/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Person

Krebs

15 articles stable
Articles
15
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
7
publications

Coverage Timeline

2025-10-12
Krebs on Security 3 related

New evidence shows the Aisuru botnet, which outpaces all other IoT-based botnets, is drawing most of its firepower from hacked IoT devices hosted on US ISPs

The world's largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) … Mastodon: @briankrebs@infosec.exchange and @vxdb@infosec.exchange ...

2025-04-29
Electronic Frontier Foundation 14 related

Open letter: the EFF and top security experts urge the Trump administration to end its “political retribution” investigation into ex-CISA Director Chris Krebs

“An independent infosec community is fundamental to protecting our democracy, and to the profession itself.”  —  www.cybersecuritydive.com/news/chris- k... Zack Whittaker / @zackwhittaker.com : Electr...

2025-01-11
Krebs on Security 3 related

A scammer details how voice phishing groups are abusing Apple's support line to generate “account confirmation” message prompts from Apple to their customers

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution … Bluesky: @crowslabyrinth.com , @lilithsaintcrow.com , @metacurity.com , @kryton3298 , @its...

2024-09-17
Krebs on Security 4 related

A look at the activity of some members of The Com, an online community linked to the Scattered Spider hacking group, and their involvement in extortion groups

which corresponds to the screen name “@Holy” — and found the same account was used across a number of cybercrime channels that are entirely focused on extorting young people into harming themselves or...

2023-05-17
Washington Post 14 related

The US announces charges, sanctions, and a $10M reward for info leading to the arrest of Russian national Mikhail Matveev, a Babuk ransomware campaign suspect

SPECIALLY DESIGNATED NATIONALS LIST UPDATE Sarai Rodriguez / HealthITSecurity : US Formally Charges Russian Hacker Behind Global Ransomware Attacks CircleID : U.S. Targets Russian Mastermind Behind Do...

2022-09-01
Krebs on Security

Brian Krebs apologizes to IoT manufacturer Ubiquiti after posting now-removed articles on a “breach” based on a “sole source” currently under federal indictment

Last year, I posted a series of articles about a purported “breach” at Ubiquiti. Tweets: @quinnypig , @alyssam_infosec , @berendjanwever , @davezatz , @blowdart , @jrozner , and @g_solaria See also Me...

2022-03-29
Krebs on Security

Hackers are increasingly using hacked law enforcement emails to send Emergency Data Requests to ISPs, telecoms, social networks, and others, who quickly comply

There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data … Tweets: @briankrebs , @rayredacted , @michaelguimarin , @elizabeth_joh , @v...

2022-02-14
SentinelOne 3 related

Research: ModifiedElephant APT has targeted activists, journalists, lawyers, and others in India to spy on or plant digital evidence since at least 2012

files that incriminate the target in specific crimes—prior to conveniently coordinated arrests.” 2/n https://www.sentinelone.com/ ... Nilanjana Roy / @nilanjanaroy : That stage of authoritarianism: “I...

2021-11-15
Krebs on Security 22 related

The person claiming responsibility for the FBI email server hack says they were able to send spam messages by abusing insecure code in the FBI's LEEP portal

even with how silly it was written AND not following protocol — was NOT the weird juju I wanted going into this weekend. https://krebsonsecurity.com/ ... https://twitter.com/... @embryoresist : 1) Bre...

2021-03-31
Politico

Interviews with 15 people show CISA is underfunded, short on talent, outmatched by adversaries, and overwhelmed by the fallout from two massive cyberattacks

The agency that protects the U.S. from hackers is hobbled by funding woes, a talent shortage and growing pains that are jeopardizing … Tweets: @ericgeller , @gossithedog , @kevincollier , @howelloneil...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...