vulnerability
Home / Tags
Recent Inquiries
Status of High-Energy Laser (HEL) Vulnerability Activities
A researcher with the U.S. Army Space and Missile Defense Command inquired about the status of the following HEL vulnerability activities: Joint HEL Threat Card Configuration/Layout Joint HEL Vulnerability Module (VM) Configuration/Layout Joint HEL VM…
Articles
America Needs a Secure Supply of Critical Minerals
Critical minerals, including rare earth elements and metals, are the new oil. The modern world has become accustomed to and dependent on technologies that require rare earth parts. Yet for decades, as the U.S. fought and won battles against its dependence on foreign oil, it ceded complete control to China for rare earths and most
North Korea Hasn”t Stopped Launching Cyberattacks Amid Peace Talks
As Kim Jong-un speaks publicly about nuclear disarmament, North Korea’s hacker army continues to launch cyberattacks against different businesses across Asia, Europe and the U.S., according to private sector analysts and former U.S. officials. Experts from several cybersecurity firms — Dell SecureWorks, McAfee, Symantec, FireEye and Recorded Future — all told CyberScoop that activity from