All Articles

Ordered by Date Published : Year: "2022" Month: "12" Day: "30" Hour: "12"
Page: 1 (of 0)

Total Articles in this collection: 17

Navigation Help at the bottom of the page
Article: There is no secure software supply-chain. - published over 1 year ago.
Content: submitted by /u/dlorenc [link] [comments]
https://www.reddit.com/r/netsec/comments/zyzvya/there_is_no_secure_software_supplychain/   
Published: 2022 12 30 12:56:04
Received: 2022 12 30 13:21:50
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: There is no secure software supply-chain. - published over 1 year ago.
Content: submitted by /u/dlorenc [link] [comments]
https://www.reddit.com/r/netsec/comments/zyzvya/there_is_no_secure_software_supplychain/   
Published: 2022 12 30 12:56:04
Received: 2022 12 30 13:21:50
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: What is 2FA? - published over 1 year ago.
Content: Two-factor authentication, also known as 2FA, is an extra layer of security that requires users to provide an additional piece of information when logging into their accounts. This can be a code sent to a phone, a response to a security question, or a fingerprint scan. The idea behind 2FA is to make it more difficult for unauthorized users to access your acc...
https://www.swcrc.co.uk/post/what-is-2fa   
Published: 2022 12 30 12:44:57
Received: 2022 12 31 18:25:47
Feed: The Cyber Resilience Centre for the South West
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: What is 2FA? - published over 1 year ago.
Content: Two-factor authentication, also known as 2FA, is an extra layer of security that requires users to provide an additional piece of information when logging into their accounts. This can be a code sent to a phone, a response to a security question, or a fingerprint scan. The idea behind 2FA is to make it more difficult for unauthorized users to access your acc...
https://www.swcrc.co.uk/post/what-is-2fa   
Published: 2022 12 30 12:44:57
Received: 2022 12 31 18:25:47
Feed: The Cyber Resilience Centre for the South West
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: VivSoft hiring DevSecOps Engineer 1 in Ashburn, Virginia, United States | LinkedIn - published over 1 year ago.
Content: We build secure Software Factories based on DoD reference designs and NIST Frameworks for Cloud and DevSecOps. These factories deliver AI/ML ...
https://www.linkedin.com/jobs/view/devsecops-engineer-1-at-vivsoft-3415678723   
Published: 2022 12 30 12:25:20
Received: 2022 12 31 05:25:30
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: VivSoft hiring DevSecOps Engineer 1 in Ashburn, Virginia, United States | LinkedIn - published over 1 year ago.
Content: We build secure Software Factories based on DoD reference designs and NIST Frameworks for Cloud and DevSecOps. These factories deliver AI/ML ...
https://www.linkedin.com/jobs/view/devsecops-engineer-1-at-vivsoft-3415678723   
Published: 2022 12 30 12:25:20
Received: 2022 12 31 05:25:30
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Recovering Smartphone Voice from the Accelerometer - published over 1 year ago.
Content: Yet another smartphone side-channel attack: “EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers“: Abstract: Eavesdropping from the user’s smartphone is a well-known threat to the user’s safety and privacy. Existing studies show that loudspeaker reverberation can inject speech into motion sensor readings, leading to s...
https://www.schneier.com/blog/archives/2022/12/recovering-smartphone-voice-from-the-accelerometer.html   
Published: 2022 12 30 12:18:42
Received: 2022 12 30 12:24:27
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Recovering Smartphone Voice from the Accelerometer - published over 1 year ago.
Content: Yet another smartphone side-channel attack: “EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers“: Abstract: Eavesdropping from the user’s smartphone is a well-known threat to the user’s safety and privacy. Existing studies show that loudspeaker reverberation can inject speech into motion sensor readings, leading to s...
https://www.schneier.com/blog/archives/2022/12/recovering-smartphone-voice-from-the-accelerometer.html   
Published: 2022 12 30 12:18:42
Received: 2022 12 30 12:24:27
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: CVE-2022-4860 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4860   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-4860 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4860   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-4859 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4859   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-4859 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4859   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-4858 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4858   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-4858 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4858   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2020-36638 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36638   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:31
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-36638 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36638   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:31
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2020-36637 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36637   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:31
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-36637 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36637   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:31
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2018-25060 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25060   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:27
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2018-25060 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25060   
Published: 2022 12 30 12:15:09
Received: 2022 12 30 13:34:27
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: CVE-2017-20153 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20153   
Published: 2022 12 30 12:15:08
Received: 2022 12 30 13:34:25
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20153 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20153   
Published: 2022 12 30 12:15:08
Received: 2022 12 30 13:34:25
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2017-20152 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20152   
Published: 2022 12 30 12:15:08
Received: 2022 12 30 13:34:25
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20152 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20152   
Published: 2022 12 30 12:15:08
Received: 2022 12 30 13:34:25
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20151 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20151   
Published: 2022 12 30 12:15:08
Received: 2022 12 30 13:34:25
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2017-20151 - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20151   
Published: 2022 12 30 12:15:08
Received: 2022 12 30 13:34:25
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: BDWeb-Link LMS 1.11.5 SQL Injection - published over 1 year ago.
Content:
https://packetstormsecurity.com/files/170347/bdweblink1115-sql.txt   
Published: 2022 12 30 12:12:12
Received: 2023 01 02 15:04:13
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: BDWeb-Link LMS 1.11.5 SQL Injection - published over 1 year ago.
Content:
https://packetstormsecurity.com/files/170347/bdweblink1115-sql.txt   
Published: 2022 12 30 12:12:12
Received: 2023 01 02 15:04:13
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: US Congress funds cybersecurity initiatives in FY2023 spending bill - published over 1 year ago.
Content:
https://www.csoonline.com/article/3684388/us-congress-funds-cybersecurity-initiatives-in-fy2023-spending-bill.html#tk.rss_all   
Published: 2022 12 30 12:09:00
Received: 2022 12 30 14:44:33
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: US Congress funds cybersecurity initiatives in FY2023 spending bill - published over 1 year ago.
Content:
https://www.csoonline.com/article/3684388/us-congress-funds-cybersecurity-initiatives-in-fy2023-spending-bill.html#tk.rss_all   
Published: 2022 12 30 12:09:00
Received: 2022 12 30 14:44:33
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: CIO 2023 Priorities: Cybersecurity - WSJ - published over 1 year ago.
Content: Cybersecurity remains a top investment agenda for corporate technology chiefs in 2023 as companies race to combat cyber threats.
https://www.wsj.com/articles/cio-2023-priorities-cybersecurity-11672259635   
Published: 2022 12 30 12:08:35
Received: 2022 12 30 12:23:02
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: CIO 2023 Priorities: Cybersecurity - WSJ - published over 1 year ago.
Content: Cybersecurity remains a top investment agenda for corporate technology chiefs in 2023 as companies race to combat cyber threats.
https://www.wsj.com/articles/cio-2023-priorities-cybersecurity-11672259635   
Published: 2022 12 30 12:08:35
Received: 2022 12 30 12:23:02
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)

All Articles

Ordered by Date Published : Year: "2022" Month: "12" Day: "30" Hour: "12"
Page: 1 (of 0)

Total Articles in this collection: 17


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor