/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Entity

software vulnerabilities

10 articles stable
Articles
10
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
7
publications

Coverage Timeline

2025-07-16
The Record 12 related

Google says its Big Sleep AI agent for finding unknown software vulnerabilities recently discovered a critical SQLite flaw that “was at risk of being exploited”

Google said a large language model it developed to find vulnerabilities recently discovered a bug that hackers were preparing to use.

2023-08-10
Engadget 24 related

The US debuts a DARPA contest to build AI systems that can proactively identify and fix software flaws, with help from Anthropic, Google, Microsoft, and OpenAI

a competition to automatically find/fix software vulnerabilities. Details: https://www.darpa.mil/... [image] Charley Snyder / @charley_snyder_ : Can AI help secure open source software projects? We'll...

2022-06-01
Associated Press 2 related

CISA says Dominion's voting machines used in at least 16 states have nine vulnerabilities that have not been exploited, and suggests mitigation measures

ATLANTA (AP) — Electronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave …

2021-07-02
The Record 16 related

NSA, FBI, and others say Russian hacking group Fancy Bear has been using Kubernetes to run brute force attacks on US and foreign organizations since mid-2019

essentially, trying different passwords until the attackers gained access — and then use other known software vulnerabilities to steal emails, compromise other accounts and collect more data. Tonya Ri...

2021-03-21
Wired

A look at Facebook's “Red Team X”, an internal hacking team founded in 2020, which probes 3rd-party tech Facebook uses for hardware and software vulnerabilities

Lily Hay Newman / Wired : Tweets: @johnjhacking , @gadgetlab , @lilyhnewman , and @ajxchapman Tweets: John Jackson / @johnjhacking : Jealous. This is what I need to be doing for a living. https://www...

2021-03-20
Wired

A look at Facebook's “Red Team X”, an internal hacking team founded in 2020, which probes 3rd-party tech Facebook uses for hardware and software vulnerabilities

The internal hacking team has spent the last year looking for vulnerabilities in the products the company uses … Tweets: @johnjhacking , @gadgetlab , @lilyhnewman , and @jenmartinez Tweets: John Jacks...

2020-06-03
Wired

A look at Mayhem, a bot made by a startup called ForAllSecure for finding software bugs, which is now being used by the US military and Cloudflare

and Netflix. https://www.wired.com/... @cylab : A 2018 gov't report showed that most weapons systems the @DeptofDefense tested from 2012 to 2017 had serious software vulnerabilities. That's why @Carne...

2018-06-22
Cyberscoop 2 related

White House names NSC's Grant Schneider to lead Vulnerability Equities Process board, which decides software vulnerabilities to keep secret for intel gathering

Chris Bing / Cyberscoop :

2017-12-21
ZDNet 3 related

Password manager maker Keeper sues Ars Technica and reporter Dan Goodin for story on a vulnerability in Keeper software, first highlighted by Google researcher

the company behind the product— is suing Dan and Ars. In the extraordinary complaint, Keeper says Dan ‘intended’ to cause harm http://www.documentcloud.org/ ... via @zackwhittaker http://twitter.com/....

2015-09-12
CIO.com 6 related

FireEye takes security firm to court over vulnerability disclosure

A spat between two security companies shows just how sensitive reporting software vulnerabilities can be, particularly when it involves a popular product.  —  The kerfuffle between FireEye and ERNW, a...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...