Why LinkedIn is a snooper’s paradise
by Gareth Corfield
via The Telegraph on August 24, 2023
A Fake Signal App Was Planted on Google Play by China-Linked Hackers
by Thomas Brewster
via Forbes on August 30, 2023
Sleight of hand: How China weaponizes software vulnerabilities
by Dakota Cary and Kristin Del Rosso
via Atlantic Council on September 6, 2023
VIDEO – China’s Emergence as a Second Nuclear Peer: Implications for US Nuclear Deterrence
by Brad Roberts
via NSI on June 21, 2023
VIDEO – Building a Strategic Framework for Tailored Deterrence of China in Space
by Krista Langeland
via NSI on June 13, 2023
Intersections: Technology, National Security, and US-China Strategic Competition
via CNA in August 2023
Telstra-owned Pacific mobile network likely exploited by spies for hire
by ABC and the Organized Crime and Corruption Reporting Project
via ABC on September 1, 2023
Hackers stole Microsoft signing key from Windows crash dump
by Sergiu Gatlan
via Bleeping Computer on September 6, 2023
Chinese Smishing Triad Gang Hits US Users in Extensive Cybercrime Attack
by Deeba Ahmed
via Hackread on September 2, 2023
U.S. and Western Intelligence Assurance Practices in the Russia-Ukraine Conflict and Their Lessons
by Zhang Gaoyuan
via CSIS on March 27, 2023
Game Changer in Underwater Warfare? New Chinese Study Claims Breakthrough Technique to Track U.S. Stealth Submarines
by Tim McMillan
via The Debrief on August 28, 2023
Pentagon Plans Vast AI Fleet to Counter China Threat
by Nancy A. Youssef and Michael R. Gordon
via Wall Street Journal on September 6, 2023