All Articles

Ordered by Date Published : Year: "2012"
and by Page: 1 (of 0)

Total Articles in this collection: 37

Navigation Help at the bottom of the page
Article: AWK-ward! - published almost 12 years ago.
Content: Yesterday I got an email friend who complained that "awk is still a mystery". Not being one to ignore a cry for help with the command line, I was motivated to write up a simple introduction to the basics of awk. But where to post it? I know! We've got this little blog we're not doing anything with at the moment (er, yeah, sorry about that folks-- life's ...
http://blog.commandlinekungfu.com/2012/12/awk-ward.html   
Published: 2012 12 20 05:01:00
Received: 2023 03 31 08:44:33
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: AWK-ward! - published almost 12 years ago.
Content: Yesterday I got an email friend who complained that "awk is still a mystery". Not being one to ignore a cry for help with the command line, I was motivated to write up a simple introduction to the basics of awk. But where to post it? I know! We've got this little blog we're not doing anything with at the moment (er, yeah, sorry about that folks-- life's ...
http://blog.commandlinekungfu.com/2012/12/awk-ward.html   
Published: 2012 12 20 05:01:00
Received: 2023 03 31 08:44:33
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Another Ebay permanent XSS - published about 12 years ago.
Content:
http://www.xssed.com/news/131/Another_Ebay_permanent_XSS/   
Published: 2012 11 13 18:25:59
Received: 2021 06 06 09:00:29
Feed: XSSed syndication
Source: XSSed syndication
Category: Alerts
Topic: Vulnerabilities
Article: Another Ebay permanent XSS - published about 12 years ago.
Content:
http://www.xssed.com/news/131/Another_Ebay_permanent_XSS/   
Published: 2012 11 13 18:25:59
Received: 2021 06 06 09:00:29
Feed: XSSed syndication
Source: XSSed syndication
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: PwnStar latest version with new Exploits released - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pwnstar-latest-version-with-new.html   
Published: 2012 11 10 15:53:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnStar latest version with new Exploits released - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pwnstar-latest-version-with-new.html   
Published: 2012 11 10 15:53:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pwnpi-v20-pen-test-drop-box-distro-for.html   
Published: 2012 11 10 15:42:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pwnpi-v20-pen-test-drop-box-distro-for.html   
Published: 2012 11 10 15:42:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/sslsplit-v-045-man-in-middle-attacks.html   
Published: 2012 11 10 15:30:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/sslsplit-v-045-man-in-middle-attacks.html   
Published: 2012 11 10 15:30:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: NetSleuth : Open source Network Forensics And Analysis Tools - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/netsleuth-open-source-network-forensics.html   
Published: 2012 11 10 15:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: NetSleuth : Open source Network Forensics And Analysis Tools - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/netsleuth-open-source-network-forensics.html   
Published: 2012 11 10 15:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: TXDNS v 2.2.1 - Aggressive multithreaded DNS digger - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/txdns-v-221-aggressive-multithreaded.html   
Published: 2012 11 10 15:13:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: TXDNS v 2.2.1 - Aggressive multithreaded DNS digger - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/txdns-v-221-aggressive-multithreaded.html   
Published: 2012 11 10 15:13:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: PySQLi - Python SQL injection framework - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pysqli-python-sql-injection-framework.html   
Published: 2012 11 04 18:03:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PySQLi - Python SQL injection framework - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pysqli-python-sql-injection-framework.html   
Published: 2012 11 04 18:03:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: ExploitShield Browser Edition - Forget about browser vulnerabilities - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/exploitshield-browser-edition-forget.html   
Published: 2012 11 04 12:32:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: ExploitShield Browser Edition - Forget about browser vulnerabilities - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/exploitshield-browser-edition-forget.html   
Published: 2012 11 04 12:32:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Joomscan updated - now can identify 673 joomla vulnerabilities - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/joomscan-updated-now-can-identify-673.html   
Published: 2012 11 03 21:45:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Joomscan updated - now can identify 673 joomla vulnerabilities - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/joomscan-updated-now-can-identify-673.html   
Published: 2012 11 03 21:45:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: BeEF 0.4.3.8 - Browser Exploitation Framework - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/beef-0438-browser-exploitation-framework.html   
Published: 2012 11 03 21:37:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: BeEF 0.4.3.8 - Browser Exploitation Framework - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/beef-0438-browser-exploitation-framework.html   
Published: 2012 11 03 21:37:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/spooftooph-052-automated-spoofing-or.html   
Published: 2012 11 03 21:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/spooftooph-052-automated-spoofing-or.html   
Published: 2012 11 03 21:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Wifi Honey - Creates fake APs using all encryption - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/wifi-honey-creates-fake-aps-using-all.html   
Published: 2012 11 03 21:13:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Wifi Honey - Creates fake APs using all encryption - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/wifi-honey-creates-fake-aps-using-all.html   
Published: 2012 11 03 21:13:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Vulnerability Summary for the Week of October 22, 2012 - published about 12 years ago.
Content:
https://www.cisa.gov/news-events/bulletins/sb12-303   
Published: 2012 10 29 21:10:57
Received: 2023 03 17 14:24:46
Feed: CISA Bulletins
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Bulletins
Topic: Cyber Security
Article: Vulnerability Summary for the Week of October 22, 2012 - published about 12 years ago.
Content:
https://www.cisa.gov/news-events/bulletins/sb12-303   
Published: 2012 10 29 21:10:57
Received: 2023 03 17 14:24:46
Feed: CISA Bulletins
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Bulletins
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Oracle Java SE Critical Patch Update Advisory - October 2012 - published about 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html   
Published: 2012 10 16 19:26:29
Received: 2021 06 06 09:03:27
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Java SE Critical Patch Update Advisory - October 2012 - published about 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html   
Published: 2012 10 16 19:26:29
Received: 2021 06 06 09:03:27
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Critical Patch Update Advisory - October 2012 - published about 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html   
Published: 2012 10 16 19:26:29
Received: 2021 06 06 09:03:27
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Critical Patch Update Advisory - October 2012 - published about 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html   
Published: 2012 10 16 19:26:29
Received: 2021 06 06 09:03:27
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Incident Response with NTFS INDX Buffers – Part 1: Extracting an INDX Attribute - published about 12 years ago.
Content: By William Ballenthin & Jeff Hamm On August 30, 2012, we presented a webinar on how to use INDX buffers to assist in an incident response investigation. During the Q&A portion of the webinar we received many questions; however, we were not able to answer all of them. We're going to attempt to answer the remaining question...
http://www.fireeye.com/blog/threat-research/2012/09/striking-gold-incident-response-ntfs-indx-buffers-part-1.html   
Published: 2012 09 18 23:23:24
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Incident Response with NTFS INDX Buffers – Part 1: Extracting an INDX Attribute - published about 12 years ago.
Content: By William Ballenthin & Jeff Hamm On August 30, 2012, we presented a webinar on how to use INDX buffers to assist in an incident response investigation. During the Q&A portion of the webinar we received many questions; however, we were not able to answer all of them. We're going to attempt to answer the remaining question...
http://www.fireeye.com/blog/threat-research/2012/09/striking-gold-incident-response-ntfs-indx-buffers-part-1.html   
Published: 2012 09 18 23:23:24
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Hacker diagnosed with brain cancer, hacks the closed source report distributing it to the open source community hoping to get some help - published about 12 years ago.
Content:
http://www.zone-h.org/news/id/4743   
Published: 2012 09 09 17:26:00
Received: 2021 06 06 09:05:22
Feed: Zone-H.org News
Source: Zone-H.org News
Category: Cyber Security
Topic: Cyber Security
Article: Hacker diagnosed with brain cancer, hacks the closed source report distributing it to the open source community hoping to get some help - published about 12 years ago.
Content:
http://www.zone-h.org/news/id/4743   
Published: 2012 09 09 17:26:00
Received: 2021 06 06 09:05:22
Feed: Zone-H.org News
Source: Zone-H.org News
Category: Cyber Security
Topic: Cyber Security
Article: Oracle Security Alert for CVE-2012-4681 - 30 Aug 2012 - published about 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html   
Published: 2012 08 30 19:26:29
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Security Alert for CVE-2012-4681 - 30 Aug 2012 - published about 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html   
Published: 2012 08 30 19:26:29
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Oracle Security Alert for CVE-2012-3132 - 10 Aug 2012 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-3132-1721017.html   
Published: 2012 08 10 19:14:29
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Security Alert for CVE-2012-3132 - 10 Aug 2012 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-3132-1721017.html   
Published: 2012 08 10 19:14:29
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Oracle Critical Patch Update (CPU) Advisory - July 2012 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html   
Published: 2012 07 19 22:15:29
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Critical Patch Update (CPU) Advisory - July 2012 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html   
Published: 2012 07 19 22:15:29
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Vulnerability Summary for the Week of June 25, 2012 - published over 12 years ago.
Content:
https://www.cisa.gov/news-events/bulletins/sb12-184   
Published: 2012 07 02 21:10:50
Received: 2023 03 16 19:24:27
Feed: CISA Bulletins
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Bulletins
Topic: Cyber Security
Article: Vulnerability Summary for the Week of June 25, 2012 - published over 12 years ago.
Content:
https://www.cisa.gov/news-events/bulletins/sb12-184   
Published: 2012 07 02 21:10:50
Received: 2023 03 16 19:24:27
Feed: CISA Bulletins
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Bulletins
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Oracle Java SE Critical Patch Update Advisory - June 2012 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html   
Published: 2012 06 12 20:00:00
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Java SE Critical Patch Update Advisory - June 2012 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html   
Published: 2012 06 12 20:00:00
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: M-Trends #1: Malware Only Tells Half the Story - published over 12 years ago.
Content: When I joined Mandiant earlier this year, I was given the opportunity to help write our annual M-Trends report. This is the third year Mandiant has published the report, which is a summary of the trends we've observed in our investigations over the last twelve months. I remember reading Mandiant's first M-Trends report when it ca...
http://www.fireeye.com/blog/threat-research/2012/05/mtrends-1-malware-tells-story.html   
Published: 2012 05 14 20:45:15
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: M-Trends #1: Malware Only Tells Half the Story - published over 12 years ago.
Content: When I joined Mandiant earlier this year, I was given the opportunity to help write our annual M-Trends report. This is the third year Mandiant has published the report, which is a summary of the trends we've observed in our investigations over the last twelve months. I remember reading Mandiant's first M-Trends report when it ca...
http://www.fireeye.com/blog/threat-research/2012/05/mtrends-1-malware-tells-story.html   
Published: 2012 05 14 20:45:15
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Oracle Security Alert for CVE-2012-1675 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html   
Published: 2012 04 30 20:01:09
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Security Alert for CVE-2012-1675 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html   
Published: 2012 04 30 20:01:09
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Oracle Critical Patch Update (CPU) Advisory - April 2012 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html   
Published: 2012 04 18 15:40:13
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Critical Patch Update (CPU) Advisory - April 2012 - published over 12 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html   
Published: 2012 04 18 15:40:13
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Executive Briefing in New York with Former Secretary of Homeland Security Michael Chertoff - published over 12 years ago.
Content: On March 15, Mandiant hosted an executive briefing over breakfast in New York City. The location in the W Hotel in Downtown NYC overlooked the 9/11 Memorial and the rising One World Trade Center-an arresting view and a unique setting for this event. Former Secretary of Homeland Security Michael Chertoff kicked off the morning by discus...
http://www.fireeye.com/blog/threat-research/2012/04/executive-briefing-york-secretary-homeland-security.html   
Published: 2012 04 02 22:17:49
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Executive Briefing in New York with Former Secretary of Homeland Security Michael Chertoff - published over 12 years ago.
Content: On March 15, Mandiant hosted an executive briefing over breakfast in New York City. The location in the W Hotel in Downtown NYC overlooked the 9/11 Memorial and the rising One World Trade Center-an arresting view and a unique setting for this event. Former Secretary of Homeland Security Michael Chertoff kicked off the morning by discus...
http://www.fireeye.com/blog/threat-research/2012/04/executive-briefing-york-secretary-homeland-security.html   
Published: 2012 04 02 22:17:49
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Zone-H celebrates its 10 years! - published over 12 years ago.
Content:
http://www.zone-h.org/news/id/4742   
Published: 2012 03 09 22:04:00
Received: 2021 06 06 09:05:22
Feed: Zone-H.org News
Source: Zone-H.org News
Category: Cyber Security
Topic: Cyber Security
Article: Zone-H celebrates its 10 years! - published over 12 years ago.
Content:
http://www.zone-h.org/news/id/4742   
Published: 2012 03 09 22:04:00
Received: 2021 06 06 09:05:22
Feed: Zone-H.org News
Source: Zone-H.org News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Oracle Java SE Critical Patch Update Advisory - February 2012 - published almost 13 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html   
Published: 2012 02 14 20:00:00
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Java SE Critical Patch Update Advisory - February 2012 - published almost 13 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html   
Published: 2012 02 14 20:00:00
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Oracle Security Alert for CVE-2011-5035 - published almost 13 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/alert-cve-2011-5035-1506603.html   
Published: 2012 01 31 21:20:32
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Security Alert for CVE-2011-5035 - published almost 13 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/alert-cve-2011-5035-1506603.html   
Published: 2012 01 31 21:20:32
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Episode #165: What's the Frequency Kenneth? - published almost 13 years ago.
Content: Tim helps Tim crack the codeLong time reader, second time caller emailer writes in:I've always been interested in mystery and codes (going back to 'Mystery Club' in 7th Grade), and today I discovered a cool show on History Channel called Decoded. They were talking about cryptography, specifically frequency analysis. I'm not an educator here but just to make ...
http://blog.commandlinekungfu.com/2012/01/episode-165-whats-frequency-kenneth.html   
Published: 2012 01 24 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #165: What's the Frequency Kenneth? - published almost 13 years ago.
Content: Tim helps Tim crack the codeLong time reader, second time caller emailer writes in:I've always been interested in mystery and codes (going back to 'Mystery Club' in 7th Grade), and today I discovered a cool show on History Channel called Decoded. They were talking about cryptography, specifically frequency analysis. I'm not an educator here but just to make ...
http://blog.commandlinekungfu.com/2012/01/episode-165-whats-frequency-kenneth.html   
Published: 2012 01 24 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Oracle Critical Patch Update (CPU) Advisory - January 2012 - published almost 13 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html   
Published: 2012 01 17 20:44:45
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Critical Patch Update (CPU) Advisory - January 2012 - published almost 13 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html   
Published: 2012 01 17 20:44:45
Received: 2021 06 06 09:03:28
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: New MSFRPC Post - published almost 13 years ago.
Content: I have posted a new article about using MSFRPC over at http://blog.spiderlabs.com. This post will walk you through how to talk to Metasploit using Python and show off some new code that I released as part of SpiderLabs Git Repo at : https://github.com/SpiderLabs/msfrpc. Let me know if you have thoughts or suggestions.
http://blog.happypacket.net/2012/01/new-msfrpc-post.html   
Published: 2012 01 15 01:56:00
Received: 2021 06 06 09:04:44
Feed: Happy Packet Blog
Source: Happy Packet Blog
Category: Cyber Security
Topic: Cyber Security
Article: New MSFRPC Post - published almost 13 years ago.
Content: I have posted a new article about using MSFRPC over at http://blog.spiderlabs.com. This post will walk you through how to talk to Metasploit using Python and show off some new code that I released as part of SpiderLabs Git Repo at : https://github.com/SpiderLabs/msfrpc. Let me know if you have thoughts or suggestions.
http://blog.happypacket.net/2012/01/new-msfrpc-post.html   
Published: 2012 01 15 01:56:00
Received: 2021 06 06 09:04:44
Feed: Happy Packet Blog
Source: Happy Packet Blog
Category: Cyber Security
Topic: Cyber Security
Article: F-Secure, McAfee and Symantec websites again XSSed - published almost 13 years ago.
Content:
http://www.xssed.com/news/130/F-Secure_McAfee_and_Symantec_websites_again_XSSed/   
Published: 2012 01 13 14:31:00
Received: 2021 06 06 09:00:29
Feed: XSSed syndication
Source: XSSed syndication
Category: Alerts
Topic: Vulnerabilities
Article: F-Secure, McAfee and Symantec websites again XSSed - published almost 13 years ago.
Content:
http://www.xssed.com/news/130/F-Secure_McAfee_and_Symantec_websites_again_XSSed/   
Published: 2012 01 13 14:31:00
Received: 2021 06 06 09:00:29
Feed: XSSed syndication
Source: XSSed syndication
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Episode #164: Exfiltration Nation - published almost 13 years ago.
Content: Hal pillages the mailboxHappy 2012 everybody!In the days and weeks to come, the industry press will no doubt be filled with stories of all the high-profile companies whose data was "liberated" during the past couple of weeks. It may be a holiday for most of us, but it's the perfect time for the black hats to be putting in a little overtime with their data e...
http://blog.commandlinekungfu.com/2012/01/episode-164-exfiltration-nation.html   
Published: 2012 01 10 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #164: Exfiltration Nation - published almost 13 years ago.
Content: Hal pillages the mailboxHappy 2012 everybody!In the days and weeks to come, the industry press will no doubt be filled with stories of all the high-profile companies whose data was "liberated" during the past couple of weeks. It may be a holiday for most of us, but it's the perfect time for the black hats to be putting in a little overtime with their data e...
http://blog.commandlinekungfu.com/2012/01/episode-164-exfiltration-nation.html   
Published: 2012 01 10 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Happy New Year 2012! - published almost 13 years ago.
Content:
http://www.xssed.com/news/129/Happy_New_Year_2012/   
Published: 2012 01 01 18:19:09
Received: 2021 06 06 09:00:29
Feed: XSSed syndication
Source: XSSed syndication
Category: Alerts
Topic: Vulnerabilities
Article: Happy New Year 2012! - published almost 13 years ago.
Content:
http://www.xssed.com/news/129/Happy_New_Year_2012/   
Published: 2012 01 01 18:19:09
Received: 2021 06 06 09:00:29
Feed: XSSed syndication
Source: XSSed syndication
Category: Alerts
Topic: Vulnerabilities

All Articles

Ordered by Date Published : Year: "2012"
Page: 1 (of 0)

Total Articles in this collection: 37


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor