Over the last two decades, state-linked efforts to shape and influence cyberspace have expanded in scale, targeting and impact. In the first of a new series of infographics, IISS experts shed light on the full extent of these activities and the strategic questions that they pose for policymakers.
IISS Research has identified at least 134 states and territories that have been affected by cyber disruptions, while at least 84 have sought to shape the physical, logical and virtual layers of cyberspace.
Cyber and disinformation operations, intelligence gathering, and attacks on physical infrastructure, have become pervasive and increasingly normalised features of grey-zone competition.
The graphics show that more than 70 states have been found to have engaged in cyber operations for varied intents, more than 100 states and territories have been targeted by disinformation operations, more than 60 have faced submarine cable disruptions, and less than 35 have committed a total of US$34bn to complete new submarine cable infrastructure by 2030.
The selective focus shaped by public reporting and investigations, risks distorting the representation of global cyber activity, creating strategic blind spots around the varied ambitions of state influence on cyberspace.
IISS Research has identified at least 134 states and territories that have been affected by cyber disruptions, while at least 84 have sought to shape the physical, logical and virtual layers of cyberspace.
Cyber and disinformation operations, intelligence gathering, and attacks on physical infrastructure, have become pervasive and increasingly normalised features of grey-zone competition.
The graphics show that more than 70 states have been found to have engaged in cyber operations for varied intents, more than 100 states and territories have been targeted by disinformation operations, more than 60 have faced submarine cable disruptions, and less than 35 have committed a total of US$34bn to complete new submarine cable infrastructure by 2030.
The selective focus shaped by public reporting and investigations, risks distorting the representation of global cyber activity, creating strategic blind spots around the varied ambitions of state influence on cyberspace.
❤3
На початку цього року менш відома група під назвою RALord тихо заявила про свої перші жертви. Всього через кілька тижнів вони перейменувалися в Nova і запустили повноцінну платформу RaaS орієнтовану на Windows, Linux і ESXi.
Читати аналіз
Читати аналіз
🤣4😁2👍1
CyberPeople
Live stream scheduled for
Завтра буде цікавенний ефір з Максом Багінським - Head of Engineering у Solidgate
Тема ефіру: DDoS. Механізм захисту ( та не тільки)😉
Пишіть під постом запитання
Тема ефіру: DDoS. Механізм захисту ( та не тільки)😉
Пишіть під постом запитання
❤24
Recorded Future’s Payment Fraud Intelligence team is looking for a skilled Threat Intelligence Analyst to join our mission of exposing financial cybercrime and fraud infrastructure.
We want to hear from you if you're passionate about cybercrime, OSINT, and uncovering scam/fraud infrastructure. You’ll dive into the dark web, turn raw signals into insights, and help shape high-impact research for the fintech, payments, and cybersecurity space.
What we're looking for:
— Fluency in Ukrainian or Russian is required
— Strong analytical and written communication skills (English reports)
— Experience in OSINT, threat intelligence or fraud investigation
— Familiarity with tools like VirusTotal, URLScan, PublicWWW, RiskIQ, etc.
— Bonus: scripting (Python, JS), knowledge in the field of cryptocurrency
Ukraine (Remote) | Flexible Schedule | International Team
Apply here: https://lnkd.in/euhjfJqg
We want to hear from you if you're passionate about cybercrime, OSINT, and uncovering scam/fraud infrastructure. You’ll dive into the dark web, turn raw signals into insights, and help shape high-impact research for the fintech, payments, and cybersecurity space.
What we're looking for:
— Fluency in Ukrainian or Russian is required
— Strong analytical and written communication skills (English reports)
— Experience in OSINT, threat intelligence or fraud investigation
— Familiarity with tools like VirusTotal, URLScan, PublicWWW, RiskIQ, etc.
— Bonus: scripting (Python, JS), knowledge in the field of cryptocurrency
Ukraine (Remote) | Flexible Schedule | International Team
Apply here: https://lnkd.in/euhjfJqg
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
👍4🤮3🔥1💩1
https://therecord.media/spain-awards-contracts-huawei-intelligence-agency-wiretaps
Іспанці не перестають дивувати
Іспанці не перестають дивувати
therecord.media
Spain awards Huawei contracts to manage intelligence agency wiretaps
Huawei will manage and store judicially authorized wiretaps in Spain, under a contract that bucks the trend of Western governments restricting use of the Chinese tech company's products and services.
⚠️ A critical UNPATCHED zero-day in Microsoft SharePoint (CVE-2025-53770) is being massively exploited right now.
At least 75 orgs breached—including major companies and governments.
Here’s what you need to know ↓ https://lnkd.in/gAXwpwZv
At least 75 orgs breached—including major companies and governments.
Here’s what you need to know ↓ https://lnkd.in/gAXwpwZv
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
❤4🤔1