Tag Archives: Dual-use encryption

Illustration of APT29 spear-phishing Europe with Russian flag

APT29 Spear-Phishing Europe: Stealthy Russian Espionage

APT29 SpearPhishing Europe: A Stealthy LongTerm Threat APT29 spearphishing Europe campaigns highlight a persistent and highly sophisticated cyberespionage threat orchestrated by Russia’s Foreign Intelligence Service (SVR), known as Cozy Bear. Active since at least 2008, APT29 has become synonymous with stealthy operations targeting European institutions through phishing emails, Microsoft 365 abuse, supply chain compromises, and […]

Secure digital lock over a world map representing ITAR dual-use encryption.

ITAR Dual-Use Encryption: Navigating Compliance in Cryptography

ITAR’s Scope and Impact on Dual-Use Encryption What is ITAR and How Does It Apply to Dual-Use Encryption? ITAR plays a critical role in regulating dual-use encryption technologies. It controls the export of items listed on the United States Munitions List (USML), which includes certain encryption systems. These regulations apply when encryption technologies can be […]