Technology & Innovation

A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY

Wed, Nov 1, 2023

Hacker collectives take sides in the Mideast crisis

Telegram feeds of hacker groups document alleged attacks targeting Israel

by Ruslan Trad

Conflict in and through the Cyber Domain Cybersecurity
An image of browser icons for Edge, Firefox, Chrome, Opera, and Brave browsers

Mon, Oct 30, 2023

Homogeneity and Concentration in the Browser

Web browsers are the gateway to the internet. As browser developers replicate design features and concentrate around shared underlying technologies, they create cybersecurity risks with the potential to impact many internet users at once.

by Justin Sherman and Jessica Edelson

Cybersecurity Telecomms and the Internet

Fri, Oct 27, 2023

The 5×5—The Cybersecurity Implications of Artificial Intelligence

A group of experts with diverse perspectives discusses the intersection of cybersecurity and artificial intelligence.

by Maia Hamin and Simon Handler

Artificial Intelligence Series and Response
Israel's Iron Dome anti-missile system intercepts rockets launched from the Gaza Strip, as seen from the city of Ashkelon, Israel October 9, 2023. (Source: Reuters/Amir Cohen/File Photo)

Wed, Oct 18, 2023

Network of South Asian Twitter accounts spreading Israel-Palestine war disinformation

Accounts exhibiting signs of coordination amplify divisive copypasta targeting both sides of the conflict

by Ali Chenrose

Deceptive Content Manipulation Disinformation
Hamas's al-Qassam Brigades train with paragliders as they prepare for an armed air assault, in this screengrab obtained from a social media video released on October 7, 2023. (Source: Izz el-Deen al-Qassam Brigades via Telegram/Reuters)

Thu, Oct 12, 2023

In Israel-Hamas conflict, social media become tools of propaganda and disinformation

An endless flood of false, misleading, and unverified information risks inflaming the conflict.

by Dina Sadek, Layla Mashkoor

Conflict Disinformation

Thu, Oct 12, 2023

Driving Software Recalls: Manufacturing Supply Chain Best Practices for Open Source Consumption

Product recalls require practices that can help software vendors move toward better component selection and tracking and better relationships with customers, all while making software vendors responsible for OSS security instead of maintainers.

by Jeff Wayman, Brian Fox

Cybersecurity Open Source Software
Kiyozumi Dera, Kyoto, Japan

Thu, Oct 5, 2023

Quiet part out loud: Rules of the internet and the 2023 Internet Governance Forum

A breakdown of the 2023 Internet Governance Forum (IGF) and the competing factions vying for the future rules of the internet.

by Leah (Léa) Fiddler

Digital Policy International Organizations
Protesters scuffle with police during a rally to demand the resignation of Armenian Prime Minister Nikol Pashinyan in Yerevan, Armenia, September 22, 2023. (Source: Vahram Baghdasaryan/Photolure via Reuters)

Thu, Oct 5, 2023

Kremlin propagandists fuel anti-government sentiment in Armenia

Russian media and influencers blame Armenian prime minister and the West for the situation in Nagorno-Karabakh while encouraging anti-government protests

by , Sopo Gelava

Armenia Disinformation
SENSITIVE MATERIAL. THIS IMAGE MAY OFFEND OR DISTURB Bodies of killed people are seen at a site of a Russian military strike, amid Russia's attack on Ukraine, in the village of Hroza, in Kharkiv region, Ukraine October 5, 2023. REUTERS/Vyacheslav Madiyevskyy

Thu, Oct 5, 2023

Russian War Report: Civilian cafe attacked and a fake Ukrainian news site is exposed

A suspicious website impersonating a Ukrainian news agency accused Ukrainian President Volodymyr Zelenskyy and Ukrainian leadership of corruption and misusing aid provided by the United States.

by Digital Forensic Research Lab

Wed, Oct 4, 2023

Suspicious Twitter accounts promote Saudi Arabia, call for reinstating Saud Al-Qahtani

Network amplified content calling for Twitter to reinstate Saud Al-Qahtani, accused of orchestrating Jamal Khashoggi’s killing in 2018

by Dina Sadek, Ali Chenrose

Digital Policy Disinformation

Tue, Oct 3, 2023

Georgian travel company behind inauthentic network promotes health-related clickbait content

Inauthentic network disseminated unreliable health-related content to promote travel company and increase sales

by Sopo Gelava, Jean le Roux

Advertising Disinformation

Wed, Sep 27, 2023

Kink in the Chain: Eight Perspectives on Software Supply Chain Risk Management

Software supply chain attacks are popular, impactful, and are used to great effect by malicious actors. To dive deeper on this topic, we asked eight experts about these threats and how policymakers can help protect against them.

by Cyber Statecraft Initiative

Cybersecurity Software Supply Chains