Skip to content

Publications

Security through Obfuscation: Why Governments Use Proxies in Cyber Conflicts
Security through Obfuscation: Why Governments Use Proxies in Cyber Conflicts
Harnisch, Sebastian; Zettl-Schabath, Kerstin
APT Profile - UNC1151
APT Profile – UNC1151
Kerstin Zettl-Schabath; Jakob Bund; Lena Rottinger; Camille Borrett
EuRepoC Cyber Conflict Briefing - March 2023
EuRepoC Cyber Conflict Briefing – March 2023
Kerstin Zettl-Schabath; Jakob Bund; Martin Müller; Camille Borrett
One Year of Hostilities in Ukraine: Nine Notes on Cyber Operations
One Year of Hostilities in Ukraine: Nine Notes on Cyber Operations
Kerstin Zettl-Schabath; Sebastian Harnisch
Cyber Operations in Russia’s War against Ukraine
Cyber Operations in Russia’s War against Ukraine
Schulze, Matthias; Kerttunen, Mika
Major Cyber Incident: NotPetya
Major Cyber Incident: NotPetya
Kerttunen, Mika; Hemmelskamp, Jonas
APT Profile - APT29
APT Profile – APT29
Zettl-Schabath, Kerstin; Bund, Jakob; Gschwend, Timothy; Borrett, Camille
Major Cyber Incident: BAPCO
Major Cyber Incident: BAPCO
Kerttunen, Mika; Liang, Linda
APT Profile - APT 28
APT Profile – APT 28
Zettl-Schabath, Kerstin; Gschwend, Timothy; Borrett, Camille

Welcome to our Cyber Incident Dashboard!

For best results, please view on a desktop device.