Venezuela, cyber
Digest more
In 2025, NATO member states moved decisively to expand their cyber posture beyond protection. One of the clearest signals came in December, when the United States and its allies staged the large-scale Cyber Coalition 2025 exercises in Estonia.
The U.S. appears to have used its cyber capabilities to capture Venezuela’s leader over the weekend — revealing how the U.S. could wield cyber power in future geopolitical showdowns.
Expect significant innovations in AI-driven cyber tools and a closer convergence between cybersecurity and geopolitics, they said.
The Pentagon is examining the affect of cyberoperations on the cognitive domain, according to a top official. (Staff Sgt. Jacob Osborne/Marine Corps) WASHINGTON — The Department of Defense is at an “inflection point” when it comes to cyberspace and ...
The U.S. Air Force’s 67th Cyberspace Wing has been busy. The wing operationally acts as the execution arm of Air Forces Cyber, performing comprehensive cyber operations on a service and nation level. The wing has successfully proven its ability to ...
Without a new framework to counter China-backed cyber operations in the region, Beijing and other state-backed cyber groups will continue escalating their cyber operations to spy, steal, and sabotage with near impunity.
The US has suspended operations and planning for offensive cyber operations against Russia, a senior US official told CNN. The suspension is “a major blow,” the official said, especially since planning for such operations takes time and research to ...
The Cyber National Mission Force (CNMF) was upgraded to a subordinate unified command, marking an upgrade for the force and stressing the importance of defense, attack and intelligence cyber operations against hackers as well as adversarial nations.
This article is authored by Soumya Awasthi, fellow, Centre for Security, Strategy and Technology, Observer Research Foundation, New Delhi.
This paper examines the military effectiveness of Russia’s wartime cyber operations in Ukraine, the reasons why these operations have not had greater strategic impact, and the lessons applicable to other countries’ military cyber efforts. It builds on ...