All Articles

Ordered by Date Published : Year: "2021" Month: "12" Day: "16" Hour: "15"
Page: 1 (of 0)

Total Articles in this collection: 47

Navigation Help at the bottom of the page
Article: Lenovo laptops vulnerable to bug allowing admin privileges - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/lenovo-laptops-vulnerable-to-bug-allowing-admin-privileges/   
Published: 2021 12 16 15:56:29
Received: 2021 12 16 16:00:36
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Lenovo laptops vulnerable to bug allowing admin privileges - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/lenovo-laptops-vulnerable-to-bug-allowing-admin-privileges/   
Published: 2021 12 16 15:56:29
Received: 2021 12 16 16:00:36
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: RSAC 2022 shares latest cybersecurity insights and solutions - Technology Record - published almost 3 years ago.
Content: Keynote presentations will be held by leaders in cybersecurity such as Bryan Palma, CEO of McAfee Enterprise; Bruce Schneier, security technologist ...
https://www.technologyrecord.com/Article/rsac-2022-shares-latest-cybersecurity-insights-and-solutions-127579   
Published: 2021 12 16 15:54:15
Received: 2021 12 16 17:40:30
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: RSAC 2022 shares latest cybersecurity insights and solutions - Technology Record - published almost 3 years ago.
Content: Keynote presentations will be held by leaders in cybersecurity such as Bryan Palma, CEO of McAfee Enterprise; Bruce Schneier, security technologist ...
https://www.technologyrecord.com/Article/rsac-2022-shares-latest-cybersecurity-insights-and-solutions-127579   
Published: 2021 12 16 15:54:15
Received: 2021 12 16 17:40:30
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: UK government reveals plans to become 'global cyber power' in 2022 | The Daily Swig - PortSwigger - published almost 3 years ago.
Content: National Cyber Security Centre leads scheme to increase capabilities. The UK government has laid out its plans to become a 'global cyber power'.
https://portswigger.net/daily-swig/uk-government-reveals-plans-to-become-global-cyber-power-in-2022   
Published: 2021 12 16 15:52:38
Received: 2021 12 16 19:01:02
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: UK government reveals plans to become 'global cyber power' in 2022 | The Daily Swig - PortSwigger - published almost 3 years ago.
Content: National Cyber Security Centre leads scheme to increase capabilities. The UK government has laid out its plans to become a 'global cyber power'.
https://portswigger.net/daily-swig/uk-government-reveals-plans-to-become-global-cyber-power-in-2022   
Published: 2021 12 16 15:52:38
Received: 2021 12 16 19:01:02
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: More Log4j News - published almost 3 years ago.
Content: Log4j is being exploited by all sorts of attackers, all over the Internet: At that point it was reported that there were over 100 attempts to exploit the vulnerability every minute. “Since we started to implement our protection we prevented over 1,272,000 attempts to allocate the vulnerability, over 46% of those attempts were made by known malicious groups,”...
https://www.schneier.com/blog/archives/2021/12/more-log4j-news.html   
Published: 2021 12 16 15:50:29
Received: 2021 12 16 16:03:56
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: More Log4j News - published almost 3 years ago.
Content: Log4j is being exploited by all sorts of attackers, all over the Internet: At that point it was reported that there were over 100 attempts to exploit the vulnerability every minute. “Since we started to implement our protection we prevented over 1,272,000 attempts to allocate the vulnerability, over 46% of those attempts were made by known malicious groups,”...
https://www.schneier.com/blog/archives/2021/12/more-log4j-news.html   
Published: 2021 12 16 15:50:29
Received: 2021 12 16 16:03:56
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Pixelmator Photo Now Available on iPhone - published almost 3 years ago.
Content:
https://www.macrumors.com/2021/12/16/pixelmator-photo-iphone-app/   
Published: 2021 12 16 15:43:46
Received: 2021 12 16 15:48:03
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Pixelmator Photo Now Available on iPhone - published almost 3 years ago.
Content:
https://www.macrumors.com/2021/12/16/pixelmator-photo-iphone-app/   
Published: 2021 12 16 15:43:46
Received: 2021 12 16 15:48:03
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Wipro expands end-to-end solutions portfolio delivered on Microsoft's cybersecurity stack - published almost 3 years ago.
Content: The company's end-to-end security solutions and services now include two of Microsoft's advanced specializations in Security - Identity and Access ...
https://www.indiainfoline.com/article/news-sector-information-technology/wipro-expands-end-to-end-solutions-portfolio-delivered-on-microsoft%E2%80%99s-cybersecurity-stack-121121600243_1.html   
Published: 2021 12 16 15:41:38
Received: 2021 12 16 21:00:55
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Wipro expands end-to-end solutions portfolio delivered on Microsoft's cybersecurity stack - published almost 3 years ago.
Content: The company's end-to-end security solutions and services now include two of Microsoft's advanced specializations in Security - Identity and Access ...
https://www.indiainfoline.com/article/news-sector-information-technology/wipro-expands-end-to-end-solutions-portfolio-delivered-on-microsoft%E2%80%99s-cybersecurity-stack-121121600243_1.html   
Published: 2021 12 16 15:41:38
Received: 2021 12 16 21:00:55
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Ubuntu Security Notice USN-5195-1 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165334/USN-5195-1.txt   
Published: 2021 12 16 15:34:34
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5195-1 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165334/USN-5195-1.txt   
Published: 2021 12 16 15:34:34
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5106-04 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165333/RHSA-2021-5106-04.txt   
Published: 2021 12 16 15:34:27
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5106-04 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165333/RHSA-2021-5106-04.txt   
Published: 2021 12 16 15:34:27
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Chrome NavigationPreloadRequest Site Isolation Bypass - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165332/GS20211216153046.tgz   
Published: 2021 12 16 15:33:12
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Chrome NavigationPreloadRequest Site Isolation Bypass - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165332/GS20211216153046.tgz   
Published: 2021 12 16 15:33:12
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Cybersecurity firm offers tips to avoid hacking amid attack vs financial institutions - Interaksyon - published almost 3 years ago.
Content: A cybersecurity firm offered recommendations on how to prevent cyber attacks within their organizations amid recent attacks against financial ...
https://interaksyon.philstar.com/trends-spotlights/2021/12/16/206742/cybersecurity-firm-offers-tips-to-avoid-hacking-amid-attack-vs-financial-institutions/   
Published: 2021 12 16 15:31:10
Received: 2021 12 16 17:40:30
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity firm offers tips to avoid hacking amid attack vs financial institutions - Interaksyon - published almost 3 years ago.
Content: A cybersecurity firm offered recommendations on how to prevent cyber attacks within their organizations amid recent attacks against financial ...
https://interaksyon.philstar.com/trends-spotlights/2021/12/16/206742/cybersecurity-firm-offers-tips-to-avoid-hacking-amid-attack-vs-financial-institutions/   
Published: 2021 12 16 15:31:10
Received: 2021 12 16 17:40:30
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Most risk-based vulnerability management programs ineffective - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/96744-most-risk-based-vulnerability-management-programs-ineffective   
Published: 2021 12 16 15:30:00
Received: 2021 12 16 15:48:01
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Most risk-based vulnerability management programs ineffective - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/96744-most-risk-based-vulnerability-management-programs-ineffective   
Published: 2021 12 16 15:30:00
Received: 2021 12 16 15:48:01
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Chrome ThreadedIconLoader::DecodeAndResizeImageOnBackgroundThread Heap Use-After-Free - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165331/GS20211216152827.tgz   
Published: 2021 12 16 15:28:29
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Chrome ThreadedIconLoader::DecodeAndResizeImageOnBackgroundThread Heap Use-After-Free - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165331/GS20211216152827.tgz   
Published: 2021 12 16 15:28:29
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Anubis campaign targets hundred of financial apps | Security Magazine - published almost 3 years ago.
Content: Transparency smart phone with ransomware attack warning sign. December 16, 2021. KEYWORDS banking security / commodity / cyber security / risk ...
https://www.securitymagazine.com/articles/96729-anubis-campaign-targets-hundred-of-financial-apps   
Published: 2021 12 16 15:27:05
Received: 2021 12 16 19:01:02
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Anubis campaign targets hundred of financial apps | Security Magazine - published almost 3 years ago.
Content: Transparency smart phone with ransomware attack warning sign. December 16, 2021. KEYWORDS banking security / commodity / cyber security / risk ...
https://www.securitymagazine.com/articles/96729-anubis-campaign-targets-hundred-of-financial-apps   
Published: 2021 12 16 15:27:05
Received: 2021 12 16 19:01:02
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Chrome blink::NativeIOFile::DoRead Heap Use-After-Free - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165330/GS20211216152619.tgz   
Published: 2021 12 16 15:26:20
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Chrome blink::NativeIOFile::DoRead Heap Use-After-Free - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165330/GS20211216152619.tgz   
Published: 2021 12 16 15:26:20
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Red Hat Security Advisory 2021-5148-01 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165329/RHSA-2021-5148-01.txt   
Published: 2021 12 16 15:25:46
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5148-01 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165329/RHSA-2021-5148-01.txt   
Published: 2021 12 16 15:25:46
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5150-03 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165328/RHSA-2021-5150-03.txt   
Published: 2021 12 16 15:25:30
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5150-03 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165328/RHSA-2021-5150-03.txt   
Published: 2021 12 16 15:25:30
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Anubis campaign targets hundred of financial apps - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/96729-anubis-campaign-targets-hundred-of-financial-apps   
Published: 2021 12 16 15:25:00
Received: 2021 12 16 15:48:01
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Anubis campaign targets hundred of financial apps - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/96729-anubis-campaign-targets-hundred-of-financial-apps   
Published: 2021 12 16 15:25:00
Received: 2021 12 16 15:48:01
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cibele Thinfinity VirtualUI 2.5.41.0 User Enumeration - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165327/cibeletv25410-enumerate.txt   
Published: 2021 12 16 15:24:34
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Cibele Thinfinity VirtualUI 2.5.41.0 User Enumeration - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165327/cibeletv25410-enumerate.txt   
Published: 2021 12 16 15:24:34
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Hat Security Advisory 2021-5141-05 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165326/RHSA-2021-5141-05.txt   
Published: 2021 12 16 15:22:54
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5141-05 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165326/RHSA-2021-5141-05.txt   
Published: 2021 12 16 15:22:54
Received: 2021 12 16 15:45:08
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Ubuntu Security Notice USN-5197-1 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165324/USN-5197-1.txt   
Published: 2021 12 16 15:20:38
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5197-1 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165324/USN-5197-1.txt   
Published: 2021 12 16 15:20:38
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Croogo 3.0.2 Shell Upload - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165323/croogo302-shell.txt   
Published: 2021 12 16 15:20:00
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Croogo 3.0.2 Shell Upload - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165323/croogo302-shell.txt   
Published: 2021 12 16 15:20:00
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Croogo 3.0.2 Cross Site Scripting - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165322/croogo302-xss.txt   
Published: 2021 12 16 15:18:45
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Croogo 3.0.2 Cross Site Scripting - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165322/croogo302-xss.txt   
Published: 2021 12 16 15:18:45
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Red Hat Security Advisory 2021-5154-04 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165321/RHSA-2021-5154-04.txt   
Published: 2021 12 16 15:18:11
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5154-04 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165321/RHSA-2021-5154-04.txt   
Published: 2021 12 16 15:18:11
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: New Dutch cabinet to invest in cybersecurity, digitization - Telecompaper - published almost 3 years ago.
Content: Cybersecurity will receive attention, as will European cooperation and strategic autonomy. There will also be an extra budget for Dutch data ...
https://www.telecompaper.com/news/new-dutch-cabinet-to-invest-in-cybersecurity-digitization--1408063   
Published: 2021 12 16 15:18:00
Received: 2021 12 16 20:00:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: New Dutch cabinet to invest in cybersecurity, digitization - Telecompaper - published almost 3 years ago.
Content: Cybersecurity will receive attention, as will European cooperation and strategic autonomy. There will also be an extra budget for Dutch data ...
https://www.telecompaper.com/news/new-dutch-cabinet-to-invest-in-cybersecurity-digitization--1408063   
Published: 2021 12 16 15:18:00
Received: 2021 12 16 20:00:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Red Hat Security Advisory 2021-5160-04 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165320/RHSA-2021-5160-04.txt   
Published: 2021 12 16 15:17:46
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5160-04 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165320/RHSA-2021-5160-04.txt   
Published: 2021 12 16 15:17:46
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CurveBall Windows CryptoAPI Spoofing - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165319/curveball-windows.pdf   
Published: 2021 12 16 15:16:09
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: CurveBall Windows CryptoAPI Spoofing - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165319/curveball-windows.pdf   
Published: 2021 12 16 15:16:09
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: CVE-2021-3960 (gravityzone) - published almost 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3960   
Published: 2021 12 16 15:15:07
Received: 2021 12 21 19:25:48
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-3960 (gravityzone) - published almost 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3960   
Published: 2021 12 16 15:15:07
Received: 2021 12 21 19:25:48
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2021-3960 - published almost 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3960   
Published: 2021 12 16 15:15:07
Received: 2021 12 16 17:27:40
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-3960 - published almost 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3960   
Published: 2021 12 16 15:15:07
Received: 2021 12 16 17:27:40
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2021-3959 - published almost 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3959   
Published: 2021 12 16 15:15:07
Received: 2021 12 16 17:27:40
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-3959 - published almost 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3959   
Published: 2021 12 16 15:15:07
Received: 2021 12 16 17:27:40
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: Hive ransomware enters big league with hundreds breached in four months - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/hive-ransomware-enters-big-league-with-hundreds-breached-in-four-months/   
Published: 2021 12 16 15:14:50
Received: 2021 12 16 15:20:20
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Hive ransomware enters big league with hundreds breached in four months - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/hive-ransomware-enters-big-league-with-hundreds-breached-in-four-months/   
Published: 2021 12 16 15:14:50
Received: 2021 12 16 15:20:20
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: SOC investment places Telefónica Tech at forefront of cyber security in Ireland - TechCentral.ie - published almost 3 years ago.
Content: Aside from the big, headline grabbing cyber security attacks that we're probably all familiar with, there has been a marked increase in the number ...
https://www.techcentral.ie/soc-investment-places-telefonica-tech-at-forefront-of-cyber-security-in-ireland/   
Published: 2021 12 16 15:13:26
Received: 2021 12 16 19:01:02
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: SOC investment places Telefónica Tech at forefront of cyber security in Ireland - TechCentral.ie - published almost 3 years ago.
Content: Aside from the big, headline grabbing cyber security attacks that we're probably all familiar with, there has been a marked increase in the number ...
https://www.techcentral.ie/soc-investment-places-telefonica-tech-at-forefront-of-cyber-security-in-ireland/   
Published: 2021 12 16 15:13:26
Received: 2021 12 16 19:01:02
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Russia proposes holding collective cybersecurity talks with EU -TASS | Reuters - published almost 3 years ago.
Content: Russia on Thursday proposed holding collective consultations on cybersecurity with the European Union, after successful talks with the Netherlands ...
https://www.reuters.com/technology/russia-proposes-holding-collective-cybersecurity-talks-with-eu-tass-2021-12-16/   
Published: 2021 12 16 15:12:08
Received: 2021 12 16 17:40:30
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Russia proposes holding collective cybersecurity talks with EU -TASS | Reuters - published almost 3 years ago.
Content: Russia on Thursday proposed holding collective consultations on cybersecurity with the European Union, after successful talks with the Netherlands ...
https://www.reuters.com/technology/russia-proposes-holding-collective-cybersecurity-talks-with-eu-tass-2021-12-16/   
Published: 2021 12 16 15:12:08
Received: 2021 12 16 17:40:30
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: New Phishing Campaign Targets German Banks Via QR Codes - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/12/16/new-phishing-campaign-targets-german-banks-via-qr-codes/   
Published: 2021 12 16 15:10:49
Received: 2021 12 16 17:05:18
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: New Phishing Campaign Targets German Banks Via QR Codes - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/12/16/new-phishing-campaign-targets-german-banks-via-qr-codes/   
Published: 2021 12 16 15:10:49
Received: 2021 12 16 17:05:18
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Britain's rail regulator acts to make it easier to claim for train delays - Global Railway Review - published almost 3 years ago.
Content: Britain's Office of Rail and Road has finalised a Delay Compensation Code of Practice that train companies must comply with by April 2022.
https://www.globalrailwayreview.com/news/130704/britain-rail-regulator-claim-train-delays/   
Published: 2021 12 16 15:08:10
Received: 2021 12 16 19:01:02
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Britain's rail regulator acts to make it easier to claim for train delays - Global Railway Review - published almost 3 years ago.
Content: Britain's Office of Rail and Road has finalised a Delay Compensation Code of Practice that train companies must comply with by April 2022.
https://www.globalrailwayreview.com/news/130704/britain-rail-regulator-claim-train-delays/   
Published: 2021 12 16 15:08:10
Received: 2021 12 16 19:01:02
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Washington shouldn't pat itself on the back for its cybersecurity spending just yet | TheHill - published almost 3 years ago.
Content: Meanwhile, for the energy sector, there are two $250 million cybersecurity-specific grant programs: one for support to rural and municipal utilities ...
https://thehill.com/opinion/cybersecurity/586054-washington-shouldnt-pat-itself-on-the-back-for-its-cybersecurity   
Published: 2021 12 16 15:08:03
Received: 2021 12 16 17:40:30
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Washington shouldn't pat itself on the back for its cybersecurity spending just yet | TheHill - published almost 3 years ago.
Content: Meanwhile, for the energy sector, there are two $250 million cybersecurity-specific grant programs: one for support to rural and municipal utilities ...
https://thehill.com/opinion/cybersecurity/586054-washington-shouldnt-pat-itself-on-the-back-for-its-cybersecurity   
Published: 2021 12 16 15:08:03
Received: 2021 12 16 17:40:30
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Arunna 1.0.0 Cross Site Request Forgery - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165318/arunna100-xsrf.txt   
Published: 2021 12 16 15:07:30
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Arunna 1.0.0 Cross Site Request Forgery - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165318/arunna100-xsrf.txt   
Published: 2021 12 16 15:07:30
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Hillrom Addressed A Zero-Day Vulnerability Affecting Its Cardiac Devices - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/12/16/hillrom-addressed-a-zero-day-vulnerability-affecting-its-cardiac-devices/   
Published: 2021 12 16 15:07:13
Received: 2021 12 16 17:05:18
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Hillrom Addressed A Zero-Day Vulnerability Affecting Its Cardiac Devices - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/12/16/hillrom-addressed-a-zero-day-vulnerability-affecting-its-cardiac-devices/   
Published: 2021 12 16 15:07:13
Received: 2021 12 16 17:05:18
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Hat Security Advisory 2021-5151-01 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165317/RHSA-2021-5151-01.txt   
Published: 2021 12 16 15:06:43
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5151-01 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165317/RHSA-2021-5151-01.txt   
Published: 2021 12 16 15:06:43
Received: 2021 12 16 15:27:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5170-01 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165316/RHSA-2021-5170-01.txt   
Published: 2021 12 16 15:06:30
Received: 2021 12 16 15:27:25
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5170-01 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165316/RHSA-2021-5170-01.txt   
Published: 2021 12 16 15:06:30
Received: 2021 12 16 15:27:25
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Red Hat Security Advisory 2021-5149-05 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165315/RHSA-2021-5149-05.txt   
Published: 2021 12 16 15:06:10
Received: 2021 12 16 15:27:25
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5149-05 - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165315/RHSA-2021-5149-05.txt   
Published: 2021 12 16 15:06:10
Received: 2021 12 16 15:27:25
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Microsoft Launch Vulnerable And Malicious Driver Reporting Center - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/12/16/microsoft-launch-vulnerable-and-malicious-driver-reporting-center/   
Published: 2021 12 16 15:05:03
Received: 2021 12 16 17:05:18
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft Launch Vulnerable And Malicious Driver Reporting Center - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/12/16/microsoft-launch-vulnerable-and-malicious-driver-reporting-center/   
Published: 2021 12 16 15:05:03
Received: 2021 12 16 17:05:18
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Untrusted Data Deserialization In Jsoniter - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165314/deserializaton-jsoniter.pdf   
Published: 2021 12 16 15:03:24
Received: 2021 12 16 15:27:25
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Untrusted Data Deserialization In Jsoniter - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165314/deserializaton-jsoniter.pdf   
Published: 2021 12 16 15:03:24
Received: 2021 12 16 15:27:25
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Child's Day Care Management System 1.0 SQL Injection - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165325/cdcms10-sql.txt   
Published: 2021 12 16 15:01:11
Received: 2021 12 16 15:45:09
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Child's Day Care Management System 1.0 SQL Injection - published almost 3 years ago.
Content:
https://packetstormsecurity.com/files/165325/cdcms10-sql.txt   
Published: 2021 12 16 15:01:11
Received: 2021 12 16 15:45:09
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Dear Congress: It's Complicated. Please Consider This When Crafting New Cybersecurity Legislation - published almost 3 years ago.
Content:
https://www.darkreading.com/risk/dear-congress-it-s-complicated-please-consider-this-when-crafting-new-cybersecurity-legislation   
Published: 2021 12 16 15:00:00
Received: 2021 12 16 15:08:23
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Dear Congress: It's Complicated. Please Consider This When Crafting New Cybersecurity Legislation - published almost 3 years ago.
Content:
https://www.darkreading.com/risk/dear-congress-it-s-complicated-please-consider-this-when-crafting-new-cybersecurity-legislation   
Published: 2021 12 16 15:00:00
Received: 2021 12 16 15:08:23
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: SiriusXM Platinum VIP Tier Now Includes 12 Months of Free Apple Music - published almost 3 years ago.
Content:
https://www.macrumors.com/2021/12/16/siriusxm-apple-music-12-months-free/   
Published: 2021 12 16 15:00:00
Received: 2021 12 16 15:07:53
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: SiriusXM Platinum VIP Tier Now Includes 12 Months of Free Apple Music - published almost 3 years ago.
Content:
https://www.macrumors.com/2021/12/16/siriusxm-apple-music-12-months-free/   
Published: 2021 12 16 15:00:00
Received: 2021 12 16 15:07:53
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report

All Articles

Ordered by Date Published : Year: "2021" Month: "12" Day: "16" Hour: "15"
Page: 1 (of 0)

Total Articles in this collection: 47


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor