Sean Lyngaas

Sean Lyngaas

Sean Lyngaas is CyberScoop’s Senior Reporter covering DHS and Congress.

He was previously a freelance journalist in West Africa, where he covered everything from a presidential election in Ghana to military mutinies in Ivory Coast for The New York Times. Lyngaas’s reporting has also appeared in The Washington Post, The Economist, and the BBC, among other outlets. His investigation of cybersecurity issues in the nuclear sector, backed by a grant from the Pulitzer Center on Crisis Reporting, won plaudits from industrial security experts. He was previously a reporter with Federal Computer Week and, before that, with Smart Grid Today.

Sean earned a B.A. in public policy from Duke University and an M.A. in International Relations from The Fletcher School of Law and Diplomacy at Tufts University.

Technology

Facebook rejects new allegation that it protected employees over users in 2018 breach

by Sean Lyngaas • 3 days ago

The plaintiffs say the company knew about the problem with "access tokens" for years and chose to protect its own employees before fixing the problem for users.

Technology

Voting-machine companies are thinking about vulnerability disclosure, bug bounty programs

by Sean Lyngaas • 4 days ago

The industry has some very particular challenges to work out before establishing a coordinated vulnerability disclosure program. But the big companies are changing their thinking.

Technology

Microsoft patches two critical vulnerabilities comparable to BlueKeep

by Sean Lyngaas • 6 days ago

Like BlueKeep and the bug involved in WannaCry, the new vulnerabilities are "wormable."

Technology

DEF CON Voting Village matures as industry keeps its distance

by Sean Lyngaas • 1 week ago

The country's top three voting gear vendors were a no-show, but there was still plenty of enthusiasm at DEF CON's Voting Village.

Government

Feds plan to use SecureDrop as a vulnerability reporting portal

by Sean Lyngaas • 1 week ago

The plan is for DEF CON to host the servers for the vulnerability reporting, acting as a bridge between hackers and the government.

Government

Meet APT41, the Chinese hackers moonlighting for personal gain

by Sean Lyngaas • 2 weeks ago

In a first for China-based group, FireEye said, the hackers are using malware typically reserved for spying for personal gain.

TwitterFacebookLinkedInRedditGoogle Gmail