All Articles

Ordered by Date Published : Year: "2021"
and by Page: << < 1,456 (of 1,457) > >>

Total Articles in this collection: 72,886

Navigation Help at the bottom of the page
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published over 4 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/   
Published: 2021 02 08 16:22:11
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published over 4 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/   
Published: 2021 02 08 16:22:11
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Is blockchain the right tool for you? - published over 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/is-blockchain-the-right-tool-for-you   
Published: 2021 02 08 03:59:27
Received: 2023 12 05 16:42:19
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Is blockchain the right tool for you? - published over 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/is-blockchain-the-right-tool-for-you   
Published: 2021 02 08 03:59:27
Received: 2023 12 05 16:42:19
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: The cyber threat to sports organisations - published over 4 years ago.
Content:
https://www.ncsc.gov.uk/report/the-cyber-threat-to-sports-organisations   
Published: 2021 02 07 11:28:26
Received: 2024 08 08 13:01:02
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The cyber threat to sports organisations - published over 4 years ago.
Content:
https://www.ncsc.gov.uk/report/the-cyber-threat-to-sports-organisations   
Published: 2021 02 07 11:28:26
Received: 2024 08 08 13:01:02
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Launching OSV - Better vulnerability triage for open source - published almost 5 years ago.
Content: Posted by Oliver Chang and Kim Lewandowski, Google Security TeamWe are excited to launch OSV (Open Source Vulnerabilities), our first step towards improving vulnerability triage for developers and consumers of open source software. The goal of OSV is to provide precise data on where a vulnerability was introduced and where it got fixed, thereby helping consu...
http://security.googleblog.com/2021/02/launching-osv-better-vulnerability.html   
Published: 2021 02 05 17:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Launching OSV - Better vulnerability triage for open source - published almost 5 years ago.
Content: Posted by Oliver Chang and Kim Lewandowski, Google Security TeamWe are excited to launch OSV (Open Source Vulnerabilities), our first step towards improving vulnerability triage for developers and consumers of open source software. The goal of OSV is to provide precise data on where a vulnerability was introduced and where it got fixed, thereby helping consu...
http://security.googleblog.com/2021/02/launching-osv-better-vulnerability.html   
Published: 2021 02 05 17:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 05 06:26:27
Received: 2024 02 14 12:02:29
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 05 06:26:27
Received: 2024 02 14 12:02:29
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Weekly Threat Report 5th February 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-5th-february-2021   
Published: 2021 02 05 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 5th February 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-5th-february-2021   
Published: 2021 02 05 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Vulnerability Reward Program: 2020 Year in Review - published almost 5 years ago.
Content: Posted by Anna Hupa, Senior Strategist, Vulnerability Rewards TeamDespite the challenges of this unprecedented year, our vulnerability researchers have achieved more than ever before, partnering with our Vulnerability Reward Programs (VRPs) to protect Google’s users by discovering security and abuse bugs and reporting them to us for remediation. Their dilige...
http://security.googleblog.com/2021/02/vulnerability-reward-program-2020-year.html   
Published: 2021 02 04 18:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Vulnerability Reward Program: 2020 Year in Review - published almost 5 years ago.
Content: Posted by Anna Hupa, Senior Strategist, Vulnerability Rewards TeamDespite the challenges of this unprecedented year, our vulnerability researchers have achieved more than ever before, partnering with our Vulnerability Reward Programs (VRPs) to protect Google’s users by discovering security and abuse bugs and reporting them to us for remediation. Their dilige...
http://security.googleblog.com/2021/02/vulnerability-reward-program-2020-year.html   
Published: 2021 02 04 18:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Active Cyber Defence (ACD) - The Third Year - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 04 12:01:39
Received: 2024 06 13 14:01:48
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Active Cyber Defence (ACD) - The Third Year - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 04 12:01:39
Received: 2024 06 13 14:01:48
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials - published almost 5 years ago.
Content:
https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed   
Published: 2021 02 03 13:13:35
Received: 2021 06 06 09:04:42
Feed: Darknet - The Darkside
Source: Darknet - The Darkside
Category: Cyber Security
Topic: Cyber Security
Article: GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials - published almost 5 years ago.
Content:
https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed   
Published: 2021 02 03 13:13:35
Received: 2021 06 06 09:04:42
Feed: Darknet - The Darkside
Source: Darknet - The Darkside
Category: Cyber Security
Topic: Cyber Security
Article: Introducing the protocol design principles - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/introducing-the-protocol-design-principles   
Published: 2021 02 03 11:58:27
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing the protocol design principles - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/introducing-the-protocol-design-principles   
Published: 2021 02 03 11:58:27
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Defending software build pipelines from malicious attack - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 10:56:29
Received: 2024 01 25 15:42:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 10:56:29
Received: 2024 01 25 15:42:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Coming soon to ACD users...the 'MyNCSC' platform - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/myncsc-coming-soon   
Published: 2021 02 03 09:17:13
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Coming soon to ACD users...the 'MyNCSC' platform - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/myncsc-coming-soon   
Published: 2021 02 03 09:17:13
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Defending software build pipelines from malicious attack - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 00:00:23
Received: 2022 12 02 11:01:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 00:00:23
Received: 2022 12 02 11:01:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Exercise in a Box: Fitness tracking - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/exercise-in-a-box-fitness-tracking   
Published: 2021 02 03 00:00:00
Received: 2022 07 23 23:20:14
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Exercise in a Box: Fitness tracking - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/exercise-in-a-box-fitness-tracking   
Published: 2021 02 03 00:00:00
Received: 2022 07 23 23:20:14
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published almost 5 years ago.
Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ...
https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/   
Published: 2021 02 02 23:18:40
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published almost 5 years ago.
Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ...
https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/   
Published: 2021 02 02 23:18:40
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Crypto Crook Hired Steven Seagal to Promote Scam, Now Faces Charges - published almost 5 years ago.
Content:
https://threatpost.com/crypto-crook-steven-segal-scam/163612/   
Published: 2021 02 02 18:17:18
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Crypto Crook Hired Steven Seagal to Promote Scam, Now Faces Charges - published almost 5 years ago.
Content:
https://threatpost.com/crypto-crook-steven-segal-scam/163612/   
Published: 2021 02 02 18:17:18
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Coming soon to ACD users...the 'MyNCSC' platform - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/myncsc-coming-soon   
Published: 2021 02 02 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Coming soon to ACD users...the 'MyNCSC' platform - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/myncsc-coming-soon   
Published: 2021 02 02 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: 10 years of '10 Steps to Cyber Security' - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security   
Published: 2021 02 01 23:00:00
Received: 2022 02 16 11:20:52
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: 10 years of '10 Steps to Cyber Security' - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security   
Published: 2021 02 01 23:00:00
Received: 2022 02 16 11:20:52
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: SolarWinds Hack Prompts Congress to Put NSA in Encryption Hot Seat - published almost 5 years ago.
Content:
https://threatpost.com/solarwinds-nsa-encryption/163561/   
Published: 2021 02 01 21:12:13
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: SolarWinds Hack Prompts Congress to Put NSA in Encryption Hot Seat - published almost 5 years ago.
Content:
https://threatpost.com/solarwinds-nsa-encryption/163561/   
Published: 2021 02 01 21:12:13
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Critical Libgcrypt Crypto Bug Opens Machines to Arbitrary Code - published almost 5 years ago.
Content:
https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/   
Published: 2021 02 01 16:59:19
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Critical Libgcrypt Crypto Bug Opens Machines to Arbitrary Code - published almost 5 years ago.
Content:
https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/   
Published: 2021 02 01 16:59:19
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: In the shadow of SolarWinds: Personal reflections - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/94488-in-the-shadow-of-solarwinds-personal-reflections   
Published: 2021 02 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: In the shadow of SolarWinds: Personal reflections - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/94488-in-the-shadow-of-solarwinds-personal-reflections   
Published: 2021 02 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Cyber Accelerator - doing things differently - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-accelerator-doing-things-differently   
Published: 2021 02 01 00:00:00
Received: 2023 04 13 09:41:25
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Cyber Accelerator - doing things differently - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-accelerator-doing-things-differently   
Published: 2021 02 01 00:00:00
Received: 2023 04 13 09:41:25
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Helping organisations - and researchers - to manage vulnerability disclosure - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/helping-to-manage-vulnerability-disclosure   
Published: 2021 01 29 07:31:19
Received: 2024 02 12 09:42:33
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Helping organisations - and researchers - to manage vulnerability disclosure - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/helping-to-manage-vulnerability-disclosure   
Published: 2021 01 29 07:31:19
Received: 2024 02 12 09:42:33
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 29th January 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-29th-january-2021   
Published: 2021 01 29 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 29th January 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-29th-january-2021   
Published: 2021 01 29 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The rise of ransomware - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/rise-of-ransomware   
Published: 2021 01 29 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The rise of ransomware - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/rise-of-ransomware   
Published: 2021 01 29 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Weekly Threat Report 29th January 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-29th-january-2021   
Published: 2021 01 29 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Weekly Threat Report 29th January 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-29th-january-2021   
Published: 2021 01 29 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: The rise of ransomware - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/rise-of-ransomware   
Published: 2021 01 29 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: The rise of ransomware - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/rise-of-ransomware   
Published: 2021 01 29 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Introducing data breach guidance for individuals and families - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/introducing-data-breach-guidance-for-individuals-and-families   
Published: 2021 01 28 08:09:48
Received: 2024 03 06 17:21:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing data breach guidance for individuals and families - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/introducing-data-breach-guidance-for-individuals-and-families   
Published: 2021 01 28 08:09:48
Received: 2024 03 06 17:21:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Introducing new NCSC Mobile Device Guidance - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-new-ncsc-mobile-device-guidance   
Published: 2021 01 28 00:00:00
Received: 2023 05 18 12:20:27
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Introducing new NCSC Mobile Device Guidance - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-new-ncsc-mobile-device-guidance   
Published: 2021 01 28 00:00:00
Received: 2023 05 18 12:20:27
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Data breaches: guidance for individuals and families - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/data-breaches   
Published: 2021 01 28 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Data breaches: guidance for individuals and families - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/data-breaches   
Published: 2021 01 28 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Introducing data breach guidance for individuals and families - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-data-breach-guidance-for-individuals-and-families   
Published: 2021 01 28 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing data breach guidance for individuals and families - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-data-breach-guidance-for-individuals-and-families   
Published: 2021 01 28 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Data breaches: guidance for individuals and families - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/data-breaches   
Published: 2021 01 28 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Article: Data breaches: guidance for individuals and families - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/guidance/data-breaches   
Published: 2021 01 28 00:00:00
Received: 2021 04 18 14:04:37
Feed: NCSC – Guidance Feed
Source: National Cyber Security Centre (NCSC)
Category: Guidance
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Notorious cybersecurity attacks in history and how to prevent them - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/94114-notorious-cybersecurity-attacks-in-history-and-how-to-prevent-them   
Published: 2021 01 27 05:00:00
Received: 2021 04 25 02:14:07
Feed: Security Magazine – Reports
Source: Security Magazine
Category: Reports
Topic: Cyber Security
Article: Notorious cybersecurity attacks in history and how to prevent them - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/94114-notorious-cybersecurity-attacks-in-history-and-how-to-prevent-them   
Published: 2021 01 27 05:00:00
Received: 2021 04 25 02:14:07
Feed: Security Magazine – Reports
Source: Security Magazine
Category: Reports
Topic: Cyber Security
Article: DanaBot Malware Roars Back into Relevancy - published almost 5 years ago.
Content:
https://threatpost.com/danabot-malware-roars-back/163358/   
Published: 2021 01 26 21:24:34
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: DanaBot Malware Roars Back into Relevancy - published almost 5 years ago.
Content:
https://threatpost.com/danabot-malware-roars-back/163358/   
Published: 2021 01 26 21:24:34
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication - published almost 5 years ago.
Content: FireEye Email Security recently encountered various phishing campaigns, mostly in the Americas and Europe, using source code obfuscation with compromised or bad domains. These domains were masquerading as authentic websites and stole personal information such as credit card data. The stolen information was then shared to cross-platform, cloud-bas...
https://www.fireeye.com/blog/threat-research/2021/01/phishing-campaign-woff-obfuscation-telegram-communications.html   
Published: 2021 01 26 20:45:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication - published almost 5 years ago.
Content: FireEye Email Security recently encountered various phishing campaigns, mostly in the Americas and Europe, using source code obfuscation with compromised or bad domains. These domains were masquerading as authentic websites and stole personal information such as credit card data. The stolen information was then shared to cross-platform, cloud-bas...
https://www.fireeye.com/blog/threat-research/2021/01/phishing-campaign-woff-obfuscation-telegram-communications.html   
Published: 2021 01 26 20:45:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: RITICS: Securing cyber-physical systems - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems   
Published: 2021 01 26 13:06:12
Received: 2024 03 06 17:21:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: RITICS: Securing cyber-physical systems - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems   
Published: 2021 01 26 13:06:12
Received: 2024 03 06 17:21:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: An RFC on IoCs – playing our part in international standards - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/rfc-indicators-of-compromise-for-ietf   
Published: 2021 01 26 13:06:12
Received: 2024 01 31 09:21:01
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: An RFC on IoCs – playing our part in international standards - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/rfc-indicators-of-compromise-for-ietf   
Published: 2021 01 26 13:06:12
Received: 2024 01 31 09:21:01
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: RITICS: Securing cyber-physical systems - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems   
Published: 2021 01 26 13:06:12
Received: 2023 11 22 12:21:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: RITICS: Securing cyber-physical systems - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems   
Published: 2021 01 26 13:06:12
Received: 2023 11 22 12:21:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The problems with patching - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-problems-with-patching   
Published: 2021 01 26 01:20:20
Received: 2024 09 16 08:41:16
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The problems with patching - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-problems-with-patching   
Published: 2021 01 26 01:20:20
Received: 2024 09 16 08:41:16
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: RITICS: Securing cyber-physical systems - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems   
Published: 2021 01 26 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: RITICS: Securing cyber-physical systems - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems   
Published: 2021 01 26 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: In new study Interisle Reveals Excessive Withholding of Internet WHOIS Data - published almost 5 years ago.
Content: My Interisle colleagues, together with Greg Aaron, have completed an in-depth analysis of the effects of ICANN policy for WHOIS, a public lookup service that has until recently made it possible to identify who registered and controls a domain name. The European Union’s General Data Protection Regulation (GDPR), adopted in May 2018, restricted the publication...
https://www.securityskeptic.com/2021/01/in-new-study-interisle-reveals-excessive-withholding-of-internet-whois-data.html   
Published: 2021 01 25 14:06:56
Received: 2021 06 06 09:04:59
Feed: The Security Skeptic
Source: The Security Skeptic
Category: Cyber Security
Topic: Cyber Security
Article: In new study Interisle Reveals Excessive Withholding of Internet WHOIS Data - published almost 5 years ago.
Content: My Interisle colleagues, together with Greg Aaron, have completed an in-depth analysis of the effects of ICANN policy for WHOIS, a public lookup service that has until recently made it possible to identify who registered and controls a domain name. The European Union’s General Data Protection Regulation (GDPR), adopted in May 2018, restricted the publication...
https://www.securityskeptic.com/2021/01/in-new-study-interisle-reveals-excessive-withholding-of-internet-whois-data.html   
Published: 2021 01 25 14:06:56
Received: 2021 06 06 09:04:59
Feed: The Security Skeptic
Source: The Security Skeptic
Category: Cyber Security
Topic: Cyber Security
Article: Top 10 Most Exploited Vulnerabilities in 2020 - published almost 5 years ago.
Content:
https://toolswatch.org/2021/01/top-10-most-exploited-vulnerabilities-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-most-exploited-vulnerabilities-in-2020   
Published: 2021 01 25 09:37:20
Received: 2023 01 25 14:23:47
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Article: Top 10 Most Exploited Vulnerabilities in 2020 - published almost 5 years ago.
Content:
https://toolswatch.org/2021/01/top-10-most-exploited-vulnerabilities-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-most-exploited-vulnerabilities-in-2020   
Published: 2021 01 25 09:37:20
Received: 2023 01 25 14:23:47
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CISOs of small and medium enterprises need to rethink cybersecurity strategy - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/94417-cisos-of-small-and-medium-enterprises-need-to-rethink-cybersecurity-strategy   
Published: 2021 01 25 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: CISOs of small and medium enterprises need to rethink cybersecurity strategy - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/94417-cisos-of-small-and-medium-enterprises-need-to-rethink-cybersecurity-strategy   
Published: 2021 01 25 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Weekly Threat Report 22nd January 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-22nd-january-2021   
Published: 2021 01 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 22nd January 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-22nd-january-2021   
Published: 2021 01 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Can you help improve the Cyber Security Toolkit for Boards? - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/help-improve-the-board-toolkit   
Published: 2021 01 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Can you help improve the Cyber Security Toolkit for Boards? - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/help-improve-the-board-toolkit   
Published: 2021 01 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Weekly Threat Report 22nd January 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-22nd-january-2021   
Published: 2021 01 22 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Weekly Threat Report 22nd January 2021 - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-22nd-january-2021   
Published: 2021 01 22 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Can you help improve the Cyber Security Toolkit for Boards? - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/help-improve-the-board-toolkit   
Published: 2021 01 22 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Can you help improve the Cyber Security Toolkit for Boards? - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/help-improve-the-board-toolkit   
Published: 2021 01 22 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction - published almost 5 years ago.
Content: Highlights        Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect malicious URLs under multiple training regimes Compare our model against other deep learning methods, and show it performs on-par with other top-scoring models Identify issues with applying generative p...
https://www.fireeye.com/blog/threat-research/2021/01/training-transformers-for-cyber-security-tasks-malicious-url-prediction.html   
Published: 2021 01 21 17:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction - published almost 5 years ago.
Content: Highlights        Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect malicious URLs under multiple training regimes Compare our model against other deep learning methods, and show it performs on-par with other top-scoring models Identify issues with applying generative p...
https://www.fireeye.com/blog/threat-research/2021/01/training-transformers-for-cyber-security-tasks-malicious-url-prediction.html   
Published: 2021 01 21 17:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cross domain security - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cross-domain-security   
Published: 2021 01 21 09:11:19
Received: 2024 04 12 13:21:07
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Cross domain security - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cross-domain-security   
Published: 2021 01 21 09:11:19
Received: 2024 04 12 13:21:07
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Emulation of Kernel Mode Rootkits With Speakeasy - published almost 5 years ago.
Content: In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you haven’t had a chance, give the post a read today. In addition to user mode emulation, Speakeasy also supports emulation of kernel mode Windows binaries. When malware authors employ kernel mode mal...
https://www.fireeye.com/blog/threat-research/2021/01/emulation-of-kernel-mode-rootkits-with-speakeasy.html   
Published: 2021 01 20 16:45:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Emulation of Kernel Mode Rootkits With Speakeasy - published almost 5 years ago.
Content: In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you haven’t had a chance, give the post a read today. In addition to user mode emulation, Speakeasy also supports emulation of kernel mode Windows binaries. When malware authors employ kernel mode mal...
https://www.fireeye.com/blog/threat-research/2021/01/emulation-of-kernel-mode-rootkits-with-speakeasy.html   
Published: 2021 01 20 16:45:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cross domain security - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/cross-domain-security   
Published: 2021 01 20 15:11:19
Received: 2024 03 06 17:21:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Cross domain security - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/cross-domain-security   
Published: 2021 01 20 15:11:19
Received: 2024 03 06 17:21:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Ransomware Taskforce (RTF) announce framework to combat ransomware - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/ransomware-taskforce-rtf-announce-framework-to-combat-ransomware   
Published: 2021 01 20 12:23:09
Received: 2024 05 29 07:41:12
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Ransomware Taskforce (RTF) announce framework to combat ransomware - published almost 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/ransomware-taskforce-rtf-announce-framework-to-combat-ransomware   
Published: 2021 01 20 12:23:09
Received: 2024 05 29 07:41:12
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking   
Published: 2021 01 20 12:19:18
Received: 2024 03 06 17:21:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking - published almost 5 years ago.
Content:
httpss://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking   
Published: 2021 01 20 12:19:18
Received: 2024 03 06 17:21:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security

All Articles

Ordered by Date Published : Year: "2021"
Page: << < 1,456 (of 1,457) > >>

Total Articles in this collection: 72,886


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor