All Articles

Ordered by Date Published : Year: "2020"
and by Page: << < 15 (of 15)

Total Articles in this collection: 796

Navigation Help at the bottom of the page
Article: What’s It Like for a New CISO? - published almost 5 years ago.
Content: As of this writing, I've spent six months in the role of Chief Information Security Officer (CISO) at Axonius, a rapidly growing technology company. Though I've held a variety of leadership positions over the years, working in this capacity and setting is new for me. I've been capturing aspects of my journey in talks and articles so that others might learn ...
https://zeltser.com/new-ciso-impressions/   
Published: 2020 02 13 16:38:59
Received: 2021 06 06 09:05:26
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: What’s It Like for a New CISO? - published almost 5 years ago.
Content: As of this writing, I've spent six months in the role of Chief Information Security Officer (CISO) at Axonius, a rapidly growing technology company. Though I've held a variety of leadership positions over the years, working in this capacity and setting is new for me. I've been capturing aspects of my journey in talks and articles so that others might learn ...
https://zeltser.com/new-ciso-impressions/   
Published: 2020 02 13 16:38:59
Received: 2021 06 06 09:05:26
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: Mitigating malware and ransomware attacks - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks   
Published: 2020 02 13 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Mitigating malware and ransomware attacks - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks   
Published: 2020 02 13 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: CAS(T) closed - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cas-t-closed   
Published: 2020 02 13 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: CAS(T) closed - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cas-t-closed   
Published: 2020 02 13 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Mitigating malware and ransomware attacks - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks   
Published: 2020 02 13 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Article: Mitigating malware and ransomware attacks - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks   
Published: 2020 02 13 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests - published almost 5 years ago.
Content: In May 2019, FireEye Threat Intelligence published a blog post exposing a network of English-language social media accounts that engaged in inauthentic behavior and misrepresentation that we assessed with low confidence was organized in support of Iranian political interests. Personas in that network impersonated candidates for U.S. House of Re...
https://www.fireeye.com/blog/threat-research/2020/02/information-operations-fabricated-personas-to-promote-iranian-interests.html   
Published: 2020 02 12 12:30:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests - published almost 5 years ago.
Content: In May 2019, FireEye Threat Intelligence published a blog post exposing a network of English-language social media accounts that engaged in inauthentic behavior and misrepresentation that we assessed with low confidence was organized in support of Iranian political interests. Personas in that network impersonated candidates for U.S. House of Re...
https://www.fireeye.com/blog/threat-research/2020/02/information-operations-fabricated-personas-to-promote-iranian-interests.html   
Published: 2020 02 12 12:30:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Managed Defense: The Analytical Mindset - published almost 5 years ago.
Content: When it comes to cyber security (managed services or otherwise), you’re ultimately reliant on analyst expertise to keep your environment safe. Products and intelligence are necessary pieces of the security puzzle to generate detection signal and whittle down the alert chaff, but in the end, an analyst’s trained eyes and investigative process are th...
http://www.fireeye.com/blog/threat-research/2020/02/managed-defense-the-analytical-mindset.html   
Published: 2020 02 11 17:00:00
Received: 2021 11 02 20:00:26
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Managed Defense: The Analytical Mindset - published almost 5 years ago.
Content: When it comes to cyber security (managed services or otherwise), you’re ultimately reliant on analyst expertise to keep your environment safe. Products and intelligence are necessary pieces of the security puzzle to generate detection signal and whittle down the alert chaff, but in the end, an analyst’s trained eyes and investigative process are th...
http://www.fireeye.com/blog/threat-research/2020/02/managed-defense-the-analytical-mindset.html   
Published: 2020 02 11 17:00:00
Received: 2021 11 02 20:00:26
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Compiling a DLL using MingGW - published almost 5 years ago.
Content:
https://malicious.link/post/2020/compiling-a-dll-using-mingw/   
Published: 2020 02 09 14:30:44
Received: 2021 06 06 09:05:32
Feed: Room362.com RSS Feed
Source: Room362.com RSS Feed
Category: News
Topic: Hacking
Article: Compiling a DLL using MingGW - published almost 5 years ago.
Content:
https://malicious.link/post/2020/compiling-a-dll-using-mingw/   
Published: 2020 02 09 14:30:44
Received: 2021 06 06 09:05:32
Feed: Room362.com RSS Feed
Source: Room362.com RSS Feed
Category: News
Topic: Hacking
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Weekly Threat Report 7th February 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-7th-february-2020   
Published: 2020 02 07 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 7th February 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-7th-february-2020   
Published: 2020 02 07 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Design guidelines for high assurance products - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/design-guidelines-for-high-assurance-products   
Published: 2020 02 06 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Design guidelines for high assurance products - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/design-guidelines-for-high-assurance-products   
Published: 2020 02 06 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Introducing the design guidelines for high assurance products - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-high-assurance-guidelines   
Published: 2020 02 06 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing the design guidelines for high assurance products - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-high-assurance-guidelines   
Published: 2020 02 06 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Design guidelines for high assurance products - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/design-guidelines-for-high-assurance-products   
Published: 2020 02 06 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Article: Design guidelines for high assurance products - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/design-guidelines-for-high-assurance-products   
Published: 2020 02 06 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: STOMP 2 DIS: Brilliance in the (Visual) Basics - published almost 5 years ago.
Content: Throughout January 2020, FireEye has continued to observe multiple targeted phishing campaigns designed to download and deploy a backdoor we track as MINEBRIDGE. The campaigns primarily targeted financial services organizations in the United States, though targeting is likely more widespread than those we’ve initially observed in our FireEye produc...
http://www.fireeye.com/blog/threat-research/2020/01/stomp-2-dis-brilliance-in-the-visual-basics.html   
Published: 2020 02 05 14:15:00
Received: 2021 11 02 20:00:26
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: STOMP 2 DIS: Brilliance in the (Visual) Basics - published almost 5 years ago.
Content: Throughout January 2020, FireEye has continued to observe multiple targeted phishing campaigns designed to download and deploy a backdoor we track as MINEBRIDGE. The campaigns primarily targeted financial services organizations in the United States, though targeting is likely more widespread than those we’ve initially observed in our FireEye produc...
http://www.fireeye.com/blog/threat-research/2020/01/stomp-2-dis-brilliance-in-the-visual-basics.html   
Published: 2020 02 05 14:15:00
Received: 2021 11 02 20:00:26
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: CVE In The Hook – Monthly Vulnerability Review (January 2020 Issue) - published almost 5 years ago.
Content:
https://toolswatch.org/2020/02/cve-in-the-hook-monthly-vulnerability-review-january-2020-issue/?utm_source=rss&utm_medium=rss&utm_campaign=cve-in-the-hook-monthly-vulnerability-review-january-2020-issue   
Published: 2020 02 05 12:06:05
Received: 2023 01 25 14:23:48
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Article: CVE In The Hook – Monthly Vulnerability Review (January 2020 Issue) - published almost 5 years ago.
Content:
https://toolswatch.org/2020/02/cve-in-the-hook-monthly-vulnerability-review-january-2020-issue/?utm_source=rss&utm_medium=rss&utm_campaign=cve-in-the-hook-monthly-vulnerability-review-january-2020-issue   
Published: 2020 02 05 12:06:05
Received: 2023 01 25 14:23:48
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Shining a light on the cyber security marketplace - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/shining-a-light-on-the-cyber-security-marketplace   
Published: 2020 02 04 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Shining a light on the cyber security marketplace - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/shining-a-light-on-the-cyber-security-marketplace   
Published: 2020 02 04 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Getting DNS Client Cached Entries with CIM/WMI - published almost 5 years ago.
Content: What is DNS CacheThe DNS cache maintains a database of recent DNS resolution in memory. This allows for faster resolution of hosts that have been queried in the recent past. To keep this cache fresh and reduce the chance of stale records the time of items in the cache is of 1 day on Windows clients. The DNS Client service in Windows is the one that manages t...
https://www.darkoperator.com/blog/2020/1/14/getting-dns-client-cached-entries-with-cimwmi   
Published: 2020 02 03 10:00:00
Received: 2023 12 06 08:02:19
Feed: Blog
Source: Blog
Category: Cyber Security
Topic: Cyber Security
Article: Getting DNS Client Cached Entries with CIM/WMI - published almost 5 years ago.
Content: What is DNS CacheThe DNS cache maintains a database of recent DNS resolution in memory. This allows for faster resolution of hosts that have been queried in the recent past. To keep this cache fresh and reduce the chance of stale records the time of items in the cache is of 1 day on Windows clients. The DNS Client service in Windows is the one that manages t...
https://www.darkoperator.com/blog/2020/1/14/getting-dns-client-cached-entries-with-cimwmi   
Published: 2020 02 03 10:00:00
Received: 2023 12 06 08:02:19
Feed: Blog
Source: Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Effective steps to cyber exercise creation - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/effective-steps-to-cyber-exercise-creation   
Published: 2020 02 03 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Effective steps to cyber exercise creation - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/effective-steps-to-cyber-exercise-creation   
Published: 2020 02 03 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cyber exercise creation step class - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-exercise-creation-step-class   
Published: 2020 02 03 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Cyber exercise creation step class - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-exercise-creation-step-class   
Published: 2020 02 03 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Effective steps to cyber exercise creation - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/effective-steps-to-cyber-exercise-creation   
Published: 2020 02 03 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Article: Effective steps to cyber exercise creation - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/effective-steps-to-cyber-exercise-creation   
Published: 2020 02 03 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: A Framework for Measuring InfoSec as a Business Function - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/91648-a-framework-for-measuring-infosec-as-a-business-function   
Published: 2020 02 02 05:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: A Framework for Measuring InfoSec as a Business Function - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/91648-a-framework-for-measuring-infosec-as-a-business-function   
Published: 2020 02 02 05:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D - published almost 5 years ago.
Content: DLL Abuse Techniques Overview Dynamic-link library (DLL) side-loading occurs when Windows Side-by-Side (WinSxS) manifests are not explicit about the characteristics of DLLs being loaded by a program. In layman’s terms, DLL side-loading can allow an attacker to trick a program into loading a malicious DLL. If you are interested in learning more abo...
http://www.fireeye.com/blog/threat-research/2020/01/abusing-dll-misconfigurations.html   
Published: 2020 01 31 16:45:00
Received: 2021 11 02 20:00:26
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D - published almost 5 years ago.
Content: DLL Abuse Techniques Overview Dynamic-link library (DLL) side-loading occurs when Windows Side-by-Side (WinSxS) manifests are not explicit about the characteristics of DLLs being loaded by a program. In layman’s terms, DLL side-loading can allow an attacker to trick a program into loading a malicious DLL. If you are interested in learning more abo...
http://www.fireeye.com/blog/threat-research/2020/01/abusing-dll-misconfigurations.html   
Published: 2020 01 31 16:45:00
Received: 2021 11 02 20:00:26
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Threat Report 31st January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-31st-january-2020   
Published: 2020 01 31 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 31st January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-31st-january-2020   
Published: 2020 01 31 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The future of telecoms in the UK - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk   
Published: 2020 01 30 09:20:01
Received: 2024 08 16 07:00:30
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: The future of telecoms in the UK - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk   
Published: 2020 01 30 09:20:01
Received: 2024 08 16 07:00:30
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Summary of NCSC’s security analysis for the UK telecoms sector - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector   
Published: 2020 01 28 07:52:20
Received: 2024 03 06 17:21:28
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Summary of NCSC’s security analysis for the UK telecoms sector - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector   
Published: 2020 01 28 07:52:20
Received: 2024 03 06 17:21:28
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: NCSC advice on the use of equipment from high risk vendors in UK telecoms networks - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: NCSC advice on the use of equipment from high risk vendors in UK telecoms networks - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Summary of NCSC’s security analysis for the UK telecoms sector - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Summary of NCSC’s security analysis for the UK telecoms sector - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The future of telecoms in the UK - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The future of telecoms in the UK - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Summary of NCSC?s security analysis for the UK telecoms sector - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:42
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Summary of NCSC?s security analysis for the UK telecoms sector - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:42
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: The future of telecoms in the UK - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: The future of telecoms in the UK - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: NCSC advice on the use of equipment from high risk vendors in UK telecoms networks - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Article: NCSC advice on the use of equipment from high risk vendors in UK telecoms networks - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks   
Published: 2020 01 28 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Top 5 Critical CVEs Vulnerability from 2019 That Every CISO Must Patch Before He Gets Fired ! - published almost 5 years ago.
Content:
https://toolswatch.org/2020/01/top-5-critical-cves-vulnerability-from-2019-that-every-ciso-must-patch-before-he-gets-fired/?utm_source=rss&utm_medium=rss&utm_campaign=top-5-critical-cves-vulnerability-from-2019-that-every-ciso-must-patch-before-he-gets-fired   
Published: 2020 01 25 09:44:59
Received: 2023 01 25 14:23:48
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Article: Top 5 Critical CVEs Vulnerability from 2019 That Every CISO Must Patch Before He Gets Fired ! - published almost 5 years ago.
Content:
https://toolswatch.org/2020/01/top-5-critical-cves-vulnerability-from-2019-that-every-ciso-must-patch-before-he-gets-fired/?utm_source=rss&utm_medium=rss&utm_campaign=top-5-critical-cves-vulnerability-from-2019-that-every-ciso-must-patch-before-he-gets-fired   
Published: 2020 01 25 09:44:59
Received: 2023 01 25 14:23:48
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Article: Introducing Scanning Made Easy - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-scanning-made-easy   
Published: 2020 01 25 00:00:00
Received: 2022 12 02 11:01:47
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing Scanning Made Easy - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-scanning-made-easy   
Published: 2020 01 25 00:00:00
Received: 2022 12 02 11:01:47
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Nice Try: 501 (Ransomware) Not Implemented - published almost 5 years ago.
Content: An Ever-Evolving Threat Since January 10, 2020, FireEye has tracked extensive global exploitation of CVE-2019-19781, which continues to impact Citrix ADC and Gateway instances that are unpatched or do not have mitigations applied. We previously reported on attackers’ swift attempts to exploit this vulnerability and the post-compromise deploy...
https://www.fireeye.com/blog/threat-research/2020/01/nice-try-501-ransomware-not-implemented.html   
Published: 2020 01 24 17:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Nice Try: 501 (Ransomware) Not Implemented - published almost 5 years ago.
Content: An Ever-Evolving Threat Since January 10, 2020, FireEye has tracked extensive global exploitation of CVE-2019-19781, which continues to impact Citrix ADC and Gateway instances that are unpatched or do not have mitigations applied. We previously reported on attackers’ swift attempts to exploit this vulnerability and the post-compromise deploy...
https://www.fireeye.com/blog/threat-research/2020/01/nice-try-501-ransomware-not-implemented.html   
Published: 2020 01 24 17:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Threat Report 24th January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-24th-january-2020   
Published: 2020 01 24 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 24th January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-24th-january-2020   
Published: 2020 01 24 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Launch of the Academic Centres of Excellence in Cyber Security Education - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/launch-of-the-academic-centres-of-excellence-in-cyber-security-education   
Published: 2020 01 23 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Launch of the Academic Centres of Excellence in Cyber Security Education - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/launch-of-the-academic-centres-of-excellence-in-cyber-security-education   
Published: 2020 01 23 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Introducing new NCSC Mobile Device Guidance - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-new-ncsc-mobile-device-guidance   
Published: 2020 01 22 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing new NCSC Mobile Device Guidance - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-new-ncsc-mobile-device-guidance   
Published: 2020 01 22 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Managing Active Directory groups from Linux - published almost 5 years ago.
Content:
https://www.n00py.io/2020/01/managing-active-directory-groups-from-linux/   
Published: 2020 01 17 17:27:39
Received: 2021 06 06 09:05:30
Feed: from:mubix #SharedLinks - Twitter Search
Source: from:mubix #SharedLinks - Twitter Search
Category: News
Topic: Hacking
Article: Managing Active Directory groups from Linux - published almost 5 years ago.
Content:
https://www.n00py.io/2020/01/managing-active-directory-groups-from-linux/   
Published: 2020 01 17 17:27:39
Received: 2021 06 06 09:05:30
Feed: from:mubix #SharedLinks - Twitter Search
Source: from:mubix #SharedLinks - Twitter Search
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Get Process List with Command Line Arguments - published almost 5 years ago.
Content:
https://malicious.link/post/2020/get-process-list/   
Published: 2020 01 17 14:30:44
Received: 2021 06 06 09:05:32
Feed: Room362.com RSS Feed
Source: Room362.com RSS Feed
Category: News
Topic: Hacking
Article: Get Process List with Command Line Arguments - published almost 5 years ago.
Content:
https://malicious.link/post/2020/get-process-list/   
Published: 2020 01 17 14:30:44
Received: 2021 06 06 09:05:32
Feed: Room362.com RSS Feed
Source: Room362.com RSS Feed
Category: News
Topic: Hacking
Article: Weekly Threat Report 17th January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-17th-january-2020   
Published: 2020 01 17 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 17th January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-17th-january-2020   
Published: 2020 01 17 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The RastaLabs experience - published almost 5 years ago.
Content: Introduction It was 20 November, and I was just starting to wonder what I would do during the next month. I had already left my previous job, and the new one would only start in January. Playing with PS4 all month might sound fun for some people, but I knew I would get bored quickly. Even though I have some limited red teaming experience, I always fe...
https://jumpespjump.blogspot.com/2020/01/the-rastalabs-experience.html   
Published: 2020 01 16 14:54:00
Received: 2024 03 12 23:22:32
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Article: The RastaLabs experience - published almost 5 years ago.
Content: Introduction It was 20 November, and I was just starting to wonder what I would do during the next month. I had already left my previous job, and the new one would only start in January. Playing with PS4 all month might sound fun for some people, but I knew I would get bored quickly. Even though I have some limited red teaming experience, I always fe...
https://jumpespjump.blogspot.com/2020/01/the-rastalabs-experience.html   
Published: 2020 01 16 14:54:00
Received: 2024 03 12 23:22:32
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: 404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor - published almost 5 years ago.
Content: As noted in Rough Patch: I Promise It'll Be 200 OK, our FireEye Mandiant Incident Response team has been hard at work responding to intrusions stemming from the exploitation of CVE-2019-19781. After analyzing dozens of successful exploitation attempts against Citrix ADCs that did not have the Citrix mitigation steps implemented, we’ve recogni...
http://www.fireeye.com/blog/threat-research/2020/01/vigilante-deploying-mitigation-for-citrix-netscaler-vulnerability-while-maintaining-backdoor.html   
Published: 2020 01 16 03:00:00
Received: 2021 11 02 20:00:26
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: 404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor - published almost 5 years ago.
Content: As noted in Rough Patch: I Promise It'll Be 200 OK, our FireEye Mandiant Incident Response team has been hard at work responding to intrusions stemming from the exploitation of CVE-2019-19781. After analyzing dozens of successful exploitation attempts against Citrix ADCs that did not have the Citrix mitigation steps implemented, we’ve recogni...
http://www.fireeye.com/blog/threat-research/2020/01/vigilante-deploying-mitigation-for-citrix-netscaler-vulnerability-while-maintaining-backdoor.html   
Published: 2020 01 16 03:00:00
Received: 2021 11 02 20:00:26
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Secure communications principles - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/secure-communication-principles   
Published: 2020 01 16 00:00:00
Received: 2021 09 30 13:06:22
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Secure communications principles - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/secure-communication-principles   
Published: 2020 01 16 00:00:00
Received: 2021 09 30 13:06:22
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Secure communications principles: alpha release - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/secure-communication-principles-alpha-release   
Published: 2020 01 16 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Secure communications principles: alpha release - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/secure-communication-principles-alpha-release   
Published: 2020 01 16 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Secure communication principles - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/secure-communication-principles   
Published: 2020 01 16 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Secure communication principles - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/secure-communication-principles   
Published: 2020 01 16 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Secure communications principles: alpha release - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/secure-communication-principles-alpha-release   
Published: 2020 01 16 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Article: Secure communications principles: alpha release - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/secure-communication-principles-alpha-release   
Published: 2020 01 16 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Article: MMD-0065-2020 - Linux/Mirai-Fbot's new encryption explained - published almost 5 years ago.
Content:
https://blog.malwaremustdie.org/2020/01/mmd-0065-2020-linuxmirai-fbot.html   
Published: 2020 01 15 12:48:00
Received: 2021 06 06 09:04:55
Feed: Malware Must Die!
Source: Malware Must Die!
Category: Cyber Security
Topic: Cyber Security
Article: MMD-0065-2020 - Linux/Mirai-Fbot's new encryption explained - published almost 5 years ago.
Content:
https://blog.malwaremustdie.org/2020/01/mmd-0065-2020-linuxmirai-fbot.html   
Published: 2020 01 15 12:48:00
Received: 2021 06 06 09:04:55
Feed: Malware Must Die!
Source: Malware Must Die!
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: CISP migration set to take place - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cisp-migration-set-to-take-place   
Published: 2020 01 15 00:00:00
Received: 2022 04 06 09:01:11
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: CISP migration set to take place - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cisp-migration-set-to-take-place   
Published: 2020 01 15 00:00:00
Received: 2022 04 06 09:01:11
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: CiSP migration set to take place - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cisp-migration-set-to-take-place   
Published: 2020 01 15 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: CiSP migration set to take place - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cisp-migration-set-to-take-place   
Published: 2020 01 15 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Oracle Critical Patch Update Advisory - January 2020 - published almost 5 years ago.
Content:
https://www.oracle.com/security-alerts/cpujan2020.html    
Published: 2020 01 14 19:30:54
Received: 2021 06 06 09:03:27
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Critical Patch Update Advisory - January 2020 - published almost 5 years ago.
Content:
https://www.oracle.com/security-alerts/cpujan2020.html    
Published: 2020 01 14 19:30:54
Received: 2021 06 06 09:03:27
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Weekly Threat Report 10th January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-10th-january-2020   
Published: 2020 01 10 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 10th January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-10th-january-2020   
Published: 2020 01 10 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: SAIGON, the Mysterious Ursnif Fork - published almost 5 years ago.
Content: Ursnif (aka Gozi/Gozi-ISFB) is one of the oldest banking malware families still in active distribution. While the first major version of Ursnif was identified in 2006, several subsequent versions have been released in large part due source code leaks. FireEye reported on a previously unidentified variant of the Ursnif malware family to our threat...
http://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html   
Published: 2020 01 09 17:30:00
Received: 2021 11 02 23:00:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: SAIGON, the Mysterious Ursnif Fork - published almost 5 years ago.
Content: Ursnif (aka Gozi/Gozi-ISFB) is one of the oldest banking malware families still in active distribution. While the first major version of Ursnif was identified in 2006, several subsequent versions have been released in large part due source code leaks. FireEye reported on a previously unidentified variant of the Ursnif malware family to our threat...
http://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html   
Published: 2020 01 09 17:30:00
Received: 2021 11 02 23:00:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: 2020 ShmooCon Ticket - published almost 5 years ago.
Content:
https://malicious.link/post/2020/2020-shmoocon-ticket/   
Published: 2020 01 08 14:30:44
Received: 2021 06 06 09:05:32
Feed: Room362.com RSS Feed
Source: Room362.com RSS Feed
Category: News
Topic: Hacking
Article: 2020 ShmooCon Ticket - published almost 5 years ago.
Content:
https://malicious.link/post/2020/2020-shmoocon-ticket/   
Published: 2020 01 08 14:30:44
Received: 2021 06 06 09:05:32
Feed: Room362.com RSS Feed
Source: Room362.com RSS Feed
Category: News
Topic: Hacking
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: 2020 ShmooCon Hiring List - published almost 5 years ago.
Content:
https://malicious.link/post/2020/2020-shmoocon-hiring-list/   
Published: 2020 01 07 14:30:44
Received: 2021 06 06 09:05:32
Feed: Room362.com RSS Feed
Source: Room362.com RSS Feed
Category: News
Topic: Hacking
Article: 2020 ShmooCon Hiring List - published almost 5 years ago.
Content:
https://malicious.link/post/2020/2020-shmoocon-hiring-list/   
Published: 2020 01 07 14:30:44
Received: 2021 06 06 09:05:32
Feed: Room362.com RSS Feed
Source: Room362.com RSS Feed
Category: News
Topic: Hacking
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: The cyber threat to sports organisations - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/the-cyber-threat-to-sports-organisations   
Published: 2020 01 04 11:09:23
Received: 2024 08 02 11:01:13
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The cyber threat to sports organisations - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/the-cyber-threat-to-sports-organisations   
Published: 2020 01 04 11:09:23
Received: 2024 08 02 11:01:13
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 3rd January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-3rd-january-2020   
Published: 2020 01 03 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 3rd January 2020 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-3rd-january-2020   
Published: 2020 01 03 00:00:00
Received: 2021 04 18 14:04:45
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Import data, not malware - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/import-data-not-malware   
Published: 2020 01 01 16:15:16
Received: 2024 04 12 13:21:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Import data, not malware - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/import-data-not-malware   
Published: 2020 01 01 16:15:16
Received: 2024 04 12 13:21:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Is cyber insurance right for you? - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/is-cyber-insurance-right-for-you   
Published: 2020 01 01 05:35:06
Received: 2024 01 31 09:21:08
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Is cyber insurance right for you? - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/is-cyber-insurance-right-for-you   
Published: 2020 01 01 05:35:06
Received: 2024 01 31 09:21:08
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: New Year Prognostications: A Perennial Guide for the Perplexed - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/91486-new-year-prognostications-a-perennial-guide-for-the-perplexed   
Published: 2020 01 01 05:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: New Year Prognostications: A Perennial Guide for the Perplexed - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/91486-new-year-prognostications-a-perennial-guide-for-the-perplexed   
Published: 2020 01 01 05:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report

All Articles

Ordered by Date Published : Year: "2020"
Page: << < 15 (of 15)

Total Articles in this collection: 796


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor