/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@metacurity

@metacurity
20 posts
2023-04-25
their insight. https://www.csoonline.com/... (2/2)
2023-04-25 View on X
CyberScoop

A group of operational technology cybersecurity vendors launches ETHOS, an open-source portal for sharing early warnings about critical infrastructure threats

Christian Vasquez / CyberScoop :

2023-03-12
“As the weekend progresses, it is clear that more than a bailout, the SVB needs a white knight, someone who can come in and take over the bank. If that happens, we can see something akin to normalcy return. ” https://om.co/...
2023-03-12 View on X
Bloomberg

SVB draws support from 300+ VC firms, including General Catalyst, while 1,200+ founders and CEOs sign a Y Combinator petition asking the US Congress to act

More than 100 venture capital and investing firms have signed a statement supporting Silicon Valley Bank, part of mounting industry calls …

2023-01-06
😂 https://www.washingtonpost.com/ ...
2023-01-06 View on X
Washington Post

Twitter verified a Washington Post columnist's fake US Senator Ed Markey account, after Elon Musk said “all verified accounts will be manually authenticated”

Elon Musk said Twitter would begin authenticating users who pay $8 for Blue.  Our tech columnist was still able to get a checkmark for an impostor Sen. Ed Markey.

2022-07-28
I wondered what @Ax_Sharma had been working on. This piece on protestware is great and, I think, unique. Protestware on the rise: Why developers are sabotaging their own code https://techcrunch.com/... via @techcrunch
2022-07-28 View on X
TechCrunch

A look at the recent rise of protestware, where developers deliberately sabotage their own software libraries as a means of protest for a cause they believe in

Ax Sharma / TechCrunch : Tweets: @haje Tweets: @haje : I loved this piece from @Ax_Sharma (making his @TechCrunch contributor debut) today, delving into how and why #OpenSource de...

2022-06-16
Great scoop from @pearswick and @bing_chris on how the U.S. is funding three VPN companies, nthLink, Psiphon, and Lantern, to help Russians get around censorship. EXCLUSIVE U.S. targets Russia with tech to evade censorship of Ukraine news https://www.reuters.com/...
2022-06-16 View on X
Reuters

Sources: the US increased its funding into VPN companies nthLink, Psiphon, and Lantern by about 50% since February to support the surge in their Russian users

2022-01-29
Must-read bombshell. FBI paid NSO Group $5m for its Pegasus spyware, tested it, but purportedly decided not to use it. CIA put Pegasus in the hands of at least one country, Djibouti, with a record of human rights abuses. Then the U.S. sanctioned NSO. https://www.nytimes.com/...
2022-01-29 View on X
New York Times

An investigation into the rise of NSO's Pegasus shows its widespread use by the CIA, UAE, Mexico, Saudi Arabia, and others; the FBI bought but didn't use it

Firstly, welcome to my new blog!  (Or is it a “newsletter”?) Tweets: Eva / @evacide : Here I am, having taken to my fainting couch, wearing my finest clutching pearls, because NSO ...

2022-01-28
Must-read bombshell. FBI paid NSO Group $5m for its Pegasus spyware, tested it, but purportedly decided not to use it. CIA put Pegasus in the hands of at least one country, Djibouti, with a record of human rights abuses. Then the U.S. sanctioned NSO. https://www.nytimes.com/...
2022-01-28 View on X
New York Times

An investigation into the rise of NSO's Pegasus shows its widespread use by the CIA, UAE, Mexico, Saudi Arabia, and others; the FBI bought but didn't use it

A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO's Pegasus spyware — a tool America itself purchased but is now trying to ban.

2021-12-05
Ilya Sachkov, who's been charged with treason in Russia, is alleged to have given the U.S. information about the “Fancy Bear” operation that sought to influence the U.S. election https://www.bloomberg.com/... via @BW
2021-12-05 View on X
Bloomberg

Profile of Group-IB CEO Ilya Sachkov, who is charged with treason in Russia, sources say for allegedly giving the US info about Fancy Bear's 2016 operation

Ilya Sachkov, who's been charged with treason in Russia, is alleged to have given the U.S. information about the “Fancy Bear” … Tweets: @bw , @hewiak , @amandakhurley , @z3r0trust ...

2021-09-29
Apple didn't respond to the security researcher who discovered this obviously concerning vulnerability for three months until Brian Krebs contacted them about it last week. https://twitter.com/...
2021-09-29 View on X
Krebs on Security

Researcher discloses AirTag Lost Mode vulnerability that enables a phishing attack, and says Apple spent three months investigating and refused basic questions

The new $30 Airtag tracking device from Apple has a feature that allows anyone who finds one of these tiny location beacons …

2021-01-06
Google's iOS apps haven't been updated in weeks. Could Apple's privacy labels be the reason? https://www.fastcompany.com/ ...
2021-01-06 View on X
TechCrunch

Google plans to add privacy labels across its iOS app catalog this week or next, after a report claimed none of Google's iOS apps have been updated since Dec. 7

Contrary to reports, Google is not delaying updates to its iOS apps because it doesn't want to comply with Apple's recently announced App Store Privacy Labels policy.

2020-04-03
Zoom Windows Client Vulnerability Allows Attackers to Steal Windows Credentials of Users Who Click on Links @LawrenceAbrams https://www.bleepingcomputer.com/ ... https://metacurity.com/...
2020-04-03 View on X
The Intercept

Researchers: Zoom sometimes uses encryption keys issued by servers in China, uses a flawed encryption method, and hence is not suited to communicate secrets

Meetings on Zoom, the increasingly popular video conferencing service, are encrypted using an algorithm with serious …

Zoom Windows Client Vulnerability Allows Attackers to Steal Windows Credentials of Users Who Click on Links @LawrenceAbrams https://www.bleepingcomputer.com/ ... https://metacurity.com/...
2020-04-03 View on X
Zoom Blog

Zoom apologizes for security failures, says it has 200M+ DAUs vs. 10M in Dec., and plans to freeze development of new features to focus on security and privacy

And An FBI Warning Brian Krebs / Krebs on Security : ‘War Dialing’ Tool Exposes Zoom's Password Problems Kari Paul / The Guardian : ‘Zoom is malware’: why experts worry about the v...

2020-02-26
Serious Bug in PayPal's Contactless Payment System Likely Behind String of Recent Fraudulent Charges in Germany, Flaw Was Reported to PayPal a Year Ago But Remains Unfixed @UKZak https://www.forbes.com/... https://metacurity.com/...
2020-02-26 View on X
ZDNet

PayPal is investigating unauthorized transactions affecting numerous German users; a researcher says hackers could be exploiting PayPal's Google Pay integration

All signs point to an attack exploiting PayPal's Google Pay integration. … Hackers have found a bug in PayPal's Google Pay integration …

2019-12-21
Apple Formally Opens Bug Bounty Program to All Security Researchers, Expands Program Scope to Broader Spectrum of Products and Raises Top Bounty to $1.5 Million @campuscodi https://www.zdnet.com/... https://metacurity.com/...
2019-12-21 View on X
AppleInsider

Apple releases a 2019 Platform Security guide, outlining how features like Secure Enclave work, letting organizations adapt to its policies and procedures

Apple has published its guide to Platform Security for Fall 2019, outlining how the company's products and services work to ensure …

Apple Formally Opens Bug Bounty Program to All Security Researchers, Expands Program Scope to Broader Spectrum of Products and Raises Top Bounty to $1.5 Million @campuscodi https://www.zdnet.com/... https://metacurity.com/...
2019-12-21 View on X
ZDNet

Apple opens its bug bounty program to security researchers, publishes eligibility criteria, bounty categories, and report and payout guidelines

Catalin Cimpanu / ZDNet :

2019-09-29
DEF CON 27 Voting Village Report Released Showing Vulnerabilities in Top Voting Machines Used in Nearly 30 States @lilyhnewman https://www.wired.com/... https://metacurity.com/...
2019-09-29 View on X
Wired

2019 Defcon Voting Village findings reveal detailed vulnerabilities related to six models of voting machines, most of which are still in use

and they paint an ugly picture for voting machine security. https://www.wired.com/... @verifiedvoting : How do we make our election infrastructure as secure as possible? By having ...

2019-09-28
DEF CON 27 Voting Village Report Released Showing Vulnerabilities in Top Voting Machines Used in Nearly 30 States @lilyhnewman https://www.wired.com/... https://metacurity.com/...
2019-09-28 View on X
Wired

2019 Defcon Voting Village findings reveal detailed vulnerabilities related to six models of voting machines, most of which are still in use

The results of the 2019 Defcon Voting Village are in—and they paint an ugly picture for voting machine security.

2019-09-13
I do everything listed here at Metacurity, Techmeme pioneered it with just one person at the outset and Google is going to use 10,000 human raters to do this? Interesting to see if Google News is any better in six months. It's really bad now. @google https://www.blog.google/...
2019-09-13 View on X
The Keyword

Google says it changed how it ranks stories and updated guidelines for evaluation of search results to help better identify and surface original news reporting

Richard Gingras / The Keyword :

2019-08-16
Cloudflare Issues Pre-IPO Filing Showing Revenue Jump of 48%, Loss Increase of 13% in First Half of 2019, Notes That Offensive Customers Such as 8chan Could Have Negative Consequences @jordannovet https://www.cnbc.com/... https://metacurity.com/...
2019-08-16 View on X
TechCrunch

Cloudflare files for an IPO, citing sites like 8chan as one risk factor, says it had revenues of $192.7M in 2018, up 43% YoY, and a net loss of $87.2M

with a female co-founder Zack Whittaker / TechCrunch : Cloudflare says cutting off customers like 8chan is an IPO ‘risk factor’ Teuta Franjkovic / Coinspeaker : Cloudflare Files fo...

2019-08-11
Eighteen-Year-Old High School Student Found Flaws in School Software That Could Have Allowed Hackers Deep Access to At Least Five Million Students' Data in 5,000 Schools @a_greenberg https://www.wired.com/... https://metacurity.com/...
2019-08-11 View on X
Wired

Teen hacker Bill Demirkapi on finding bugs, that exposed 5M student records across 5,000 schools, in educational software from providers Blackboard and Follett

A FEW SHORT decades ago, the archetypal hacker was a bored teenager breaking into his school's network to change grades, à la Ferris Bueller.