/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
API keys, docs, usage dashboard
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Person

Shaun Nichols

Filtered to controversy pattern ×
44 articles decelerating
Articles
44
mentions
Velocity
-66.7%
growth rate
Acceleration
-0.167
velocity change
Sources
31
publications

Coverage Timeline

2024-06-15
Washington Post 27 related

Brad Smith tells a US House committee that Microsoft “accepts responsibility” for the issues the CSRB found, its business in China serves US interests, and more

if they haven't shown good cybersecurity performance Jessica Lyons / The Register : Microsoft answered Congress' questions on security. Now the White House needs to act Sean Lyngaas / CNN : Microsoft ...

2019-11-04
Wired 20 related

Researchers spot the first successful attack using Windows BlueKeep vulnerability; the exploit is not a worm and installs cryptominers, instead of ransomware

Using Firepower to defend against encrypted DejaBlue Jon Fingas / Engadget : The first in-the-wild BlueKeep cyberattack isn't as dangerous as feared Elizabeth Montalbano / Threatpost : BlueKeep Attack...

2019-09-01
Project Zero 78 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ian Beer / Project Zero : In-the-wild iOS Exploit Chain 1 Patrick Howell O'Neill / MIT Technology Review : Websites have been quietly hacking iPhones for years, says...

2019-08-31
Project Zero 81 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iPhone security flaws ...

2019-08-10
Forbes 18 related

Apple expands bug bounty to macOS, watchOS, and Apple TV, increases maximum payout to $1M, and will open the program to all researchers this fall

And a Bigger Bug Bounty The Hacker News : Apple will now pay hackers up to $1 million for reporting vulnerabilities Charlotte Henry / The Mac Observer : Apple Offers New Bug Bounty of up to $1.5 Milli...

2019-07-03
VICE 26 related

China's border guards close to Xinjiang install Android malware on tourists' devices that scans for 70K+ files and downloads texts, calendar entries, phone logs

An APK Chinese authorities load onto the Android phones … Pierluigi Paganini / Security Affairs : China installs a surveillance app on tourists' phones while crossing in the Xinjiang Harper Neidig / T...

2019-06-18
ZDNet 8 related

Europol, FBI, Bitdefender, and others release a free tool to decrypt GandCrab ransomware, thought to have infected 1.5M+ Windows PCs since January 2018

Recover Files for Free Mark Wyciślik-Wilson / BetaNews : BitDefender releases free decryption tool for GandCrab ransomware Shaun Nichols / The Register : Smash GandCrab: Free tools released to decrypt...

2019-03-10
Citrix Blogs 14 related

Citrix says it was informed by the FBI that Citrix's internal network has been breached, believes some business documents may have been accessed and downloaded

Here's What To Do Next Jon Fingas / Engadget : Iranian hackers stole terabytes of data from software giant Citrix Adam Westlake / SlashGear : Hackers stole 6TB of data from Citrix breach - FBI is inve...

2019-01-09
Motherboard 18 related

Investigation shows how easy and affordable it is to obtain cellphone customers' real-time location data, as T-Mobile, Sprint, and AT&T peddle it to middlemen

Fear and Loathing in Las Vegas, China Edition Jon Fingas / Engadget : It's way too easy for bounty hunters to get your phone location data Yoni Heisler / BGR : Bombshell report reveals how location da...

2018-11-20
The Register 3 related

Microsoft says Azure users globally were unable to log in using MFA on Monday due to the weight of login requests, is still working on fix for Office 365 logins

Shaun Nichols / The Register :

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...