/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
API keys, docs, usage dashboard
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Person

Katie Nickels

Filtered to acquisition pattern ×
6 articles stable
Articles
6
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
5
publications

Coverage Timeline

2023-03-31
BleepingComputer 32 related

Researchers say hackers have compromised the VoIP desktop client of 3CX's Phone System, used by 600K+ companies and 12M+ DAUs, in an ongoing supply chain attack

https://www.3cx.com/...  Any vendor of software and services that pull in code from NPM, PIP, RubyGems etc … Eitan Erez : This supply chain attack started unfolding not long ago as 3CX VOIP desktop cl...

2022-01-17
Microsoft Security Blog 39 related

Microsoft identifies a destructive malware operation targeting Ukrainian organizations; the malware looks like ransomware but lacks a ransom recovery mechanism

European Union simulated a cyber attack on a fictitious Finnish power company Vilius Petkauskas / cybernews.com : Belarus state hackers suspected behind Ukraine cyberattack Grugq / grugq's domain : Uk...

2021-04-30
Washington Post 9 related

A task force of 60+ experts from industry, government, nonprofits, and academia calls on the US and allies to take steps to fight a surge in ransomware attacks

the Secret Weapon to Combatting Ransomware Danny Palmer / ZDNet : Ransomware is now a national security risk. This group thinks it knows how to defeat it Duncan Riley / SiliconANGLE : Expert task for...

2021-03-31
Politico

Interviews with 15 people show CISA is underfunded, short on talent, outmatched by adversaries, and overwhelmed by the fallout from two massive cyberattacks

The agency that protects the U.S. from hackers is hobbled by funding woes, a talent shortage and growing pains that are jeopardizing … Tweets: @ericgeller , @gossithedog , @kevincollier , @howelloneil...

2019-12-22
Wired 1 related

Profile of Cliff Stoll, whose memoir The Cuckoo's Egg, which traces the first known case of state-sponsored hacking, inspired a generation of cybersecurity pros

and Stoll has become a cybersecurity icon. https://www.wired.com/... Dame Mlley / @damienmulley : I read this book when I was 18 I think. It was fascinating. If I re-read it now It would probably feel...

2019-12-21
Wired

Profile of Cliff Stoll, whose memoir The Cuckoo's Egg, which traces the first known case of state-sponsored hacking, inspired a generation of cybersecurity pros

Andy Greenberg / Wired : Tweets: @damienmulley , @wired , @instacyber , @stvemillertime , @likethecoins , and @ronindey Tweets: Dame Mlley / @damienmulley : I read this book when I was 18 I think. It...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...