/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Person

Tara Seals

7 articles decelerating
Articles
7
mentions
Velocity
-66.7%
growth rate
Acceleration
-2.667
velocity change
Sources
6
publications

Coverage Timeline

2024-02-07
CyberScoop 36 related

Google's TAG publishes a report on commercial spyware, detailing ~40 vendors, and says global governments should take more aggressive steps to combat spyware

Twitter's natural heir is finally open to the public — and it has some big ideas for social networking Shane Huntley / The Keyword : Buying Spying: How the commercial surveillance industry works and w...

2019-09-01
Project Zero 78 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ian Beer / Project Zero : In-the-wild iOS Exploit Chain 1 Patrick Howell O'Neill / MIT Technology Review : Websites have been quietly hacking iPhones for years, says...

2019-08-31
Project Zero 81 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iPhone security flaws ...

2019-07-31
ZDNet 11 related

Google Project Zero researchers publish details and demo exploit code for five of six “interactionless” iOS security bugs; iOS 12.4 patched all but one of them

And It's Only Paying Thousands to Squash Them Firstpost Tech : Google researchers found 6 iMessage exploits that could compromise your iPhone Leo Kelion / BBC : Google reveals fistful of flaws in Appl...

2019-05-06
Mozilla Add-ons Blog 22 related

Expired certificate caused Firefox add-ons to stop working on Friday; Mozilla has issued a fix for most issues, advises others not to try any workarounds

A small number of add-ons may be listed … Victoria Song / Gizmodo : Firefox Fixes Borked Extensions for Everyone but Legacy Users Catalin Cimpanu / ZDNet : Mozilla releases Firefox 66.0.4 with fix dis...

2019-03-10
Citrix Blogs 14 related

Citrix says it was informed by the FBI that Citrix's internal network has been breached, believes some business documents may have been accessed and downloaded

Here's What To Do Next Jon Fingas / Engadget : Iranian hackers stole terabytes of data from software giant Citrix Adam Westlake / SlashGear : Hackers stole 6TB of data from Citrix breach - FBI is inve...

2018-12-15
The Verge 34 related

Spammers are emailing businesses, schools, and other locations in the US, Canada, and New Zealand, demanding bitcoin as ransom to not detonate a supposed bomb

and a ‘Terrible Strategy’ Francisco Memoria / CryptoGlobe : US Government Advises Bitcoin Bomb Threat Victims to Ignore Ransom, Inform the FBI Usman Qureshi / iPhone in Canada Blog : Bitcoin Scammers ...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...