All Articles

Ordered by Date Published : Year: "2022" Month: "01" Day: "19"
Page: << < 3 (of 3)

Total Articles in this collection: 167

Navigation Help at the bottom of the page
Article: Interpol arrests 11 BEC gang members linked to 50,000 targets - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/interpol-arrests-11-bec-gang-members-linked-to-50-000-targets/   
Published: 2022 01 19 12:16:35
Received: 2022 01 19 12:20:03
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Interpol arrests 11 BEC gang members linked to 50,000 targets - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/interpol-arrests-11-bec-gang-members-linked-to-50-000-targets/   
Published: 2022 01 19 12:16:35
Received: 2022 01 19 12:20:03
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Are Fake COVID Testing Sites Harvesting Data? - published over 2 years ago.
Content: Over the past few weeks, I’ve seen a bunch of writing about what seems to be fake COVID-19 testing sites. They take your name and info, and do a nose swab, but you never get test results. Speculation centered around data harvesting, but that didn’t make sense because it was far too labor intensive for that and — sorry to break it to you — your data isn’t wor...
https://www.schneier.com/blog/archives/2022/01/are-fake-covid-testing-sites-harvesting-data.html   
Published: 2022 01 19 12:10:53
Received: 2022 01 19 12:25:45
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Are Fake COVID Testing Sites Harvesting Data? - published over 2 years ago.
Content: Over the past few weeks, I’ve seen a bunch of writing about what seems to be fake COVID-19 testing sites. They take your name and info, and do a nose swab, but you never get test results. Speculation centered around data harvesting, but that didn’t make sense because it was far too labor intensive for that and — sorry to break it to you — your data isn’t wor...
https://www.schneier.com/blog/archives/2022/01/are-fake-covid-testing-sites-harvesting-data.html   
Published: 2022 01 19 12:10:53
Received: 2022 01 19 12:25:45
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: A New Destructive Malware Targeting Ukrainian Government and Business Entities - published over 2 years ago.
Content:
https://thehackernews.com/2022/01/a-new-destructive-malware-targeting.html   
Published: 2022 01 19 12:08:33
Received: 2022 01 16 09:26:26
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: A New Destructive Malware Targeting Ukrainian Government and Business Entities - published over 2 years ago.
Content:
https://thehackernews.com/2022/01/a-new-destructive-malware-targeting.html   
Published: 2022 01 19 12:08:33
Received: 2022 01 16 09:26:26
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Remote code execution vulnerability present in SonicWall SMA 100 series appliances - published over 2 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/alerts/remote-code-execution-vulnerability-present-sonicwall-sma-100-series-appliances   
Published: 2022 01 19 12:00:00
Received: 2022 01 19 07:21:45
Feed: ACSC – Alerts
Source: Australian Cyber Security Centre (ACSC)
Category: Alerts
Topic: Cyber Security
Article: Remote code execution vulnerability present in SonicWall SMA 100 series appliances - published over 2 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/alerts/remote-code-execution-vulnerability-present-sonicwall-sma-100-series-appliances   
Published: 2022 01 19 12:00:00
Received: 2022 01 19 07:21:45
Feed: ACSC – Alerts
Source: Australian Cyber Security Centre (ACSC)
Category: Alerts
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Phone and email scammers impersonating the ACSC - published over 2 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/alerts/phone-and-email-scammers-impersonating-acsc   
Published: 2022 01 19 12:00:00
Received: 2021 05 23 07:00:32
Feed: ACSC – Alerts
Source: Australian Cyber Security Centre (ACSC)
Category: Alerts
Topic: Cyber Security
Article: Phone and email scammers impersonating the ACSC - published over 2 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/alerts/phone-and-email-scammers-impersonating-acsc   
Published: 2022 01 19 12:00:00
Received: 2021 05 23 07:00:32
Feed: ACSC – Alerts
Source: Australian Cyber Security Centre (ACSC)
Category: Alerts
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: What's Notch to Like? Samsung Accidentally Leaks Its New Flagship Galaxy Tab - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/19/samsung-puts-a-notch-on-its-next-tablet/   
Published: 2022 01 19 11:58:17
Received: 2022 01 19 12:07:39
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: What's Notch to Like? Samsung Accidentally Leaks Its New Flagship Galaxy Tab - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/19/samsung-puts-a-notch-on-its-next-tablet/   
Published: 2022 01 19 11:58:17
Received: 2022 01 19 12:07:39
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Pip-Audit - Audits Python Environments And Dependency Trees For Known Vulnerabilities - published over 2 years ago.
Content:
http://www.kitploit.com/2022/01/pip-audit-audits-python-environments.html   
Published: 2022 01 19 11:30:00
Received: 2022 01 19 11:46:43
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Pip-Audit - Audits Python Environments And Dependency Trees For Known Vulnerabilities - published over 2 years ago.
Content:
http://www.kitploit.com/2022/01/pip-audit-audits-python-environments.html   
Published: 2022 01 19 11:30:00
Received: 2022 01 19 11:46:43
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Accellion Agrees to Pay $8.1 M in Data Breach Lawsuit Settlement - published over 2 years ago.
Content: Accellion, a provider of hosted file transfer services, recently agreed to pay $8.1 million to settle a class-action lawsuit related to a data breach in December 2020. The lawsuit, filed in a California Federal Court, claims that Accellion failed to protect the sensitive information of millions of users after threat actors exploited a vulnerability in Accell...
https://cisomag.eccouncil.org/accellion-agrees-to-pay-8-1-m-in-data-breach-lawsuit-settlement/   
Published: 2022 01 19 11:14:51
Received: 2022 01 19 11:46:54
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Article: Accellion Agrees to Pay $8.1 M in Data Breach Lawsuit Settlement - published over 2 years ago.
Content: Accellion, a provider of hosted file transfer services, recently agreed to pay $8.1 million to settle a class-action lawsuit related to a data breach in December 2020. The lawsuit, filed in a California Federal Court, claims that Accellion failed to protect the sensitive information of millions of users after threat actors exploited a vulnerability in Accell...
https://cisomag.eccouncil.org/accellion-agrees-to-pay-8-1-m-in-data-breach-lawsuit-settlement/   
Published: 2022 01 19 11:14:51
Received: 2022 01 19 11:46:54
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Phishers go after business email credentials by impersonating U.S. DOL - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/phishers-business-email/   
Published: 2022 01 19 11:10:13
Received: 2022 01 19 11:47:15
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Phishers go after business email credentials by impersonating U.S. DOL - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/phishers-business-email/   
Published: 2022 01 19 11:10:13
Received: 2022 01 19 11:47:15
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Gorillas: Special offer - unicorn slices, 150g 🦍❤️ - published over 2 years ago.
Content: submitted by /u/moviuro [link] [comments]
https://www.reddit.com/r/netsec/comments/s7no43/gorillas_special_offer_unicorn_slices_150g/   
Published: 2022 01 19 11:01:26
Received: 2022 01 19 17:44:22
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Gorillas: Special offer - unicorn slices, 150g 🦍❤️ - published over 2 years ago.
Content: submitted by /u/moviuro [link] [comments]
https://www.reddit.com/r/netsec/comments/s7no43/gorillas_special_offer_unicorn_slices_150g/   
Published: 2022 01 19 11:01:26
Received: 2022 01 19 17:44:22
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Cloned Dept. of Labor Site Hawks Fake Government Contracts - published over 2 years ago.
Content:
https://threatpost.com/cloned-dept-of-labor-fake-government-contracts/177734/   
Published: 2022 01 19 11:00:12
Received: 2022 01 19 13:46:05
Feed: Threatpost – Government
Source: Threatpost
Category: News
Topic: Government
Article: Cloned Dept. of Labor Site Hawks Fake Government Contracts - published over 2 years ago.
Content:
https://threatpost.com/cloned-dept-of-labor-fake-government-contracts/177734/   
Published: 2022 01 19 11:00:12
Received: 2022 01 19 13:46:05
Feed: Threatpost – Government
Source: Threatpost
Category: News
Topic: Government
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Office 365 phishing attack impersonates the US Department of Labor - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/office-365-phishing-attack-impersonates-the-us-department-of-labor/   
Published: 2022 01 19 11:00:00
Received: 2022 01 19 12:20:03
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Office 365 phishing attack impersonates the US Department of Labor - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/office-365-phishing-attack-impersonates-the-us-department-of-labor/   
Published: 2022 01 19 11:00:00
Received: 2022 01 19 12:20:03
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Apple's US Education Store Now Requires Institution Verification to Buy Discounted Products - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/19/apple-us-education-store-verification/   
Published: 2022 01 19 10:22:02
Received: 2022 01 19 10:46:17
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple's US Education Store Now Requires Institution Verification to Buy Discounted Products - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/19/apple-us-education-store-verification/   
Published: 2022 01 19 10:22:02
Received: 2022 01 19 10:46:17
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: How chaos engineering can help DevSecOps teams find vulnerabilities - published over 2 years ago.
Content:
https://www.csoonline.com/article/3646413/how-chaos-engineering-can-help-devsecops-teams-find-vulnerabilities.html#tk.rss_all   
Published: 2022 01 19 10:00:00
Received: 2022 01 19 11:20:08
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: How chaos engineering can help DevSecOps teams find vulnerabilities - published over 2 years ago.
Content:
https://www.csoonline.com/article/3646413/how-chaos-engineering-can-help-devsecops-teams-find-vulnerabilities.html#tk.rss_all   
Published: 2022 01 19 10:00:00
Received: 2022 01 19 11:20:08
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Russian cyberattacks on Ukraine raise IT security concerns - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647070/russian-cyberattacks-on-ukraine-raise-it-security-concerns.html#tk.rss_all   
Published: 2022 01 19 10:00:00
Received: 2022 01 19 11:20:08
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Russian cyberattacks on Ukraine raise IT security concerns - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647070/russian-cyberattacks-on-ukraine-raise-it-security-concerns.html#tk.rss_all   
Published: 2022 01 19 10:00:00
Received: 2022 01 19 11:20:08
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Russia-linked cyberattacks on Ukraine: A timeline - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647072/a-timeline-of-russian-linked-cyberattacks-on-ukraine.html#tk.rss_all   
Published: 2022 01 19 10:00:00
Received: 2022 01 19 11:20:08
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Russia-linked cyberattacks on Ukraine: A timeline - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647072/a-timeline-of-russian-linked-cyberattacks-on-ukraine.html#tk.rss_all   
Published: 2022 01 19 10:00:00
Received: 2022 01 19 11:20:08
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Microsoft's Pluton security processor tackles hardware, firmware vulnerabilities - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647170/microsofts-pluton-security-processor-tackles-hardware-firmware-vulnerabilities.html#tk.rss_all   
Published: 2022 01 19 10:00:00
Received: 2022 01 19 11:20:08
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft's Pluton security processor tackles hardware, firmware vulnerabilities - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647170/microsofts-pluton-security-processor-tackles-hardware-firmware-vulnerabilities.html#tk.rss_all   
Published: 2022 01 19 10:00:00
Received: 2022 01 19 11:20:08
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Demonstrating how phishermen abuse free hosting - published over 2 years ago.
Content: submitted by /u/df_works [link] [comments]
https://www.reddit.com/r/netsec/comments/s7mhiu/demonstrating_how_phishermen_abuse_free_hosting/   
Published: 2022 01 19 09:40:45
Received: 2022 01 19 10:24:20
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Demonstrating how phishermen abuse free hosting - published over 2 years ago.
Content: submitted by /u/df_works [link] [comments]
https://www.reddit.com/r/netsec/comments/s7mhiu/demonstrating_how_phishermen_abuse_free_hosting/   
Published: 2022 01 19 09:40:45
Received: 2022 01 19 10:24:20
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Apple Lowers Value of Android Smartphones for iPhone Trade-In - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/19/apple-lowers-value-of-android-smartphones/   
Published: 2022 01 19 09:27:54
Received: 2022 01 19 09:46:03
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Lowers Value of Android Smartphones for iPhone Trade-In - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/19/apple-lowers-value-of-android-smartphones/   
Published: 2022 01 19 09:27:54
Received: 2022 01 19 09:46:03
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Nine-year-old kids are launching DDoS attacks against schools - published over 2 years ago.
Content:
https://www.bitdefender.com/blog/hotforsecurity/nine-year-old-kids-are-launching-ddos-attacks-against-schools/   
Published: 2022 01 19 09:25:23
Received: 2022 01 19 09:43:57
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: Nine-year-old kids are launching DDoS attacks against schools - published over 2 years ago.
Content:
https://www.bitdefender.com/blog/hotforsecurity/nine-year-old-kids-are-launching-ddos-attacks-against-schools/   
Published: 2022 01 19 09:25:23
Received: 2022 01 19 09:43:57
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: SMS and telephone best practice: new guidance for organisations - published over 2 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/sms-and-telephone-best-practice-new-guidance-for-organisations   
Published: 2022 01 19 08:46:05
Received: 2024 03 06 17:21:18
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: SMS and telephone best practice: new guidance for organisations - published over 2 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/sms-and-telephone-best-practice-new-guidance-for-organisations   
Published: 2022 01 19 08:46:05
Received: 2024 03 06 17:21:18
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Ukraine: Recent Cyber Attacks Part of Wider Plot to Sabotage Critical Infrastructure - published over 2 years ago.
Content:
https://thehackernews.com/2022/01/ukraine-recent-cyber-attacks-part-of.html   
Published: 2022 01 19 07:49:16
Received: 2022 01 19 07:06:32
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Ukraine: Recent Cyber Attacks Part of Wider Plot to Sabotage Critical Infrastructure - published over 2 years ago.
Content:
https://thehackernews.com/2022/01/ukraine-recent-cyber-attacks-part-of.html   
Published: 2022 01 19 07:49:16
Received: 2022 01 19 07:06:32
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cultivating a security-first mindset for software developers - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/development-approach/   
Published: 2022 01 19 07:00:02
Received: 2022 01 19 07:06:51
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Cultivating a security-first mindset for software developers - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/development-approach/   
Published: 2022 01 19 07:00:02
Received: 2022 01 19 07:06:51
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Is cloud the solution to optimized data privacy? - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/privacy-data/   
Published: 2022 01 19 06:30:04
Received: 2022 01 19 06:46:41
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Is cloud the solution to optimized data privacy? - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/privacy-data/   
Published: 2022 01 19 06:30:04
Received: 2022 01 19 06:46:41
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: What are the barriers to moving legacy data to the cloud? - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/legacy-data-cloud/   
Published: 2022 01 19 06:00:44
Received: 2022 01 19 06:06:38
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: What are the barriers to moving legacy data to the cloud? - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/legacy-data-cloud/   
Published: 2022 01 19 06:00:44
Received: 2022 01 19 06:06:38
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Product showcase: Adaptive Shield SaaS Security Posture Management - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/product-showcase-adaptive-shield-saas-security-posture-management/   
Published: 2022 01 19 05:30:54
Received: 2022 01 19 05:46:52
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Product showcase: Adaptive Shield SaaS Security Posture Management - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/product-showcase-adaptive-shield-saas-security-posture-management/   
Published: 2022 01 19 05:30:54
Received: 2022 01 19 05:46:52
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Cybersecurity Will Become the Top Agenda in Boardroom Discussions - published over 2 years ago.
Content: Among my three cybersecurity predictions for 2022, the one that I am optimistic about is cybersecurity getting more mindshare in the boardroom.  Expect to see cybersecurity-focused board members taking an active role in understanding the organization’s cybersecurity posture, including requests for additional metrics and frequent board updates. Here are my th...
https://cisomag.eccouncil.org/cybersecurity-in-the-boardroom/   
Published: 2022 01 19 05:30:05
Received: 2022 01 19 06:28:39
Feed: CISO Mag - Features
Source: CISO Mag
Category: Features
Topic: Cyber Security
Article: Cybersecurity Will Become the Top Agenda in Boardroom Discussions - published over 2 years ago.
Content: Among my three cybersecurity predictions for 2022, the one that I am optimistic about is cybersecurity getting more mindshare in the boardroom.  Expect to see cybersecurity-focused board members taking an active role in understanding the organization’s cybersecurity posture, including requests for additional metrics and frequent board updates. Here are my th...
https://cisomag.eccouncil.org/cybersecurity-in-the-boardroom/   
Published: 2022 01 19 05:30:05
Received: 2022 01 19 06:28:39
Feed: CISO Mag - Features
Source: CISO Mag
Category: Features
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Supply chain disruptions rose in 2021 - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/supply-chain-disruptions-2021/   
Published: 2022 01 19 05:00:31
Received: 2022 01 19 05:06:44
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Supply chain disruptions rose in 2021 - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/supply-chain-disruptions-2021/   
Published: 2022 01 19 05:00:31
Received: 2022 01 19 05:06:44
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Open Subtitles - 6,783,158 breached accounts - published over 2 years ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#OpenSubtitles   
Published: 2022 01 19 04:51:36
Received: 2022 02 01 12:44:33
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Article: Open Subtitles - 6,783,158 breached accounts - published over 2 years ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#OpenSubtitles   
Published: 2022 01 19 04:51:36
Received: 2022 02 01 12:44:33
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Trends that will shape the security industry in 2022 - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/security-industry-trends-2022/   
Published: 2022 01 19 04:30:56
Received: 2022 01 19 04:46:56
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Trends that will shape the security industry in 2022 - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/security-industry-trends-2022/   
Published: 2022 01 19 04:30:56
Received: 2022 01 19 04:46:56
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Designing a 100-Day Sprint for OT Cybersecurity: What to Consider - published over 2 years ago.
Content:
https://www.tripwire.com/state-of-security/ics-security/designing-a-100-day-sprint-for-ot-cybersecurity-what-to-consider/   
Published: 2022 01 19 04:01:00
Received: 2022 01 19 04:04:25
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Designing a 100-Day Sprint for OT Cybersecurity: What to Consider - published over 2 years ago.
Content:
https://www.tripwire.com/state-of-security/ics-security/designing-a-100-day-sprint-for-ot-cybersecurity-what-to-consider/   
Published: 2022 01 19 04:01:00
Received: 2022 01 19 04:04:25
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Network security sandbox market to reach $43 billion by 2027 - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/network-security-sandbox-2027/   
Published: 2022 01 19 04:00:23
Received: 2022 01 19 04:07:00
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Network security sandbox market to reach $43 billion by 2027 - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/network-security-sandbox-2027/   
Published: 2022 01 19 04:00:23
Received: 2022 01 19 04:07:00
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: How to Fulfill Multiple Compliance Objectives Using the CIS Controls - published over 2 years ago.
Content:
https://www.tripwire.com/state-of-security/controls/how-to-fulfill-multiple-compliance-objectives-using-the-cis-controls/   
Published: 2022 01 19 04:00:00
Received: 2022 01 19 04:04:25
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: How to Fulfill Multiple Compliance Objectives Using the CIS Controls - published over 2 years ago.
Content:
https://www.tripwire.com/state-of-security/controls/how-to-fulfill-multiple-compliance-objectives-using-the-cis-controls/   
Published: 2022 01 19 04:00:00
Received: 2022 01 19 04:04:25
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Upstox - 111,002 breached accounts - published over 2 years ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#Upstox   
Published: 2022 01 19 03:29:03
Received: 2022 02 01 12:44:33
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Article: Upstox - 111,002 breached accounts - published over 2 years ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#Upstox   
Published: 2022 01 19 03:29:03
Received: 2022 02 01 12:44:33
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Article: Kovrr Quantum enables organizations to financially quantify their cyber risk exposure - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/kovrr-quantum/   
Published: 2022 01 19 03:20:55
Received: 2022 01 19 03:46:27
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Kovrr Quantum enables organizations to financially quantify their cyber risk exposure - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/kovrr-quantum/   
Published: 2022 01 19 03:20:55
Received: 2022 01 19 03:46:27
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: SpyCloud Identity Risk Engine provides fraud risk assessments based on malware-stolen credentials - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/spycloud-identity-risk-engine/   
Published: 2022 01 19 03:10:41
Received: 2022 01 19 03:46:27
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: SpyCloud Identity Risk Engine provides fraud risk assessments based on malware-stolen credentials - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/spycloud-identity-risk-engine/   
Published: 2022 01 19 03:10:41
Received: 2022 01 19 03:46:27
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Juniper Networks unveils AI-driven SD-WAN solution to help IT teams identify network issues - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/juniper-networks-ssr-technology/   
Published: 2022 01 19 03:00:04
Received: 2022 01 19 03:06:37
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Juniper Networks unveils AI-driven SD-WAN solution to help IT teams identify network issues - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/juniper-networks-ssr-technology/   
Published: 2022 01 19 03:00:04
Received: 2022 01 19 03:06:37
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Apple Prepares Fix for Safari Bug Allowing Websites to Decipher Your Recent Browsing Activity - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/18/apple-prepares-fix-for-safari-indexeddb-bug/   
Published: 2022 01 19 02:28:29
Received: 2022 01 19 02:46:19
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Prepares Fix for Safari Bug Allowing Websites to Decipher Your Recent Browsing Activity - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/18/apple-prepares-fix-for-safari-indexeddb-bug/   
Published: 2022 01 19 02:28:29
Received: 2022 01 19 02:46:19
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: SentryBay collaborates with TD SYNNEX to protect corporate applications and data on the endpoint - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/sentrybay-td-synnex/   
Published: 2022 01 19 00:55:37
Received: 2022 01 19 01:06:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: SentryBay collaborates with TD SYNNEX to protect corporate applications and data on the endpoint - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/sentrybay-td-synnex/   
Published: 2022 01 19 00:55:37
Received: 2022 01 19 01:06:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Device Authority partners with Trusted Objects to provide a combined solution for IoT Edge devices - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/device-authority-trusted-objects/   
Published: 2022 01 19 00:50:20
Received: 2022 01 19 01:06:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Device Authority partners with Trusted Objects to provide a combined solution for IoT Edge devices - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/device-authority-trusted-objects/   
Published: 2022 01 19 00:50:20
Received: 2022 01 19 01:06:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Teneo collaborates with Exium to help IT teams in their transition to a SASE - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/teneo-exium/   
Published: 2022 01 19 00:40:46
Received: 2022 01 19 01:06:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Teneo collaborates with Exium to help IT teams in their transition to a SASE - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/teneo-exium/   
Published: 2022 01 19 00:40:46
Received: 2022 01 19 01:06:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: SeeYouCM-Thief: Exploiting common misconfigurations in Cisco phone systems - published over 2 years ago.
Content: submitted by /u/HackingLZ [link] [comments]...
https://www.reddit.com/r/netsec/comments/s7cs02/seeyoucmthief_exploiting_common_misconfigurations/   
Published: 2022 01 19 00:39:32
Received: 2022 01 19 02:24:19
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: SeeYouCM-Thief: Exploiting common misconfigurations in Cisco phone systems - published over 2 years ago.
Content: submitted by /u/HackingLZ [link] [comments]...
https://www.reddit.com/r/netsec/comments/s7cs02/seeyoucmthief_exploiting_common_misconfigurations/   
Published: 2022 01 19 00:39:32
Received: 2022 01 19 02:24:19
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Arqit partners with AUCloud to deploy sovereign quantum encryption service in Australia - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/arqit-aucloud/   
Published: 2022 01 19 00:35:16
Received: 2022 01 19 01:06:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Arqit partners with AUCloud to deploy sovereign quantum encryption service in Australia - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/arqit-aucloud/   
Published: 2022 01 19 00:35:16
Received: 2022 01 19 01:06:34
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Secure Logiq and Seagate join forces to offer storage solution for the video surveillance industry - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/secure-logiq-seagate/   
Published: 2022 01 19 00:30:32
Received: 2022 01 19 00:46:42
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Secure Logiq and Seagate join forces to offer storage solution for the video surveillance industry - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/secure-logiq-seagate/   
Published: 2022 01 19 00:30:32
Received: 2022 01 19 00:46:42
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Yugabyte partners with Intuita to support cloud-native database market growth - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/yugabyte-partners-with-intuita-to-support-cloud-native-database-market-growth/   
Published: 2022 01 19 00:25:29
Received: 2022 01 19 00:46:42
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Yugabyte partners with Intuita to support cloud-native database market growth - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/yugabyte-partners-with-intuita-to-support-cloud-native-database-market-growth/   
Published: 2022 01 19 00:25:29
Received: 2022 01 19 00:46:42
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Gatenox launches decentralized identity wallet built on Aleph Zero platform - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/gatenox-aleph-zero/   
Published: 2022 01 19 00:20:38
Received: 2022 01 19 00:46:42
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Gatenox launches decentralized identity wallet built on Aleph Zero platform - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/gatenox-aleph-zero/   
Published: 2022 01 19 00:20:38
Received: 2022 01 19 00:46:42
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Netrix acquires BTB Security to expand its managed security portfolio - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/netrix-btb-security/   
Published: 2022 01 19 00:10:48
Received: 2022 01 19 00:46:42
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Netrix acquires BTB Security to expand its managed security portfolio - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/netrix-btb-security/   
Published: 2022 01 19 00:10:48
Received: 2022 01 19 00:46:42
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Mophie Debuts $150 MagSafe-Compatible 3-in-1 Travel Charger - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/18/mophie-magsafe-travel-charger/   
Published: 2022 01 19 00:06:10
Received: 2022 01 19 00:26:20
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Mophie Debuts $150 MagSafe-Compatible 3-in-1 Travel Charger - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/18/mophie-magsafe-travel-charger/   
Published: 2022 01 19 00:06:10
Received: 2022 01 19 00:26:20
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Tech Mahindra acquires Com Tec Co IT to enhance digital engineering capability - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/tech-mahindra-com-tec-co-it/   
Published: 2022 01 19 00:00:49
Received: 2022 01 19 00:07:27
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Tech Mahindra acquires Com Tec Co IT to enhance digital engineering capability - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/19/tech-mahindra-com-tec-co-it/   
Published: 2022 01 19 00:00:49
Received: 2022 01 19 00:07:27
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Vulnerability Scanning: Keeping on top of the most common threats - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/vulnerability-scanning-keeping-on-top-of-the-most-common-threats   
Published: 2022 01 19 00:00:00
Received: 2023 09 25 13:21:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Vulnerability Scanning: Keeping on top of the most common threats - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/vulnerability-scanning-keeping-on-top-of-the-most-common-threats   
Published: 2022 01 19 00:00:00
Received: 2023 09 25 13:21:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: The Trouble with Phishing - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/trouble-phishing   
Published: 2022 01 19 00:00:00
Received: 2022 11 07 17:20:20
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: The Trouble with Phishing - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/trouble-phishing   
Published: 2022 01 19 00:00:00
Received: 2022 11 07 17:20:20
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: [webapps] uDoctorAppointment v2.1.1 - 'Multiple' Cross Site Scripting (XSS) - published over 2 years ago.
Content:
https://www.exploit-db.com/exploits/50676   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:44:18
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] uDoctorAppointment v2.1.1 - 'Multiple' Cross Site Scripting (XSS) - published over 2 years ago.
Content:
https://www.exploit-db.com/exploits/50676   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:44:18
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS) - published over 2 years ago.
Content:
https://www.exploit-db.com/exploits/50677   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:44:18
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS) - published over 2 years ago.
Content:
https://www.exploit-db.com/exploits/50677   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:44:18
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: [webapps] Affiliate Pro 1.7 - 'Multiple' Cross Site Scripting (XSS) - published over 2 years ago.
Content:
https://www.exploit-db.com/exploits/50678   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:44:18
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] Affiliate Pro 1.7 - 'Multiple' Cross Site Scripting (XSS) - published over 2 years ago.
Content:
https://www.exploit-db.com/exploits/50678   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:44:18
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Business communications - SMS and telephone best practice - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/guidance/business-communications-sms-and-telephone-best-practice   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:29:53
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Business communications - SMS and telephone best practice - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/guidance/business-communications-sms-and-telephone-best-practice   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:29:53
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: SMS and telephone best practice: new guidance for organisations - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/sms-and-telephone-best-practice-new-guidance-for-organisations   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:29:53
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: SMS and telephone best practice: new guidance for organisations - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/sms-and-telephone-best-practice-new-guidance-for-organisations   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:29:53
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Business communications - SMS and telephone best practice - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/guidance/business-communications-sms-and-telephone-best-practice   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:29:10
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Article: Business communications - SMS and telephone best practice - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/guidance/business-communications-sms-and-telephone-best-practice   
Published: 2022 01 19 00:00:00
Received: 2022 02 01 12:29:10
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security

All Articles

Ordered by Date Published : Year: "2022" Month: "01" Day: "19"
Page: << < 3 (of 3)

Total Articles in this collection: 167


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor