Chinese flag made by children holding up colored boards in North Korea on Sept. 6, 2012. (Photo by Eric Lafforgue/Art In All Of Us/Corbis via Getty Images) Chinese influence operations may lack critical element: influence A Chinese influence operation has hundreds of thousands of accounts and almost zero influence, a new report claims. Jan 26, 2023 By Christian Vasquez
A phony cryptocurrency site used by North Korean hackers in a recently exposed hacking campaign. (Google Threat Analysis Group) Dual North Korean hacking efforts found attacking Google Chrome vulnerability The hacking attempts are just the latest in the multiple ongoing hacking campaigns from the North Korean government. Mar 24, 2022
A server room run by the internet connection and data center company Equinix in Amsterdam on July 14, 2021. (Photo by SEM VAN DER WAL / ANP / AFP via Getty Images) Google Cloud offers good news and bad news on Log4Shell, other issues Potential intruders are still scanning for the bug every day, but the company says many vendors have been on top of fixing vulnerable instances of Log4j software. Feb 15, 2022