Start your day with intelligence. Get The OODA Daily Pulse.
Home > OODA Analysis and Briefs
OODA Experts provide their perspective on the RSA 2019 conference including a list of 30+ companies to watch.
Fresh off of RSA – OODA Network Expert Michael Tanji provides insightful analysis of the most recent and significant cyber news.
OODA Network Members are invited to participate in our webinar on the Russian Threat scheduled for Tuesday February 19, 2019 at 2:00 p.m. EST.
The United States intelligence strategy for 2019 has been released, covering seven specific themes. Here’s how the United States Intelligence Community will deal with cyber threats: “Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to come. Our adversaries are becoming…
This is the final article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents. In Part 3 of this series, I provided four actionable steps for explaining the benefits of insider risk management to your workforce, read more…
How can you use HACKthinking to solve complex problems or evolve or develop a disruptive solution.
This is the third article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents. In Part 2 of this series, I provided four actionable steps for being straightforward with your workforce about how you plan to establish…
The top ten books of the year as curated by OODA Loop founder Matt Devost.
This is the second article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents. In Part 1 of this series, GPSG’s insider threat risk team introduced its workforce investment strategy and provided actionable steps for explaining to your…
An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.
This is the first article in a series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents.Your organization faces insider risk every day. The average cost of an incident over a 12-month period is $8.76 million, according to a recent Ponemon…
Software and our internetworked computer systems are more complex than ever. Which means to develop countermeasures to these new types of cyberattacks we have to work harder than ever.
With every sector of the economy, every element of critical infrastructure and every component of government now dependent on IT and software, clearly software has eaten the world.
10 lessons from one headhunter’s two decades behind the scenes working with hundreds of clients and thousands of senior executives.
The United States is currently years behind its rivals in cyberspace, both conceptually and operationally.
Low Earth orbit satellite constellations are all the rage, but up to this point they’ve been the prospective domain of commercial entities. Now the U.S. military wants in on the action — thanks in part to inroads made by the likes of Starlink, OneWeb, Planet and more — and it’s spending big, turning to a variety…
Well-known policy experts and veterans of the artificial intelligence (AI) world have been advocating for the nationalization of AI infrastructure. While these concerns may be legitimate, the policy prescriptions would repeat mistakes that have stifled innovation in the past. Many experts are generally optimistic about the future, and one predicts an “AI dividend” if algorithms…
An Iranian man and four Iraqis were given life in prison for the 2022 killing of U.S. citizen Stephen Troell in Baghdad. Troell had been living in Baghdad with his family where he worked as an English teacher. Troell was killed after an attempted abduction last November. The men “confessed” to murder and said they…
Iran has accused Israel of trying to sabotage its ballistic missile program through faulty parts that could explode, which would destroy the weapons before they were used. This comes amid a yearslong effort by both Israel and the U.S. to target Iran. A report also said that the part could have been used in Iran’s…
Lebanon and Israel have been in a border dispute that has caused tensions and cross-border violence in recent months. The United States may get involved in mediating the end of the border dispute. The land demarcation line between Lebanon and Israel is known as the Blue Line. There have been spikes of violence at the…
Britain’s National Cyber Security Centre (NCSC) is warning of an apparently fundamental security flaw affecting large language models (LLMs) — the type of AI used by ChatGPT to conduct human-like conversations. Since the launch of ChatGPT last November, the bulk of security concerns regarding the technology have focused on its ability to produce human-like speech…
The US has expanded the restriction of exports of Nvidia artificial intelligence chips beyond China to some countries in the Middle East. Nvidia, which is one of the world’s most valuable companies at $1.2tn, said in a regulatory filing this week the curbs affected its A100 and H100 chips, which are used to accelerate machine-learning…
ASML Holding NV said it has licenses to ship restricted chip-making machines to China until the end of the year, even as export curbs kick in from September. Europe’s most valuable tech company doesn’t expect to get export licenses to ship three advanced immersion deep ultraviolet lithography, or DUV, models to China from January, an…
Some of the world’s leading astronomical observatories have reported cyberattacks that have resulted in temporary shutdowns. The National Science Foundation’s National Optical-Infrared Astronomy Research Laboratory, or NOIRLab, reported that a cybersecurity incident that occurred on Aug. 1 has prompted the lab to temporarily halt operations at its Gemini North Telescope in Hawaii and Gemini South…
The breakneck speed at which generative AI has mainlined into seemingly every organization this year has caused some major whiplash for enterprise IT, risk and security leaders, who face tough questions about how to govern the use of these new tools without hamstringing the ability to innovate. In practice, many are still struggling to get…
Increasing demand but decreasing budgets are putting a strain on NASA’s Deep Space Network (DSN), threatening its ability to provide communications for the agency’s science missions and Artemis lunar expeditions. While pressures on the DSN, a system of antennas located in Australia, California and Spain used primarily for communications with spacecraft beyond Earth orbit, have been…
OpenAI is currently on pace to generate more than $1 billion in revenue over the next 12 months from the sale of artificial intelligence software and the computing capacity that powers it. That’s far ahead of revenue projections the company previously shared with its shareholders, according to a person with direct knowledge of the situation. The…
An artificial intelligence group with links to Abu Dhabi’s ruling family has launched what it described as the world’s highest-quality Arabic AI software, as the United Arab Emirates pushes ahead with efforts to lead the Gulf’s adoption of generative AI. The large language model known as Jais is an open-source, bilingual model available for use by…
Having trounced humans at everything from chess and Go, to StarCraft and Gran Turismo, artificial intelligence (AI) has raised its game and laid waste world champions at a physical sport. The latest mortals to feel the sting of AI-induced defeat are three expert drone racers who were beaten by an algorithm that learned to fly a…
Several professors in prestigious universities in Iran have been expelled, leading to debates about whether these terminations are related to their support for last year’s nationwide protests. The protests, which began in September, were sparked by the death of a woman in police custody and led to acts of civil disobedience by students and professors.…
India has lodged a “strong protest” with China over a new map that claims Indian territory as part of China. The map released by China’s ministry of natural resources shows the north-eastern state of Arunachal Pradesh and the disputed Aksai Chin plateau as Chinese territory. India’s foreign ministry rejected the claims, saying they have no…
A UN report has highlighted that hundreds of thousands of people have been trafficked to Southeast Asia to run online scams, with at least 120,000 people in Myanmar and another 100,000 in Cambodia being forced into these activities. These scams generate billions of dollars in revenue each year. Victims are often lured by promises of…
Canada has issued a travel warning to its LGBT citizens planning to visit the United States due to rising anti-LGBT protests and legal moves to restrict LGBT rights in the country. The travel warning states that some state laws in the US may affect LGBT travelers, without specifying which states. This type of warning is…
Mozilla and Google have released stable updates for Firefox and Chrome to address high-severity vulnerabilities, including memory corruption issues. Mozilla’s Firefox 117 includes patches for 13 vulnerabilities, with seven rated as high severity. Four of these are memory corruption bugs that could lead to potentially exploitable crashes. One of the high-severity vulnerabilities is an integer…
The advancement of quantum computing technology is raising concerns about the potential for these computers to break modern cryptography, rendering current data encryption methods obsolete. The US government has been taking steps to address these concerns, with President Biden releasing a national security memorandum in 2022 and the US House of Representatives passing the Quantum…
A significant flaw in multiple major Border Gateway Protocol (BGP) implementations can lead to extended internet outages, according to researcher Ben Cox. BGP is crucial for routing data between autonomous systems on the internet. This flaw is connected to attributes in BGP exchange UPDATE messages, with certain BGP implementations vulnerable to an error triggered by…
GitHub has launched Enterprise Server 3.10 with new security features, such as custom deployment rules and enhanced visibility through GitHub Projects. Teams using GitHub Actions can create custom deployment protection rules to ensure only compliant deployments proceed to production. Administrators now have greater control over the management and security of runners in GitHub Actions, including…
Artificial intelligence tools are being abused to conduct cyberattacks. How do you beat them? You join them — by using AI to bolster modern-day defenses. Artificial intelligence (AI) and machine learning (ML) have become hot topics in the technology space in recent years. While the launch of tools including ChatGPT introduced the explosive potential of AI…
The U.S. may be about to get its first spot bitcoin exchange-traded fund, after a federal court ruled that the U.S. Securities and Exchange Commission (SEC) must review its rejection of Grayscale Investments’ attempt to convert the Grayscale Bitcoin Trust (GBTC) into an ETF. The legal victory potentially opens the door for a spot bitcoin…
Overall, 52% of Americans say they feel more concerned than excited about the increased use of artificial intelligence. Just 10% say they are more excited than concerned, while 36% say they feel an equal mix of these emotions. The share of Americans who are mostly concerned about AI in daily life is up 14 percentage…
Today, the SEC announced its first enforcement action against NFTs in a case that was settled by Impact Theory, the NFTs’ issuer. The SEC said the NFTs issued by Impact Theory were unlicensed securities. The company agreed to a cease-and-desist order, paid $6.1 million in penalties, and agreed to destroy all of the NFTs in…
Artificial intelligence development firm OpenAI has announced a business version of its popular ChatGPT bot. The new product, dubbed ChatGPT Enterprise, is touted as the most powerful version of the company’s AI technology yet. “Today marks another step towards an AI assistant for work that helps with any task, is customized for your organization, and…
Mali’s military junta ordered the United Nations to remove its peacekeepers from the country. Secretary-General António Guterres called the six-month withdrawal from the West African nation “unprecedented.” Mali’s U.N. Ambassador Issa Konfourou is communicating with MINUSMA while it removes its 12,947 peacekeepers and police, 12 camps, and 1,786 civilian staff. Mali officials will not extend…
Meta announced on Tuesday that it discovered and removed thousands of Facebook accounts spreading pro-China messaging and Western criticism. The “Spamoflauge” operation spread across over 50 platforms including Instagram, TikTok, YouTube, and X. Meta Global Threat Intelligence Lead Ben Nimmo called the effort the “largest, though unsuccessful, and most prolific covert influence operation…in the world…
During a phone call between Russian President Vladimir Putin and Indian Prime Minister Narendra Modi on Monday, Putin stated Foreign Minister Sergei Lavrov will represent his country at the G20 summit next month. The two leaders also discussed BRICS extending membership to six new nations. Putin’s decision to remain in Russia for the G20 summit…
Polish authorities arrested two Polish citizens on Sunday, both suspected of hacking and disrupting the national railway’s communications network. The attacks caused delays near the city of Szczecin on Friday, where about 20 trains were hindered or completely halted. The two men continued to attack other railway communications networks on Saturday and Sunday with negligible…
Iranian foreign ministry spokesman Nasser Kanaani stated on Monday that Iran and Iraq reached an agreement to disarm and relocate “separatists and terrorist groups” in Iraqi Kurdistan. An anonymous Iraqi security advisor confirmed Iran’s demands involved relocating separatist forces to refugee camps. The same source pointed to a March border security agreement between the two…
Cybersecurity firm ReliaQuest reported that QakBot, SocGholish, and Raspberry Robin were the three most commonly used malware loaders in 2023. Cybercriminals utilized one of these three services in 80% of observed incidents this year. QakBot was activated in 2009 as a banking trojan but has since developed into a malware loader capable of deploying payloads,…
Phylum security researchers recently discovered suspicious libraries uploaded to the Rust programming language’s crate registry, crates.io. The Phylum report explained that the threat actor was likely seeking to compromise developer machines. The user “amaperf” uploaded the malicious libraries postgress, if-cfg, xrvrv, serd, oncecell, lazystatic, and envlogger between August 14 and 16. These packages were capable…
The Russian Defence Ministry announced it scrambled two fighter jets on Monday in response to two U.S. drones conducting an intelligence-gathering mission in the Black Sea region. The ministry stated that Russian forces observed the drones near Crimea, and claimed they were headed toward the Russian border. The statement added that the drones altered course…
Although recent developments in generative artificial intelligence (AI) have raised unprecedented awareness around the power of AI/ML, they have also illuminated the foundational need for privacy and security. Groups like IAPP, Brookings, and Gartner’s recent AI TRiSM framework have outlined key considerations for organizations looking to achieve the business outcomes uniquely available through AI without…
We’ve been talking about intellectual property in one way or another for at least the last five hundred years, and each new wave of technology or creativity leads to new kinds of arguments. We invented performance rights for composers and we decided that photography – ‘mechanical reproduction’ – could be protected as art, and in…
It is powered into flight by a rocket engine. It can fly a distance equal to the width of China. It has a stealthy design and is capable of carrying missiles that can hit enemy targets far beyond its visual range. But what really distinguishes the Air Force’s pilotless XQ-58A Valkyrie experimental aircraft is that…
One of the founders of crypto mixer Tornado Cash has been released on bail after being charged with laundering $1 billion by the U.S. Department of Justice (DOJ). According to defense attorney Brian Klein, Roman Storm, one of the founders of the sanctioned crypto mixer, has been released on bail. However, according to Klein, the implications…
Enterprises have quickly recognized the power of generative AI to uncover new ideas and increase both developer and non-developer productivity. But pushing sensitive and proprietary data into publicly hosted large language models (LLMs) creates significant risks in security, privacy and governance. Businesses need to address these risks before they can start to see any benefit…
Japan has summoned China’s ambassador after businesses were inundated by ‘harassment’ phone calls following the release of water from the Fukushima nuclear power plant. Last week, China banned all seafood from its neighbor after Japan began releasing cooling water from the stricken Fukushima plant, which Tokyo and the UN’s nuclear watchdog have said is safe.…
Vessels from the Russian Navy returned from more than three weeks of joint-patrolling the Pacific Ocean with Chinese warships. The Wall Street Journal reported that during the patrol, Russian and Chinese ships steamed close to the Aleutian Islands, in what appeared to be the largest such flotilla to approach US shores. However, the ships never…
A high-level United States delegation has made a rare visit to rebel-held territory in northwestern Syria in an effort to highlight the humanitarian catastrophe there. This marks the first such visit since 2017. The delegation included three members of the U.S. Congress, which are all members of the U.S. Republican Party. The United Nations Office…
United Nations experts said in a new report that the armed group ISIL (ISIS) has almost doubled its territory in Mali in less than a year. The delay of a peace deal have offered ISIL a chance “to re-enact the 2012 scenario”, the report said. This is when rebels in the north formed “an Islamic…
Businesses are using machine learning (ML) to unlock valuable insights, gain operational efficiencies, and solidify competitive advantage. Recent developments in generative artificial intelligence and ML have illuminated the need for privacy and security. ML models are algorithms that process data to generate insights and inform decisions. ML is able to learn and improve through data.…
In a Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing the authentication across remote workforces, the negative consequences of ineffective authorization, and how the shift toward cloud transformation affects authentication strategies. Ineffective authorization can have many negative consequences, including: data breaches, fraud, vulnerabilities in system security, compliance…
Ohio History Connection (OHC) , a nonprofit organization that manages the Ohio History Center and 50 other museums and sites across the state, has confirmed that personal information was stolen in a ransomware attack and later posted online. The attackers demanded millions of dollars to be paid as ransom, which OHC did not pay. The…
North Korean state-sponsored hackers Lazarus Group have been exploiting a ManageEngine ServiceDesk vulnerability to target internet backbone infrastructure and healthcare institutions in Europe and the U.S. The malware is capable of downloading and deploying additional malicious payloads. The researchers were able to associate the latest attacks with Lazarus and identify other malware they use. According…
Researchers are making monumental strides in enhancing robotic dexterity and tactile sensing. The goal? Robots that can manipulate objects with the finesse and precision of human hands. At the forefront of this research field is a groundbreaking study from MIT’s Computer Science and Artificial Intelligence Lab (CSAIL). The team tackled the intricate challenge of contact-rich…
SpaceX’s next astronaut launch has been pushed back by at least 24 hours. The company was counting down to launch the four-person Crew-7 mission to the International Space Station (ISS) for NASA in the early hours of Friday (Aug. 25) from Florida’s Kennedy Space Center. But now, that’s not going to happen. “NASA and SpaceX…
Alibaba on Friday launched a new artificial intelligence model that the company says can understand images and carry out more complex conversations than the company’s previous products, as the global race for leadership in the technology heats up. The Chinese technology giant said that its two new models, Qwen-VL and Qwen-VL-Chat, will be open source —…
The world of cybersecurity is constantly changing, and it requires new and creative ways to deal with the ever-growing complexity of cyber threats. AI has become an important weapon in the fight against these threats, providing both exciting advantages and some tricky obstacles. I’ll delve into the crucial role of AI in cybersecurity, discussing its…
Data from 2.6 million users of Duolingo has been leaked on a hacking forum. Duolingo is a language platform with over 74 million monthly users. The compromised data included real names, login names, email addresses, and internal service-related details. Duolingo said that the data was sourced from public profiles, however, the leaked email addresses are…
Danish cloud hosting firms, CloudNordic and Azero have suffered ransomware attacks that resulted in most customer data being stolen and systems and servers rendered inaccessible. The companies believe the attack happened while they were transferring servers from one data center to another. The attacks gained access to the company’s central administration and backup systems and…
The Office of the Director of National Intelligence released a warning about the growing threat of foreign intelligence entities as they continue to launch cyberattacks to gain access to the U.S. space industry. Aside from global competition, there are also national and economic security concerns regarding the threats to U.S. space innovation. The counterintelligence agencies…
A new study by cybersecurity firm Critical Insight noted that the number of breaches against health care facilities is down, but there is an increase in the number of individuals who have been attacked. Individual records compromised are the highest they’ve ever been in a 6 month period. Further, the study says that the attackers…
Fourier Intelligence’s striking humanoid robot, GR-1, made a remarkable debut at the World Artificial Intelligence Conference (WAIC) in Shanghai in July. This jet-black marvel captured the attention of the global technology community, showcasing the immense potential of bipedal robots. Amid the buzz surrounding AI software, the Chinese-designed GR-1 garnered attention by demonstrating its ability to walk…
On a recent cross-country trip—I (Paul) drove from California to Illinois and back again. On the drive, I saw a sign I had never seen before: In a McDonald’s window it said $1,000 SIGNING BONUS. That was not a thing when I was a teenager doing minimum-wage jobs. No one paid you $1,000 signing bonuses…
Earlier this year, the DEA was duped by a common cryptocurrency scam, resulting in the agency losing over $50,000 in digital money it had seized during a three-year investigation into the use of digital currency for laundering suspected drug proceeds. In May, the DEA seized just over $500,000 in the dollar-linked cryptocurrency Tether from two Binance…
Technology giant Nvidia says its sales have hit a record after more than doubling as demand for its artificial intelligence (AI) chips soars. The company says revenue jumped to above $13.5bn (£10.6bn) for the three months to the end of June. Nvidia also expects sales to soar further in the current quarter and plans to buy back…
Copyright © 2025 — All Rights Reserved.
Notifications