Article: Helping organisations - and researchers - to manage vulnerability disclosure - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/helping-to-manage-vulnerability-disclosure Published: 2021 01 29 07:31:19 Received: 2024 02 12 09:42:33 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 29th January 2021 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-29th-january-2021 Published: 2021 01 29 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The rise of ransomware - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/rise-of-ransomware Published: 2021 01 29 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 29th January 2021 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-29th-january-2021 Published: 2021 01 29 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: The rise of ransomware - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/rise-of-ransomware Published: 2021 01 29 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Introducing data breach guidance for individuals and families - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/introducing-data-breach-guidance-for-individuals-and-families Published: 2021 01 28 08:09:48 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Introducing new NCSC Mobile Device Guidance - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-new-ncsc-mobile-device-guidance Published: 2021 01 28 00:00:00 Received: 2023 05 18 12:20:27 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Data breaches: guidance for individuals and families - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/data-breaches Published: 2021 01 28 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Introducing data breach guidance for individuals and families - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-data-breach-guidance-for-individuals-and-families Published: 2021 01 28 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Data breaches: guidance for individuals and families - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/data-breaches Published: 2021 01 28 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Notorious cybersecurity attacks in history and how to prevent them - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94114-notorious-cybersecurity-attacks-in-history-and-how-to-prevent-them Published: 2021 01 27 05:00:00 Received: 2021 04 25 02:14:07 Feed: Security Magazine – Reports Source: Security Magazine Category: Reports Topic: Cyber Security |
Article: DanaBot Malware Roars Back into Relevancy - published almost 4 years ago. Content: https://threatpost.com/danabot-malware-roars-back/163358/ Published: 2021 01 26 21:24:34 Received: 2021 05 06 16:00:15 Feed: Threatpost – Cryptography Source: Threatpost Category: News Topic: Cryptography |
|
Article: Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication - published almost 4 years ago. Content: FireEye Email Security recently encountered various phishing campaigns, mostly in the Americas and Europe, using source code obfuscation with compromised or bad domains. These domains were masquerading as authentic websites and stole personal information such as credit card data. The stolen information was then shared to cross-platform, cloud-bas... https://www.fireeye.com/blog/threat-research/2021/01/phishing-campaign-woff-obfuscation-telegram-communications.html Published: 2021 01 26 20:45:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: RITICS: Securing cyber-physical systems - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems Published: 2021 01 26 13:06:12 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: An RFC on IoCs – playing our part in international standards - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/rfc-indicators-of-compromise-for-ietf Published: 2021 01 26 13:06:12 Received: 2024 01 31 09:21:01 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: RITICS: Securing cyber-physical systems - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems Published: 2021 01 26 13:06:12 Received: 2023 11 22 12:21:38 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The problems with patching - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-problems-with-patching Published: 2021 01 26 01:20:20 Received: 2024 09 16 08:41:16 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: RITICS: Securing cyber-physical systems - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems Published: 2021 01 26 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: In new study Interisle Reveals Excessive Withholding of Internet WHOIS Data - published almost 4 years ago. Content: My Interisle colleagues, together with Greg Aaron, have completed an in-depth analysis of the effects of ICANN policy for WHOIS, a public lookup service that has until recently made it possible to identify who registered and controls a domain name. The European Union’s General Data Protection Regulation (GDPR), adopted in May 2018, restricted the publication... https://www.securityskeptic.com/2021/01/in-new-study-interisle-reveals-excessive-withholding-of-internet-whois-data.html Published: 2021 01 25 14:06:56 Received: 2021 06 06 09:04:59 Feed: The Security Skeptic Source: The Security Skeptic Category: Cyber Security Topic: Cyber Security |
Article: Top 10 Most Exploited Vulnerabilities in 2020 - published almost 4 years ago. Content: https://toolswatch.org/2021/01/top-10-most-exploited-vulnerabilities-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-most-exploited-vulnerabilities-in-2020 Published: 2021 01 25 09:37:20 Received: 2023 01 25 14:23:47 Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Category: News Topic: Security Tooling |
|
Article: CISOs of small and medium enterprises need to rethink cybersecurity strategy - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94417-cisos-of-small-and-medium-enterprises-need-to-rethink-cybersecurity-strategy Published: 2021 01 25 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: Weekly Threat Report 22nd January 2021 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-22nd-january-2021 Published: 2021 01 22 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Can you help improve the Cyber Security Toolkit for Boards? - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/help-improve-the-board-toolkit Published: 2021 01 22 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 22nd January 2021 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-22nd-january-2021 Published: 2021 01 22 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Can you help improve the Cyber Security Toolkit for Boards? - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/help-improve-the-board-toolkit Published: 2021 01 22 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction - published almost 4 years ago. Content: Highlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect malicious URLs under multiple training regimes Compare our model against other deep learning methods, and show it performs on-par with other top-scoring models Identify issues with applying generative p... https://www.fireeye.com/blog/threat-research/2021/01/training-transformers-for-cyber-security-tasks-malicious-url-prediction.html Published: 2021 01 21 17:30:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Cross domain security - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/cross-domain-security Published: 2021 01 21 09:11:19 Received: 2024 04 12 13:21:07 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Emulation of Kernel Mode Rootkits With Speakeasy - published almost 4 years ago. Content: In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you haven’t had a chance, give the post a read today. In addition to user mode emulation, Speakeasy also supports emulation of kernel mode Windows binaries. When malware authors employ kernel mode mal... https://www.fireeye.com/blog/threat-research/2021/01/emulation-of-kernel-mode-rootkits-with-speakeasy.html Published: 2021 01 20 16:45:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Cross domain security - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/cross-domain-security Published: 2021 01 20 15:11:19 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Ransomware Taskforce (RTF) announce framework to combat ransomware - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ransomware-taskforce-rtf-announce-framework-to-combat-ransomware Published: 2021 01 20 12:23:09 Received: 2024 05 29 07:41:12 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking Published: 2021 01 20 12:19:18 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Click to Open Code Editor