1. Walker, M., Matsa, K.E. (2021). News consumption across social media in 2021. Retrieved from: https://policycommons.net/artifacts/1817184/news-consumption-across-social-media-in-2021/2554124/.
2. Hayes, N. (2018). The forrester new wave™: digital risk protection, Q3 2018. Retrieved from https://www.forrester.com/report/The-Forrester-New-Wave-Digital-Risk-Protection-Q3-2018/RES141152.
3. Kropotov, K., & Yarochkin, F. (2019). Hunting threats on Twitter. Retrieved from https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/hunting-threats-on-twitter.
4. Geer, D. (2022). A source of security challenges for years to come. Retrieved from https://cacm.acm.org/news/258808-a-source-of-security-challenges-for-years-to-come/fulltext.
5. Goodin, D. (2021). Critics fume after Github removes exploit code for Exchange vulnerabilities. Retrieved from: https://arstechnica.com/gadgets/2021/03/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities/.