/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Pulse API
API keys, docs, usage dashboard
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Entity

security community

12 articles stable
Articles
12
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
10
publications

Coverage Timeline

2024-10-08
TechCrunch 4 related

Experts have long warned “secure backdoor” systems are impossible; Salt Typhoon's reported hack of US ISPs' wiretap systems exemplifies the risks of backdoors

Security professionals and technologists have for years been sounding the alarm about the security risks of backdoors … Riana / @riana@mastodon.lawprofs.org : “Blaze told TechCrunch that the Chinese i...

2021-04-26
CircleID 8 related

Dan Kaminsky, the celebrated security researcher widely known for his work on discovering crucial DNS security flaws and Sony Rootkit infections, has died at 42

Saddened by news of the death of Dan Kaminsky, a member of the ICANN Trusted … Pierluigi Paganini / Security Affairs : The cybersecurity researcher Dan Kaminsky has died Tweets: Sarah B / @sarahbrie :...

2020-12-15
Wall Street Journal 28 related

Source: Treasury's hackers used a flaw in a SolarWinds product; SolarWinds, which touts 300K+ customers, says the flaw was the result of a “supply chain attack”

and it has the Kremlin's fingerprints all over it. https://www.bloomberg.com/... Thomas Brewster / @iblametom : New - A review of contract records shows DOD, FBI, DHS, Veterans Affairs and many other ...

2020-05-15
CyberScoop 4 related

Microsoft opens up its threat intelligence data, including file hash indicators used in email scams, to wider security community via GitHub during the pandemic

Microsoft is making the threat intelligence it's collected on coronavirus-related hacking campaigns public, the company announced Thursday.

2019-09-08
Apple 50 related

Apple accuses Google's Project Zero of stoking fear by creating a “false impression of mass exploitation”, says the sophisticated attack was narrowly focused

And They're Wrong PYMNTS.com : Apple, Google At Odds On iPhone Security Flaws Tied To Attacks Michael Tsai : Apple Responds to Project Zero Abner Li / 9to5Google : Google stands by iOS vulnerability r...

2019-09-07
Apple 50 related

Apple accuses Google's Project Zero of stoking fear by creating a “false impression of mass exploitation”, says the sophisticated attack was narrowly focused

And They're Wrong Michael Tsai : Apple Responds to Project Zero Firstpost Tech : Apple hits back at Google, accusing it of creating a ‘false impression’ of ‘mass exploitation’ around iPhone exploits A...

2019-09-01
Project Zero 78 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ian Beer / Project Zero : In-the-wild iOS Exploit Chain 1 Patrick Howell O'Neill / MIT Technology Review : Websites have been quietly hacking iPhones for years, says...

2019-08-31
Project Zero 81 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iPhone security flaws ...

2019-07-10
Medium 20 related

Researcher discloses zero-day exploit in Zoom's Mac client that lets any malicious site force a user into a Zoom call with video enabled without user permission

“'A little less creepy' is still creepy.” Dan Goodin / Ars Technica : Zoom for Mac makes it too easy for hackers to access webcams. Here's what to do Nicole Nguyen / BuzzFeed News : The Zoom Desktop A...

2018-05-02
Motherboard 7 related

Facebook confirms it has fired one of its security engineers who allegedly used privileged access to stalk women online

After a member of the information security community provided evidence to Facebook's chief information security officer, the company has terminated a security engineer …

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...