/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Person

Jamie Tarabay

8 articles decelerating
Articles
8
mentions
Velocity
-50.0%
growth rate
Acceleration
-0.500
velocity change
Sources
2
publications

Coverage Timeline

2025-05-01
Bloomberg 1 related

Experts say China's hacking breakthroughs have become more secretive since laws began requiring researchers to report vulnerabilities to the government first

Jamie Tarabay / Bloomberg :

2025-01-07
Bloomberg

Sources: Chinese state-sponsored hackers targeted the Philippine president's office and stole sensitive data as part of a yearslong, broad espionage campaign

Jamie Tarabay / Bloomberg :

2025-01-03
Bloomberg 5 related

Sources: Chinese state-sponsored hackers accessed senior US Treasury officials' computers but did not breach the department's email system and classified data

www.washingtonpost.com/national- sec... X: Jamie Tarabay / @jamietarabay : Chinese state-sponsored hackers broke into the computers of senior US Treasury Department leaders as part of a recent breach ...

2024-10-31
Bloomberg

Amazon's threat intel unit is making a name for itself after years in the shadows, including disrupting Anonymous Sudan and combating anti-US disinformation

Jamie Tarabay / Bloomberg : X: @oxleyio X: David Oxley / @oxleyio : Proud of the ongoing work being done by @Amazon Cyber Threat Intelligence to protect Amazon and its customers, behind the scenes or...

2024-10-13
Bloomberg 11 related

Investigation: Uber and Lyft lockouts for 800+ NYC drivers occurred almost every hour of every day, saving the companies hundreds of millions of dollars in pay

Even If You're Not One Johan / The Rideshare Guy : Weekly Roundup: Rideshare Drivers Use Teslas as Makeshift Robotaxis Katie Johnston / The Boston Globe : 'To me, this isn't a full and real union': La...

2024-07-26
Bloomberg

How TikTok is trying to fend off a potential US ban via ad campaigns, funding creators' lawsuits, and spending $6M on lobbying in H1 2024, vs. $3.5M in H1 2023

- Lobbying, lawsuits and ad campaign are deployed to fight law  — Popular app seeks to avoid US ban over its Chinese ownership X: @jamietarabay X: Jamie Tarabay / @jamietarabay : Backed by its Chinese...

2024-03-09
The Verge 46 related

Microsoft says Russian state-sponsored hackers Midnight Blizzard accessed some of its “source code repositories and internal systems” following the January hack

and the Attack Isn't Over Pranav Dixit / Business Today : Microsoft discloses source code theft by Russian hackers Michael Kan / PCMag : Microsoft: Russian Hackers Accessed Company Source Code Jak Con...

2021-08-31
Bloomberg

Experts have traced most of the cyberattacks that have reverberated across the Australian economy in recent months to China-linked hacking groups

Jamie Tarabay / Bloomberg : Tweets: @business , @msnabilaahmed , @rpotter_9 , and @business Tweets: @business : Wave after wave of cyberattacks in Australia show the range of tactics experts say Chin...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...