Cybersecurity / Technology Systems

Tag Overview

Cybersecurity, encryption, zero-day exploits, and the growing tension between security and surveillance. The same tools that protect systems can be used to monitor the people inside them. Defense spending on cyber capabilities is accelerating across every major government, and the line between protecting infrastructure and controlling populations runs through the same technology.

Part of Technology Systems Domain

Modern civilization runs on digital infrastructure that most people never think about until it breaks. A small number of companies control the cloud platforms, network backbone, and software layers th...

Related Tags

Cybersecurity Articles

FBI arrests suspect linked to $46M crypto theft from US Marshals
BleepingComputerMar 6
CRYPTO FINANCE CYBERCRIME CYBERSECURITY
FBI investigating hack on its wiretap and surveillance systems: report
TechCrunchMar 6
SURVEILLANCE CYBERCRIME CYBERSECURITY
UAE's defense giant EDGE Group to equip Ecuador with border protection systems
Breaking DefenseMar 5
GEOPOLITICS SURVEILLANCE CYBERSECURITY MILITARIZATION
This iOS Exploit Kit Has 23 Attacks – But Lockdown Mode Stops It Cold
MacRumorsMar 5
SURVEILLANCE PRIVACY CYBERCRIME CYBERSECURITY
'Hundreds' of Iranian hacking attempts have hit surveillance cameras since the missile strikes
The RegisterMar 5
GEOPOLITICS SURVEILLANCE CYBERWAR CYBERSECURITY
Why Satellites Fail
War on the RocksMar 4
INFRASTRUCTURE CYBERSECURITY SPACE MILITARIZATION
Feds Used Online Advertising Data to Track the Public’s Phone Locations
GizmodoMar 4
SURVEILLANCE PRIVACY CYBERSECURITY
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities
CyberScoopMar 3
TECH INFRASTRUCTURE CYBERSECURITY
CyberStrikeAI tool adopted by hackers for AI-powered attacks
BleepingComputerMar 3
CYBERCRIME AI CYBERSECURITY
When AI lies: The rise of alignment faking in autonomous systems
VentureBeatMar 2
AUTOMATION TECH AI CYBERSECURITY
ClawJacked attack let malicious websites hijack OpenClaw to steal data
BleepingComputerMar 2
PRIVACY TECH AI CYBERSECURITY
Strikes on Iran will test US cyber strategy abroad, and defenses at home
Defense OneMar 1
REGULATION CYBERWAR INFRASTRUCTURE CYBERSECURITY MILITARIZATION
'Silent failure at scale': The AI risk that can tip the business world into disorder
CNBCMar 1
AUTOMATION TECH AI INFRASTRUCTURE CYBERSECURITY
The Case for Why Better Breach Transparency Matters
Dark ReadingFeb 28
PRIVACY REGULATION CYBERCRIME TECH CYBERSECURITY
Ransomware payments cratered in 2025
The RegisterFeb 28
CORPORATE REGULATION CYBERCRIME TECH CYBERSECURITY
CISA replaces acting director after a bumbling year on the job
TechCrunchFeb 28
REGULATION CYBERWAR TECH CYBERSECURITY
Tech bills of the week: Updated AI innovation; expanding cybersecurity for SNAP; and more
Nextgov/FCWFeb 28
SURVEILLANCE REGULATION TECH AI CYBERSECURITY
Conduent Data Breach Could Affect 25M People. Learn How to Protect Your Online Accounts
CNETFeb 27
CORPORATE SURVEILLANCE REGULATION CYBERCRIME CYBERSECURITY
Acting head of the nation's cyber agency reassigned amid rising congressional scrutiny
POLITICOFeb 27
SURVEILLANCE REGULATION CYBERWAR CYBERSECURITY
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023
BleepingComputerFeb 26
CORPORATE CYBERWAR TECH INFRASTRUCTURE CYBERSECURITY
Inside the story of the US defense contractor who leaked hacking tools to Russia
TechCrunchFeb 26
CORPORATE GEOPOLITICS CYBERWAR CYBERSECURITY
Can A.I. Detection Tools Really Spot Fake Images and Videos?
The New York TimesFeb 25
MEMETIC TECH AI CYBERSECURITY
Breaking encryption with a quantum computer just got 10 times easier
New ScientistFeb 25
CYBERWAR INFRASTRUCTURE CYBERSECURITY QUANTUM
CrowdStrike says attackers are moving through networks in under 30 minutes
CyberScoopFeb 24
CYBERCRIME CYBERWAR AI INFRASTRUCTURE CYBERSECURITY
600+ FortiGate Devices Hacked by AI-Armed Amateur
Dark ReadingFeb 24
CYBERCRIME CYBERWAR AI INFRASTRUCTURE CYBERSECURITY
Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS
SecurityWeekFeb 24
CYBERCRIME TECH AI INFRASTRUCTURE CYBERSECURITY