Managing Extreme Speech on Social Media
Managing Extreme Speech on Social Media

Extreme speech on social media—foul language, threats and overtly sexist and racist language—has been in the spotlight. While such language is not new, recent increases of extreme and offensive posts on social…

Tracing the Sources of Today’s Russian Cyberthreat
Tracing the Sources of Today’s Russian Cyberthreat

Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military personnel probing weaknesses in corporate, national and even personal online…

6
Hacking Hat Colors Explained
Hacking Hat Colors Explained

Not all hackers are created equal. A hacker may typically be thought of as someone who infiltrates computer systems illegally for harmful purposes, and while this is certainly true of some hackers,…

USB Connections Less Secure Than Has Been Thought
USB Connections Less Secure Than Has Been Thought

USB connections, the most common interface used globally to connect external devices to computers, are vulnerable to information “leakage,” making them even less secure than has been thought, Australian research has shown.…

©2026 Global Cyber Security Report. Use Our Intel. All Rights Reserved. Washington, D.C.