/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Mark Madsen

@markmadsen.bsky.social
1 posts
2024-03-01
Who could possibly have expected that a highly trafficked site that makes available code for you to run might be compromised in this way?  I'm still wondering about all the supply chain vulnerabilities for libraries python, java, and javascript [embedded post]
2024-03-01 View on X
BleepingComputer

JFrog finds ~100 malicious PyTorch and Tensorflow Keras models on Hugging Face, some of which can execute code on users' machines to give attackers a backdoor