In this article, Jakob Bund examines how authoritarian states like Russia, China, and North Korea increasingly harness non-state cyber actors to expand their capabilities, blur attribution, and complicate global responses. He argues that this growing fusion of state and criminal or contractor activity demands integrated threat assessments and response tools that can operate independently of political attribution.
EuRepoC Articles
Concise and to-the-point publications analysing current issues on cybersecurity and cyber conflict
Advanced Persistent Threat Profiles
Standardised profiles analysing the conflict activities and attribution processes linked to the most potent APT groups
Database of Cyber Incidents
Continuously updated and fully open-access database of cyber incidents with over 60 variables coded by our experts
About us
The European Repository of Cyber Incidents (EuRepoC) is an independent research consortium dedicated to providing evidence-based scientific analysis of cyber incidents for a better understanding of the current cyber threat environment. Its resources include user-specific, reliable data based on an interdisciplinary perspective.
MORE ABOUT US >
Our database
We provide a comprehensive, inter-disciplinary and continuously updated database of cyber incidents worldwide:
● Covering incidents from the year 2000 to the present
● ~3,000 articles from 220 sources scanned and curated daily
● Each cyber incident is coded across 60 variables by our experts
EXPLORE OUR DATA >
Explore our cyber trackers
Latest news
- Announcement
- Cyber Unpacked
- Data Speaks Cyber
- Further Readings
- Major Cyber Incidents
- Nicht kategorisiert
- Research and Analysis
In this article, Annegret Bendiek and Jakob Bund analyse how authoritarian states use hybrid state/non-state networks to challenge Europe through obfuscating responsibility and escalating conflicts; Bendiek and Bund argue that the EU must reform its cybersecurity policy under a “Janus Principle” to strengthen resilience, coordination, and strategic effectiveness.
In this second part of a three-part series, Kerstin Zettl-Schabath, Bilal Ibralic, Sonja Drick, Inés Villalva Gándara, and Moritz Sparer closely examine the actual application of the EU’s Cyber Diplomacy Toolbox (CDT) measures by EU institutions/actors.