All Articles

Ordered by Date Published : Year: "2021" Month: "02"
and by Page: 1 (of 2) > >>

Total Articles in this collection: 112

Navigation Help at the bottom of the page
Article: Home learning technology: securing tools for remote education - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-technology-securing-tools-for-remote-education   
Published: 2021 02 26 00:00:00
Received: 2023 04 13 09:41:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Home learning technology: securing tools for remote education - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-technology-securing-tools-for-remote-education   
Published: 2021 02 26 00:00:00
Received: 2023 04 13 09:41:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 26th February 2021 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-26th-february-2021   
Published: 2021 02 26 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 26th February 2021 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-26th-february-2021   
Published: 2021 02 26 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Celebrating the influence and contributions of Black+ Security & Privacy Googlers - published over 3 years ago.
Content: Posted by Royal Hansen, Vice President, SecurityBlack History Month may be coming to a close, but our work to build sustainable equity for Google’s Black+ community, and externally is ongoing. Currently, Black Americans make up less than 12% of information security analysts in the U.S. In an industry that consistently requires new ideas to spark positive cha...
http://security.googleblog.com/2021/02/celebrating-influence-and-contributions.html   
Published: 2021 02 25 17:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Celebrating the influence and contributions of Black+ Security & Privacy Googlers - published over 3 years ago.
Content: Posted by Royal Hansen, Vice President, SecurityBlack History Month may be coming to a close, but our work to build sustainable equity for Google’s Black+ community, and externally is ongoing. Currently, Black Americans make up less than 12% of information security analysts in the U.S. In an industry that consistently requires new ideas to spark positive cha...
http://security.googleblog.com/2021/02/celebrating-influence-and-contributions.html   
Published: 2021 02 25 17:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: So Unchill: Melting UNC2198 ICEDID to Ransomware Operations - published over 3 years ago.
Content: Mandiant Advanced Practices (AP) closely tracks the shifting tactics, techniques, and procedures (TTPs) of financially motivated groups who severely disrupt organizations with ransomware. In May 2020, FireEye released a blog post detailing intrusion tradecraft associated with the deployment of MAZE. As of publishing this post, we track 11 disti...
http://www.fireeye.com/blog/threat-research/2021/02/melting-unc2198-icedid-to-ransomware-operations.html   
Published: 2021 02 25 16:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: So Unchill: Melting UNC2198 ICEDID to Ransomware Operations - published over 3 years ago.
Content: Mandiant Advanced Practices (AP) closely tracks the shifting tactics, techniques, and procedures (TTPs) of financially motivated groups who severely disrupt organizations with ransomware. In May 2020, FireEye released a blog post detailing intrusion tradecraft associated with the deployment of MAZE. As of publishing this post, we track 11 disti...
http://www.fireeye.com/blog/threat-research/2021/02/melting-unc2198-icedid-to-ransomware-operations.html   
Published: 2021 02 25 16:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: LD_PRELOAD: How to Run Code at Load Time - published over 3 years ago.
Content:     Today I want to continue the series on using LD_PRELOAD.  In previous posts, we covered how to inject a shared object binary into a process, and use that to hijack a library function call to run our own code.  This is great when we want to overwrite the behavior of external library calls in a process, but we would have to wait for that call to happen fi...
/blog/2021/02/ld_preload-how-to-run-code-at-load-time.html   
Published: 2021 02 24 15:40:00
Received: 2021 06 06 09:04:36
Feed: Secure Ideas: Professionally Evil!
Source: Secure Ideas: Professionally Evil!
Category: Cyber Security
Topic: Cyber Security
Article: LD_PRELOAD: How to Run Code at Load Time - published over 3 years ago.
Content:     Today I want to continue the series on using LD_PRELOAD.  In previous posts, we covered how to inject a shared object binary into a process, and use that to hijack a library function call to run our own code.  This is great when we want to overwrite the behavior of external library calls in a process, but we would have to wait for that call to happen fi...
/blog/2021/02/ld_preload-how-to-run-code-at-load-time.html   
Published: 2021 02 24 15:40:00
Received: 2021 06 06 09:04:36
Feed: Secure Ideas: Professionally Evil!
Source: Secure Ideas: Professionally Evil!
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Nvidia’s Anti-Cryptomining GPU Chip May Not Discourage Attacks - published over 3 years ago.
Content:
https://threatpost.com/nvidia-tries-discourage-crypto-jacking-new-gpu/164221/   
Published: 2021 02 24 15:31:59
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Nvidia’s Anti-Cryptomining GPU Chip May Not Discourage Attacks - published over 3 years ago.
Content:
https://threatpost.com/nvidia-tries-discourage-crypto-jacking-new-gpu/164221/   
Published: 2021 02 24 15:31:59
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: AA21-055A: Exploitation of Accellion File Transfer Appliance - published over 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-055a   
Published: 2021 02 24 14:00:00
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: AA21-055A: Exploitation of Accellion File Transfer Appliance - published over 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-055a   
Published: 2021 02 24 14:00:00
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Active Cyber Defence (ACD) - The Third Year - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 24 03:42:28
Received: 2024 08 08 13:01:02
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Active Cyber Defence (ACD) - The Third Year - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 24 03:42:28
Received: 2024 08 08 13:01:02
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: New Password Checkup Feature Coming to Android - published over 3 years ago.
Content: Posted by Arvind Kumar Sugumar, Software Engineer, Android Team(Note: We’ve updated this post to reflect that the API works by collecting 3.25 bytes of the hashed username)With the proliferation of digital services in our lives, it’s more important than ever to make sure our online information remains safe and secure. Passwords are usually the first line of ...
http://security.googleblog.com/2021/02/new-password-checkup-feature-coming-to.html   
Published: 2021 02 23 17:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: New Password Checkup Feature Coming to Android - published over 3 years ago.
Content: Posted by Arvind Kumar Sugumar, Software Engineer, Android Team(Note: We’ve updated this post to reflect that the API works by collecting 3.25 bytes of the hashed username)With the proliferation of digital services in our lives, it’s more important than ever to make sure our online information remains safe and secure. Passwords are usually the first line of ...
http://security.googleblog.com/2021/02/new-password-checkup-feature-coming-to.html   
Published: 2021 02 23 17:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: TDoS Attacks Take Aim at Emergency First-Responder Services - published over 3 years ago.
Content:
https://threatpost.com/tdos-attacks-emergency-first-responder/164176/   
Published: 2021 02 22 22:02:10
Received: 2021 05 06 16:00:15
Feed: Threatpost – Critical Infrastructure
Source: Threatpost
Category: News
Topic: Critical Infrastructure
Article: TDoS Attacks Take Aim at Emergency First-Responder Services - published over 3 years ago.
Content:
https://threatpost.com/tdos-attacks-emergency-first-responder/164176/   
Published: 2021 02 22 22:02:10
Received: 2021 05 06 16:00:15
Feed: Threatpost – Critical Infrastructure
Source: Threatpost
Category: News
Topic: Critical Infrastructure
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Erasing data from donated devices - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/erasing-data-from-donated-devices   
Published: 2021 02 22 16:17:31
Received: 2024 02 26 14:22:22
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Erasing data from donated devices - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/erasing-data-from-donated-devices   
Published: 2021 02 22 16:17:31
Received: 2024 02 26 14:22:22
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Goldman Sachs joins not-for-profit TCG to define security measures and standards within FinTech - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94653-goldman-sachs-joins-not-for-profit-tcg-to-define-security-measures-and-standards-within-fintech   
Published: 2021 02 22 15:59:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Goldman Sachs joins not-for-profit TCG to define security measures and standards within FinTech - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94653-goldman-sachs-joins-not-for-profit-tcg-to-define-security-measures-and-standards-within-fintech   
Published: 2021 02 22 15:59:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Cyber Criminals Exploit Accellion FTA for Data Theft and Extortion - published over 3 years ago.
Content: Starting in mid-December 2020, malicious actors that Mandiant tracks as UNC2546 exploited multiple zero-day vulnerabilities in Accellion’s legacy File Transfer Appliance (FTA) to install a newly discovered web shell named DEWMODE. The motivation of UNC2546 was not immediately apparent, but starting in late January 2021, several organizations that h...
http://www.fireeye.com/blog/threat-research/2021/02/accellion-fta-exploited-for-data-theft-and-extortion.html   
Published: 2021 02 22 14:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Cyber Criminals Exploit Accellion FTA for Data Theft and Extortion - published over 3 years ago.
Content: Starting in mid-December 2020, malicious actors that Mandiant tracks as UNC2546 exploited multiple zero-day vulnerabilities in Accellion’s legacy File Transfer Appliance (FTA) to install a newly discovered web shell named DEWMODE. The motivation of UNC2546 was not immediately apparent, but starting in late January 2021, several organizations that h...
http://www.fireeye.com/blog/threat-research/2021/02/accellion-fta-exploited-for-data-theft-and-extortion.html   
Published: 2021 02 22 14:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Erasing data from donated devices - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/erasing-data-from-donated-devices   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Erasing data from donated devices - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/erasing-data-from-donated-devices   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Home learning: advice for parents and carers - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-advice-for-parents-and-carers   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Home learning: advice for parents and carers - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-advice-for-parents-and-carers   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Home learning technology: securing tools for remote education - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-technology-securing-tools-for-remote-education   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Home learning technology: securing tools for remote education - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-technology-securing-tools-for-remote-education   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Erasing data from donated devices - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/erasing-data-from-donated-devices   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Erasing data from donated devices - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/erasing-data-from-donated-devices   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Home learning: advice for parents and carers - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-advice-for-parents-and-carers   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Home learning: advice for parents and carers - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-advice-for-parents-and-carers   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Home learning technology: securing tools for remote education - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-technology-securing-tools-for-remote-education   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Home learning technology: securing tools for remote education - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/home-learning-technology-securing-tools-for-remote-education   
Published: 2021 02 22 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: How cybercriminals use sales best practices in ransomware attacks - published almost 4 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94392-how-cybercriminals-use-sales-best-practices-in-ransomware-attacks   
Published: 2021 02 21 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: How cybercriminals use sales best practices in ransomware attacks - published almost 4 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94392-how-cybercriminals-use-sales-best-practices-in-ransomware-attacks   
Published: 2021 02 21 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Active Cyber Defence (ACD) - the fourth year - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-four   
Published: 2021 02 19 00:00:00
Received: 2022 04 05 08:40:51
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Active Cyber Defence (ACD) - the fourth year - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-four   
Published: 2021 02 19 00:00:00
Received: 2022 04 05 08:40:51
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Active Cyber Defence (ACD) - The Third Year - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 19 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Active Cyber Defence (ACD) - The Third Year - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 19 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 19th February 2021 - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-19th-february-2021   
Published: 2021 02 19 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 19th February 2021 - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-19th-february-2021   
Published: 2021 02 19 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Active Cyber Defence (ACD) - The Third Year - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 19 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Active Cyber Defence (ACD) - The Third Year - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 19 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Weekly Threat Report 19th February 2021 - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-19th-february-2021   
Published: 2021 02 19 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Weekly Threat Report 19th February 2021 - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-19th-february-2021   
Published: 2021 02 19 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem - published almost 4 years ago.
Content: PropositionDigital offense capabilities are currently net negative for the security ecosystem.[0]The costs of improved digital offense currently outweigh the benefits. The legitimate benefits of digital offense accrue primarily to the security one percent (#securityonepercent), and to intelligence, military, and law enforcement agencies. The derived defensiv...
https://taosecurity.blogspot.com/2021/02/digital-offense-capabilities-are.html   
Published: 2021 02 18 15:30:00
Received: 2024 10 18 20:19:28
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem - published almost 4 years ago.
Content: PropositionDigital offense capabilities are currently net negative for the security ecosystem.[0]The costs of improved digital offense currently outweigh the benefits. The legitimate benefits of digital offense accrue primarily to the security one percent (#securityonepercent), and to intelligence, military, and law enforcement agencies. The derived defensiv...
https://taosecurity.blogspot.com/2021/02/digital-offense-capabilities-are.html   
Published: 2021 02 18 15:30:00
Received: 2024 10 18 20:19:28
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Active Cyber Defence (ACD) - The Third Year - published almost 4 years ago.
Content:
httpss://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 18 12:01:39
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Active Cyber Defence (ACD) - The Third Year - published almost 4 years ago.
Content:
httpss://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 18 12:01:39
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware - published almost 4 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-048a   
Published: 2021 02 17 16:00:00
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware - published almost 4 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-048a   
Published: 2021 02 17 16:00:00
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Mitigating Memory Safety Issues in Open Source Software - published almost 4 years ago.
Content: Posted by Dan Lorenc, Infrastructure Security TeamMemory-safety vulnerabilities have dominated the security field for years and often lead to issues that can be exploited to take over entire systems. A recent study found that "~70% of the vulnerabilities addressed through a security update each year continue to be memory safety issues.” Another analysis on s...
http://security.googleblog.com/2021/02/mitigating-memory-safety-issues-in-open.html   
Published: 2021 02 17 14:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Mitigating Memory Safety Issues in Open Source Software - published almost 4 years ago.
Content: Posted by Dan Lorenc, Infrastructure Security TeamMemory-safety vulnerabilities have dominated the security field for years and often lead to issues that can be exploited to take over entire systems. A recent study found that "~70% of the vulnerabilities addressed through a security update each year continue to be memory safety issues.” Another analysis on s...
http://security.googleblog.com/2021/02/mitigating-memory-safety-issues-in-open.html   
Published: 2021 02 17 14:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two) - published almost 4 years ago.
Content: In this post, we continue our analysis of the SolarCity ConnectPort X2e Zigbee device (referred to throughout as X2e device). In Part One, we discussed the X2e at a high level, performed initial network-based attacks, then discussed the hardware techniques used to gain a remote shell on the X2e device as a non-privileged system user. In this se...
http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-two.html   
Published: 2021 02 17 13:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two) - published almost 4 years ago.
Content: In this post, we continue our analysis of the SolarCity ConnectPort X2e Zigbee device (referred to throughout as X2e device). In Part One, we discussed the X2e at a high level, performed initial network-based attacks, then discussed the hardware techniques used to gain a remote shell on the X2e device as a non-privileged system user. In this se...
http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-two.html   
Published: 2021 02 17 13:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One) - published almost 4 years ago.
Content: In 2019, Mandiant’s Red Team discovered a series of vulnerabilities present within Digi International’s ConnectPort X2e device, which allows for remote code execution as a privileged user. Specifically, Mandiant’s research focused on SolarCity’s (now owned by Tesla) rebranded ConnectPort X2e device, which is used in residential solar installations....
http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-one.html   
Published: 2021 02 17 13:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One) - published almost 4 years ago.
Content: In 2019, Mandiant’s Red Team discovered a series of vulnerabilities present within Digi International’s ConnectPort X2e device, which allows for remote code execution as a privileged user. Specifically, Mandiant’s research focused on SolarCity’s (now owned by Tesla) rebranded ConnectPort X2e device, which is used in residential solar installations....
http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-one.html   
Published: 2021 02 17 13:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Building Web Check using PaaS - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/building-web-check-using-paas   
Published: 2021 02 17 08:09:16
Received: 2024 05 09 11:23:27
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Building Web Check using PaaS - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/building-web-check-using-paas   
Published: 2021 02 17 08:09:16
Received: 2024 05 09 11:23:27
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Better device configuration shouldn’t be like herding cats - published almost 4 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/better-device-configuration-should-not-be-like-herding-cats   
Published: 2021 02 17 08:09:16
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Better device configuration shouldn’t be like herding cats - published almost 4 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/better-device-configuration-should-not-be-like-herding-cats   
Published: 2021 02 17 08:09:16
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Let’s Encrypt Gears Up to Replace 200M Certificates a Day - published almost 4 years ago.
Content:
https://threatpost.com/lets-encrypt-gears-up-to-replace-200m-certificates-a-day/164002/   
Published: 2021 02 16 21:47:30
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Let’s Encrypt Gears Up to Replace 200M Certificates a Day - published almost 4 years ago.
Content:
https://threatpost.com/lets-encrypt-gears-up-to-replace-200m-certificates-a-day/164002/   
Published: 2021 02 16 21:47:30
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cyber Accelerator - doing things differently - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-accelerator-doing-things-differently   
Published: 2021 02 16 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Cyber Accelerator - doing things differently - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-accelerator-doing-things-differently   
Published: 2021 02 16 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 12th February 2021 - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-12th-february-2021   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 12th February 2021 - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-12th-february-2021   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Mobile Device Guidance updates: Chrome OS and Ubuntu - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/mobile-device-guidance-updates-chrome-os-and-ubuntu   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Mobile Device Guidance updates: Chrome OS and Ubuntu - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/mobile-device-guidance-updates-chrome-os-and-ubuntu   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 12th February 2021 - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-12th-february-2021   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Weekly Threat Report 12th February 2021 - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-12th-february-2021   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Mobile Device Guidance updates: Chrome OS and Ubuntu - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/mobile-device-guidance-updates-chrome-os-and-ubuntu   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Mobile Device Guidance updates: Chrome OS and Ubuntu - published almost 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/mobile-device-guidance-updates-chrome-os-and-ubuntu   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: AA21-042A: Compromise of U.S. Water Treatment Facility - published almost 4 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-042a   
Published: 2021 02 11 19:15:49
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: AA21-042A: Compromise of U.S. Water Treatment Facility - published almost 4 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-042a   
Published: 2021 02 11 19:15:49
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: I’ve made it! - published almost 4 years ago.
Content: First off, happy new year! (Well if the tax man can start the new year in April, I can start it on Feb 11th!) Secondly, Infosecurity Magazine was ever so kind as to feature an interview with me in the Q1, 2021, Voume 18, Issue 1 edition. (the link should take you to the digital version if you’re so inclined). Of course, I won’t miss any opportuni...
https://javvadmalik.com/2021/02/11/ive-made-it/   
Published: 2021 02 11 13:10:22
Received: 2021 06 06 09:04:45
Feed: J4vv4D
Source: J4vv4D
Category: Cyber Security
Topic: Cyber Security
Article: I’ve made it! - published almost 4 years ago.
Content: First off, happy new year! (Well if the tax man can start the new year in April, I can start it on Feb 11th!) Secondly, Infosecurity Magazine was ever so kind as to feature an interview with me in the Q1, 2021, Voume 18, Issue 1 edition. (the link should take you to the digital version if you’re so inclined). Of course, I won’t miss any opportuni...
https://javvadmalik.com/2021/02/11/ive-made-it/   
Published: 2021 02 11 13:10:22
Received: 2021 06 06 09:04:45
Feed: J4vv4D
Source: J4vv4D
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Top 10 Most Used MITRE ATT&CK Tactics & Techniques In 2020 - published almost 4 years ago.
Content:
https://toolswatch.org/2021/02/top-10-most-used-mitre-attck-tactics-techniques-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-most-used-mitre-attck-tactics-techniques-in-2020   
Published: 2021 02 11 06:44:16
Received: 2023 01 25 14:23:47
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Article: Top 10 Most Used MITRE ATT&CK Tactics & Techniques In 2020 - published almost 4 years ago.
Content:
https://toolswatch.org/2021/02/top-10-most-used-mitre-attck-tactics-techniques-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-most-used-mitre-attck-tactics-techniques-in-2020   
Published: 2021 02 11 06:44:16
Received: 2023 01 25 14:23:47
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling

All Articles

Ordered by Date Published : Year: "2021" Month: "02"
Page: 1 (of 2) > >>

Total Articles in this collection: 112


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor