Technology & Innovation

Mon, Jul 24, 2023

Pro-Russia actors target Armenia with anti-Ukraine propaganda

Suspicious quotes magnified by pro-Russian sources used to undermine Ukraine's reputation in Armenia

by , Roman Osadchuk

Armenia Conflict

Thu, Jul 20, 2023

Russian War Report: Wagner is still in business in Africa

Despite their Russia-based forces being relocated to Belarus after their failed mutiny, Wagner Group is still alive and active in Africa, including ahead of a referendum in the Central African Republic.

by Digital Forensic Research Lab

Wed, Jul 19, 2023

Why Do SBOM Haters Hate? Or Why Trade Associations Say the Darndest Things

SBOMs are an important step forward for software supply chain security, so despite pushback and opposition, industry and government should take a page out of Taylor Swift’s book and just keep cruisin’, don’t let SBOM haters get in the way. 

by John Speed Meyers, Sara Ann Brackett, and Trey Herr

Cybersecurity Cybersecurity Standards and Requirements

Tue, Jul 18, 2023

The National Cybersecurity Strategy Implementation Plan: A CSI Markup

On July 13, the White House released the Implementation Plan for the 2023 US National Cybersecurity Strategy. Read along with CSI staff, fellows, and experts for commentary and what the NCSIP means for the Strategy.

by Trey Herr, Stewart Scott, Maia Hamin, Will Loomis, Sara Ann Brackett, Jennifer Lin

Cyber Strategy Cybersecurity
Marina Tauber, leader of the opposition pro-Russian political party Shor, delivers a speech during a hearing of the Constitutional Court in Chisinau, Moldova, June 19, 2023. (Source: Reuters/Vladislav Culiomza)

Tue, Jul 11, 2023

Inauthentic Facebook campaign promoted pro-Russian Shor Party messaging in Moldova

The campaign sponsored ads in support of convicted oligarch Ilan Shor and used fake accounts to target Moldova's pro-European government

by Victoria Olari, Iain Robertson

Disinformation Eastern Europe

Tue, Jul 11, 2023

Cross-platform kompromat campaign targets detained activist Bakhtiyar Hajiyev and several female Azerbaijani activists

Kompromat campaign against Azerbaijani activists disseminated on Telegram and amplified on other platforms

by Digital Forensic Research Lab

Azerbaijan Civil Society

Mon, Jul 10, 2023

Critical Infrastructure and the Cloud: Policy for Emerging Risk

Critical infrastructure increasingly depends upon cloud computing. Policy must adapt its approach to risk management accordingly.

by Tianjiu Zuo, Justin Sherman, Maia Hamin, and Stewart Scott

Cloud Computing Cybersecurity

Fri, Jul 7, 2023

Russian War Report: Russian conspiracy alleges false flag at Zaporizhzhia nuclear plant

Allegations of a supposedly US and Ukraine-planned false flag operation on the Zaporizhzhia nuclear power plant spread across social media ahead of the NATO Summit.

by Digital Forensic Research Lab

Fri, Jun 30, 2023

Russian War Report: Kremlin denies that it targeted civilians in a missile attack on a pizza restaurant

A deadly Russian missile strike on a cafe in Kramatorsk leaves a dozen dead and more injured. Post-mutiny, Wagner's future in Africa is up in the air.

by Digital Forensic Research Lab

Thu, Jun 29, 2023

The disinformation landscape in West Africa and beyond

A look at West Africa’s information environment, with particular emphasis on local and international disinformation campaigns targeting the region and beyond.

by Tessa Knight, Jean le Roux

Wed, Jun 28, 2023

Yevgeny Prigozhin: A history of violence and propaganda around the world

Yevgeny Prigozhin captured global attention with his mutiny in Russia; the DFRLab has tracked his efforts around the world for over half a decade.

by Digital Forensic Research Lab

Africa Botnets

Wed, Jun 28, 2023

Shaping the global spyware market: Opportunities for transatlantic cooperation

The United States and its allies can do more to improve their position on spyware. Further policy action should, through greater collaboration with marketplace operators and allies and partners, work on furthering the development of norms and common understanding of what spyware can and cannot be used for.

by Jen Roberts and Emmeline Nettles

Cyber Strategy Cybersecurity