/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Person

Zeljka Zorz / Help Net Security

7 articles accelerating
Articles
7
mentions
Velocity
+100.0%
growth rate
Acceleration
+1.000
velocity change
Sources
7
publications

Coverage Timeline

2024-07-20
Bloomberg 17 related

CrowdStrike and other endpoint security tools require access to the core of OSes, giving them the ability to disrupt the very systems they're trying to protect

cybersecurity leaders say there's no easy fix PYMNTS.com : Businesses Scramble for Backup After CrowdStrike Update Hobbles IT Networks Dave McQuilling / SlashGear : 5 Of The Top CrowdStrike Alternativ...

2024-07-13
TechCrunch 91 related

AT&T says it will begin notifying consumers about a data breach where cybercriminals stole phone records of “nearly all” of its cellular and landline customers

Item 1.05 Material Cybersecurity Incidents.  On April 19, 2024, AT&T Inc. … AT&T : AT&T Addresses Illegal Download of Customer Data CNN : Nearly all AT&T cell customers' call and text records exposed ...

2024-02-07
CyberScoop 36 related

Google's TAG publishes a report on commercial spyware, detailing ~40 vendors, and says global governments should take more aggressive steps to combat spyware

Twitter's natural heir is finally open to the public — and it has some big ideas for social networking Shane Huntley / The Keyword : Buying Spying: How the commercial surveillance industry works and w...

2021-04-21
Reuters 20 related

FireEye and networking company Pulse Secure say two China-linked hacking groups used a flaw in its VPN devices to target customers in the US defense industry

Exploitation of Pulse Connect Secure Vulnerabilities  —  Summary Department of Homeland Security : Emergency Directive 21-03  —  Mitigate Pulse Secure Product Vulnerabilities CNN : Suspected Chinese h...

2017-11-15
VentureBeat 36 related

Mozilla releases Firefox 57 “Quantum” browser with faster browser engine, major visual overhaul, and Google as default search engine

It's time.  The New Firefox is finally here. Mozilla / Releases - APKMirror : Firefox 57.0  —  Experience a fast, smart and personal Web. Abhimanyu Ghoshal / The Next Web : How to switch from RAM-hung...

2017-06-28
The Verge 57 related

Ransomware attack spreads to orgs in Britain, US, and Europe, including ad firm WPP, Chernobyl power plant, shipping giant Maersk, US hospital, Merck, more

what's happening and how to protect yourself Zeljka Zorz / Help Net Security : NotPetya outbreak: What we know so far Nandini Yadav / bgr.in : Petya ransomware spreads globally; social media is gracef...

2015-06-04
Help Net Security 4 related

SourceForge hijacks inactive accounts of popular software, adds 3rd party bundle-ware installers

Zeljka Zorz / Help Net Security :

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...