Article: Transforming the way we work, with 'missions' - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/transforming-the-way-we-work-with-missions Published: 2020 10 09 07:09:11 Received: 2024 05 29 07:41:14 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Increased enterprise security for the “new normal” working culture - published over 4 years ago. Content: https://www.securitymagazine.com/articles/93386-increased-enterprise-security-in-the-new-normal-working-culture Published: 2020 10 09 05:40:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Weekly Threat Report 9th October 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-october-2020 Published: 2020 10 08 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Transforming the way we work, with 'missions' - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/transforming-the-way-we-work-with-missions Published: 2020 10 08 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 9th October 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-october-2020 Published: 2020 10 08 23:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Transforming the way we work, with 'missions' - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/transforming-the-way-we-work-with-missions Published: 2020 10 08 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: NHS COVID-19 app: improving its security posture - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-covid-19-app-improving-its-security-posture Published: 2020 10 07 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Small Business Guide: updated for 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/small-business-guide-2020 Published: 2020 10 07 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NHS COVID-19 app: improving its security posture - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-covid-19-app-improving-its-security-posture Published: 2020 10 07 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Small Business Guide: updated for 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/small-business-guide-2020 Published: 2020 10 07 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Weekly Threat Report 2nd October 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-2nd-october-2020 Published: 2020 10 01 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Oracle Security Alert for CVE-2020-14750 - 01 November 2020
- published over 4 years ago. Content: https://www.oracle.com/security-alerts/alert-cve-2020-14750.html Published: 2020 10 01 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Group attribution error – The most pervasive and potentially consequential threat of our day - published over 4 years ago. Content: https://www.securitymagazine.com/articles/93517-group-attribution-error-the-most-pervasive-and-potentially-consequential-threat-of-our-day Published: 2020 10 01 04:00:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Detecting Microsoft 365 and Azure Active Directory Backdoors - published over 4 years ago. Content: Mandiant has seen an uptick in incidents involving Microsoft 365 (M365) and Azure Active Directory (Azure AD). Most of these incidents are the result of a phishing email coercing a user to enter their credentials used for accessing M365 into a phishing site. Other incidents have been a result of password spraying, password stuffing, or simple brute... http://www.fireeye.com/blog/threat-research/2020/09/detecting-microsoft-365-azure-active-directory-backdoors.html Published: 2020 09 30 16:45:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Enterprise patching in a post-Flash world - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/enterprise-patching-in-a-post-flash-world Published: 2020 09 29 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NCSC's new cyber security training for staff now available - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-cyber-security-training-for-staff-now-available Published: 2020 09 29 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Enterprise patching in a post-Flash world - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/enterprise-patching-in-a-post-flash-world Published: 2020 09 29 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: NCSC's new cyber security training for staff now available - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-cyber-security-training-for-staff-now-available Published: 2020 09 29 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Efficiency of the Vulnerability Response With vFeed Intelligence - published over 4 years ago. Content: https://toolswatch.org/2020/09/efficiency-of-the-vulnerability-response-with-vfeed-intelligence/?utm_source=rss&utm_medium=rss&utm_campaign=efficiency-of-the-vulnerability-response-with-vfeed-intelligence Published: 2020 09 28 07:27:03 Received: 2023 01 25 14:23:47 Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Category: News Topic: Security Tooling |
|
Article: Mitigating digital banking security issues during the pandemic - published over 4 years ago. Content: https://www.securitymagazine.com/articles/93221-mitigating-digital-banking-security-issues-during-the-pandemic Published: 2020 09 25 09:00:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Fuzzing Image Parsing in Windows, Part One: Color Profiles - published over 4 years ago. Content: Image parsing and rendering are basic features of any modern operating system (OS). Image parsing is an easily accessible attack surface, and a vulnerability that may lead to remote code execution or information disclosure in such a feature is valuable to attackers. In this multi-part blog series, I am reviewing Windows OS’ built-in image parsers a... http://www.fireeye.com/blog/threat-research/2020/09/fuzzing-image-parsing-in-windows-color-profiles.html Published: 2020 09 24 15:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Poor incident detection can cost your organization a fortune - published over 4 years ago. Content: https://www.securitymagazine.com/articles/93173-poor-incident-detection-can-cost-your-organization-a-fortune Published: 2020 09 24 10:00:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: A Cyber Accelerator success story - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/a-cyber-accelerator-success-story Published: 2020 09 23 23:00:02 Received: 2022 07 15 08:00:20 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Weekly Threat Report 25th September 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-25th-september-2020 Published: 2020 09 23 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: A Cyber Accelerator success story - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/a-cyber-accelerator-success-story Published: 2020 09 23 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NHS Test and Trace: securing the NHS COVID-19 app - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-test-and-trace-securing-the-nhs-covid-19-app Published: 2020 09 23 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 25th September 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-25th-september-2020 Published: 2020 09 23 23:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: A Cyber Accelerator success story - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/a-cyber-accelerator-success-story Published: 2020 09 23 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: NHS Test and Trace: securing the NHS COVID-19 app - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-test-and-trace-securing-the-nhs-covid-19-app Published: 2020 09 23 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: UPDATE: Empire v3.4.0 - published over 4 years ago. Content: Empire v3.4.0 was released a couple of days ago! I briefly mentioned about this tool in my old post titled – List of Open Source C2 Post-Exploitation Frameworks. This new version brings support for Malleable C2 listeners and reflective file loading among other bug fixes. What is Empire? Empire 3.x is an open source post-exploitation framework that includes a... https://pentestit.com/empire-v3-4-0-post-exploitation-framework-updated/ Published: 2020 09 18 18:30:07 Received: 2022 03 24 22:49:47 Feed: PenTestIT Source: PenTestIT Category: News Topic: Security Tooling |
|
Article: Weekly Threat Report 18th September 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-18th-september-2020 Published: 2020 09 17 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Can the voting process be hacked? - published over 4 years ago. Content: https://www.securitymagazine.com/articles/93385-can-the-voting-process-be-hacked Published: 2020 09 17 14:04:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: More than 80% of government cybersecurity leaders say private-public partnerships a necessity - published over 4 years ago. Content: https://www.securitymagazine.com/articles/93381-more-than-80-of-government-cybersecurity-leaders-say-private-public-partnerships-a-necessity Published: 2020 09 17 12:55:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Industry 100: FS-ISAC in NCSC and it's XLNT - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/industry-100-fs-isac-ncsc-and-its-xlnt Published: 2020 09 16 16:15:16 Received: 2024 04 12 13:21:09 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Import data, not malware - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/import-data-not-malware Published: 2020 09 16 16:15:16 Received: 2024 03 06 17:21:25 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The leaky pipe of secure coding - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/leaky-pipe-secure-coding Published: 2020 09 16 15:54:24 Received: 2024 03 06 17:21:25 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: New guidance for practitioners supporting victims of 'domestic cyber crime' - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/new-guidance-for-practitioners-supporting-victims-of-domestic-cyber-crime Published: 2020 09 16 13:54:24 Received: 2024 01 31 09:21:05 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: UPDATE: Merlin v0.9.0 - published over 4 years ago. Content: Merlin v0.9.0 was released a couple of days ago. This release adds support for HTTP and h2c protocols. As we know, the h2c protocol is the non-TLS version of HTTP/2. This release also adds new “Listeners” menu to create and manage multiple listeners. You can now configure agent/listeners to listen on a list of resources and change the Agent JA3 hash on the f... https://pentestit.com/merlin-v0-9-0-released/ Published: 2020 09 16 00:37:04 Received: 2022 03 24 22:49:47 Feed: PenTestIT Source: PenTestIT Category: News Topic: Security Tooling |
Article: How to do secure system administration - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/how-to-do-secure-system-administration Published: 2020 09 15 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic Analysis - published over 4 years ago. Content: Many organizations operating in e-commerce, hospitality, healthcare, managed services, and other service industries rely on web applications. And buried within the application logs may be the potential discovery of fraudulent use and/or compromise! But, let's face it, finding evil in application logs can be difficult and overwhelming for a few reas... http://www.fireeye.com/blog/threat-research/2020/09/dfur-ent-perspective-on-threat-modeling-and-application-log-forensic-analysis.html Published: 2020 09 14 16:30:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Helping organisations - and researchers - to manage vulnerability disclosure - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/helping-to-manage-vulnerability-disclosure Published: 2020 09 14 09:10:34 Received: 2024 08 16 07:00:30 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Click to Open Code Editor