/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@cooperq.com

@cooperq.com
2 posts
2026-03-08
The cyber-mercenary industry is now bigger than state sponsored hacking.  —  “For the first time since we began tracking zero-day exploitation, we attributed more zero-days to [commercial surveillance vendors] than to traditional state-sponsored cyber espionage groups.”  —  cloud.google.com/blog/topics/ ...
2026-03-08 View on X
The Register

Google's TIG documented 90 zero-day vulnerabilities exploited in 2025, up from 78 in 2024; commercial spyware vendors and China-linked groups led the abuse

2026-03-07
The cyber-mercenary industry is now bigger than state sponsored hacking.  —  “For the first time since we began tracking zero-day exploitation, we attributed more zero-days to [commercial surveillance vendors] than to traditional state-sponsored cyber espionage groups.”  —  cloud.google.com/blog/topics/ ...
2026-03-07 View on X
The Register

Google's TIG documented 90 zero-day vulnerabilities exploited in 2025, up from 78 in 2024; commercial spyware vendors and China-linked groups led the abuse

Of the 90 zero-days GTIG tracked in 2025, 43 hit enterprise tech  —  Zero-day exploitation targeting enterprise tech products reached …