/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Company

CVE

12 articles decelerating
Articles
12
mentions
Velocity
-50.0%
growth rate
Acceleration
-0.500
velocity change
Sources
8
publications

Coverage Timeline

2025-10-07
The Record 21 related

Oracle urges customers to patch an E-Business Suite vulnerability that cybercriminals are exploiting; Google's Mandiant says the Clop hacking group exploited it

AWAITING ANALYSIS  —  This CVE record has been marked for NVD enrichment efforts. CrowdStrike : CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability (now tracke...

2025-05-26
Sean Heelan's Blog 10 related

A security researcher details how he discovered a zero-day vulnerability in the Linux kernel's SMB implementation by analyzing the code using OpenAI's o3 API

Now finding a Linux kernel-level zero day is as simple as knowing how to prompt. sean.heelan.io/2025/05/22/h... @davidcrespo : key detail in this very good post about finding a novel vuln with LLMs: e...

2025-04-16
BleepingComputer 51 related

CISA says it will extend funding to Mitre, which runs the CVE Program, and “there will be no lapse in critical CVE services”, after Mitre said funding expired

CISA says the U.S. government has extended MITRE's funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.

2025-03-25
CyberScoop 12 related

Researchers say a Next.js flaw that existed for several years could have let hackers bypass middleware-based authentication; Vercel patched the flaw on March 18

Next.js version 15.2.3 has been released to address a security vulnerability (CVE-2025-29927). zhero_web_security : Next.js and the corrupt middleware: the authorizing artifact National Vulnerability ...

CyberScoop

A look at the 25-year-old CVE program, which assigns unique IDs to security flaws; 413 orgs report CVEs, with 40K+ reported in 2024, pushing the total to 270K+

this time for Cyberscoop—that examines the CVE system and how well it has weathered challenges over the past 25 years.  —  cyberscoop.com/cve-program-...

2024-04-22
The Register 14 related

Researchers: when given 15 CVE descriptions, GPT-4 autonomously exploited 87% of the “one-day” vulnerabilities, compared to 0% for every other model tested

2024-04-21
The Register 12 related

Researchers: when given 15 CVE descriptions, GPT-4 autonomously exploited 87% of the vulnerabilities, compared to 0% for every other model tested

While some other LLMs appear to flat-out suck  —  AI agents, which combine large language models with automation software …

2023-10-29
Ars Technica 13 related

Apple fixed an old bug exposing a device's real MAC address to nearby wireless routers even when Private Wi-Fi Address is enabled, including in Lockdown Mode

@dangoodin  —  https://arstechnica.com/... X: @mysk_co : The bug addressed in iOS 17.1 is about hiding the device's MAC address from joined networks, a privacy feature introduced in iOS 14. This shoul...

2023-07-20
Cyentia Institute 10 related

Analysis: tweets about CVEs, which peaked before Elon Musk took over, show a steep decline in recent months, suggesting the infosec Twitter community has shrunk

https://www.cyentia.com/... Eduardo Cuducos / @cuducos.me : So long Infosec Twitter https://www.cyentia.com/... Mastodon: Dr. Juande Santander-Vela / @juandesant@astrodon.social : @Techmeme they might...

2022-07-27
BleepingComputer 6 related

Unit 42: hackers typically scan for vulnerabilities within 15 minutes of a new CVE disclosure; the first active exploitation attempts are observed within hours

Bill Toulas / BleepingComputer : Source: Unit 42 .

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...