Why LinkedIn is a snooper’s paradise
by Gareth Corfield
via The Telegraph on August 24, 2023

A Fake Signal App Was Planted on Google Play by China-Linked Hackers
by Thomas Brewster
via Forbes on August 30, 2023

Sleight of hand: How China weaponizes software vulnerabilities
by Dakota Cary and Kristin Del Rosso
via Atlantic Council on September 6, 2023

VIDEO – China’s Emergence as a Second Nuclear Peer: Implications for US Nuclear Deterrence
by Brad Roberts
via NSI on June 21, 2023

VIDEO – Building a Strategic Framework for Tailored Deterrence of China in Space
by Krista Langeland
via NSI on June 13, 2023

Intersections: Technology, National Security, and US-China Strategic Competition
via CNA in August 2023

Telstra-owned Pacific mobile network likely exploited by spies for hire
by ABC and the Organized Crime and Corruption Reporting Project
via ABC on September 1, 2023

Hackers stole Microsoft signing key from Windows crash dump
by Sergiu Gatlan
via Bleeping Computer on September 6, 2023

Chinese Smishing Triad Gang Hits US Users in Extensive Cybercrime Attack
by Deeba Ahmed
via Hackread on September 2, 2023

U.S. and Western Intelligence Assurance Practices in the Russia-Ukraine Conflict and Their Lessons
by Zhang Gaoyuan
via CSIS on March 27, 2023

Game Changer in Underwater Warfare? New Chinese Study Claims Breakthrough Technique to Track U.S. Stealth Submarines
by Tim McMillan
via The Debrief on August 28, 2023

Pentagon Plans Vast AI Fleet to Counter China Threat
by Nancy A. Youssef and Michael R. Gordon
via Wall Street Journal on September 6, 2023

Expand
overlay image