/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
API keys, docs, usage dashboard
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Person

Chris Wysopal

Filtered to acquisition pattern ×
10 articles decelerating
Articles
10
mentions
Velocity
-50.0%
growth rate
Acceleration
-0.167
velocity change
Sources
8
publications

Coverage Timeline

2024-02-11
Gizmodo 12 related

A Canadian minister says the government plans to ban devices that copy wireless signals for remote keyless entry, like the Flipper Zero, to combat auto theft

🤨  —  https://www.bleepingcomputer.com/ ...  #security #pentesting #flipperzero #canada Matti Aleve / @maleve@zeroes.ca : Sigh where to even begin with this.  —  The subhead pretty much covers it thou...

2023-08-06
TechCrunch

A profile of Window Snyder, who helped secure the early internet while at Microsoft and Mozilla, and pushed Apple to enable encryption by default in its devices

https://techcrunch.com/... Kenn White / @kennwhite@mastodon.social : This is a great profile on Window Synder, one of the true OG hackers and an absolute force of nature in internet security.  You can...

2023-08-05
TechCrunch 1 related

A profile of Window Snyder, who helped secure the early internet while at Microsoft and Mozilla, and pushed Apple to enable encryption by default in its devices

Snyder has made Windows, Mac computers, iPhones, and other technologies more secure for almost 25 years. Mastodon: @Weld@infosec.exchange and @kennwhite@mastodon.social . Bluesky: @arw.bsky.social Twi...

2023-03-31
BleepingComputer 32 related

Researchers say hackers have compromised the VoIP desktop client of 3CX's Phone System, used by 600K+ companies and 12M+ DAUs, in an ongoing supply chain attack

https://www.3cx.com/...  Any vendor of software and services that pull in code from NPM, PIP, RubyGems etc … Eitan Erez : This supply chain attack started unfolding not long ago as 3CX VOIP desktop cl...

2023-03-18
TechCrunch 69 related

Google's Project Zero finds 18 zero-day vulnerabilities in Exynos modems, affecting some Samsung, Vivo, and Google phones as well as wearables and vehicles

do this before you're next Maria Deutscher / SiliconANGLE : Google discovers 18 vulnerabilities in multiple Samsung chips Pierluigi Paganini / Security Affairs : Baseband RCE flaws in Samsung's Exynos...

2023-01-15
Ars Technica 6 related

Hackers have begun exploiting a critical remote code execution vulnerability in unpatched versions of the Control Web Panel, a widely used web hosting interface

Patch NOW Ionut Arghire / SecurityWeek : Exploitation of Control Web Panel Vulnerability Starts After PoC Publication TechRadar : Hackers target and exploit major Control Web Panel security flaw Msmas...

2022-11-13
CoinDesk 71 related

FTX claims the company was hacked, telling users to delete FTX apps, not install app updates, and not to visit FTX.com, after $600M+ in crypto left its wallets

trustless, permissionless, uncensorable crypto—is the only path forward for the future. This week, we grieved. Next week, we build. @cz_binance : What a sh!t show... And it's going to be crypto's faul...

2021-08-14
Reuters 24 related

Poly Network offers a $500K “bug bounty” to the hacker who returned $340M+ in assets and placed the rest in a wallet jointly controlled by the hacker and Poly

but there's a catch Finextra : Hacker behind $610m crypto heist in line for reward for returning assets Brian Fung / CNN : An anonymous hacker stole $600 million in cryptocurrency, then gave it back R...

2021-04-26
CircleID 8 related

Dan Kaminsky, the celebrated security researcher widely known for his work on discovering crucial DNS security flaws and Sony Rootkit infections, has died at 42

Saddened by news of the death of Dan Kaminsky, a member of the ICANN Trusted … Pierluigi Paganini / Security Affairs : The cybersecurity researcher Dan Kaminsky has died Tweets: Sarah B / @sarahbrie :...

2017-01-16
Forbes

Law enforcement has used services like SiriusXM and GM's OnStar to track cars and listen in on conversations since at least 2001, review of court filings shows

The rapid spread of connected devices that can listen and locate has been a boon for law enforcement. Tweets: @uvstaska , @hoofnagle , @jackshafer , @gerzic , @jackshafer , @onstar , @swiftonsecurity ...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...