/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
API keys, docs, usage dashboard
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Person

Paul Wagenseil

14 articles accelerating
Articles
14
mentions
Velocity
+100.0%
growth rate
Acceleration
+1.500
velocity change
Sources
11
publications

Coverage Timeline

2021-12-15
CyberScoop 32 related

CISA Director Jen Easterly says the Log4j flaw likely affects hundreds of millions of devices and may be the most serious bug she has seen in her career

A vulnerability in a widely used Apache library … Ncsc-Nl / GitHub : Log4j overview related software Kyle Alspach / VentureBeat : Log4j exploits attempted on 44% of corporate networks; ransomware payl...

2021-11-25
BleepingComputer 12 related

A Windows 10 and Windows 11 exploit allows an attacker with physical access to gain SYSTEM privileges, bypassing Microsoft's patch from earlier this month

Hackers Exploiting New Windows Installer Zero-Day Exploit in the Wild Brittany A. Roston / SlashGear : All Windows PCs at risk after Microsoft fails to fix zero-day exploit Elizabeth Montalbano / Thre...

2021-02-06
ZDNet 32 related

Google has patched an actively exploited zero-day vulnerability in its Chrome 88 update

update now Ryan Naraine / SecurityWeek : Google Chrome, Microsoft IE Zero-Days in Crosshairs Gareth Corfield / The Register : Chrome zero-day bug that is actively being abused by bad folks affects Edg...

2019-12-20
New York Times 21 related

Leaked dataset from a location data company with a log of the movements of 12M+ Americans shows how “anonymous” location data can be used to track people

and it's not hard to figure out who you are Whitney Kimball / Gizmodo : Holy Shit, Reportedly Jerry Hildenbrand / Android Central : Your phone tracks your every move and there is nothing you can do ab...

2019-10-09
Tom's Guide 3 related

D-Link won't patch a remote exploit in four of its routers, saying they are end-of-life, despite some being discontinued in 2018 and still being sold on Amazon

Paul Wagenseil / Tom's Guide :

2019-09-01
Project Zero 78 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ian Beer / Project Zero : In-the-wild iOS Exploit Chain 1 Patrick Howell O'Neill / MIT Technology Review : Websites have been quietly hacking iPhones for years, says...

2019-08-31
Project Zero 81 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iPhone security flaws ...

2019-02-02
TechCrunch 35 related

Apple restores Google's internal iOS apps after certificate misuse punishment

and it made a powerful point Scott Rosenberg / Axios : Tech giants are the new gatekeepers Wall Street Journal : Apple Exerts Power as Privacy Protector Enrique Dans / Forbes : Google Vs. Facebook: Si...

2018-01-12
New York Times 29 related

House votes 256 to 164 to extend Section 702 FISA warrantless surveillance program for six years with minimal changes; bill now proceeds to the Senate

Why It's a Good Thing That Dropbox Is Going Public Charlie Savage / New York Times : Surveillance and Privacy Debate Reaches Pivotal Moment in Congress Louise Matsakis / Wired : Congress Renews Warran...

2017-10-25
Motherboard 46 related

New “Bad Rabbit” ransomware targets corp networks in Ukraine, Turkey, Germany, infects devices through hacked Russian media sites using NotPetya type methods

There is a connection between Bad Rabbit and Not Petya Waqas / HackRead : Bad Rabbit ransomware spreading like wildfire but there is a way out Dell Cameron / Gizmodo : ‘Bad Rabbit’ Ransomware Strikes ...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...