The digital battleground has shifted decisively from lines of code and firewall rules to the far more complex territory of cultural values and political agendas. What was once considered the domain of technical experts—cybersecurity—now finds itself at the very front lines of a broader cultural...
cyber geopolitics
cybernormscyber threats
cybersecurity
cybersecurity challenges
cybersecurity culture
data localization
data sovereignty
digital culture
digital sovereignty
digital trust
european data laws
global data privacy
international cybersecurity
political influence
sovereign clouds
tech policy
transatlantic relations
us tech policy
us-eu data laws
Russian threat actors have once again raised the bar for cyber espionage, turning attention toward OAuth 2.0 authentication flows in Microsoft 365, hijacking accounts connected to Ukraine and human rights organizations. Their tactics, as uncovered by cybersecurity firm Volexity, fit into a...