Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Ukraine needs more drones. How can the U.S. best supply them? → Read More
OFAC should consider a creative sanction against the mixing service Tornado Cash, particularly the 100 Ethereum wallet that is known to be hiding a large amount of the DPRK’s stolen cryptocurrency. → Read More
The details behind a massive cyber problem. → Read More
The $600 million hack of the “decentralized” Poly Nnetwork should alert regulators due not to the size of the theft but, rather, to what the stakeholders did after the incident. → Read More
Right before the start of the holiday weekend, news broke of yet another massive ransomware attack. What's the deal? → Read More
Making cryptocurrency markets harder to use will have the effect of making them less useful as a ransomware payment vehicle. → Read More
Making cryptocurrency mining illegal won’t stop all mining, but it will seriously disrupt it. → Read More
The May 7 ransomware shutdown of Colonial Pipeline, resulting in the payment of nearly $5 million to the group responsible for hacking the corporation, illustrates how the ransomware epidemic is now out of hand. Beyond just the Colonial Pipeline hack, this single ransomware gang, DarkSide, has successfully earned/amassed/extorted $90 million in revenue in half a year, and the → Read More
The world is probably days away from a mass-exploitation of Microsoft Exchange servers—a hack that could have a far greater impact than the SolarWinds breach. → Read More
A quick guide to the news of a major cyber intrusion by the Russian government. → Read More
Iranian scientist Mohsen Fakhrizadeh reportedly may have been assassinated using a remote-controlled machine gun. Such devices are unfortunately easy to construct. → Read More
On a short timeline, student immigration is not a national security issue. On a timeline measured in decades, it is. → Read More
Once again, the FBI is seeking Apple’s help in unlocking phones in a counterterrorism case. But this time, Apple is technically incapable of providing assistance. → Read More
What are the key takeaways from the emerging battle between Facebook and NSO group? → Read More
Proposals to weaken encryption often use child exploitation images as an excuse in ways that don’t meaningfully address the problem. Here’s an alternative solution. → Read More
Libra will enable cybercriminals if it succeeds. Regulators should stop it “left of launch.” → Read More
Now that the U.S. government appears to have decided that no additional charges will be filed against Julian Assange, it’s worth asking why the indictment doesn’t include anything about WikiLeaks’s release of information on CIA hacking tools. → Read More
The GCHQ’s disclosure of the “BlueKeep” vulnerability offers an opportunity for the U.S. to learn from how the British handle the question of vulnerabilities equities. → Read More
The president wanted to let the Commerce Department cut Huawei off from U.S. components. His order may do quite a bit more. → Read More
What a country needs to consider before buying Huawei 5G equipment. → Read More