Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

A New Era of Malware: Large Language Models (LLMs) Unleashed

The landscape of cyber threats is rapidly evolving, with the emergence of sophisticated malware leveraging cutting-edge technologies. One particularly alarming trend is the increasing use of Large Language Models (LLMs) to enhance the capabilities of malicious software. In recent years,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Growing Threat of Deepfakes: AI-Generated Videos and Audio as Tools for Terrorism, Psychological Warfare, and Cyber Attacks

deepfakes

In today’s rapidly evolving technological landscape, artificial intelligence (AI) is driving remarkable advancements. However, as with any powerful tool, there are dark sides to its applications. One of the most alarming developments in recent years is the rise of deepfakes—AI-generated…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

A Vulnerable Lifeline: Protecting Water Infrastructure from Cyberattacks

In an era where the digital landscape is intricately woven into the fabric of daily life, critical infrastructure sectors such as drinking water and wastewater systems have become increasingly attractive targets for cyberattacks. Water infrastructure, encompassing drinking water and wastewater systems,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

HALEU: The Uranium Fuel for Next-Gen Reactors—A Clean Energy Breakthrough or a Nuclear Weapons Risk?

Introduction Preventing the proliferation of nuclear weapons has been a major focus of international policy for over 70 years. However, a growing interest in high-assay low-enriched uranium (HALEU), driven by billions of dollars in U.S. government funding, raises serious concerns…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SemaFor to tackle ‘deepfakes’ with semantic forensics and create automatic disinformation campaigns for US DOD

DARPA SemaFor

The rise of digital media has brought unparalleled opportunities for information sharing, but it has also created fertile ground for large-scale disinformation attacks. As the ability to generate falsified media—whether through altered images, deepfake videos, or fabricated text—has advanced rapidly,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA Tackles Deepfakes: New Initiatives to Combat AI-Generated Media

The Defense Advanced Research Projects Agency (DARPA) has unveiled two major initiatives to strengthen defenses against deepfakes—AI-generated media designed to deceive by manipulating or synthesizing content. With the rapid advancement of artificial intelligence, deepfakes are becoming increasingly sophisticated and pose…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA CARCOSA Program: Enhancing Cyber Capabilities on the Battlefield

The Defense Advanced Research Projects Agency (DARPA) has long been at the forefront of groundbreaking technological innovations, particularly in the realm of national security. One of its latest and most ambitious initiatives, the CARCOSA program, seeks to revolutionize cyber warfare…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Strengthening Domestic Rare Earth Supply Chains: A Defense Priority

In an era where technological dominance and national security are tightly intertwined, the United States Department of Defense (DoD) has identified the critical need to reduce reliance on foreign sources for rare earth elements (REEs). These essential materials, indispensable in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Powering the Future Soldier: Fault-Tolerant and Cyber-Secure Battery Management Systems (BMS) for Military Applications

Battery Management System Data Acquisition

In modern warfare, the reliance on advanced electronics and portable devices has made power management a critical factor in ensuring mission success. From communications equipment and surveillance tools to wearable technology and autonomous systems, the demand for reliable, long-lasting, and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Rise of Unmanned Surface Vehicles (USVs): Transforming Naval Warfare

Elbit Seagull USV

Unmanned Surface Vehicles (USVs) are revolutionizing how we explore and protect our oceans. These autonomous vessels, operating at or near the sea surface without any onboard operators, are increasingly being employed across various sectors. From monitoring marine life to enhancing…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here