack. Some have lauded this as an example of 'clean' cyberwarfare since it ...
-
[163]
Cloud of War: The AI Cyber Threat to U.S. Critical InfrastructureOct 9, 2025 · Agentic AI cyberweapons are rapidly becoming the tool of choice for state-sponsored attackers targeting U.S. critical infrastructure.
-
[164]
The Growing Threat of AI-powered Cyberattacks in 2025Jun 15, 2025 · AI-driven attacks can bypass traditional security measures, automate malicious activity, and exploit vulnerabilities at a record scale.
-
[165]
Russia, China increasingly using AI to escalate cyberattacks on the USOct 16, 2025 · Russia, China, Iran and North Korea are using artificial intelligence to improve their cyberattacks on U.S. companies, governments and ...
-
[166]
Artificial Intelligence and State-Sponsored Cyber EspionageFeb 25, 2025 · The rise of Artificial Intelligence (AI) in cyber warfare has ushered in a new era of state-sponsored espionage, posing unprecedented global security risks.Missing: deepfakes | Show results with:deepfakes
-
[167]
NIST approves three quantum-resistant encryption standards ...Aug 14, 2024 · These encryption standards specify key establishment and digital signature schemes that are designed to resist future attacks by quantum ...
-
[168]
Countdown to Q Day: Quantum computers could kill cryptographyOct 7, 2025 · A recent Gartner® report* says “By 2029, advances in quantum computing will make conventional asymmetric cryptography unsafe to use.” The good ...
- [169]
-
[170]
Supply Chain Attacks Surge in 2025: Double the Usual Rate - CybleSep 1, 2025 · Supply chain attacks have doubled since April 2025, targeting IT and tech firms. Ransomware, data theft, and zero-day exploits drive the ...
-
[171]
Supply Chain Attack Statistics 2025: Costs & Defenses - DeepStrikeSep 10, 2025 · 2025 supply-chain stats: third-party breaches reach 30% (DBIR); average breach costs $4.44M (IBM). SolarWinds, 3CX, MOVEit + NIST C-SCRM, ...
-
[172]
Cybersecurity Awareness Month 2025: Key Trends in IoT SecurityIoT devices face approximately 820,000 attacks daily, with threat actors increasingly targeting operational technology (OT) environments. Ransomware attacks ...Missing: weaponization | Show results with:weaponization
-
[173]
[PDF] 2025 Global Threat Landscape Report - FortinetMay 1, 2025 · As the weaponization phase of attacks becomes smaller, threat actors can now maintain a near-real-time understanding of attack surfaces ...
-
[174]
IBM X-Force 2025 Threat Intelligence IndexApr 16, 2025 · ... cyber and physical security threats. Weaponized exploits, often involving malicious payloads or malware, are attack tools used by threat ...
-
[175]
[PDF] Zero Trust Architecture - NIST Technical Series PublicationsZero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, ...
-
[176]
[PDF] Zero Trust and Advanced Persistent Threats: Who Will Win the War?The article's goal is to provide insights into the effectiveness of Zero Trust Architecture (ZTA) to prevent APT attacks. For that purpose, we reviewed four ...
-
[177]
[PDF] NSA'S Top Ten Cybersecurity Mitigation StrategiesWithout rapid and thorough patch application, threat actors can operate inside a defender's patch cycle. 2. Defend Privileges and Accounts. Assign privileges ...Missing: patching | Show results with:patching
-
[178]
Five Eyes' Critical 5 nations focus on adapting to evolving cyber ...Jun 18, 2024 · Five Eyes' Critical 5 nations focus on adapting to evolving cyber threats to boost critical infrastructure security, resilience.
-
[179]
CYBER 101 - Defend Forward and Persistent EngagementOct 25, 2022 · The 2018 Department of Defense Cyber Strategy states the United States will defend forward to disrupt malicious cyber activity at its source, ...
-
[180]
America's policy in cyberspace is about persistence, not deterrenceOct 2, 2024 · The United States has been forthright, stating in the DoD Cyber Strategy that it “will continue to persistently engage U.S. adversaries in ...
-
[181]
Framework and principles for active cyber defense - ScienceDirectThis essay offers a broad view of active defense derived from the concept of active air and missile defense. This view admits a range of cyber defenses, ...Missing: empirical | Show results with:empirical
-
[182]
EU, ENISA launch €36 million Cybersecurity Reserve to tackle cyber ...Aug 27, 2025 · The EU Cybersecurity Reserve is included in the Digital Europe Work Programme 2025-2027, which earmarks €36 million to strengthen response and ...<|separator|>
-
[183]
[PDF] United States Cyber Command - Fiscal Year 2025 Budget EstimatesThe USCYBERCOM FY 2025 President's Budget request is $1,705,736 thousand, which is $54,432 thousand above the FY 2024 estimate and supports the USCYBERCOM ...
-
[184]
US critical infrastructure remains exposed as Congress confronts OT ...Jul 22, 2025 · US critical infrastructure remains exposed as Congress confronts OT cybersecurity gaps, fifteen years after Stuxnet.
- [185]