/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Entity

hacking tools

60 articles rising
Articles
60
mentions
Velocity
+50.0%
growth rate
Acceleration
-0.500
velocity change
Sources
27
publications

Coverage Timeline

2025-11-30
CyberScoop 8 related

Unit 42 details how underground hacking forums advertise and sell custom, jailbroken, and open-source AI hacking tools such as WormGPT and KawaiiGPT

#AI #DualUse #DarkLLMs … Palo Alto Networks Unit 42 : The dual-use dilemma, traditionally associated with technologies such as nuclear physics, now extends to artificial intelligence. … Bluesky: @cybe...

2025-11-29
CyberScoop 8 related

Unit 42 details how underground hacking forums advertise and sell custom, jailbroken, and open-source AI hacking tools such as WormGPT and KawaiiGPT

As legitimate businesses purchase AI tools from some of the largest companies in the world, cybercriminals are accessing …

2025-10-30
CyberScoop 11 related

A former L3Harris executive pleads guilty in a US district court to selling eight zero-day exploits to a Russian broker in exchange for millions of dollars

* “at least eight sensitive and protected cyber-exploit components” illegally sold to “a Russian cyber-tools broker” (for ~$1.3m).  Obviously at a huge discount, bc super illegal  —  But separately “[...

2024-02-16
TechCrunch 1 related

Sources: spyware vendor Variston is closing after Google “burned” its name publicly in 2022; source: a disgruntled staffer sent its malicious code to Google

The company's apparent demise came after Google “burned” Variston's name publicly, exposing its hacking tools. … X: Lorenzo Franceschi-Bicchierai / @lorenzofb : When Google publicly exposed Variston's...

2024-02-06
Politico 5 related

The UK, the US, France, Poland, and other nations, plus Google, Microsoft, Meta, and others, sign a statement recognizing the need for more action on spyware

Governments have struggled to stop the spread of commercial hacking tools.  —  The United Kingdom, France and allied countries …

2023-07-18
Wall Street Journal 6 related

The Biden admin adds European spyware firms Intellexa and Cytrox to an export prohibition list blocking them from US tech, as concerns grow over hacking tools

Dustin Volz / Wall Street Journal :

2023-04-17
CTech 4 related

Sources: Tel Aviv-based QuaDream is shutting down, after Microsoft and Citizen Lab said its mercenary spyware is being used to hack journalists and others

It was reported last week that the Israeli firm's hacking tools have been used against journalists, opposition figures and advocacy organizations across at least 10 countries

2023-04-03
New York Times 2 related

Sources: in November 2021, five days after Joe Biden put NSO on a Commerce Department blocklist, a US government front company licensed NSO's geolocation tool

The Biden administration has been trying to choke off use of hacking tools made by the Israeli firm NSO.

2023-03-28
Wall Street Journal 14 related

Biden signs an EO limiting US agencies' use of hacking tools from companies that are linked to human rights abuses or are deemed to pose national security risks

Dustin Volz / Wall Street Journal :

2023-01-07
Forbes 6 related

Researchers: cybercriminals have started using ChatGPT to create hacking tools and AI-generated malware code, and are testing the tool for dating scam chatbots

some with little or no coding experience—were using it to write software and emails that could be used for espionage, ransomware, malicious spam, and other malicious tasks.” https://research.checkpoin...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...