/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Company

Defcon

10 articles stable
Articles
10
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
5
publications

Coverage Timeline

2024-08-12
Wired

A researcher finds 15K+ hardcoded secrets and 66K vulnerable websites, including details on accessing Stanford's Slack, by searching overlooked data sources

Security researcher Bill Demirkapi found more than 15,000 hardcoded secrets and 66,000 vulnerable websites—all by searching overlooked data sources. Forums: r/technews , r/cybersecurity , r/Nebraska ,...

2023-08-11
Wired 1 related

Teens replicated a 2008 hack of Boston's subway fare system and were invited to present their work, a contrast to the transit authority's response 15 years ago

In 2008, Boston's transit authority sued to stop MIT hackers from presenting at the Defcon hacker conference on how to get free subway rides. Mastodon: @jennifer@defcon.social . X: @kurtopsahl and @a_...

2021-04-26
CircleID 8 related

Dan Kaminsky, the celebrated security researcher widely known for his work on discovering crucial DNS security flaws and Sony Rootkit infections, has died at 42

Saddened by news of the death of Dan Kaminsky, a member of the ICANN Trusted … Pierluigi Paganini / Security Affairs : The cybersecurity researcher Dan Kaminsky has died Tweets: Sarah B / @sarahbrie :...

2021-03-11
Forbes

Q&A with Chris Sacca on his brief retirement, Trump and Biden, investing in climate startups, how investing has changed, NFTs, and more

In 2015, venture capitalist Chris Sacca was one of Silicon Valley's most influential investors, No. 3 on the Midas List with more than one million Twitter followers … Tweets: @sacca , @alexrkonrad , @...

2020-05-10
Wired 7 related

Both Defcon and Black Hat, originally scheduled for August, have cancelled in-person events, instead opting to host conferences online

and I, for one, am looking forward to it 😈 https://twitter.com/... Marc Rogers / @marcwrogers : DEF CON is officially cancelled. https://forum.defcon.org/... we will be putting on an online event inst...

2020-05-09
Wired 7 related

Both Defcon and Black Hat, originally scheduled for August, have cancelled in-person events, instead opting to host conferences online

For real this time.  Its sister conference, Black Hat, has also been called off.  —  For years, a simple and elegant inside joke has permeated Defcon, the influential hacking conference.

2019-08-18
VICE 1 related

Some Defcon attendees discuss why people are still getting hacked and what the cybersecurity community needs to do better

why are people still getting hacked, and what is one thing the cybersecurity industry needs to do better. Wide variety of answers https://www.vice.com/... pic.twitter.com/tCxZfEyj52

2019-08-17
VICE 1 related

Some Defcon attendees discuss why people are still getting hacked and what the cybersecurity community needs to do better

The cybersecurity industry is worth billions of dollars, and tens of thousands of people attend Black Hat and Def Con every year.  So, are we getting any safer?

2019-08-12
Wired 2 related

Defcon has a prototype secure voting machine for hacking, funded by a $10M DARPA project aimed at developing an open source voting platform on secure hardware

At this year's Defcon hacking conference, Darpa brought the beginnings of what it hopes will be impervious hardware.

2018-09-24
New York Times

Defcon attendees say corporate demands, widespread professionalization, and bug bounty programs are reshaping hackers' attitudes toward privacy and anonymity

and, most importantly, role models for the younger generations of hackers,” she said. http://twitter.com/...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...