/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Chris Wysopal

@weldpond
60 posts
2026-01-23
cURL has ended its bug bounty program after being overwhelmed by a flood of low-quality, often AI-generated bug reports that strained its volunteer security team. Maintainer Daniel Stenberg hopes the move will cut noise and encourage real vulnerability reports — even without
2026-01-23 View on X
BleepingComputer

The curl project plans to end its HackerOne bug bounty program at the end of January, citing a surge in low-quality AI-generated vulnerability reports

The developer of the popular curl command-line utility and library announced that the project will end its HackerOne security bug bounty program …

2026-01-22
cURL has ended its bug bounty program after being overwhelmed by a flood of low-quality, often AI-generated bug reports that strained its volunteer security team. Maintainer Daniel Stenberg hopes the move will cut noise and encourage real vulnerability reports — even without
2026-01-22 View on X
BleepingComputer

The curl project plans to end its HackerOne bug bounty program at the end of January, citing a surge in low-quality AI-generated vulnerability reports

The developer of the popular curl command-line utility and library announced that the project will end its HackerOne security bug bounty program …

2025-01-05
Devastated to hear about the passing of Amit Yoran. A true visionary in cybersecurity, Amit shaped our industry with his brilliance, leadership, and generosity. Always friendly, always sharing his knowledge—he inspired us all. He will be profoundly missed. Rest in peace. 🙏
2025-01-05 View on X
TechCrunch

Amit Yoran, the CEO of cybersecurity company Tenable, passed away after a battle with cancer; he previously held a number of roles, including president of RSA

Longtime entrepreneur and cybersecurity executive Amit Yoran passed away Friday after a battle with cancer.

2024-10-23
SEC fines the companies that minimized the severity of the attacks they were required to disclose.
2024-10-23 View on X
TechCrunch

Unisys, Check Point, Avaya, and Mimecast to pay a combined $7M to the SEC, which says they negligently downplayed the impact of the SolarWinds supply chain hack

The companies fined are: Avaya, Check Point, Mimecast, and Unysis.  —  https://techcrunch.com/... X: Mike Swift / @swiftstories : The ⁦@SECGov⁩ is starting to hand out some real #c...

2024-07-20
I am personally troubled by the recent Microsoft Windows IT outage and its widespread impact on travel, banking, and healthcare systems globally. Such incidents highlight the vulnerabilities in our interconnected systems and the importance of cybersecurity diligence. My thoughts
2024-07-20 View on X
The Verge

BSODs hit thousands of Windows PCs due to “a defect” in an update from CrowdStrike, taking banks, airlines, and more businesses offline; Microsoft is aware

or CrowdStrike Microsoft : HELPFUL LINKS  —  Get notified of outages that impact you  —  Building reliable applications on Azure The Record : IT teams scramble to recover from Crow...

I am personally troubled by the recent Microsoft Windows IT outage and its widespread impact on travel, banking, and healthcare systems globally. Such incidents highlight the vulnerabilities in our interconnected systems and the importance of cybersecurity diligence. My thoughts
2024-07-20 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The little-known company is very popular in Corporate America, contributing to the severity of the global IT outage

2024-06-27
If your website uses https://polyfill.io/, remove it immediately. In Feb, a Chinese company bought the domain & Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds https://cdn.polyfill.io/ https://sansec.io/...
2024-06-27 View on X
The Register

Researchers: polyfill.io, which offers JavaScript polyfills, is being used to infect 100K+ websites with malware, after a Chinese CDN bought the domain in 2024

2024-05-13
“The accuracy of some critical GPS navigation systems used in modern farming have been ‘extremely compromised,’” https://www.404media.co/...
2024-05-13 View on X
404 Media

Many US farmers had to halt their planting operations after a solar storm broke critical GPS and precision farming functionality in tractors and other equipment

The solar storm that brought the aurora borealis to large parts of the United States this weekend also broke critical GPS …

2024-03-22
Hackers found a way to open any of 3 million hotel SafLok keycard locks in seconds using a valid keycard, 2 blank keycards and RFID read-write device like Flipper Zero https://www.wired.com/... [image]
2024-03-22 View on X
Wired

Researchers reveal a hotel keycard hacking technique that can let a hacker almost instantly open RFID-based Saflok locks used in 3M doors across 13K properties

The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.

2024-02-12
Thinking about the Canadian Flipper Zero ban. Wouldn't they have to ban all SDRs that transmit? Car thieves don't exclusively use the Flipper. I've never seen one in a car theft demonstration.
2024-02-12 View on X
Gizmodo

A Canadian minister says the government plans to ban devices that copy wireless signals for remote keyless entry, like the Flipper Zero, to combat auto theft

2024-02-11
Thinking about the Canadian Flipper Zero ban. Wouldn't they have to ban all SDRs that transmit? Car thieves don't exclusively use the Flipper. I've never seen one in a car theft demonstration.
2024-02-11 View on X
Gizmodo

A Canadian minister says the government plans to ban devices that copy wireless signals for remote keyless entry, like the Flipper Zero, to combat auto theft

🤨  —  https://www.bleepingcomputer.com/ ...  #security #pentesting #flipperzero #canada Matti Aleve / @maleve@zeroes.ca : Sigh where to even begin with this.  —  The subhead pretty...

2023-11-15
“The best exploit chain is the supply chain” - TCrown https://www.unciphered.com/...
2023-11-15 View on X
Washington Post

Unciphered, which helps recover cryptocurrency, finds a BitcoinJS flaw in some wallets made before 2016, and says that up to $1B of crypto is at risk of theft

2023-10-07
What gets collected gets stolen and resold. Information wants to be freely available for a price. https://cyberscoop.com/...
2023-10-07 View on X
BleepingComputer

23andMe confirms that it is aware of user data from its platform circulating on hacker forums and attributes the leak to a credential-stuffing attack

23andMe has confirmed to BleepingComputer that it is aware of user data from its platform circulating on hacker forums and attributes the leak to a credential-stuffing attack.

2023-08-12
At @defcon this morning @dildog and @medus4_cdc unveil @VeilidNetwork [image]
2023-08-12 View on X
The Register

Hacker group Cult of the Dead Cow details Veilid, an open-source, P2P application framework, and unveils VeilidChat, a Signal-like instant messaging app

'It's like Tor and IPFS had sex and produced this thing'  —  DEF CON Infosec super-band the Cult of the Dead Cow has released Veilid …

2023-08-05
Discover the extraordinary journey of @window, a trailblazing cybersecurity pioneer! Her genius was fortifying crucial software and devices we rely on daily, making our digital world safer. https://techcrunch.com/...
2023-08-05 View on X
TechCrunch

A profile of Window Snyder, who helped secure the early internet while at Microsoft and Mozilla, and pushed Apple to enable encryption by default in its devices

Snyder has made Windows, Mac computers, iPhones, and other technologies more secure for almost 25 years. Mastodon: @Weld@infosec.exchange and @kennwhite@mastodon.social . Bluesky: ...

2023-07-01
The hackers claimed to have sent malicious software to the satellite terminals, setting off a scramble among security experts to obtain a terminal for testing. https://www.washingtonpost.com/ ...
2023-07-01 View on X
The Record

Hackers claim responsibility for attacking Russian satellite internet service Dozor-Teleport; the IODA project says the network went down at 10pm EST on June 28

Daryna Antoniuk / The Record :

2023-03-31
This supply chain attack, dubbed ‘SmoothOperator’ by SentinelOne, starts when the MSI installer is downloaded from 3CX's website or an update is pushed to an already installed desktop application. https://www.bleepingcomputer.com/ ...
2023-03-31 View on X
BleepingComputer

Researchers say hackers have compromised the VoIP desktop client of 3CX's Phone System, used by 600K+ companies and 12M+ DAUs, in an ongoing supply chain attack

https://www.3cx.com/...  Any vendor of software and services that pull in code from NPM, PIP, RubyGems etc … Eitan Erez : This supply chain attack started unfolding not long ago as...

2023-03-30
This supply chain attack, dubbed ‘SmoothOperator’ by SentinelOne, starts when the MSI installer is downloaded from 3CX's website or an update is pushed to an already installed desktop application. https://www.bleepingcomputer.com/ ...
2023-03-30 View on X
BleepingComputer

Researchers say hackers have compromised the 3CX VoIP IPBX desktop app, used by 600K+ companies and 12M+ daily users, in an ongoing supply chain attack

A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used to target …

2023-03-18
RCE from a mobile# on many Samsung devices. Until patches are available users can thwart baseband RCE exploitation attempts targeting Samsungs Exynos chipsets in their device by disabling Wi-Fi calling and Voice-over-LTE (VoLTE) to remove the attack vector https://www.bleepingcomputer.com/ ...
2023-03-18 View on X
TechCrunch

Google's Project Zero finds 18 zero-day vulnerabilities in Exynos modems, affecting some Samsung, Vivo, and Google phones as well as wearables and vehicles

do this before you're next Maria Deutscher / SiliconANGLE : Google discovers 18 vulnerabilities in multiple Samsung chips Pierluigi Paganini / Security Affairs : Baseband RCE flaws...

2023-03-01
“by targeting the DevOps engineer's home computer and exploiting a vulnerable third-party media software package, which enabled remote code exec” I wonder what security controls were on that computer. https://arstechnica.com/...
2023-03-01 View on X
BleepingComputer

LastPass says hackers stole password vault data in 2022 by exploiting an RCE flaw in third-party software to install a keylogger on a DevOps engineer's computer

Lawrence Abrams / BleepingComputer :