/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Company

MITM

Filtered to competitor pattern ×
14 articles accelerating

MITM has appeared in 14 articles since 2015-11. Coverage peaked in 2024Q3 with 2 articles. Frequently mentioned alongside Dan Goodin.

Articles
14
mentions
Velocity
+100.0%
growth rate
Acceleration
+1.000
velocity change
Sources
6
publications

Coverage Timeline

2024-08-16
Washington Post 33 related

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

'Dangerous' New Spyware Warning Issued Vinayak Guha / Android Authority : Flaw in Verizon Pixel's firmware poses serious security threat (Update: Google statement) Threads: Lauren Goode / @laurengoode...

2024-07-11
Ars Technica 26 related

Researchers detail the Blast-RADIUS MD5-based vulnerability affecting RADIUS, a widely used network access authentication protocol first developed in 1991

AWAITING ANALYSIS  —  This vulnerability is currently awaiting analysis. Microsoft Support : KB5040268: How to manage the Access-Request packets attack vulnerability associated with CVE-2024-3596 Conn...

2023-12-20
Ars Technica 15 related

Researchers detail a MITM attack on SSH that can break the integrity of the protocol, the first “practical attack of its kind”; fixes face compatibility issues

SSH is an internet standard that provides secure access to network services … Connor Jones / The Register : SSH shaken, not stirred by Terrapin vulnerability Terrapin Attack : Terrapin Attack: Breakin...

2023-05-12
Engadget 32 related

Twitter rolls out encrypted DMs, but both sender and recipient must be Blue subscribers, group messages are not supported, and message metadata is not encrypted

Starting with Verified Users Jay Peters / The Verge : Twitter launches encrypted DMs behind a paywall Geoff Desreumaux / WeRSM : Twitter Launches Encrypted DMs, But Only For Paid Subscribers Tweets: E...

2020-02-01
ZDNet 20 related

Microsoft launches Xbox bug bounty program, will pay rewards up to $20K for vulnerabilities found in the Xbox Live network and services

The Xbox Bounty Program invites gamers … Ethan Gach / Kotaku : Microsoft's Bug Bounty Program Will Pay Players To Find Security Flaws In Xbox Live Anthony Spadafora / TechRadar.com : Microsoft to pay ...

2018-11-29
Ars Technica 13 related

Sennheiser's HeadSetup software makes PCs and Macs vulnerable to MITM attacks due to flawed self-signed TLS certificate, which users should now manually remove

Poorly secured certificate lets hackers impersonate any website on the Internet.  —  Audio device maker Sennheiser has issued …

2016-12-03
Ars Technica 18 related

AirDroid, a remote management app with 10M+ Play Store downloads, uses a static and easily detectable encryption key leaving users vulnerable to MITM attacks

Dan Goodin / Ars Technica :

2016-12-02
Ars Technica 9 related

AirDroid, a remote management app with 10M+ Play Store downloads, uses a static and easily detectable encryption key leaving users vulnerable to MITM attacks

For six months, the remote management app has opened users to code-execution attacks.  —  For at least the past six months …

2016-08-04
Ars Technica 1 related

Researchers demo new attack technique, HEIST, that lets hackers steal sensitive data like SSNs and e-mail addresses from HTTPS pages without a MITM position

Approach exploits how HTTPS responses are delivered over transmission control protocol.  —  The HTTPS cryptographic scheme protecting millions …

2016-06-04
Threatpost 14 related

Lenovo tells users to uninstall its Accelerator app, says it's vulnerable to MITM attacks after Duo Labs report on insecure bloatware in top PC vendor laptops

Michael Mimoso / Threatpost :

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Relationships

Loading graph...