All Articles

Ordered by Date Published : Year: "2022" Month: "04"
and by Page: << < 24 (of 225) > >>

Total Articles in this collection: 11,282

Navigation Help at the bottom of the page
Article: Ubuntu Security Notice USN-5366-2 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166871/USN-5366-2.txt   
Published: 2022 04 27 18:17:05
Received: 2022 04 27 18:49:15
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5366-2 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166871/USN-5366-2.txt   
Published: 2022 04 27 18:17:05
Received: 2022 04 27 18:49:15
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1619-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166870/RHSA-2022-1619-01.txt   
Published: 2022 04 27 18:16:52
Received: 2022 04 27 18:49:15
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1619-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166870/RHSA-2022-1619-01.txt   
Published: 2022 04 27 18:16:52
Received: 2022 04 27 18:49:15
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Backdoor.Win32.Cafeini.b Man-In-The-Middle - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166869/MVID-2022-0569.txt   
Published: 2022 04 27 18:16:28
Received: 2022 04 27 18:49:15
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Cafeini.b Man-In-The-Middle - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166869/MVID-2022-0569.txt   
Published: 2022 04 27 18:16:28
Received: 2022 04 27 18:49:15
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Red Hat Security Advisory 2022-1599-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166868/RHSA-2022-1599-01.txt   
Published: 2022 04 27 18:15:12
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1599-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166868/RHSA-2022-1599-01.txt   
Published: 2022 04 27 18:15:12
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: CVE-2022-28197 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28197   
Published: 2022 04 27 18:15:08
Received: 2022 04 27 20:23:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28197 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28197   
Published: 2022 04 27 18:15:08
Received: 2022 04 27 20:23:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-28196 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28196   
Published: 2022 04 27 18:15:08
Received: 2022 04 27 20:23:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28196 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28196   
Published: 2022 04 27 18:15:08
Received: 2022 04 27 20:23:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2022-28195 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28195   
Published: 2022 04 27 18:15:08
Received: 2022 04 27 20:23:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28195 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28195   
Published: 2022 04 27 18:15:08
Received: 2022 04 27 20:23:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28194 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28194   
Published: 2022 04 27 18:15:07
Received: 2022 04 27 20:23:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28194 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28194   
Published: 2022 04 27 18:15:07
Received: 2022 04 27 20:23:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2022-28193 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28193   
Published: 2022 04 27 18:15:07
Received: 2022 04 27 20:23:20
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28193 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28193   
Published: 2022 04 27 18:15:07
Received: 2022 04 27 20:23:20
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-24372 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24372   
Published: 2022 04 27 18:15:07
Received: 2022 04 27 20:23:17
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-24372 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24372   
Published: 2022 04 27 18:15:07
Received: 2022 04 27 20:23:17
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22315 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22315   
Published: 2022 04 27 18:15:07
Received: 2022 04 27 20:23:17
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22315 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22315   
Published: 2022 04 27 18:15:07
Received: 2022 04 27 20:23:17
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Coca-Cola Investigates Data-Theft Claims After Ransomware Attack - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/coca-cola-investigates-data-theft-ransomware   
Published: 2022 04 27 18:14:51
Received: 2022 05 04 13:10:11
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Coca-Cola Investigates Data-Theft Claims After Ransomware Attack - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/coca-cola-investigates-data-theft-ransomware   
Published: 2022 04 27 18:14:51
Received: 2022 05 04 13:10:11
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Ubuntu Security Notice USN-5390-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166867/USN-5390-1.txt   
Published: 2022 04 27 18:14:32
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5390-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166867/USN-5390-1.txt   
Published: 2022 04 27 18:14:32
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Red Hat Security Advisory 2022-1617-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166866/RHSA-2022-1617-01.txt   
Published: 2022 04 27 18:12:25
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1617-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166866/RHSA-2022-1617-01.txt   
Published: 2022 04 27 18:12:25
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Cafeini.b Hardcoded Credential - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166865/MVID-2022-0568.txt   
Published: 2022 04 27 18:09:53
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Cafeini.b Hardcoded Credential - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166865/MVID-2022-0568.txt   
Published: 2022 04 27 18:09:53
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Microsoft says Russia hit Ukraine with hundreds of cyberattacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/microsoft-says-russia-hit-ukraine-with-hundreds-of-cyberattacks/   
Published: 2022 04 27 18:09:38
Received: 2022 04 27 18:22:09
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft says Russia hit Ukraine with hundreds of cyberattacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/microsoft-says-russia-hit-ukraine-with-hundreds-of-cyberattacks/   
Published: 2022 04 27 18:09:38
Received: 2022 04 27 18:22:09
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Seniors get helping hand with scam awareness, cybersecurity - Energeticcity.ca - published over 2 years ago.
Content: Deb Snider and financial planner Nadine Thornton talk cybersecurity at the Fort St. John Seniors Hall, April 26, 2022. (Tom Summer/Alaska Highway ...
https://energeticcity.ca/2022/04/27/seniors-get-helping-hand-with-scam-awareness-cybersecurity/   
Published: 2022 04 27 18:05:51
Received: 2022 04 27 21:01:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Seniors get helping hand with scam awareness, cybersecurity - Energeticcity.ca - published over 2 years ago.
Content: Deb Snider and financial planner Nadine Thornton talk cybersecurity at the Fort St. John Seniors Hall, April 26, 2022. (Tom Summer/Alaska Highway ...
https://energeticcity.ca/2022/04/27/seniors-get-helping-hand-with-scam-awareness-cybersecurity/   
Published: 2022 04 27 18:05:51
Received: 2022 04 27 21:01:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Kubernetes Config and Efficiency: The Butterfly Effect - Container Journal - published over 2 years ago.
Content: This pervasive DevSecOps-like model of service ownership frees operations teams from handling deployment configuration and allows them to focus on ...
https://containerjournal.com/features/kubernetes-config-and-efficiency-the-butterfly-effect/   
Published: 2022 04 27 18:01:45
Received: 2022 04 27 19:10:45
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Kubernetes Config and Efficiency: The Butterfly Effect - Container Journal - published over 2 years ago.
Content: This pervasive DevSecOps-like model of service ownership frees operations teams from handling deployment configuration and allows them to focus on ...
https://containerjournal.com/features/kubernetes-config-and-efficiency-the-butterfly-effect/   
Published: 2022 04 27 18:01:45
Received: 2022 04 27 19:10:45
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Why Pandemic Burnout Is a Cybersecurity Problem and How To Fix It - CPO Magazine - published over 2 years ago.
Content: Employee wearing face mask feeling tired looking at laptop screen showing pandemic burnout. Cyber SecurityInsights. ·4 min read ...
https://www.cpomagazine.com/cyber-security/why-pandemic-burnout-is-a-cybersecurity-problem-and-how-to-fix-it/   
Published: 2022 04 27 18:00:32
Received: 2022 04 27 18:41:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Why Pandemic Burnout Is a Cybersecurity Problem and How To Fix It - CPO Magazine - published over 2 years ago.
Content: Employee wearing face mask feeling tired looking at laptop screen showing pandemic burnout. Cyber SecurityInsights. ·4 min read ...
https://www.cpomagazine.com/cyber-security/why-pandemic-burnout-is-a-cybersecurity-problem-and-how-to-fix-it/   
Published: 2022 04 27 18:00:32
Received: 2022 04 27 18:41:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Bar Council experiences 'technical difficulties' after facing malicious cyber attack - City AM - published over 2 years ago.
Content: The hack follows warnings from cyber security experts and intelligence agencies that Russia's invasion of Ukraine may lead to a rise in the number ...
https://www.cityam.com/bar-council-experiences-technical-difficulties-after-facing-malicious-cyber-attack/   
Published: 2022 04 27 17:55:17
Received: 2022 04 28 02:01:51
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Bar Council experiences 'technical difficulties' after facing malicious cyber attack - City AM - published over 2 years ago.
Content: The hack follows warnings from cyber security experts and intelligence agencies that Russia's invasion of Ukraine may lead to a rise in the number ...
https://www.cityam.com/bar-council-experiences-technical-difficulties-after-facing-malicious-cyber-attack/   
Published: 2022 04 27 17:55:17
Received: 2022 04 28 02:01:51
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: DevSecOps - Sonrai Security - published over 2 years ago.
Content: Discover how Sonrai helps Devops teams right-size their security, leverage cloud speed and improve workflows.
https://sonraisecurity.com/user-role/devsecops/   
Published: 2022 04 27 17:53:00
Received: 2022 04 27 21:10:57
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps - Sonrai Security - published over 2 years ago.
Content: Discover how Sonrai helps Devops teams right-size their security, leverage cloud speed and improve workflows.
https://sonraisecurity.com/user-role/devsecops/   
Published: 2022 04 27 17:53:00
Received: 2022 04 27 21:10:57
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Dakota State students join international AI cyber consortium in Sweden - Argus Leader - published over 2 years ago.
Content: ... and a handful of other application-focused labs — the Global Center of Excellence for Cyber Security for Distributed Intelligence, AI Sweden, ...
https://www.argusleader.com/story/news/education/2022/04/27/dakota-state-students-join-international-ai-cyber-consortium-sweden/9554228002/   
Published: 2022 04 27 17:51:35
Received: 2022 04 27 18:41:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Dakota State students join international AI cyber consortium in Sweden - Argus Leader - published over 2 years ago.
Content: ... and a handful of other application-focused labs — the Global Center of Excellence for Cyber Security for Distributed Intelligence, AI Sweden, ...
https://www.argusleader.com/story/news/education/2022/04/27/dakota-state-students-join-international-ai-cyber-consortium-sweden/9554228002/   
Published: 2022 04 27 17:51:35
Received: 2022 04 27 18:41:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Feds offer big rewards for info on suspected Russian Sandworm intel officers - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/04/27/feds_10m_reward_sandworm/   
Published: 2022 04 27 17:46:55
Received: 2022 04 27 18:02:02
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Feds offer big rewards for info on suspected Russian Sandworm intel officers - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/04/27/feds_10m_reward_sandworm/   
Published: 2022 04 27 17:46:55
Received: 2022 04 27 18:02:02
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Red Hat Security Advisory 2022-1618-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166864/RHSA-2022-1618-01.txt   
Published: 2022 04 27 17:46:05
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1618-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166864/RHSA-2022-1618-01.txt   
Published: 2022 04 27 17:46:05
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Red Hat Security Advisory 2022-1550-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166863/RHSA-2022-1550-01.txt   
Published: 2022 04 27 17:45:51
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1550-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166863/RHSA-2022-1550-01.txt   
Published: 2022 04 27 17:45:51
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1546-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166862/RHSA-2022-1546-01.txt   
Published: 2022 04 27 17:45:38
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1546-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166862/RHSA-2022-1546-01.txt   
Published: 2022 04 27 17:45:38
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Trojan-Downloader.Win32.Small.ahlq Insecure Permissions - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166861/MVID-2022-0567.txt   
Published: 2022 04 27 17:45:24
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Trojan-Downloader.Win32.Small.ahlq Insecure Permissions - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166861/MVID-2022-0567.txt   
Published: 2022 04 27 17:45:24
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Virus.Win32.Qvod.b Insecure Permissions - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166860/MVID-2022-0565.txt   
Published: 2022 04 27 17:45:07
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Virus.Win32.Qvod.b Insecure Permissions - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166860/MVID-2022-0565.txt   
Published: 2022 04 27 17:45:07
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1555-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166859/RHSA-2022-1555-01.txt   
Published: 2022 04 27 17:44:50
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1555-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166859/RHSA-2022-1555-01.txt   
Published: 2022 04 27 17:44:50
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Red Hat Security Advisory 2022-1556-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166858/RHSA-2022-1556-01.txt   
Published: 2022 04 27 17:44:27
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1556-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166858/RHSA-2022-1556-01.txt   
Published: 2022 04 27 17:44:27
Received: 2022 04 27 18:29:23
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Hat Security Advisory 2022-1592-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166857/RHSA-2022-1592-01.txt   
Published: 2022 04 27 17:44:15
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1592-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166857/RHSA-2022-1592-01.txt   
Published: 2022 04 27 17:44:15
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1591-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166856/RHSA-2022-1591-01.txt   
Published: 2022 04 27 17:42:40
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1591-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166856/RHSA-2022-1591-01.txt   
Published: 2022 04 27 17:42:40
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Red Hat Security Advisory 2022-1537-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166855/RHSA-2022-1537-01.txt   
Published: 2022 04 27 17:42:03
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1537-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166855/RHSA-2022-1537-01.txt   
Published: 2022 04 27 17:42:03
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Hat Security Advisory 2022-1535-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166854/RHSA-2022-1535-01.txt   
Published: 2022 04 27 17:41:19
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1535-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166854/RHSA-2022-1535-01.txt   
Published: 2022 04 27 17:41:19
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Devsecops Jobs in Harwell Intnl Business Centre, Didcot (OX11) in April 2022 - Totaljobs - published over 2 years ago.
Content: 44 Devsecops jobs in Harwell Intnl Business Centre on totaljobs. Get instant job matches for companies hiring now for Devsecops jobs in Harwell ...
https://www.totaljobs.com/jobs/devsecops/in-harwell-intnl-business-centre   
Published: 2022 04 27 17:36:29
Received: 2022 04 28 02:50:12
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Devsecops Jobs in Harwell Intnl Business Centre, Didcot (OX11) in April 2022 - Totaljobs - published over 2 years ago.
Content: 44 Devsecops jobs in Harwell Intnl Business Centre on totaljobs. Get instant job matches for companies hiring now for Devsecops jobs in Harwell ...
https://www.totaljobs.com/jobs/devsecops/in-harwell-intnl-business-centre   
Published: 2022 04 27 17:36:29
Received: 2022 04 28 02:50:12
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Securado outline how its MSP offering can help tackle cybersecurity challenges | TahawulTech.com - published over 2 years ago.
Content: Sultanate of Oman ranked 3rd in Arab world in Global Cybersecurity Index, is a pioneer to adopt new trends and technologies in the field of Cyber ...
https://www.tahawultech.com/features/securado-outline-how-its-msp-offering-can-help-tackle-cybersecurity-challenges/   
Published: 2022 04 27 17:36:04
Received: 2022 04 27 22:41:35
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Securado outline how its MSP offering can help tackle cybersecurity challenges | TahawulTech.com - published over 2 years ago.
Content: Sultanate of Oman ranked 3rd in Arab world in Global Cybersecurity Index, is a pioneer to adopt new trends and technologies in the field of Cyber ...
https://www.tahawultech.com/features/securado-outline-how-its-msp-offering-can-help-tackle-cybersecurity-challenges/   
Published: 2022 04 27 17:36:04
Received: 2022 04 27 22:41:35
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Hat Security Advisory 2022-1552-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166853/RHSA-2022-1552-01.txt   
Published: 2022 04 27 17:34:03
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1552-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166853/RHSA-2022-1552-01.txt   
Published: 2022 04 27 17:34:03
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Review: Transcend's 1TB JetDrive Lite 330 Adds Convenient Removable Storage to Your MacBook Pro - published over 2 years ago.
Content:
https://www.macrumors.com/review/transcend-1tb-jetdrive-lite-330/   
Published: 2022 04 27 17:33:52
Received: 2022 04 27 17:49:41
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Review: Transcend's 1TB JetDrive Lite 330 Adds Convenient Removable Storage to Your MacBook Pro - published over 2 years ago.
Content:
https://www.macrumors.com/review/transcend-1tb-jetdrive-lite-330/   
Published: 2022 04 27 17:33:52
Received: 2022 04 27 17:49:41
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Email-Worm.Win32.Sidex Remote Command Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166852/MVID-2022-0564.txt   
Published: 2022 04 27 17:33:11
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Email-Worm.Win32.Sidex Remote Command Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166852/MVID-2022-0564.txt   
Published: 2022 04 27 17:33:11
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Governments under attack must think defensively - Help Net Security - published over 2 years ago.
Content: In this video for Help Net Security, Tom Van de Wiele, Principal Security Consultant, Cyber Security Services at WithSecure, talks about cyber ...
https://www.helpnetsecurity.com/2022/04/27/cyber-threats-governmental-organizations-video/   
Published: 2022 04 27 17:32:53
Received: 2022 04 28 00:21:39
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Governments under attack must think defensively - Help Net Security - published over 2 years ago.
Content: In this video for Help Net Security, Tom Van de Wiele, Principal Security Consultant, Cyber Security Services at WithSecure, talks about cyber ...
https://www.helpnetsecurity.com/2022/04/27/cyber-threats-governmental-organizations-video/   
Published: 2022 04 27 17:32:53
Received: 2022 04 28 00:21:39
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Red Hat Security Advisory 2022-1566-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166851/RHSA-2022-1566-01.txt   
Published: 2022 04 27 17:32:53
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1566-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166851/RHSA-2022-1566-01.txt   
Published: 2022 04 27 17:32:53
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Red Hat Security Advisory 2022-1565-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166850/RHSA-2022-1565-01.txt   
Published: 2022 04 27 17:32:28
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1565-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166850/RHSA-2022-1565-01.txt   
Published: 2022 04 27 17:32:28
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Hat Security Advisory 2022-1589-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166849/RHSA-2022-1589-01.txt   
Published: 2022 04 27 17:32:14
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1589-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166849/RHSA-2022-1589-01.txt   
Published: 2022 04 27 17:32:14
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1557-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166848/RHSA-2022-1557-01.txt   
Published: 2022 04 27 17:31:49
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1557-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166848/RHSA-2022-1557-01.txt   
Published: 2022 04 27 17:31:49
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Net-Worm.Win32.Kibuv.c Authentication Bypass - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166847/MVID-2022-0563.txt   
Published: 2022 04 27 17:31:05
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Net-Worm.Win32.Kibuv.c Authentication Bypass - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166847/MVID-2022-0563.txt   
Published: 2022 04 27 17:31:05
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Red Hat Security Advisory 2022-1541-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166846/RHSA-2022-1541-01.txt   
Published: 2022 04 27 17:30:46
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1541-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166846/RHSA-2022-1541-01.txt   
Published: 2022 04 27 17:30:46
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1540-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166845/RHSA-2022-1540-01.txt   
Published: 2022 04 27 17:30:31
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1540-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166845/RHSA-2022-1540-01.txt   
Published: 2022 04 27 17:30:31
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Red Hat Security Advisory 2022-1539-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166844/RHSA-2022-1539-01.txt   
Published: 2022 04 27 17:30:03
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-1539-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/166844/RHSA-2022-1539-01.txt   
Published: 2022 04 27 17:30:03
Received: 2022 04 27 18:29:24
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: A flow-based IDS using Machine Learning in eBPF - published over 2 years ago.
Content: submitted by /u/paran0ide [link] [comments]
https://www.reddit.com/r/netsec/comments/ud901p/a_flowbased_ids_using_machine_learning_in_ebpf/   
Published: 2022 04 27 17:29:39
Received: 2022 04 27 18:26:52
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: A flow-based IDS using Machine Learning in eBPF - published over 2 years ago.
Content: submitted by /u/paran0ide [link] [comments]
https://www.reddit.com/r/netsec/comments/ud901p/a_flowbased_ids_using_machine_learning_in_ebpf/   
Published: 2022 04 27 17:29:39
Received: 2022 04 27 18:26:52
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: 6 Key Things to Drive DevSecOps Success | 05.18.22 | Virtual - Orasi Software Incorporated - published over 2 years ago.
Content: Today, we are a DevSecOps innovator enabling the acceleration, security and adoption of software applications through automation.
https://www.orasi.com/6-key-things-to-drive-devsecops-success-05-18-22-virtual/   
Published: 2022 04 27 17:26:48
Received: 2022 04 28 05:12:04
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: 6 Key Things to Drive DevSecOps Success | 05.18.22 | Virtual - Orasi Software Incorporated - published over 2 years ago.
Content: Today, we are a DevSecOps innovator enabling the acceleration, security and adoption of software applications through automation.
https://www.orasi.com/6-key-things-to-drive-devsecops-success-05-18-22-virtual/   
Published: 2022 04 27 17:26:48
Received: 2022 04 28 05:12:04
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Bellevue College Launching Bachelor's Degree in Cybersecurity | News | 425business.com - published over 2 years ago.
Content: Bellevue College has created a new Bachelor of Applied Science in Cybersecurity to address employers' need for systems administrators and security ...
https://www.425business.com/news/bellevue-college-launching-bachelor-s-degree-in-cybersecurity/article_c9d96380-c5ba-11ec-a74f-bb32f4220c13.html   
Published: 2022 04 27 17:15:13
Received: 2022 04 27 21:01:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Bellevue College Launching Bachelor's Degree in Cybersecurity | News | 425business.com - published over 2 years ago.
Content: Bellevue College has created a new Bachelor of Applied Science in Cybersecurity to address employers' need for systems administrators and security ...
https://www.425business.com/news/bellevue-college-launching-bachelor-s-degree-in-cybersecurity/article_c9d96380-c5ba-11ec-a74f-bb32f4220c13.html   
Published: 2022 04 27 17:15:13
Received: 2022 04 27 21:01:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-23822 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23822   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23822 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23822   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22278 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22278   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22278 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22278   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: CVE-2022-22277 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22277   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22277 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22277   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-22276 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22276   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22276 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22276   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22275 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22275   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22275 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22275   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: CVE-2022-1507 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1507   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1507 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1507   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2021-25266 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25266   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:22:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25266 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25266   
Published: 2022 04 27 17:15:07
Received: 2022 04 27 18:22:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: System Analyst (DevSecOps/Gov)-IK Job For 5-7 Year Exp In Bgc Group Pte. Ltd. Singapore - published over 2 years ago.
Content: Job Description For System Analyst (DevSecOps/Gov)-IK Posted By Bgc Group Pte. Ltd. For Singapore Location. Require 5 Years Experience With Other ...
https://www.monster.com.sg/job/system-analyst-devsecops-gov-ik-bgc-group-pte-ltd-singapore-5982156   
Published: 2022 04 27 17:12:16
Received: 2022 04 28 01:31:08
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: System Analyst (DevSecOps/Gov)-IK Job For 5-7 Year Exp In Bgc Group Pte. Ltd. Singapore - published over 2 years ago.
Content: Job Description For System Analyst (DevSecOps/Gov)-IK Posted By Bgc Group Pte. Ltd. For Singapore Location. Require 5 Years Experience With Other ...
https://www.monster.com.sg/job/system-analyst-devsecops-gov-ik-bgc-group-pte-ltd-singapore-5982156   
Published: 2022 04 27 17:12:16
Received: 2022 04 28 01:31:08
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: At least 154 victims lose S$7.1m to tech support scam since January: Police, Cyber Security Agency - published over 2 years ago.
Content: The Singapore Police Force and the Cyber Security Agency of Singapore (CSA) warned the public of scammers who approach victims under the pretext ...
https://www.todayonline.com/minute/least-154-victims-lose-s71m-tech-support-scam-january-police-cyber-security-agency-1883986   
Published: 2022 04 27 17:10:17
Received: 2022 04 27 18:41:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: At least 154 victims lose S$7.1m to tech support scam since January: Police, Cyber Security Agency - published over 2 years ago.
Content: The Singapore Police Force and the Cyber Security Agency of Singapore (CSA) warned the public of scammers who approach victims under the pretext ...
https://www.todayonline.com/minute/least-154-victims-lose-s71m-tech-support-scam-january-police-cyber-security-agency-1883986   
Published: 2022 04 27 17:10:17
Received: 2022 04 27 18:41:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Technology industry cybersecurity venture financing deals total $1.2bn globally in March 2022 - published over 2 years ago.
Content: The $200m venture financing of Axonius was the technology industry's top cybersecurity venture financing deal as total deals worth $1.2bn were ...
https://www.verdict.co.uk/technology-industry-cybersecurity-venture-financing-deals-total-1-2bn-globally-in-march-2022/   
Published: 2022 04 27 17:05:49
Received: 2022 04 27 21:01:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Technology industry cybersecurity venture financing deals total $1.2bn globally in March 2022 - published over 2 years ago.
Content: The $200m venture financing of Axonius was the technology industry's top cybersecurity venture financing deal as total deals worth $1.2bn were ...
https://www.verdict.co.uk/technology-industry-cybersecurity-venture-financing-deals-total-1-2bn-globally-in-march-2022/   
Published: 2022 04 27 17:05:49
Received: 2022 04 27 21:01:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Proficio launches detection and response service to tackle identity-based threats - published over 2 years ago.
Content:
https://www.csoonline.com/article/3658240/proficio-launches-detection-and-response-service-to-tackle-identity-based-threats.html#tk.rss_all   
Published: 2022 04 27 17:04:00
Received: 2022 04 27 18:50:04
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Proficio launches detection and response service to tackle identity-based threats - published over 2 years ago.
Content:
https://www.csoonline.com/article/3658240/proficio-launches-detection-and-response-service-to-tackle-identity-based-threats.html#tk.rss_all   
Published: 2022 04 27 17:04:00
Received: 2022 04 27 18:50:04
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: AI in the Cyber Security Market 2022-2030 : Scope and overview, Set for Rapid Growth - published over 2 years ago.
Content: New York, United States -AI in the Cyber Security Market report contains detailed information on factors influencing demand, growth, opportunities ...
https://www.themobility.club/news/2022/04/27/ai-in-the-cyber-security-market-2022-2030-scope-and-overview-set-for-rapid-growth-cisco-systems-inc-symantec-corporation/   
Published: 2022 04 27 17:00:45
Received: 2022 04 27 18:41:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: AI in the Cyber Security Market 2022-2030 : Scope and overview, Set for Rapid Growth - published over 2 years ago.
Content: New York, United States -AI in the Cyber Security Market report contains detailed information on factors influencing demand, growth, opportunities ...
https://www.themobility.club/news/2022/04/27/ai-in-the-cyber-security-market-2022-2030-scope-and-overview-set-for-rapid-growth-cisco-systems-inc-symantec-corporation/   
Published: 2022 04 27 17:00:45
Received: 2022 04 27 18:41:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The "End" for International Data Transfers? - Global Compliance News - published over 2 years ago.
Content: In April 2014, Lukas has been named as Cyber Security Lawyer of the Year for Austria in the 2014 Finance Monthly Law Awards.
https://www.globalcompliancenews.com/2022/04/27/the-end-for-international-data-transfers-12042022/   
Published: 2022 04 27 17:00:17
Received: 2022 04 27 19:41:32
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: The "End" for International Data Transfers? - Global Compliance News - published over 2 years ago.
Content: In April 2014, Lukas has been named as Cyber Security Lawyer of the Year for Austria in the 2014 Finance Monthly Law Awards.
https://www.globalcompliancenews.com/2022/04/27/the-end-for-international-data-transfers-12042022/   
Published: 2022 04 27 17:00:17
Received: 2022 04 27 19:41:32
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Backdoor.Win32.Agent.aegg / Weak Hardcoded Credentials - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/52   
Published: 2022 04 27 16:59:17
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.Agent.aegg / Weak Hardcoded Credentials - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/52   
Published: 2022 04 27 16:59:17
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: Trojan-Downloader.Win32.Agent / Insecure Permissions - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/53   
Published: 2022 04 27 16:59:16
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Trojan-Downloader.Win32.Agent / Insecure Permissions - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/53   
Published: 2022 04 27 16:59:16
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Backdoor.Win32.Cafeini.b / Port Bounce Scan - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/51   
Published: 2022 04 27 16:59:14
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.Cafeini.b / Port Bounce Scan - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/51   
Published: 2022 04 27 16:59:14
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.Cafeini.b / Weak Hardcoded Credentials - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/50   
Published: 2022 04 27 16:59:13
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.Cafeini.b / Weak Hardcoded Credentials - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/50   
Published: 2022 04 27 16:59:13
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Trojan-Downloader.Win32.Small.ahlq / Insecure Permissions - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/49   
Published: 2022 04 27 16:59:11
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Trojan-Downloader.Win32.Small.ahlq / Insecure Permissions - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/49   
Published: 2022 04 27 16:59:11
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Backdoor.Win32.GF.j / Unauthenticated Remote Command Execution - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/48   
Published: 2022 04 27 16:59:10
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.GF.j / Unauthenticated Remote Command Execution - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/48   
Published: 2022 04 27 16:59:10
Received: 2022 04 27 17:43:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Virus.Win32.Qvod.b / Insecure Permissions - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/47   
Published: 2022 04 27 16:59:08
Received: 2022 04 27 17:23:19
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Virus.Win32.Qvod.b / Insecure Permissions - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/47   
Published: 2022 04 27 16:59:08
Received: 2022 04 27 17:23:19
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Email-Worm.Win32.Sidex / Unauthenticated Remote Command Execution - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/46   
Published: 2022 04 27 16:59:07
Received: 2022 04 27 17:23:19
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Email-Worm.Win32.Sidex / Unauthenticated Remote Command Execution - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/46   
Published: 2022 04 27 16:59:07
Received: 2022 04 27 17:23:19
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Net-Worm.Win32.Kibuv.c / Authentication Bypass - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/45   
Published: 2022 04 27 16:59:05
Received: 2022 04 27 17:23:19
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Net-Worm.Win32.Kibuv.c / Authentication Bypass - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/45   
Published: 2022 04 27 16:59:05
Received: 2022 04 27 17:23:19
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.Jokerdoor / Remote Stack Buffer Overflow - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/44   
Published: 2022 04 27 16:59:03
Received: 2022 04 27 17:23:19
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.Jokerdoor / Remote Stack Buffer Overflow - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/44   
Published: 2022 04 27 16:59:03
Received: 2022 04 27 17:23:19
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Trojan-Banker.Win32.Banker.heq / Insecure Permissions - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/43   
Published: 2022 04 27 16:59:01
Received: 2022 04 27 17:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Trojan-Banker.Win32.Banker.heq / Insecure Permissions - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/43   
Published: 2022 04 27 16:59:01
Received: 2022 04 27 17:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: SEC Consult SA-20220427-0 :: Privilege Escalation in Miele Benchmark Programming Tool - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/42   
Published: 2022 04 27 16:58:50
Received: 2022 04 27 17:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: SEC Consult SA-20220427-0 :: Privilege Escalation in Miele Benchmark Programming Tool - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/42   
Published: 2022 04 27 16:58:50
Received: 2022 04 27 17:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Trovent Security Advisory 2108-02 / Zepp: User account enumeration in password reset function - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/41   
Published: 2022 04 27 16:58:44
Received: 2022 04 27 17:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Trovent Security Advisory 2108-02 / Zepp: User account enumeration in password reset function - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/Apr/41   
Published: 2022 04 27 16:58:44
Received: 2022 04 27 17:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Summary - Trace3 DevSecOps Power Happy Hour - published over 2 years ago.
Content: Key elements of successful DevSecOps implementations; Real-life DevOps security challenges; How to make DevSecOps programs effective. All in Happy ...
https://web.cvent.com/event/3BF4FF84-C7A1-41F3-BDD9-B8F3211927EB?environment=P2   
Published: 2022 04 27 16:57:51
Received: 2022 04 28 05:12:04
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Summary - Trace3 DevSecOps Power Happy Hour - published over 2 years ago.
Content: Key elements of successful DevSecOps implementations; Real-life DevOps security challenges; How to make DevSecOps programs effective. All in Happy ...
https://web.cvent.com/event/3BF4FF84-C7A1-41F3-BDD9-B8F3211927EB?environment=P2   
Published: 2022 04 27 16:57:51
Received: 2022 04 28 05:12:04
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Global Cybersecurity Market Research Report to 2027 - by Product Type, Component, End ... - published over 2 years ago.
Content: “Cybersecurity Market Research Report by Product Type (DDoS Mitigation, Email Security, and Endpoint Security), Component, End-User Industry, ...
https://www.businesswire.com/news/home/20220427005820/en/Global-Cybersecurity-Market-Research-Report-to-2027---by-Product-Type-Component-End-User-Industry-Deployment-and-Region---ResearchAndMarkets.com   
Published: 2022 04 27 16:48:15
Received: 2022 04 27 21:01:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Global Cybersecurity Market Research Report to 2027 - by Product Type, Component, End ... - published over 2 years ago.
Content: “Cybersecurity Market Research Report by Product Type (DDoS Mitigation, Email Security, and Endpoint Security), Component, End-User Industry, ...
https://www.businesswire.com/news/home/20220427005820/en/Global-Cybersecurity-Market-Research-Report-to-2027---by-Product-Type-Component-End-User-Industry-Deployment-and-Region---ResearchAndMarkets.com   
Published: 2022 04 27 16:48:15
Received: 2022 04 27 21:01:53
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security

All Articles

Ordered by Date Published : Year: "2022" Month: "04"
Page: << < 24 (of 225) > >>

Total Articles in this collection: 11,282


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor