News

A History of Global Hacking — and Where It’s Going Next

  • None--securityboulevard.com
  • published date: 2026-04-19 00:00:00 UTC

None

<p>The post <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/a-history-of-global-hacking-and-where-its-going-next">A History of Global Hacking — and Where It’s Going Next</a> appeared first on Lohrmann on Cybersecurity.</p><p><main id="readArticle" class="Page-main" data-module="" data-padding="none" morss_own_score="5.174216027874564" morss_score="13.809575143896664"></main></p><p><a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity">Lohrmann on Cybersecurity</a></p><h1>A History of Global Hacking — and Where It’s Going Next</h1><h2>In her new book, <i>Code War: How Nations Hack, Spy, and Shape the Digital Battlefield,</i> Allie Mellen provides true stories of the current cyber war and, importantly, what might be ahead.</h2><div>April 19, 2026 • </div><p><a href="https://www.govtech.com/authors/dan-lohrmann.html"><span>Dan Lohrmann</span></a></p><figure> <p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/5992c28/2147483647/strip/true/crop/5677x2960+0+338/resize/840x438!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2F80%2F7f%2F06383ac444849563869885bc280e%2Fadobestock-261287007.jpeg"></p> <div>Adobe Stock/lev dolgachov</div> </figure><div class="Page-articleBody RichTextBody" morss_own_score="5.449856733524355" morss_score="132.94985673352437"> <p> In the midst of recent battles with Iran and their global partners, U.S. public- and private-sector organizations are also battling to <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/securing-critical-infrastructure-in-a-time-of-war">secure critical infrastructure in a time of war</a>. Federal agencies recently <a href="https://www.politico.com/news/2026/04/07/iranian-hackers-energy-water-cybersecurity-00862018">warned that Iranian hackers are targeting U.S. energy and water sectors</a>.</p></div><div>For example, the Cybersecurity and Infrastructure Security Agency and other three-letter agencies released this advisory: “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a">Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</a>.”</div><div>But backing up a bit, many thoughtful readers are interested in more context, history, examples and deeper-dive stories of what has happened, is happening now and will be happening in the future regarding nation-state hacking. </div><div>Which is where a new book by Allie Mellen is so helpful. Mellen <a href="https://www.linkedin.com/in/hackerxbella/">is principal analyst for Forrester</a>, and she has owned and operated a successful technical consultancy during her career. Her book covers a wide range of topics and stories related to various cybersecurity themes, trends, power structures and hacking activities by China, Russia and more. <figure> <p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/7c4a58e/2147483647/strip/true/crop/126x177+0+0/resize/840x1180!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2F8a%2F95%2F5585860149dab8b6d0e6c0b93dd2%2Fcode-war.png"></p> </figure> <p>Here is the <a href="https://www.amazon.com/Code-War-Nations-Digital-Battlefield/dp/1394285574">abstract for <i>Code War</i> from Amazon</a>:</p></div><div>“Cyberattacks are the ultimate geopolitical weapon of the 21st century. They are used to damage presidential campaigns, shut down electric grids, sway public sentiment, and cost businesses and governments alike billions of dollars.</div><div>“Popular culture portrays cyberattacks as unstoppable and mysterious actions taken by shadowy, unpredictable forces. </div><div>“They aren’t. <i>Code War: How Nations Hack, Spy, and Shape the Digital Battlefield</i> shatters this depiction, revealing nation-state cyberattacks for what they are: calculated, measured actions to achieve state objectives.</div><div>“World-renowned cybersecurity expert Allie Mellen draws on her extensive experience with nation-state cyberattacks and AI threats to break down how and why nations deploy cyberattacks in their own unique ways, driven by their military doctrine, national history, and, most importantly, geopolitical strategy.</div><div>“Mellen deconstructs the most infamous cyberattacks of our time to reveal how and why attacks like Stuxnet, WannaCry, and NotPetya happened and how their success altered the international landscape. She juxtaposes these attacks against the brutal reality of how nations surveil, manipulate, and control their own citizens’ data.</div><div>“An essential resource for individuals, business professionals, and government officials, <i>Code War</i> demonstrates how you can use this knowledge to understand and respond to the practical realities of nation-state cyberattacks.</div><div>“Readers will also find: <ul> <li>An overview of how cyberattacks and defenses operate, where governments most frequently use them, their limitations, and where they provide the most value</li> <li>An in-depth breakdown of some of the most important cyberattacks of the modern age, including those targeting the 2016 US Presidential elections, the Olympics, and those against Taiwan, Ukraine, and Tibet</li> <li>Deep dives into the histories and attacks perpetrated by governments with the most prolific cyberattacks: China, Russia, and the United States</li> </ul> <p>“An eye-opening guide to the world of nation-state cyberattacks, <i>Code War</i> is a must-read for business and government leaders responsible for protecting against these attacks. It’s also a fascinating look into the world of cyberattacks for anyone interested in international relations who wants to keep up with the evolving weapons of war.”</p></div><div>Some of the topics covered in <i>Code War</i> are shown here: <figure> <p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/54f5fab/2147483647/strip/true/crop/480x354+0+0/resize/840x620!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2Fb9%2F2f%2Fab8805cf494397b572e5f4aef1e4%2Fcode-war2.jpg"></p> </figure> <p>In addition, there are detailed sections on Russia and China hacking, with stories and great examples provided like crypto wars, Olympic games, “Beijing’s Trojan Dragon,” disinformation and much more.</p> <h3>MY THOUGHTS ON CODE WAR</h3> </div><div>I really enjoyed this book for several reasons.</div><div>First, the overview of our current cybersecurity situation globally is packed with true stories and examples that put the headlines we see every day into context.</div><div>Second, I found Part IV on the future to be very insightful and helpful. Here’s how Chapter 43, “Three Broken Promises,” opens:</div><div>“Though the United States remains the world’s leading power, it now operates in a competitive environment where influence is increasingly contested. The unipolar era has ended, and the coming decades will define the balance of power in a world no longer centered on a single place.</div><div>“Here’s the wrench that is being thrown in the works of all three of these nations — the United States, China and Russia: Leadership across the board is failing to live up to the social contracts it has established with its people.”</div><div>The chapter then describes the challenges in all three countries. Part IV goes on to discuss the changes coming with NVIDIA and AI, which the author calls “The Fourth Power.”</div><div>In Chapter 45, the case is made that “reality does not exist.” Here is how that chapter ends:</div><div>“AI providers are capable of adjusting their models to craft the reality they or the government wants us to have. Visibility into its decisions that models make, opaque, which makes it even more difficult to understand why they produced the outputs they did.</div><div>“We have come further than the disinformation-ridden world of the past. We are firmly in a world where reality no longer exists. It is what we decide. Nations, enterprises, and individuals face a battle for believability.”</div><div>Finally, in the conclusion in Chapter 45, we see this:</div><div>“The one through line in this book is you.</div><div>“What do nation-states want? Your data. What do they want to influence? Your worldview. What are you to them? Someone to protect or to persecute.</div><div>“What do tech companies want? Your data. What do they want to keep? Your attention. What are you to them? A user to serve and a resource to exploit.”</div><div>Mellen elaborates on how cybersecurity is so critical to this conversation and closes with this: “We get to chose what we demand from governments and companies — and what we are no longer willing to accept.” <h3>FINAL THOUGHTS</h3> </div><div>For decades, Paul Harvey, a legendary American radio broadcaster, famously said “And now you know … the rest of the story.”</div><div>Thoughtful readers still want to know what has happened in our recent global history with technology and hacking. How did we get to this point in 2026 between nation-states and criminal hackers, and where we are going next?</div><div>Before focusing on AI hacking and cybersecurity in the future, this book will help you understand the rest of the story regarding the importance of data and the impact on you and your customers.</div><p><a href="https://www.govtech.com/tag/cybersecurity">Cybersecurity</a></p><p><a href="https://www.govtech.com/authors/dan-lohrmann.html"></a></p><p><img decoding="async" src="https://erepublic.brightspotcdn.com/dims4/default/7be6234/2147483647/strip/true/crop/343x343+77+0/resize/100x100!/quality/90/?url=http%3A%2F%2Ferepublic-brightspot.s3.us-west-2.amazonaws.com%2Faa%2Fbe%2F66bbbc539526800857dd96f3c9d5%2Flohrman.jpg"></p><p></p><p><a href="https://www.govtech.com/authors/dan-lohrmann.html">Dan Lohrmann</a></p><div> Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. </div><p><a href="https://www.govtech.com/authors/dan-lohrmann.html">See More Stories by Dan Lohrmann</a></p><p></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/a-history-of-global-hacking-and-where-its-going-next/" data-a2a-title="A History of Global Hacking — and Where It’s Going Next"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fa-history-of-global-hacking-and-where-its-going-next%2F&amp;linkname=A%20History%20of%20Global%20Hacking%20%E2%80%94%20and%20Where%20It%E2%80%99s%20Going%20Next" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="">Lohrmann on Cybersecurity</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Lohrmann on Cybersecurity">Lohrmann on Cybersecurity</a>. Read the original post at: <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/a-history-of-global-hacking-and-where-its-going-next">https://www.govtech.com/blogs/lohrmann-on-cybersecurity/a-history-of-global-hacking-and-where-its-going-next</a> </p>