32 results found
भारताच्या BOSS लिनक्स प्रणालीवर APT36 या गटाने केलेल्या लक्ष्�
APT36’s targeting of India’s BOSS Linux system reveals the expanding scope of Pakistan’s cyber-espionage operations, underscoring the urgent nee
चीन के साइबर हमले हिंद-प्रशांत की दरार को पाट रहे हैं. अलग-�
Beijing’s cyber threat actors are ramping up attacks amid the South China Sea dispute, engulfing the Philippines, Vietnam, and other claimant countr
For starters, embed geopolitics into economic policy. For desserts, craft India’s grand strategy.
Despite advances in technological surveillance, key spy capitals continue to play a significant role in the world of geopolitics and international esp
As India’s international stature grows, its intelligence agencies will come under greater scrutiny. The R&AW should institute a PR mechanism to
भारत और कनाडा के बीच जो ताज़ा विवाद चल रहा है, उसने भारत को
Without proper legislation, states using non-state actors for cyberwarfare pose a significant threat to governments, businesses, and individuals
भारत धीरे-धीरे चीनी साइबर हमलों से जुड़े ख़तरों की ज़द मे�
भारत धीरे-धीरे चीनी साइबर हमलों से जुड़े ख़तरों की ज़द मे�
Adequate measures need to be adopted to strengthen India’s cyber defence as it has become increasingly susceptible to Chinese cyber attacks
There are a number of measures the Bundeswehr needs to take to fill the ranks of its planned cyber command.
US crackdown on economic espionage could hurt research and innovation
Since the onset of the twenty-first century, China has employed various instruments of exchange diplomacy to overcome its historical 'century of humiliation’ and realise its 'Middle Kingdom’ dream. Riding on the platform of the Belt and Road Initiative, China has leveraged its strong economy and large human resources through tourism, education, and sister-city arrangements to strengthen people-to-people contact between its citizens, diaspora,
Two separate cases underscore one of the most serious challenges that open democracies are facing today in managing Chinese aggressive tactics when it comes to influence operations.
Was the cyber espionage an effort to access nuclear technology? Was it engineered by strategic rivals?
Intelligence and the world of espionage are as old as history. Rameshwar Nath Kao, the first chief of R, used to say that his friend, Comte Alexandre de Marenches, the French chief of intelligence during the Seventies, described this world as the best. Marenches used to say that espionage was an unscrupulous game played by gentlemen.
North Korea is among the states that stand out for their often defiant behaviour, divergent from typical diplomatic niceties and non-compliant with widely accepted international liberal norms and rules. This ‘uniqueness’ is seen, for instance, in the country’s nuclear weapons development programme, which has been the object of global attention since the early 1990s. North Korea has now extended this behaviour to the cyber domain, marked by
This paper examines the role that national intelligence agencies may play in helping to secure critical technology supply chains. As the race for scientific advantage becomes increasingly characteristic of national security concerns amid growing multipolarity and interstate competition, national intelligence agencies are paying greater attention to the security of critical and emerging technologies. This paper analyses how intelligence agencies m
It is not often that China defends the rights of whistleblowers against the state and America finds itself defensive about internet freedom. That precisely is what Edward Snowden, the young American who has exposed the expansive cyber espionage activities of the National Security Agency in the United States against its own citizens and the rest of the world, has achieved.
The MoU between the espionage agencies of Afghanistan and Pakistan is a case of the latter showing India the finger, never mind that it flies in the face of history and logic
With its higher speeds, ultra-low latency, and massive connectivity capabilities, 5G technology represents a new era in telecommunications that promises to redefine industries and everyday life. Chinese telecom companies have taken the lead in developing and commercialising 5G technology, threatening the commercial prospects of Western telecom firms and giving rise to fears of surveillance and espionage. The open radio access network (O-RAN) is a
Cyber security threats have amplified significantly in the last decade, creating security concerns across the globe. Media reports during this period have highlighted how information network systems have been exploited by cyber criminals-as well as States-on numerous occasions for espionage and intelligence gathering. In this backdrop, this Paper focuses on cyber security concerns related to Social Engineering.
चीनने जर स्वतःची सामरिक उद्दिष्ट्ये साध्य करण्यासाठी कुरापती करण्याचा प्रयत्न केला तर चीनला त्याच भाषेत उत्तर देण्यास अमेरिका मागेपुढे पाहणार नाही.
अमेरिकेने घातलेल्या बंदीमुळे “चीनला कायमचे थांबवता येणार नाही”, अमेरिका आणि त्याच्या मित्र राष्ट्रांची आगेकूच कायम राहावी, म्हणून त्यांना चीनला रोखायचे होते.
भारताचे सायबर संरक्षण मजबूत करण्यासाठी पुरेशा उपायांचा अवलंब करणे आवश्यक आहे, कारण ते चीनच्या सायबर हल्ल्यांनी अधिकाधिक संवेदनशील बनले आहे.