All Articles

Ordered by Date Published : Year: "2022" Month: "01" Day: "17"

Total Articles in this collection: 87

Navigation Help at the bottom of the page
Article: Trulioo hires Michael Ramsbacker as CPO - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/18/trulioo-michael-ramsbacker/   
Published: 2022 01 17 23:30:03
Received: 2022 01 18 00:07:18
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Trulioo hires Michael Ramsbacker as CPO - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/18/trulioo-michael-ramsbacker/   
Published: 2022 01 17 23:30:03
Received: 2022 01 18 00:07:18
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Toshiba appoints Andrew McDaniel as Managing Director and SVP of Europe - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/18/toshiba-andrew-mcdaniel/   
Published: 2022 01 17 23:15:58
Received: 2022 01 17 23:26:28
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Toshiba appoints Andrew McDaniel as Managing Director and SVP of Europe - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/18/toshiba-andrew-mcdaniel/   
Published: 2022 01 17 23:15:58
Received: 2022 01 17 23:26:28
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Microsoft releases emergency fixes for Windows Server, VPN bugs - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-fixes-for-windows-server-vpn-bugs/   
Published: 2022 01 17 22:46:17
Received: 2022 01 18 04:00:18
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft releases emergency fixes for Windows Server, VPN bugs - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-fixes-for-windows-server-vpn-bugs/   
Published: 2022 01 17 22:46:17
Received: 2022 01 18 04:00:18
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Microsoft releases OOB updates for January Windows update issues - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-oob-updates-for-january-windows-update-issues/   
Published: 2022 01 17 22:46:17
Received: 2022 01 17 23:00:14
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft releases OOB updates for January Windows update issues - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-oob-updates-for-january-windows-update-issues/   
Published: 2022 01 17 22:46:17
Received: 2022 01 17 23:00:14
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: reFlutter - Flutter Reverse Engineering Framework - published almost 3 years ago.
Content:
http://www.kitploit.com/2022/01/reflutter-flutter-reverse-engineering.html   
Published: 2022 01 17 20:30:00
Received: 2022 01 17 20:45:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: reFlutter - Flutter Reverse Engineering Framework - published almost 3 years ago.
Content:
http://www.kitploit.com/2022/01/reflutter-flutter-reverse-engineering.html   
Published: 2022 01 17 20:30:00
Received: 2022 01 17 20:45:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Worktime 10.20 Build 4967 DLL Hijacking - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010090   
Published: 2022 01 17 20:08:13
Received: 2022 01 17 20:26:10
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Worktime 10.20 Build 4967 DLL Hijacking - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010090   
Published: 2022 01 17 20:08:13
Received: 2022 01 17 20:26:10
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Win32.MarsStealer Web Panel / Unauthenticated Remote Persistent XSS - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010089   
Published: 2022 01 17 20:07:53
Received: 2022 01 17 20:26:10
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Win32.MarsStealer Web Panel / Unauthenticated Remote Persistent XSS - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010089   
Published: 2022 01 17 20:07:53
Received: 2022 01 17 20:26:10
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Win32.MarsStealer Web Panel / Unauthenticated Remote Information Disclosure - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010088   
Published: 2022 01 17 20:07:42
Received: 2022 01 17 20:26:10
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Win32.MarsStealer Web Panel / Unauthenticated Remote Information Disclosure - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010088   
Published: 2022 01 17 20:07:42
Received: 2022 01 17 20:26:10
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Win32.MarsStealer Web Panel / Unauthenticated Remote Data Deletion - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010087   
Published: 2022 01 17 20:07:31
Received: 2022 01 17 20:26:11
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Win32.MarsStealer Web Panel / Unauthenticated Remote Data Deletion - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010087   
Published: 2022 01 17 20:07:31
Received: 2022 01 17 20:26:11
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Developed by : Muhammad Jamil - SQL Injection - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010086   
Published: 2022 01 17 20:07:23
Received: 2022 01 17 20:26:11
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Developed by : Muhammad Jamil - SQL Injection - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010086   
Published: 2022 01 17 20:07:23
Received: 2022 01 17 20:26:11
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: AgentTesla Builder Web Panel / SQL Injection - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010085   
Published: 2022 01 17 20:06:48
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: AgentTesla Builder Web Panel / SQL Injection - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010085   
Published: 2022 01 17 20:06:48
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: AgentTesla Builder Web Panel Cross Site Scripting - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010084   
Published: 2022 01 17 20:06:31
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: AgentTesla Builder Web Panel Cross Site Scripting - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010084   
Published: 2022 01 17 20:06:31
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Chaos Ransomware Builder 4 Insecure Permissions - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010083   
Published: 2022 01 17 20:06:19
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Chaos Ransomware Builder 4 Insecure Permissions - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010083   
Published: 2022 01 17 20:06:19
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: OpenBMCS 2.4 Cross Site Request Forgery - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010082   
Published: 2022 01 17 20:06:03
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: OpenBMCS 2.4 Cross Site Request Forgery - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010082   
Published: 2022 01 17 20:06:03
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: SB Admin Cross Site Request Forgery / SQL Injection - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010081   
Published: 2022 01 17 20:05:41
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: SB Admin Cross Site Request Forgery / SQL Injection - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010081   
Published: 2022 01 17 20:05:41
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Ab Stealer Web Panel Cross Site Scripting - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010080   
Published: 2022 01 17 20:05:27
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Ab Stealer Web Panel Cross Site Scripting - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010080   
Published: 2022 01 17 20:05:27
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Worktime 10.20 Build 4967 Unquoted Service Path - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010079   
Published: 2022 01 17 20:04:53
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Worktime 10.20 Build 4967 Unquoted Service Path - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022010079   
Published: 2022 01 17 20:04:53
Received: 2022 01 17 20:07:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Microsoft: Edge will mitigate 'unforeseen active' zero day bugs - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-edge-will-mitigate-unforeseen-active-zero-day-bugs/   
Published: 2022 01 17 19:51:50
Received: 2022 01 17 20:00:07
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft: Edge will mitigate 'unforeseen active' zero day bugs - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-edge-will-mitigate-unforeseen-active-zero-day-bugs/   
Published: 2022 01 17 19:51:50
Received: 2022 01 17 20:00:07
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Firefox Relay gets added to disposable email blocklist, angers users - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/firefox-relay-gets-added-to-disposable-email-blocklist-angers-users/   
Published: 2022 01 17 19:33:56
Received: 2022 01 17 23:40:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Firefox Relay gets added to disposable email blocklist, angers users - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/firefox-relay-gets-added-to-disposable-email-blocklist-angers-users/   
Published: 2022 01 17 19:33:56
Received: 2022 01 17 23:40:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Firefox Relay's addition to disposable email blocklist upsets users - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/firefox-relays-addition-to-disposable-email-blocklist-upsets-users/   
Published: 2022 01 17 19:33:56
Received: 2022 01 17 19:40:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Firefox Relay's addition to disposable email blocklist upsets users - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/firefox-relays-addition-to-disposable-email-blocklist-upsets-users/   
Published: 2022 01 17 19:33:56
Received: 2022 01 17 19:40:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Romance scammer who targeted 670 women gets 28 months in jail - published almost 3 years ago.
Content:
https://nakedsecurity.sophos.com/2022/01/17/romance-scammer-who-targeted-670-women-gets-28-months-in-jail/   
Published: 2022 01 17 19:13:36
Received: 2022 01 17 14:44:00
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: Romance scammer who targeted 670 women gets 28 months in jail - published almost 3 years ago.
Content:
https://nakedsecurity.sophos.com/2022/01/17/romance-scammer-who-targeted-670-women-gets-28-months-in-jail/   
Published: 2022 01 17 19:13:36
Received: 2022 01 17 14:44:00
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Capturing RDP NetNTLMv2 Hashes: Attack details and a Technical How-To Guide - GoSecure - published almost 3 years ago.
Content: submitted by /u/obilodeau [link] [comments]...
https://www.reddit.com/r/netsec/comments/s6bo98/capturing_rdp_netntlmv2_hashes_attack_details_and/   
Published: 2022 01 17 18:55:59
Received: 2022 01 17 19:05:03
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Capturing RDP NetNTLMv2 Hashes: Attack details and a Technical How-To Guide - GoSecure - published almost 3 years ago.
Content: submitted by /u/obilodeau [link] [comments]...
https://www.reddit.com/r/netsec/comments/s6bo98/capturing_rdp_netntlmv2_hashes_attack_details_and/   
Published: 2022 01 17 18:55:59
Received: 2022 01 17 19:05:03
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Bug in WebKit's IndexedDB implementation makes Safari 15 leak Google account info... and more - published almost 3 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/17/safari_15_indexeddb_bug/   
Published: 2022 01 17 18:31:07
Received: 2022 01 17 18:44:20
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Bug in WebKit's IndexedDB implementation makes Safari 15 leak Google account info... and more - published almost 3 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/17/safari_15_indexeddb_bug/   
Published: 2022 01 17 18:31:07
Received: 2022 01 17 18:44:20
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Zoho plugs another critical security hole in Desktop Central - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/zoho-plugs-another-critical-security-hole-in-desktop-central/   
Published: 2022 01 17 18:04:18
Received: 2022 01 17 23:20:03
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Zoho plugs another critical security hole in Desktop Central - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/zoho-plugs-another-critical-security-hole-in-desktop-central/   
Published: 2022 01 17 18:04:18
Received: 2022 01 17 23:20:03
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Zoho patches new critical authentication bypass in Desktop Central - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/zoho-patches-new-critical-authentication-bypass-in-desktop-central/   
Published: 2022 01 17 18:04:18
Received: 2022 01 17 18:20:03
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Zoho patches new critical authentication bypass in Desktop Central - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/zoho-patches-new-critical-authentication-bypass-in-desktop-central/   
Published: 2022 01 17 18:04:18
Received: 2022 01 17 18:20:03
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Dutch Regulators to Meet With Dating App Providers to Assess Apple's Plan for Alternate In-App Payment Options - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/dutch-assess-apple-alternate-payments/   
Published: 2022 01 17 17:55:01
Received: 2022 01 17 18:06:40
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Dutch Regulators to Meet With Dating App Providers to Assess Apple's Plan for Alternate In-App Payment Options - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/dutch-assess-apple-alternate-payments/   
Published: 2022 01 17 17:55:01
Received: 2022 01 17 18:06:40
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: DHL dethrones Microsoft as most imitated brand in phishing attacks - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/dhl-dethrones-microsoft-as-most-imitated-brand-in-phishing-attacks/   
Published: 2022 01 17 17:45:25
Received: 2022 01 17 18:00:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: DHL dethrones Microsoft as most imitated brand in phishing attacks - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/dhl-dethrones-microsoft-as-most-imitated-brand-in-phishing-attacks/   
Published: 2022 01 17 17:45:25
Received: 2022 01 17 18:00:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Welcome to the Public Domain, Winnie-the-Pooh - published almost 3 years ago.
Content:
https://www.eff.org/deeplinks/2022/01/welcome-public-domain-winnie-pooh   
Published: 2022 01 17 17:26:22
Received: 2022 01 17 17:45:44
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Welcome to the Public Domain, Winnie-the-Pooh - published almost 3 years ago.
Content:
https://www.eff.org/deeplinks/2022/01/welcome-public-domain-winnie-pooh   
Published: 2022 01 17 17:26:22
Received: 2022 01 17 17:45:44
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: It’s Copyright Week 2022: Ten Years Later, How Has SOPA/PIPA Shaped Online Copyright Enforcement? - published almost 3 years ago.
Content:
https://www.eff.org/deeplinks/2022/01/its-copyright-week-2022-ten-years-later-how-has-sopapipa-shaped-online-copyright   
Published: 2022 01 17 17:20:29
Received: 2022 01 17 17:25:42
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: It’s Copyright Week 2022: Ten Years Later, How Has SOPA/PIPA Shaped Online Copyright Enforcement? - published almost 3 years ago.
Content:
https://www.eff.org/deeplinks/2022/01/its-copyright-week-2022-ten-years-later-how-has-sopapipa-shaped-online-copyright   
Published: 2022 01 17 17:20:29
Received: 2022 01 17 17:25:42
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: LG Preparing to Supply OLED Panels for iPad by 2024 - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/lg-oled-ipad-panel-by-2024/   
Published: 2022 01 17 17:04:45
Received: 2022 01 17 17:26:20
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: LG Preparing to Supply OLED Panels for iPad by 2024 - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/lg-oled-ipad-panel-by-2024/   
Published: 2022 01 17 17:04:45
Received: 2022 01 17 17:26:20
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Nintendo warns of spoofed sites pushing fake Switch discounts - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/nintendo-warns-of-spoofed-sites-pushing-fake-switch-discounts/   
Published: 2022 01 17 17:00:00
Received: 2022 01 17 17:40:07
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Nintendo warns of spoofed sites pushing fake Switch discounts - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/nintendo-warns-of-spoofed-sites-pushing-fake-switch-discounts/   
Published: 2022 01 17 17:00:00
Received: 2022 01 17 17:40:07
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cyber espionage campaign targets renewable energy companies - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/cyber-espionage-campaign-targets-renewable-energy-companies/   
Published: 2022 01 17 16:38:01
Received: 2022 01 17 16:40:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Cyber espionage campaign targets renewable energy companies - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/cyber-espionage-campaign-targets-renewable-energy-companies/   
Published: 2022 01 17 16:38:01
Received: 2022 01 17 16:40:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Ukraine blames Belarus for PC-wiping 'ransomware' that has no recovery method and nukes target boxen - published almost 3 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/17/ukraine_pc_wiping_malware_belarus_accusations/   
Published: 2022 01 17 16:24:11
Received: 2022 01 17 16:44:21
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Ukraine blames Belarus for PC-wiping 'ransomware' that has no recovery method and nukes target boxen - published almost 3 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/17/ukraine_pc_wiping_malware_belarus_accusations/   
Published: 2022 01 17 16:24:11
Received: 2022 01 17 16:44:21
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Is your recruitment website leaving your data open for criminals? - published almost 3 years ago.
Content: Why would a recruitment agency be a target from cybercrime?Cyber criminals love personal data and online systems, which places recruitment agencies firmly in the crosshairs. The personal data being held is a treasure trove for criminals with copies of passports, visa details, and employment contracts all sources of sellable secrets. 43% of cyber-attacks are...
https://www.ecrcentre.co.uk/post/is-your-recruitment-website-leaving-your-data-open-for-criminals   
Published: 2022 01 17 16:20:21
Received: 2022 02 03 04:50:38
Feed: The Eastern Cyber Resilience Centre
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Is your recruitment website leaving your data open for criminals? - published almost 3 years ago.
Content: Why would a recruitment agency be a target from cybercrime?Cyber criminals love personal data and online systems, which places recruitment agencies firmly in the crosshairs. The personal data being held is a treasure trove for criminals with copies of passports, visa details, and employment contracts all sources of sellable secrets. 43% of cyber-attacks are...
https://www.ecrcentre.co.uk/post/is-your-recruitment-website-leaving-your-data-open-for-criminals   
Published: 2022 01 17 16:20:21
Received: 2022 02 03 04:50:38
Feed: The Eastern Cyber Resilience Centre
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Researcher Discloses Unpatched Vulnerabilities In NUUO NVRmini2 Devices - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/researcher-discloses-unpatched-vulnerabilities-in-nuuo-nvrmini2-devices/   
Published: 2022 01 17 15:31:23
Received: 2022 01 17 17:44:19
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Researcher Discloses Unpatched Vulnerabilities In NUUO NVRmini2 Devices - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/researcher-discloses-unpatched-vulnerabilities-in-nuuo-nvrmini2-devices/   
Published: 2022 01 17 15:31:23
Received: 2022 01 17 17:44:19
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Developer Showcases Apple CarPlay Workaround for Teslas - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/apple-carplay-workaround-for-teslas/   
Published: 2022 01 17 15:24:41
Received: 2022 01 17 15:26:41
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Developer Showcases Apple CarPlay Workaround for Teslas - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/apple-carplay-workaround-for-teslas/   
Published: 2022 01 17 15:24:41
Received: 2022 01 17 15:26:41
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: It's not just you: Telegram is down for many users - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/technology/its-not-just-you-telegram-is-down-for-many-users/   
Published: 2022 01 17 15:01:23
Received: 2022 01 17 15:20:05
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: It's not just you: Telegram is down for many users - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/technology/its-not-just-you-telegram-is-down-for-many-users/   
Published: 2022 01 17 15:01:23
Received: 2022 01 17 15:20:05
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Mastering the Art of Cloud Tagging Using Data Science - published almost 3 years ago.
Content:
https://www.darkreading.com/cloud/mastering-the-art-of-cloud-tagging-using-data-science   
Published: 2022 01 17 15:00:00
Received: 2022 01 17 15:08:11
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Mastering the Art of Cloud Tagging Using Data Science - published almost 3 years ago.
Content:
https://www.darkreading.com/cloud/mastering-the-art-of-cloud-tagging-using-data-science   
Published: 2022 01 17 15:00:00
Received: 2022 01 17 15:08:11
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: iPhone SE With Larger 5.7-Inch Display May Launch in 2023, 'iPhone SE+ 5G' Also Rumored - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/larger-iphone-se-4-in-2023-rumor/   
Published: 2022 01 17 14:46:28
Received: 2022 01 17 15:46:00
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPhone SE With Larger 5.7-Inch Display May Launch in 2023, 'iPhone SE+ 5G' Also Rumored - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/larger-iphone-se-4-in-2023-rumor/   
Published: 2022 01 17 14:46:28
Received: 2022 01 17 15:46:00
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: iPhone SE With Larger 5.7-Inch Display Rumored to Launch as Early as 2023 - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/larger-iphone-se-4-in-2023-rumor/   
Published: 2022 01 17 14:46:28
Received: 2022 01 17 15:26:41
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPhone SE With Larger 5.7-Inch Display Rumored to Launch as Early as 2023 - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/larger-iphone-se-4-in-2023-rumor/   
Published: 2022 01 17 14:46:28
Received: 2022 01 17 15:26:41
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: 'iPhone SE+ 5G' Rumored to Launch This Year, Larger 5.7-Inch Model Expected as Early as 2023 - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/larger-iphone-se-4-in-2023-rumor/   
Published: 2022 01 17 14:46:28
Received: 2022 01 17 15:07:13
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: 'iPhone SE+ 5G' Rumored to Launch This Year, Larger 5.7-Inch Model Expected as Early as 2023 - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/larger-iphone-se-4-in-2023-rumor/   
Published: 2022 01 17 14:46:28
Received: 2022 01 17 15:07:13
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Vulnerability Summary for the Week of January 10, 2022 - published almost 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/bulletins/sb22-017   
Published: 2022 01 17 14:23:15
Received: 2022 01 17 19:46:58
Feed: CISA Bulletins
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Bulletins
Topic: Cyber Security
Article: Vulnerability Summary for the Week of January 10, 2022 - published almost 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/bulletins/sb22-017   
Published: 2022 01 17 14:23:15
Received: 2022 01 17 19:46:58
Feed: CISA Bulletins
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Bulletins
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Domain Persistence – Machine Account - published almost 3 years ago.
Content: submitted by /u/netbiosX [link] [comments]
https://www.reddit.com/r/netsec/comments/s64vyt/domain_persistence_machine_account/   
Published: 2022 01 17 14:11:09
Received: 2022 01 17 16:04:11
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Domain Persistence – Machine Account - published almost 3 years ago.
Content: submitted by /u/netbiosX [link] [comments]
https://www.reddit.com/r/netsec/comments/s64vyt/domain_persistence_machine_account/   
Published: 2022 01 17 14:11:09
Received: 2022 01 17 16:04:11
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Microsoft Finds New Malware Targeting Organizations in Ukraine - published almost 3 years ago.
Content: Microsoft’s security experts identified a novel malware campaign targeting several IT, non-profit, and government organizations based in Ukraine. Tracked as WhisperGate, the activities of the destructive malware campaign were first spotted on January 13.  As per a report from Microsoft Threat Intelligence Center (MSTIC), the malware used by this campaign is ...
https://cisomag.eccouncil.org/microsoft-finds-new-malware-targeting-organizations-in-ukraine/   
Published: 2022 01 17 14:07:45
Received: 2022 01 17 15:07:45
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Article: Microsoft Finds New Malware Targeting Organizations in Ukraine - published almost 3 years ago.
Content: Microsoft’s security experts identified a novel malware campaign targeting several IT, non-profit, and government organizations based in Ukraine. Tracked as WhisperGate, the activities of the destructive malware campaign were first spotted on January 13.  As per a report from Microsoft Threat Intelligence Center (MSTIC), the malware used by this campaign is ...
https://cisomag.eccouncil.org/microsoft-finds-new-malware-targeting-organizations-in-ukraine/   
Published: 2022 01 17 14:07:45
Received: 2022 01 17 15:07:45
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: SysJoker Backdoor Arrives As A Potent Multi-Platform Espionage Threat - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/sysjoker-backdoor-arrives-as-a-potent-multi-platform-espionage-threat/   
Published: 2022 01 17 13:59:27
Received: 2022 01 17 14:44:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: SysJoker Backdoor Arrives As A Potent Multi-Platform Espionage Threat - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/sysjoker-backdoor-arrives-as-a-potent-multi-platform-espionage-threat/   
Published: 2022 01 17 13:59:27
Received: 2022 01 17 14:44:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Safari bug leaks your Google account info, browsing history - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/safari-bug-leaks-your-google-account-info-browsing-history/   
Published: 2022 01 17 13:47:31
Received: 2022 01 17 14:00:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Safari bug leaks your Google account info, browsing history - published almost 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/safari-bug-leaks-your-google-account-info-browsing-history/   
Published: 2022 01 17 13:47:31
Received: 2022 01 17 14:00:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Umbrella company Parasol Group confirms cyber attack as 'root cause' of prolonged network outage - published almost 3 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/17/umbrella_company_parasol_group_confirms/   
Published: 2022 01 17 13:28:11
Received: 2022 01 17 13:44:23
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Umbrella company Parasol Group confirms cyber attack as 'root cause' of prolonged network outage - published almost 3 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/17/umbrella_company_parasol_group_confirms/   
Published: 2022 01 17 13:28:11
Received: 2022 01 17 13:44:23
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Apple macOS Security Bypass Bug Could Allow Access To Private Data - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/apple-macos-security-bypass-bug-could-allow-access-to-private-data/   
Published: 2022 01 17 12:51:06
Received: 2022 01 17 14:44:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Apple macOS Security Bypass Bug Could Allow Access To Private Data - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/apple-macos-security-bypass-bug-could-allow-access-to-private-data/   
Published: 2022 01 17 12:51:06
Received: 2022 01 17 14:44:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Microsoft January Patch Tuesday Addresses 96 Vulnerabilities - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/microsoft-january-patch-tuesday-addresses-96-vulnerabilities/   
Published: 2022 01 17 12:44:07
Received: 2022 01 17 14:44:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft January Patch Tuesday Addresses 96 Vulnerabilities - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/microsoft-january-patch-tuesday-addresses-96-vulnerabilities/   
Published: 2022 01 17 12:44:07
Received: 2022 01 17 14:44:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: NoReboot iOS Attack Prevents Your iPhone From Turning Off Or Reboot - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/noreboot-ios-attack-prevents-your-iphone-from-turning-off-or-reboot/   
Published: 2022 01 17 12:39:18
Received: 2022 01 17 14:44:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: NoReboot iOS Attack Prevents Your iPhone From Turning Off Or Reboot - published almost 3 years ago.
Content:
https://latesthackingnews.com/2022/01/17/noreboot-ios-attack-prevents-your-iphone-from-turning-off-or-reboot/   
Published: 2022 01 17 12:39:18
Received: 2022 01 17 14:44:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: UK Government Readies Anti-Encryption Publicity Campaign to 'Keep Children Safe' Online - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/uk-government-anti-encryption-campaign/   
Published: 2022 01 17 12:26:04
Received: 2022 01 17 12:45:45
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: UK Government Readies Anti-Encryption Publicity Campaign to 'Keep Children Safe' Online - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/uk-government-anti-encryption-campaign/   
Published: 2022 01 17 12:26:04
Received: 2022 01 17 12:45:45
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: An Examination of the Bug Bounty Marketplace - published almost 3 years ago.
Content: Here’s a fascinating report: “Bounty Everything: Hackers and the Making of the Global Bug Marketplace.” From a summary: …researchers Ryan Ellis and Yuan Stevens provide a window into the working lives of hackers who participate in “bug bounty” programs­ — programs that hire hackers to discover and report bugs or other vulnerabilities in their systems. This r...
https://www.schneier.com/blog/archives/2022/01/an-examination-of-the-bug-bounty-marketplace.html   
Published: 2022 01 17 12:16:18
Received: 2022 01 17 12:24:19
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: An Examination of the Bug Bounty Marketplace - published almost 3 years ago.
Content: Here’s a fascinating report: “Bounty Everything: Hackers and the Making of the Global Bug Marketplace.” From a summary: …researchers Ryan Ellis and Yuan Stevens provide a window into the working lives of hackers who participate in “bug bounty” programs­ — programs that hire hackers to discover and report bugs or other vulnerabilities in their systems. This r...
https://www.schneier.com/blog/archives/2022/01/an-examination-of-the-bug-bounty-marketplace.html   
Published: 2022 01 17 12:16:18
Received: 2022 01 17 12:24:19
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Ukraine: Wiper malware masquerading as ransomware hits government organizations - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/ukraine-wiper-malware/   
Published: 2022 01 17 12:10:32
Received: 2022 01 17 12:26:53
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Ukraine: Wiper malware masquerading as ransomware hits government organizations - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/ukraine-wiper-malware/   
Published: 2022 01 17 12:10:32
Received: 2022 01 17 12:26:53
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Inject-Assembly - Inject .NET Assemblies Into An Existing Process - published almost 3 years ago.
Content:
http://www.kitploit.com/2022/01/inject-assembly-inject-net-assemblies.html   
Published: 2022 01 17 11:30:00
Received: 2022 01 17 11:45:45
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Inject-Assembly - Inject .NET Assemblies Into An Existing Process - published almost 3 years ago.
Content:
http://www.kitploit.com/2022/01/inject-assembly-inject-net-assemblies.html   
Published: 2022 01 17 11:30:00
Received: 2022 01 17 11:45:45
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: North Korean Lazarus Group Stole $400 M Worth of Cryptocurrencies in 2021 - published almost 3 years ago.
Content: Several organizations started the New Year globally with hacker intrusions and data breaches, but few cybercriminal groups benefitted from their malicious activities. A recent analysis from blockchain firm Chainalysis revealed that North Korean threat actors stole over $400 million worth of cryptocurrency in 2021 by compromising multiple crypto exchanges and...
https://cisomag.eccouncil.org/north-korean-lazarus-group-stole-400-m-worth-of-cryptocurrencies-in-2021/   
Published: 2022 01 17 10:40:51
Received: 2022 01 17 11:06:38
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Article: North Korean Lazarus Group Stole $400 M Worth of Cryptocurrencies in 2021 - published almost 3 years ago.
Content: Several organizations started the New Year globally with hacker intrusions and data breaches, but few cybercriminal groups benefitted from their malicious activities. A recent analysis from blockchain firm Chainalysis revealed that North Korean threat actors stole over $400 million worth of cryptocurrency in 2021 by compromising multiple crypto exchanges and...
https://cisomag.eccouncil.org/north-korean-lazarus-group-stole-400-m-worth-of-cryptocurrencies-in-2021/   
Published: 2022 01 17 10:40:51
Received: 2022 01 17 11:06:38
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Article: The emotional stages of a data breach: How to deal with panic, anger, and guilt - published almost 3 years ago.
Content:
https://www.csoonline.com/article/3646616/the-emotional-stages-of-a-data-breach-how-to-deal-with-panic-anger-and-guilt.html#tk.rss_all   
Published: 2022 01 17 10:00:00
Received: 2022 01 17 12:20:12
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: The emotional stages of a data breach: How to deal with panic, anger, and guilt - published almost 3 years ago.
Content:
https://www.csoonline.com/article/3646616/the-emotional-stages-of-a-data-breach-how-to-deal-with-panic-anger-and-guilt.html#tk.rss_all   
Published: 2022 01 17 10:00:00
Received: 2022 01 17 12:20:12
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple Commemorates Dr. Martin Luther King, Jr. With Full-Page Website Tribute - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/apple-commemorates-dr-martin-luther-king-jr/   
Published: 2022 01 17 09:44:10
Received: 2022 01 17 10:06:11
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Commemorates Dr. Martin Luther King, Jr. With Full-Page Website Tribute - published almost 3 years ago.
Content:
https://www.macrumors.com/2022/01/17/apple-commemorates-dr-martin-luther-king-jr/   
Published: 2022 01 17 09:44:10
Received: 2022 01 17 10:06:11
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Research request - published almost 3 years ago.
Content: How do organisations prepare for and manage the consequences of a Cyber Attack? A study on resilience.Can you help by completing a short questionnaire? Researcher, Matthew Mackay, Abertay University, is exploring cyber resilience, including reviewing available guidance and best practice for cyber resilience, assessing available frameworks to allow an organi...
https://www.ecrcentre.co.uk/post/research-request   
Published: 2022 01 17 09:00:27
Received: 2022 02 03 04:50:38
Feed: The Eastern Cyber Resilience Centre
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Research request - published almost 3 years ago.
Content: How do organisations prepare for and manage the consequences of a Cyber Attack? A study on resilience.Can you help by completing a short questionnaire? Researcher, Matthew Mackay, Abertay University, is exploring cyber resilience, including reviewing available guidance and best practice for cyber resilience, assessing available frameworks to allow an organi...
https://www.ecrcentre.co.uk/post/research-request   
Published: 2022 01 17 09:00:27
Received: 2022 02 03 04:50:38
Feed: The Eastern Cyber Resilience Centre
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: North Korean Hackers ‘Stole $400m’ In 2021 - published almost 3 years ago.
Content:
https://www.silicon.co.uk/security/cyberwar/north-korea-hackers-2-437000   
Published: 2022 01 17 09:00:02
Received: 2022 01 17 09:41:00
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: North Korean Hackers ‘Stole $400m’ In 2021 - published almost 3 years ago.
Content:
https://www.silicon.co.uk/security/cyberwar/north-korea-hackers-2-437000   
Published: 2022 01 17 09:00:02
Received: 2022 01 17 09:41:00
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Major Stolen Card Marketplace Shuts Down After Making Millions - published almost 3 years ago.
Content:
https://www.silicon.co.uk/security/cyberwar/unicc-shutdown-hacking-436995   
Published: 2022 01 17 08:30:25
Received: 2022 01 17 09:41:00
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Major Stolen Card Marketplace Shuts Down After Making Millions - published almost 3 years ago.
Content:
https://www.silicon.co.uk/security/cyberwar/unicc-shutdown-hacking-436995   
Published: 2022 01 17 08:30:25
Received: 2022 01 17 09:41:00
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: January 2022 Web Server Survey - published almost 3 years ago.
Content: In the January 2022 survey we received responses from 1,167,715,133 sites across 269,835,071 unique domains and 11,700,892 web-facing computers. This reflects a loss of 1.15 million sites, but a gain of 1.51 million domains and 31,100 computers. nginx lost 7.33 million sites this month (-1.91%) but continues to be the most commonly used web server with 32.3%...
https://news.netcraft.com/archives/2022/01/17/january-2022-web-server-survey.html   
Published: 2022 01 17 08:17:28
Received: 2022 01 17 09:45:25
Feed: Netcraft
Source: Netcraft
Category: Cyber Security
Topic: Cyber Security
Article: January 2022 Web Server Survey - published almost 3 years ago.
Content: In the January 2022 survey we received responses from 1,167,715,133 sites across 269,835,071 unique domains and 11,700,892 web-facing computers. This reflects a loss of 1.15 million sites, but a gain of 1.51 million domains and 31,100 computers. nginx lost 7.33 million sites this month (-1.91%) but continues to be the most commonly used web server with 32.3%...
https://news.netcraft.com/archives/2022/01/17/january-2022-web-server-survey.html   
Published: 2022 01 17 08:17:28
Received: 2022 01 17 09:45:25
Feed: Netcraft
Source: Netcraft
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Russia’s FSB Arrests REvil Ransomware Gang Members - published almost 3 years ago.
Content:
https://www.silicon.co.uk/security/cyberwar/revil-russia-arrests-436989   
Published: 2022 01 17 08:00:57
Received: 2022 01 17 09:41:00
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Russia’s FSB Arrests REvil Ransomware Gang Members - published almost 3 years ago.
Content:
https://www.silicon.co.uk/security/cyberwar/revil-russia-arrests-436989   
Published: 2022 01 17 08:00:57
Received: 2022 01 17 09:41:00
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: IR and SimEx: Can and should they be standardized? - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/ir-simex/   
Published: 2022 01 17 06:30:26
Received: 2022 01 17 06:46:44
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: IR and SimEx: Can and should they be standardized? - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/ir-simex/   
Published: 2022 01 17 06:30:26
Received: 2022 01 17 06:46:44
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: AI to bring massive benefits, but also cause great concern - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/ai-benefits/   
Published: 2022 01 17 06:00:50
Received: 2022 01 17 06:27:06
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: AI to bring massive benefits, but also cause great concern - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/ai-benefits/   
Published: 2022 01 17 06:00:50
Received: 2022 01 17 06:27:06
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Mastering Art and Science Is Imperative for CISOs to Be Successful - published almost 3 years ago.
Content: IT experts rise to the rank of chief information security officer (CISO) because they have mastered the science and engineering involved in that discipline. But for a CISO to thrive, leadership skills are critical. And leadership is an art. By Prasad Jayaraman, Principal, Advisory at KPMG Blending the science of technology with the art of leadership is the c...
https://cisomag.eccouncil.org/ciso-leadership-skills/   
Published: 2022 01 17 05:36:18
Received: 2022 01 17 06:26:48
Feed: CISO Mag - Features
Source: CISO Mag
Category: Features
Topic: Cyber Security
Article: Mastering Art and Science Is Imperative for CISOs to Be Successful - published almost 3 years ago.
Content: IT experts rise to the rank of chief information security officer (CISO) because they have mastered the science and engineering involved in that discipline. But for a CISO to thrive, leadership skills are critical. And leadership is an art. By Prasad Jayaraman, Principal, Advisory at KPMG Blending the science of technology with the art of leadership is the c...
https://cisomag.eccouncil.org/ciso-leadership-skills/   
Published: 2022 01 17 05:36:18
Received: 2022 01 17 06:26:48
Feed: CISO Mag - Features
Source: CISO Mag
Category: Features
Topic: Cyber Security
Article: SecOps teams are understaffed and overworked - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/secops-teams-understaffed-overworked/   
Published: 2022 01 17 05:30:40
Received: 2022 01 17 06:07:00
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: SecOps teams are understaffed and overworked - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/secops-teams-understaffed-overworked/   
Published: 2022 01 17 05:30:40
Received: 2022 01 17 06:07:00
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Why is intergenerational collaboration critical in advancing zero trust security progress? - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/accelerating-zero-trust-security/   
Published: 2022 01 17 05:00:33
Received: 2022 01 17 05:27:04
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Why is intergenerational collaboration critical in advancing zero trust security progress? - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/accelerating-zero-trust-security/   
Published: 2022 01 17 05:00:33
Received: 2022 01 17 05:27:04
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Many users don’t know how to protect their broadband Wi-Fi routers - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/broadband-wi-fi-routers-risk/   
Published: 2022 01 17 04:30:18
Received: 2022 01 11 04:46:27
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Many users don’t know how to protect their broadband Wi-Fi routers - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/broadband-wi-fi-routers-risk/   
Published: 2022 01 17 04:30:18
Received: 2022 01 11 04:46:27
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Ukrainian Government Officially Accuses Russia of Recent Cyberattacks - published almost 3 years ago.
Content:
https://thehackernews.com/2022/01/ukrainian-government-officially-accuses.html   
Published: 2022 01 17 04:29:32
Received: 2022 01 17 04:46:54
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Ukrainian Government Officially Accuses Russia of Recent Cyberattacks - published almost 3 years ago.
Content:
https://thehackernews.com/2022/01/ukrainian-government-officially-accuses.html   
Published: 2022 01 17 04:29:32
Received: 2022 01 17 04:46:54
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Mobile device management market to reach $20.4 billion by 2026 - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/mobile-device-management-2026/   
Published: 2022 01 17 04:00:55
Received: 2022 01 17 04:26:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Mobile device management market to reach $20.4 billion by 2026 - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/mobile-device-management-2026/   
Published: 2022 01 17 04:00:55
Received: 2022 01 17 04:26:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The CISO’s guide to evaluating third-party security platforms - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/the-cisos-guide-to-evaluating-third-party-security-platforms/   
Published: 2022 01 17 04:00:15
Received: 2021 10 19 09:04:05
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: The CISO’s guide to evaluating third-party security platforms - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/the-cisos-guide-to-evaluating-third-party-security-platforms/   
Published: 2022 01 17 04:00:15
Received: 2021 10 19 09:04:05
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: New Unpatched Apple Safari Browser Bug Allows Cross-Site User Tracking - published almost 3 years ago.
Content:
https://thehackernews.com/2022/01/new-unpatched-apple-safari-browser-bug.html   
Published: 2022 01 17 03:34:04
Received: 2022 01 16 11:26:21
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: New Unpatched Apple Safari Browser Bug Allows Cross-Site User Tracking - published almost 3 years ago.
Content:
https://thehackernews.com/2022/01/new-unpatched-apple-safari-browser-bug.html   
Published: 2022 01 17 03:34:04
Received: 2022 01 16 11:26:21
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: IT leadership appointments: Dialpad, Elastic, Everbridge, F5 Networks, and Netrix - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/it-leadership-appointments-dialpad-elastic-everbridge-f5-networks-and-netrix/   
Published: 2022 01 17 03:32:34
Received: 2022 01 17 04:07:30
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: IT leadership appointments: Dialpad, Elastic, Everbridge, F5 Networks, and Netrix - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/it-leadership-appointments-dialpad-elastic-everbridge-f5-networks-and-netrix/   
Published: 2022 01 17 03:32:34
Received: 2022 01 17 04:07:30
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Mirantis Secure Registry 3.0 helps enterprises secure their software supply chain - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/mirantis-secure-registry-3-0/   
Published: 2022 01 17 02:00:20
Received: 2022 01 17 02:26:33
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Mirantis Secure Registry 3.0 helps enterprises secure their software supply chain - published almost 3 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/17/mirantis-secure-registry-3-0/   
Published: 2022 01 17 02:00:20
Received: 2022 01 17 02:26:33
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Actions to take when the cyber threat is heightened - published almost 3 years ago.
Content:
https://www.ncsc.gov.uk/guidance/actions-to-take-when-the-cyber-threat-is-heightened   
Published: 2022 01 17 00:00:00
Received: 2022 02 01 12:29:53
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Actions to take when the cyber threat is heightened - published almost 3 years ago.
Content:
https://www.ncsc.gov.uk/guidance/actions-to-take-when-the-cyber-threat-is-heightened   
Published: 2022 01 17 00:00:00
Received: 2022 02 01 12:29:53
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)

All Articles

Ordered by Date Published : Year: "2022" Month: "01" Day: "17"

Total Articles in this collection: 87


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor