/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Pulse API
API keys, docs, usage dashboard
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Entity

sensitive files

8 articles stable
Articles
8
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
8
publications

Coverage Timeline

2025-12-19
Financial Times 9 related

Sources: UK officials believe China was behind the October cyber attack on the UK's Foreign Office, which aimed to access tens of thousands of sensitive files

The UK's Foreign Office was the victim of a major cyber attack in October, which officials believe was carried out by Chinese hackers.

2024-10-24
BleepingComputer 27 related

Fortinet discloses a critical FortiManager API flaw being exploited in 0-day attacks to steal sensitive files, after warning customers privately over a week ago

Fortinet publicly disclosed today a critical FortiManager API vulnerability, tracked as CVE-2024-47575, that was exploited …

2022-09-21
VICE

Documents: multiple US military branches have bought access to Team Cymru's Augury internet monitoring tool, which claims to cover 90%+ of internet traffic

The “Augury” platform includes highly sensitive network data that Team Cymru, a private company, is selling to the military.  “It's everything. Tweets: @keegan_hamilton , @shotgunner101 , @motherboard...

2022-01-14
PCMag 5 related

Amazon patches two AWS flaws discovered by Orca Security that could have exposed information managed by Glue users and leaked sensitive files via CloudFormation

Nathaniel Mott / PCMag :

2020-08-05
The Verge 11 related

Files by Google adds a PIN-encrypted folder to protect sensitive files on Android

It's aimed at users who share devices, Google says  —  The Files by Google app, which primarily gives Android users an easy way to manage files and free up space on their phone, is getting a new PIN-p...

2020-06-22
Krebs on Security 6 related

Activist group DDoSecrets publishes nearly 270 GB of potentially sensitive data from hundreds of US police departments

Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week.  The collection, dubbed “BlueLeaks” …

2019-10-30
New Yorker

A profile of the defunct cybersecurity company Tiversa, whose CEO is facing federal charges for falsifying evidence about data breaches to extort clients

Tiversa dominated an emerging online market—before it was accused of fraud, extortion, and manipulating the federal government.  —  I. THE FOOTBALL Tweets: @htemmal , @raffiwriter , @newyorker , and @...

2018-08-16
The Age 9 related

Unnamed Melbourne-based 16-year-old pleads guilty to repeatedly breaching Apple's systems and downloading 90GB of sensitive files

A Melbourne private schoolboy who repeatedly broke into Apple's secure computer systems is facing criminal charges after the technology giant called in the FBI.

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...