GLOBAL SITUATIONMONITORING
517 published briefsUTCTue, Apr 28 13:53:54
Intelligence Domain

Cyber & Electronic Warfare

In-depth coverage of modern cyber and electronic warfare, including offensive capabilities, defensive strategies, jamming, spoofing, information operations, and the evolving integration of digital and electromagnetic conflict.

60 intelligence briefs← Intelligence Hub
  • Top 10 Below-Threshold Cyber Operations States Use

    Top 10 Below-Threshold Cyber Operations States Use

    A practical evergreen guide to the 10 ways nation states use cyber operations below the threshold of war to coerce, signal, prepare, and apply pressure without triggering open conflict.

    5–7 minutes
  • Top 10 Differences Between Cyberwarfare and Cyber Espionage

    Top 10 Differences Between Cyberwarfare and Cyber Espionage

    A practical evergreen guide to the 10 differences between cyberwarfare, cyber espionage, and cyber sabotage, with a focus on objectives, target selection, effects, and strategic meaning.

    6–8 minutes
  • Top 10 Signs a Cyber Campaign Is Pre-Positioning for Future Conflict

    Top 10 Signs a Cyber Campaign Is Pre-Positioning for Future Conflict

    A practical evergreen guide to the 10 signs a state-linked cyber campaign may be pre-positioning inside critical infrastructure or strategic networks for future disruptive use.

    5–8 minutes
  • Gulf States Create Safe Sea Corridor as Hormuz Risk Rises

    Gulf States Create Safe Sea Corridor as Hormuz Risk Rises

    Bahrain, Japan, Panama, Singapore, the United Arab Emirates, and the International Chamber of Shipping agreed on March 18 to create a safe sea corridor to protect seafarers and commercial traffic as risks rise around the Strait of Hormuz and the wider Gulf.

    1–2 minutes
  • EU Sanctions Chinese, Iranian Firms Over Cyberattacks

    EU Sanctions Chinese, Iranian Firms Over Cyberattacks

    The European Union on March 16 imposed sanctions on two Chinese companies and one Iranian firm over cyberattacks targeting EU member states, broadening the bloc’s cyber-response as the Iran war drives wider digital escalation.

    1–2 minutes
  • CISA Warns on Microsoft Intune After Stryker Cyberattack

    CISA Warns on Microsoft Intune After Stryker Cyberattack

    CISA said on March 19 it is aware of malicious activity targeting endpoint management systems and urged organizations to harden Microsoft Intune configurations after the March 11 cyberattack on Michigan-based medical technology company Stryker.

    1–2 minutes
  • Greek Firms Scan Networks as Iran War Raises Cyberattack Risk

    Greek Firms Scan Networks as Iran War Raises Cyberattack Risk

    Greek shipping, banking, transport, telecom, health, and energy firms have begun scanning their systems after a high-priority advisory from Greece’s National Cybersecurity Authority warned of possible Iran-linked cyber activity tied to the wider regional war.

    1–2 minutes
  • Poland Says It Foiled a Cyberattack on Its Nuclear Research Centre: Why the Iran Clue Matters Less Than the Operational Lesson

    Poland Says It Foiled a Cyberattack on Its Nuclear Research Centre: Why the Iran Clue Matters Less Than the Operational Lesson

    Poland says it stopped a cyberattack targeting its National Centre for Nuclear Research and is examining signs that Iran may have been involved. The bigger story is not just who may be behind it, but what the incident reveals about attribution traps, critical-infrastructure cyber defense, and how security teams should respond.

    4–7 minutes
  • Volt Typhoon: China’s Critical Infrastructure Pre-Positioning Campaign

    Volt Typhoon: China’s Critical Infrastructure Pre-Positioning Campaign

    Volt Typhoon is a China-linked intrusion campaign that U.S. agencies say targeted communications, energy, transportation, and water systems while using stealthy living-off-the-land tradecraft and compromised routers to hide its activity.

    6–9 minutes
  • Stuxnet: The Cyber Weapon That Changed Warfare

    Stuxnet: The Cyber Weapon That Changed Warfare

    Stuxnet was the first publicly known cyber weapon to cause physical damage inside critical infrastructure, reshaping how governments, defenders, and analysts understand cyber warfare, industrial sabotage, and state power in cyberspace.

    9–13 minutes