Article: Minecraft Mod, Mother's Day, and A Hacker Dad - published over 5 years ago. Content: Over the weekend my wife was feeling under the weather. This meant we were stuck indoors and since she is sick and it's Mother's day weekend - less than ideal situation - I needed to keep my son as occupied as possible so she could rest and recuperate.When I asked my son what he wanted to do, he responded with a new Minecraft mod he'd seen on one of these Yo... https://blog.carnal0wnage.com/2019/05/minecraft-mod-mothers-day-and-hacker-dad.html Published: 2019 05 13 15:59:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Weekly Threat Report 10th May 2019 - published over 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-10th-may-2019 Published: 2019 05 09 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Dissecting Weird Packets - published over 5 years ago. Content: I was investigating traffic in my home lab yesterday, and noticed that about 1% of the traffic was weird. Before I describe the weird, let me show you a normal frame for comparison's sake.This is a normal frame with Ethernet II encapsulation. It begins with 6 bytes of the destination MAC address, 6 bytes of the source MAC address, and 2 bytes of an Ethertype... https://taosecurity.blogspot.com/2019/05/dissecting-weird-packets.html Published: 2019 05 09 14:30:00 Received: 2021 06 06 09:05:05 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
Article: SaaS security - surely it's simple? - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/saas-security-surely-its-simple Published: 2019 05 07 23:03:11 Received: 2024 01 24 00:02:29 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Understanding Software as a Service (SaaS) security - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/guidance/understanding-software-service-saas-security Published: 2019 05 07 15:25:34 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Ransomware: 'WannaCry' guidance for enterprise administrators - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/guidance/ransomware-wannacry-guidance-enterprise-administrators-1 Published: 2019 05 07 15:21:03 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Sextortion emails: how to protect yourself - published over 5 years ago. Content: https://www.ncsc.gov.uk/guidance/sextortion-scams-how-to-protect-yourself Published: 2019 05 07 15:15:00 Received: 2024 05 13 07:20:21 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Active Cyber Defence - tackling cyber attacks on the UK - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/active-cyber-defence-tackling-cyber-attacks-uk Published: 2019 05 07 15:15:00 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Growing positive security cultures - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/growing-positive-security-cultures Published: 2019 05 07 14:41:19 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Maturity models in cyber security: what's happening to the IAMM? - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2019 05 07 14:20:52 Received: 2024 03 06 17:21:30 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Of mice and cyber - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/mice-and-cyber Published: 2019 05 07 14:20:09 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NCSC IT: How the NCSC built its own IT system - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ncsc-it-how-ncsc-built-its-own-it-system-0 Published: 2019 05 07 14:11:45 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Ready, Set... Android Go? - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ready-set-android-go Published: 2019 05 07 13:52:38 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: SaaS security - surely it's simple? - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/saas-security-surely-its-simple Published: 2019 05 07 13:50:12 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Approaching enterprise technology with cyber security in mind - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind Published: 2019 05 07 12:52:32 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: BT's proactive protection: Supporting the NCSC to make our customers safer - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/bts-proactive-protection-supporting-ncsc-make-our-customers-safer Published: 2019 05 07 03:06:16 Received: 2024 05 13 07:21:25 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Introducing Data Security: Why is it Important for Every Organization? - published over 5 years ago. Content: http://www.ehacking.net/2019/05/introducing-data-security-why-is-it.html Published: 2019 05 06 10:22:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Of mice and cyber - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/mice-and-cyber Published: 2019 05 05 14:20:09 Received: 2024 04 12 13:21:17 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: I'm gonna stop you, little phishie... - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/im-gonna-stop-you-little-phishie Published: 2019 05 03 09:11:17 Received: 2024 05 25 05:03:07 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 3rd May 2019 - published over 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-3rd-may-2019 Published: 2019 05 02 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Ready, Set... Android Go? - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/ready-set-android-go Published: 2019 05 02 09:20:13 Received: 2024 02 16 10:42:36 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Secure systems design: new guidance and security paper now available - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/secure-systems-design--new-guidance-now-available Published: 2019 05 01 10:35:40 Received: 2024 01 31 09:21:10 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Machine Learning: How It Works - published over 5 years ago. Content: https://www.securitymagazine.com/articles/90173-machine-learning-how-it-works Published: 2019 05 01 04:00:00 Received: 2021 09 10 20:00:05 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Exercise in a Box: Fitness tracking - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/exercise-in-a-box-fitness-tracking Published: 2019 04 29 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: VulnTrack 1.1 by Ogma Released - published over 5 years ago. Content: https://www.soldierx.com/news/VulnTrack-11-Ogma-Released Published: 2019 04 27 19:51:45 Received: 2021 06 06 09:05:21 Feed: SOLDIERX.COM - Nobody Can Stop Information Insemination Source: SOLDIERX.COM - Nobody Can Stop Information Insemination Category: Cyber Security Topic: Cyber Security |
|
Article: Import data, not malware - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/import-data-not-malware Published: 2019 04 27 17:00:00 Received: 2023 05 11 08:21:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Oracle Security Alert for CVE-2019-2725 - 26 Apr 2019
- published over 5 years ago. Content: https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html Published: 2019 04 26 17:00:00 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Operational technologies - published over 5 years ago. Content: https://www.ncsc.gov.uk/guidance/operational-technologies Published: 2019 04 26 16:39:04 Received: 2024 08 08 13:01:06 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 26th April 2019 - published over 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-26th-april-2019 Published: 2019 04 25 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CARBANAK Week Part Four: The CARBANAK Desktop Video Player - published over 5 years ago. Content: Part One, Part Two and Part Three of CARBANAK Week are behind us. In this final blog post, we dive into one of the more interesting tools that is part of the CARBANAK toolset. The CARBANAK authors wrote their own video player and we happened to come across an interesting video capture from CARBANAK of a network operator preparing for an... http://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-four-desktop-video-player.html Published: 2019 04 25 09:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: CYBERUK 2019: First day highlights - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2019-first-day-highlights Published: 2019 04 24 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CARBANAK Week Part Three: Behind the CARBANAK Backdoor - published over 5 years ago. Content: We covered a lot of ground in Part One and Part Two of our CARBANAK Week blog series. Now let's take a look back at some of our previous analysis and see how it holds up. In June 2017, we published a blog post sharing novel information about the CARBANAK backdoor, including technical details, intel analysis, and some interesting deductions ... http://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-three-behind-the-backdoor.html Published: 2019 04 24 17:30:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Operational technologies - published over 5 years ago. Content: httpss://www.ncsc.gov.uk/guidance/operational-technologies Published: 2019 04 24 11:32:48 Received: 2024 03 06 17:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Click to Open Code Editor