Cyber Warfare

× Clear Filters
57 Articles
Visualization of floating programming code windows on a glowing cyber grid

The Era of AI-Orchestrated Hacking Has Begun: Here’s How the United States Should Respond

Policymakers and industry must ensure that organizations have access to fit-for-purpose cyber defenses and take steps to manage the proliferation of AI capabilities.
A U.S. hacker sitting opposite of a Chinese hacker

America’s Cyber Retreat Is Undermining Indo-Pacific Security

A "Cyber Shield" would enable the United States and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing’s cyber coercion.
In this pool photograph distributed by the Russian state agency Sputnik, Russia's President Vladimir Putin chairs a Security Council meeting via a videoconference at the Kremlin in Moscow on July 25, 2025. (Photo by SERGEI ILYIN/POOL/AFP via Getty Images)

Russian Motivations Behind the “Hanoi Convention” Against Cybercrime

Russia’s cybercrime stance reflects a broader push to assert state control over the internet, restrict dissent, and build global backing for its governance model.
Futuristic, blue server room with the flowing people and data.

AcidRain Malware and Viasat Network Downtime in Ukraine: Assessing the Cyber War Threat

Russia's disruption of the Viasat network in Ukraine should be a wakeup call for policymakers.
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…

Expert Backgrounder: NATO Response Options to Potential Russia Cyber Attacks

Top cyber law expert explains NATO member states' legal options in event of different forms of Russian cyber attacks in wake of Ukraine invasion.
Artificial intelligence security cameras using facial recognition technology are displayed at a stand during the 14th China International Exhibition on Public Safety and Security at the China International Exhibition Center in Beijing on October 24, 2018. A few people sit at a small table in the booth chatting while others look at the displays on the walls.

One Thousand and One Talents: The Race for A.I. Dominance

Introduction The March 2016 defeat of “Go” world champion Lee Sedol by DeepMind, Alphabet’s artificially intelligent AlphaGo algorithm, will be remembered as a crucial turning…
A graphic illustration of Germany with a triangular grid pattern symbolizing virtual connections.

Germany’s Positions on International Law in Cyberspace Part II

Germany issues major statement on use of force and International Humanitarian Law in cyberspace, analyzed here by leading expert Professor Michael Schmitt.
A AFP journalist views a video on January 25, 2019, manipulated with artificial intelligence to potentially deceive viewers, or "deepfake" at his newsdesk in Washington, DC.

Protecting the Information Space in Times of Armed Conflict

What, if any, limits exist concerning digital information operations in armed conflict? Does the humanitarian legal framework adequately capture the protection needs that arise…
The New Zealand flag on a computer screen with numbers running up and down over the flag.

New Zealand Pushes the Dialogue on International Cyber Law Forward

New Zealand becomes latest state to issue a statement of its views on international law in cyberspace.
Map of Finland with an abstract pattern representing networks.

Finland Sets Out Key Positions on International Cyber Law

Analysis of the Government of Finland's new statement on international law in cyberspace.
Aerial view of people in white and red to form the Canadian flag.

A Deep Dive into Canada’s Overhaul of Its Foreign Intelligence and Cybersecurity Laws

Following the release of documents by Edward Snowden, many of the Western governments whose agencies’ activities were implicated in the leaks raced to update and modernize their…
1-12 of 57 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: