/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Company

Symantec

54 articles stable
Articles
54
mentions
Velocity
0.0%
growth rate
Acceleration
-1.000
velocity change
Sources
22
publications

Coverage Timeline

2023-05-17
The Record 8 related

Symantec says the advanced persistent threat Lancefly used custom malware to attack Asian governments, telcos, and other organizations from mid-2022 to Q1 2023

A government-backed hacking group known as “Lancefly” has been seen using custom-made malware to attack governments, telecoms and other organizations across Asia.

2023-04-22
Wired 10 related

Mandiant says the North Korea-linked hack of VoIP company 3CX's customers is the first confirmed incident of one software-supply-chain attack enabling another

perhaps the first confirmed case of one software supply chain attack causing another. https://www.wired.com/... Kim Zetter / @kimzetter : I've updated story about 3XC/X_Trader with new info: per @syma...

2022-03-01
BleepingComputer 15 related

Symantec details China-linked backdoor Daxin, a Windows kernel driver that can hijack TCP connections to stealthily connect with command-and-control servers

Security researchers have discovered Daxin, a China-linked stealthy backdoor specifically designed for deployment in hardened corporate networks …

2022-02-25
ZDNet 41 related

DDoS attacks disrupt several Ukrainian government sites; ESET researchers discover new data wiper malware installed on hundreds of Ukrainian machines

here's what you need to know NetBlocks : Internet disruptions registered as Russia moves in on Ukraine Andy Greenberg / Wired : Russia's Sandworm Hackers Have Built a Botnet of Firewalls Yadullah Abid...

2021-03-17
The Verge

Profile of Katie Moussouris, a pioneer of the bug bounty model, who sees her failed lawsuit against Microsoft as a test case for pay equity claims in tech

Russell Brandom / The Verge : Tweets: @jwgoerlich , @verge , @_noid_ , and @webjedi Tweets: J Wolfgang Goerlich / @jwgoerlich : “We are trying to achieve pay equity across all genders and races in th...

2020-11-19
ZDNet 5 related

Symantec says a hacking group believed to be sponsored by the Chinese gov't has exploited the Zerologon vulnerability in companies worldwide since Oct. 2019

A massive campaign is underway around the globe, with automotive, pharmaceutical and engineering entities top targets.

2020-10-13
ZDNet 26 related

Microsoft, Symantec, ESET, and other tech companies orchestrated an attempt to take down the TrickBot malware botnet, which had infected 1M+ computers

FS-ISAC, ESET, Lumen's Black Lotus Labs, NTT, Symantec, and the Microsoft Defender team participated in the takedown.

2020-10-12
ZDNet 16 related

A coalition of tech companies, including Microsoft and Symantec, orchestrated a takedown of the TrickBot malware botnet, which had infected 1M+ computers

FS-ISAC, ESET, Lumen's Black Lotus Labs, NTT, Symantec, and the Microsoft Defender team participated in the takedown.

2019-11-06
SiliconANGLE 4 related

Broadcom completes acquisition of Symantec's enterprise business for $10.7B and Symantec rebrands as NortonLifeLock after transferring Symantec name to Broadcom

Duncan Riley / SiliconANGLE :

2019-09-09
Forbes

Check Point: Chinese hacker group APT3 reverse engineered EternalRomance NSA exploit by setting up machines as traps to retrieve info after they were attacked

I write about security and surveillance.  —  When it was alleged earlier this year that secretive Chinese hacking group APT3 … Tweets: @_cpresearch_ , @docligot , @hatr , and @virusbtn Tweets: @_cpres...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...