Eugenio Benincasa is a Senior Researcher in the Cyberdefense Project with the Risk and Resilience Team at the Center for Security Studies (CSS) at ETH Zurich. Prior to joining CSS, he worked as a ...
When democracy and the rule of law appeared to take hold in Eastern Europe after the fall of the Iron Curtain, Belarus ‒ perceived as “Europe’s last dictatorship” ‒ seemed like a relic from a bygone ...
In a time of multiple, overlapping crises and tectonic geopolitical and economic shifts, Swiss security policy also faces major challenges. The CSS focuses on analyzing and assessing the security ...
Cyber, space, and artificial intelligence (AI) are pivotal research fields in contemporary security studies and on the modern battlefield. Cyber has taken on heightened significance as offensive cyber ...
As great-power rivalries intensify and revisionist actors engage in increasingly probing behaviors, military security and defense are firmly back on the political agenda of Western states. Within this ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Space systems are an integral part of modern war fighting. Militaries use them to conduct everything from reconnaissance to communications and data transfers, mission planning, and maintain ...
At the NATO Summit in Wales nearly a decade ago, NATO recognized that cyber defense is an inseparable part of collective defense. Therefore, a cyberattack against one or more member states can trigger ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
This book tries to answer the following seven questions: ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results