Verifying Who Pulled the Trigger
Verifying Who Pulled the Trigger

Can regulators know when autonomous weapons systems are being used? Editor’s Note: For those eager to restrict the use of lethal autonomous weapons, one of the biggest challenges is verification—a difficult-to-detect variation in…

Inside the Fourth EU Cyber Sanctions Package
Inside the Fourth EU Cyber Sanctions Package

Estonia’s first public attribution of a cyberattack—four years after the fact—could be a turning point for EU cyber sanctions. On Jan. 27, the European Council imposed the EU’s fourth cyber sanctions package, which…

“Chatgpt” for Computer Security
“Chatgpt” for Computer Security

Security was top of mind when Dr. Marcus Botacin, assistant professor in the Department of Computer Science and Engineering at Texas A&M University, heard about large language models (LLMs) like ChatGPT. LLMs…

©2025 Global Cyber Security Report. Use Our Intel. All Rights Reserved. Washington, D.C.