/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Eric Geller

@ericgeller
476 posts
2026-04-17
Amid an increasing volume of newly reported vulnerabilities, NIST says it will only add detailed info to CVEs in its NVD that meet certain criteria (inclusion in CISA's KEV catalog, use in fed sw, or use in critical sw). It will review requests for others. https://www.nist.gov/... [image]
2026-04-17 View on X
CyberScoop

NIST narrows its National Vulnerability Database priorities to CVEs in CISA's known exploited catalog, to deal with a backlog after its 2024 funding lapse

2026-04-16
Amid an increasing volume of newly reported vulnerabilities, NIST says it will only add detailed info to CVEs in its NVD that meet certain criteria (inclusion in CISA's KEV catalog, use in fed sw, or use in critical sw). It will review requests for others. https://www.nist.gov/... [image]
2026-04-16 View on X
CyberScoop

NIST narrows its National Vulnerability Database priorities to CVEs in CISA's known exploited catalog, to deal with a backlog after its 2024 funding lapse

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation.

2026-04-08
Iranian govt hackers are once again hacking into critical infrastructure thru vulnerable internet-facing industrial equipment like PLCs, CISA warned today. https://www.cisa.gov/... “This activity has led to PLC disruptions across several U.S. critical infrastructure sectors...” [image]
2026-04-08 View on X
Wired

The FBI, the NSA, and other US agencies warn that Iran-linked hackers targeted industrial control devices used in critical US water and energy infrastructure

As Trump threatens Iranian infrastructure, the US government warns that Iran has carried out its own digital attacks against US critical infrastructure.

2026-04-07
Iranian govt hackers are once again hacking into critical infrastructure thru vulnerable internet-facing industrial equipment like PLCs, CISA warned today. https://www.cisa.gov/... “This activity has led to PLC disruptions across several U.S. critical infrastructure sectors...” [image]
2026-04-07 View on X
Wired

A group of US agencies including the FBI and the NSA warns that Iran-linked hackers have targeted industrial control devices used in US critical infrastructure

As Trump threatens Iranian infrastructure, the US government warns that Iran has carried out its own digital attacks against US critical infrastructure.

2026-03-24
Here's the National Security Determination from an interagency group that the FCC used as the basis for its decision: https://www.fcc.gov/...
2026-03-24 View on X
Reuters

The US FCC is banning imports of new foreign-made consumer routers over security concerns; China is estimated to control 60%+ of the US market for home routers

The U.S. Federal Communications Commission said on Monday it was banning the import of all new foreign-made consumer routers …

The FCC today updated its list of products that can't be sold in the U.S. to include *all* consumer routers made in foreign countries. It's a big but potentially disruptive move to limit supply-chain security risks to U.S. networks. https://docs.fcc.gov/... [image]
2026-03-24 View on X
Reuters

The US FCC is banning imports of new foreign-made consumer routers over security concerns; China is estimated to control 60%+ of the US market for home routers

The U.S. Federal Communications Commission said on Monday it was banning the import of all new foreign-made consumer routers …

2026-03-08
.@BennieGThompson statement on the strategy: “What little ‘substance’ does exist...is...vague platitudes, a long catalogue of ‘we will’ statements that may or may not match the Administration's current behavior, and, mercifully, an apparent extension of some Biden-era policies.” [image]
2026-03-08 View on X
CyberScoop

The Trump administration debuts its cyber strategy, outlining priorities including promoting offense operations, securing AI tech, and streamlining regulations

As expected, strategy is very short, very high-level, and very bombastic, w/ multiple refs to Trump's military operations but almost no promised actions. Six focus areas are deterrence, deregulation, modernizing govt networks, securing infrastructure, tech dominance, & workforce. [image]
2026-03-08 View on X
CyberScoop

The Trump administration debuts its cyber strategy, outlining priorities including promoting offense operations, securing AI tech, and streamlining regulations

2026-03-07
As expected, strategy is very short, very high-level, and very bombastic, w/ multiple refs to Trump's military operations but almost no promised actions. Six focus areas are deterrence, deregulation, modernizing govt networks, securing infrastructure, tech dominance, & workforce. [image]
2026-03-07 View on X
CyberScoop

The Trump administration debuts its cyber strategy, outlining priorities including promoting offense operations, securing AI tech, and streamlining regulations

The administration also released an executive order on cybercrime and fraud.  —  Learn more.

.@BennieGThompson statement on the strategy: “What little ‘substance’ does exist...is...vague platitudes, a long catalogue of ‘we will’ statements that may or may not match the Administration's current behavior, and, mercifully, an apparent extension of some Biden-era policies.” [image]
2026-03-07 View on X
CyberScoop

The Trump administration debuts its cyber strategy, outlining priorities including promoting offense operations, securing AI tech, and streamlining regulations

The administration also released an executive order on cybercrime and fraud.  —  Learn more.

2026-02-27
CISA's acting director, Madhu Gottumukkala, had clashed with Costello, and as @johnnysaks130 first reported https://www.politico.com/... Gottumukkala tried to push Costello out in January. Gottumukkala finally won by getting DHS to MDR Costello.
2026-02-27 View on X
ABC News

CISA's interim director Madhu Gottumukkala is reassigned as DHS' director of strategic implementation; executive assistant director Nick Andersen will take over

The nominee to serve as CISA director has not yet received a hearing.  —  The Department of Homeland Security (DHS) …

2026-02-26
New: @CISAgov orders agencies to quickly patch serious Cisco SD-WAN device vulnerabilities, including two that the agency says are being exploited in ways that imminently threaten government networks: https://www.cybersecuritydive.com/ ... [image]
2026-02-26 View on X
BleepingComputer

Cisco warns of a critical SD-WAN bug that was actively exploited in zero-day attacks since 2023; CISA and its international partners issue emergency directives

Cisco is warning that a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, tracked as CVE-2026-20127 …

2026-01-14
Trump has renominated Sean Plankey to be @CISAgov director. Plankey's initial nomination expired at the end of 2025 amid multiple holds. Plankey was an NSC and DOE cyber official during Trump's first term. https://www.whitehouse.gov/...
2026-01-14 View on X
Politico

President Trump renominates Sean Plankey to be the next director of CISA, which hasn't had a full-time chief since Trump's return to office on January 20, 2025

Sen. Rick Scott (R-Fla.) scotched Plankey's confirmation in 2025, reportedly due to a Coast Guard ship-building contract.

2025-12-22
I was chasing this story but @johnnysaks130 beat me to it: @CISAgov has retaliated against career employees after the agency's acting director failed a polygraph test. Another embarrassing crisis at the struggling agency. https://www.politico.com/... [image]
2025-12-22 View on X
Politico

Sources: DHS is investigating whether six staffers misled CISA's acting director into taking a polygraph that he failed, compounding instability at the agency

“At least six career staffers at the Cybersecurity and Infrastructure Security Agency were suspended with pay this summer after organizing a polygraph test that the agency's acting...

2025-09-26
Breaking: @CISAgov orders agencies to analyze and patch Cisco networking equipment following the discovery of critical vulnerabilities being exploited by “an advanced threat actor.” https://www.cisa.gov/... Cisco alert: https://sec.cloudapps.cisco.com/ ... [image]
2025-09-26 View on X
BleepingComputer

CISA issues an emergency directive ordering US federal agencies to secure their Cisco firewall devices against two flaws exploited in zero-day attacks

CISA has issued a new emergency directive ordering U.S. federal agencies to secure their Cisco firewall devices against two flaws that have been exploited in zero-day attacks.

2025-08-28
Anthropic says a hacker used its Claude chatbot “to an unprecedented degree”: Claude identified vulnerable companies, wrote infostealer malware, analyzed stolen files for extortion purposes, calculated extortion amounts, and wrote extortion messages. https://www.nbcnews.com/... [image]
2025-08-28 View on X
The Verge

Anthropic's Threat Intelligence report for August says Claude was weaponized for sophisticated cybercrimes, including a “vibe-hacking” data extortion scheme

and It Could Happen Again Vyom Ramani / Digit : Vibe-hacking based AI attack turned Claude against its safeguard: Here's how Charlesarthur / The Overspill : Start Up No.2503: Anthr...

Anthropic says a hacker used its Claude chatbot “to an unprecedented degree”: Claude identified vulnerable companies, wrote infostealer malware, analyzed stolen files for extortion purposes, calculated extortion amounts, and wrote extortion messages. https://www.nbcnews.com/... [image]
2025-08-28 View on X
TechCrunch

OpenAI and Anthropic publish findings from joint safety tests of each other's models, aimed at surfacing blind spots in their internal evaluations

OpenAI and Anthropic, two of the world's leading AI labs, briefly opened up their closely guarded AI models to allow for joint safety testing …

2025-08-27
More evidence that open-source software dependencies are a serious problem: An employee of Russia's Yandex search engine is singlehandedly responsible for maintaining a package that's included in a U.S. military database of vetted software components. https://www.nextgov.com/... [image]
2025-08-27 View on X
Nextgov/FCW

Sources and docs: a Russia-based Yandex employee maintains open-source tool fast-glob, embedded in 30 US DOD software packages and downloaded 70M times per week

The package is listed inside Platform One's Iron Bank, a vetted Defense Department software repository, people familiar say.

Anthropic says a hacker used its Claude chatbot “to an unprecedented degree”: Claude identified vulnerable companies, wrote infostealer malware, analyzed stolen files for extortion purposes, calculated extortion amounts, and wrote extortion messages. https://www.nbcnews.com/... [image]
2025-08-27 View on X
The Verge

Anthropic's Threat Intelligence report for August says Claude was weaponized for sophisticated cybercrimes, including a “vibe-hacking” data extortion scheme

Anthropic's new report shows how bad actors are misusing Claude —and, likely, other AI agents. … “Agentic AI systems are being weaponized.”

2025-08-14
“'It is acceptable to engage a child in conversations that are romantic or sensual,' according to Meta's ‘GenAI: Content Risk Standards.’” https://www.reuters.com/... [image]
2025-08-14 View on X
Reuters

An internal policy doc shows Meta permitted its chatbots to engage in provocative behavior; Meta removed some examples, including romantic roleplay with kids

An internal Meta policy document, seen by Reuters, reveals the social-media giant's rules for chatbots, which have permitted provocative behavior …