Article: Coming soon to ACD users...the 'MyNCSC' platform - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/myncsc-coming-soon Published: 2021 02 03 09:17:13 Received: 2023 11 22 12:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Defending software build pipelines from malicious attack - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack Published: 2021 02 03 00:00:23 Received: 2022 12 02 11:01:38 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Exercise in a Box: Fitness tracking - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/exercise-in-a-box-fitness-tracking Published: 2021 02 03 00:00:00 Received: 2022 07 23 23:20:14 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Defending software build pipelines from malicious attack - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack Published: 2021 02 03 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published about 4 years ago. Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ... https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/ Published: 2021 02 02 23:18:40 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: Crypto Crook Hired Steven Seagal to Promote Scam, Now Faces Charges - published about 4 years ago. Content: https://threatpost.com/crypto-crook-steven-segal-scam/163612/ Published: 2021 02 02 18:17:18 Received: 2021 05 06 16:00:15 Feed: Threatpost – Cryptography Source: Threatpost Category: News Topic: Cryptography |
![]() |
Article: Coming soon to ACD users...the 'MyNCSC' platform - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/myncsc-coming-soon Published: 2021 02 02 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: 10 years of '10 Steps to Cyber Security' - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security Published: 2021 02 01 23:00:00 Received: 2022 02 16 11:20:52 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: SolarWinds Hack Prompts Congress to Put NSA in Encryption Hot Seat - published about 4 years ago. Content: https://threatpost.com/solarwinds-nsa-encryption/163561/ Published: 2021 02 01 21:12:13 Received: 2021 05 06 16:00:15 Feed: Threatpost – Cryptography Source: Threatpost Category: News Topic: Cryptography |
![]() |
Article: Critical Libgcrypt Crypto Bug Opens Machines to Arbitrary Code - published about 4 years ago. Content: https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/ Published: 2021 02 01 16:59:19 Received: 2021 05 06 16:00:15 Feed: Threatpost – Cryptography Source: Threatpost Category: News Topic: Cryptography |
Article: In the shadow of SolarWinds: Personal reflections - published about 4 years ago. Content: https://www.securitymagazine.com/articles/94488-in-the-shadow-of-solarwinds-personal-reflections Published: 2021 02 01 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
![]() |
Article: Cyber Accelerator - doing things differently - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyber-accelerator-doing-things-differently Published: 2021 02 01 00:00:00 Received: 2023 04 13 09:41:25 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Helping organisations - and researchers - to manage vulnerability disclosure - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/helping-to-manage-vulnerability-disclosure Published: 2021 01 29 07:31:19 Received: 2024 02 12 09:42:33 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 29th January 2021 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-29th-january-2021 Published: 2021 01 29 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: The rise of ransomware - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/rise-of-ransomware Published: 2021 01 29 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Weekly Threat Report 29th January 2021 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-29th-january-2021 Published: 2021 01 29 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: The rise of ransomware - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/rise-of-ransomware Published: 2021 01 29 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: Introducing data breach guidance for individuals and families - published about 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/introducing-data-breach-guidance-for-individuals-and-families Published: 2021 01 28 08:09:48 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Introducing new NCSC Mobile Device Guidance - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-new-ncsc-mobile-device-guidance Published: 2021 01 28 00:00:00 Received: 2023 05 18 12:20:27 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: Data breaches: guidance for individuals and families - published about 4 years ago. Content: https://www.ncsc.gov.uk/guidance/data-breaches Published: 2021 01 28 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Introducing data breach guidance for individuals and families - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-data-breach-guidance-for-individuals-and-families Published: 2021 01 28 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Data breaches: guidance for individuals and families - published about 4 years ago. Content: https://www.ncsc.gov.uk/guidance/data-breaches Published: 2021 01 28 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
![]() |
Article: Notorious cybersecurity attacks in history and how to prevent them - published about 4 years ago. Content: https://www.securitymagazine.com/articles/94114-notorious-cybersecurity-attacks-in-history-and-how-to-prevent-them Published: 2021 01 27 05:00:00 Received: 2021 04 25 02:14:07 Feed: Security Magazine – Reports Source: Security Magazine Category: Reports Topic: Cyber Security |
Article: DanaBot Malware Roars Back into Relevancy - published about 4 years ago. Content: https://threatpost.com/danabot-malware-roars-back/163358/ Published: 2021 01 26 21:24:34 Received: 2021 05 06 16:00:15 Feed: Threatpost – Cryptography Source: Threatpost Category: News Topic: Cryptography |
![]() |
Article: Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication - published about 4 years ago. Content: FireEye Email Security recently encountered various phishing campaigns, mostly in the Americas and Europe, using source code obfuscation with compromised or bad domains. These domains were masquerading as authentic websites and stole personal information such as credit card data. The stolen information was then shared to cross-platform, cloud-bas... https://www.fireeye.com/blog/threat-research/2021/01/phishing-campaign-woff-obfuscation-telegram-communications.html Published: 2021 01 26 20:45:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: RITICS: Securing cyber-physical systems - published about 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems Published: 2021 01 26 13:06:12 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: An RFC on IoCs – playing our part in international standards - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/rfc-indicators-of-compromise-for-ietf Published: 2021 01 26 13:06:12 Received: 2024 01 31 09:21:01 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: RITICS: Securing cyber-physical systems - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems Published: 2021 01 26 13:06:12 Received: 2023 11 22 12:21:38 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: The problems with patching - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-problems-with-patching Published: 2021 01 26 01:20:20 Received: 2024 09 16 08:41:16 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: RITICS: Securing cyber-physical systems - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems Published: 2021 01 26 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: In new study Interisle Reveals Excessive Withholding of Internet WHOIS Data - published about 4 years ago. Content: My Interisle colleagues, together with Greg Aaron, have completed an in-depth analysis of the effects of ICANN policy for WHOIS, a public lookup service that has until recently made it possible to identify who registered and controls a domain name. The European Union’s General Data Protection Regulation (GDPR), adopted in May 2018, restricted the publication... https://www.securityskeptic.com/2021/01/in-new-study-interisle-reveals-excessive-withholding-of-internet-whois-data.html Published: 2021 01 25 14:06:56 Received: 2021 06 06 09:04:59 Feed: The Security Skeptic Source: The Security Skeptic Category: Cyber Security Topic: Cyber Security |
Article: Top 10 Most Exploited Vulnerabilities in 2020 - published about 4 years ago. Content: https://toolswatch.org/2021/01/top-10-most-exploited-vulnerabilities-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-most-exploited-vulnerabilities-in-2020 Published: 2021 01 25 09:37:20 Received: 2023 01 25 14:23:47 Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Category: News Topic: Security Tooling |
![]() |
Article: CISOs of small and medium enterprises need to rethink cybersecurity strategy - published about 4 years ago. Content: https://www.securitymagazine.com/articles/94417-cisos-of-small-and-medium-enterprises-need-to-rethink-cybersecurity-strategy Published: 2021 01 25 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: Weekly Threat Report 22nd January 2021 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-22nd-january-2021 Published: 2021 01 22 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Can you help improve the Cyber Security Toolkit for Boards? - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/help-improve-the-board-toolkit Published: 2021 01 22 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Weekly Threat Report 22nd January 2021 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-22nd-january-2021 Published: 2021 01 22 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Can you help improve the Cyber Security Toolkit for Boards? - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/help-improve-the-board-toolkit Published: 2021 01 22 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction - published about 4 years ago. Content: Highlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect malicious URLs under multiple training regimes Compare our model against other deep learning methods, and show it performs on-par with other top-scoring models Identify issues with applying generative p... https://www.fireeye.com/blog/threat-research/2021/01/training-transformers-for-cyber-security-tasks-malicious-url-prediction.html Published: 2021 01 21 17:30:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Cross domain security - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/cross-domain-security Published: 2021 01 21 09:11:19 Received: 2024 04 12 13:21:07 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: Emulation of Kernel Mode Rootkits With Speakeasy - published about 4 years ago. Content: In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you haven’t had a chance, give the post a read today. In addition to user mode emulation, Speakeasy also supports emulation of kernel mode Windows binaries. When malware authors employ kernel mode mal... https://www.fireeye.com/blog/threat-research/2021/01/emulation-of-kernel-mode-rootkits-with-speakeasy.html Published: 2021 01 20 16:45:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Cross domain security - published about 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/cross-domain-security Published: 2021 01 20 15:11:19 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Ransomware Taskforce (RTF) announce framework to combat ransomware - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ransomware-taskforce-rtf-announce-framework-to-combat-ransomware Published: 2021 01 20 12:23:09 Received: 2024 05 29 07:41:12 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking - published about 4 years ago. Content: httpss://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking Published: 2021 01 20 12:19:18 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Click to Open Code Editor