All Articles

Ordered by Date Published : Year: "2022" Month: "08"
and by Page: << < 224 (of 247) > >>

Total Articles in this collection: 12,389

Navigation Help at the bottom of the page
Article: School Kid Uploads Ransomware Scripts to PyPI Repository as 'Fun' Project - published over 2 years ago.
Content:
https://www.darkreading.com/threat-intelligence/school-kid-uploads-ransomware-scripts-to-pypi-repository-as-fun-research-project   
Published: 2022 08 03 19:57:48
Received: 2022 08 03 20:11:19
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: School Kid Uploads Ransomware Scripts to PyPI Repository as 'Fun' Project - published over 2 years ago.
Content:
https://www.darkreading.com/threat-intelligence/school-kid-uploads-ransomware-scripts-to-pypi-repository-as-fun-research-project   
Published: 2022 08 03 19:57:48
Received: 2022 08 03 20:11:19
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: NTIS Can Leverage M9 Solutions as a Leading, Innovative Company to Solve Complex ... - published over 2 years ago.
Content: ... DevSecOps, Cloud, Cybersecurity, and AI/ML augmented assisted services to transform the landscape into The Digital Future™. Media Contact:.
http://www.itnewsonline.com/PRNewswire/NTIS-Can-Leverage-M9-Solutions-as-a-Leading-Innovative-Company-to-Solve-Complex-Data-Challenges/859848   
Published: 2022 08 03 19:48:58
Received: 2022 08 04 03:52:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: NTIS Can Leverage M9 Solutions as a Leading, Innovative Company to Solve Complex ... - published over 2 years ago.
Content: ... DevSecOps, Cloud, Cybersecurity, and AI/ML augmented assisted services to transform the landscape into The Digital Future™. Media Contact:.
http://www.itnewsonline.com/PRNewswire/NTIS-Can-Leverage-M9-Solutions-as-a-Leading-Innovative-Company-to-Solve-Complex-Data-Challenges/859848   
Published: 2022 08 03 19:48:58
Received: 2022 08 04 03:52:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: New: DevSecOps Market 2022 Latest Innovations, Business Senario Outlook By 2028 - published over 2 years ago.
Content: "Overview Of DevSecOps Market Latest Update: This has brought along several changes this report also covers the impact of Current COVID-19 ...
https://shanghai.ist/2022/08/03/new-devsecops-market-2022-latest-innovations-business-senario-outlook-by-2028/   
Published: 2022 08 03 19:32:36
Received: 2022 08 04 03:52:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: New: DevSecOps Market 2022 Latest Innovations, Business Senario Outlook By 2028 - published over 2 years ago.
Content: "Overview Of DevSecOps Market Latest Update: This has brought along several changes this report also covers the impact of Current COVID-19 ...
https://shanghai.ist/2022/08/03/new-devsecops-market-2022-latest-innovations-business-senario-outlook-by-2028/   
Published: 2022 08 03 19:32:36
Received: 2022 08 04 03:52:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: WordPress WP-UserOnline 2.87.6 Cross Site Scripting - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080028   
Published: 2022 08 03 19:30:00
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: WordPress WP-UserOnline 2.87.6 Cross Site Scripting - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080028   
Published: 2022 08 03 19:30:00
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: NanoCMS 0.4 Remote Code Execution - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080027   
Published: 2022 08 03 19:29:36
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: NanoCMS 0.4 Remote Code Execution - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080027   
Published: 2022 08 03 19:29:36
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Webmin 1.996 Remote Code Execution - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080026   
Published: 2022 08 03 19:29:04
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Webmin 1.996 Remote Code Execution - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080026   
Published: 2022 08 03 19:29:04
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: MobileIron Log4Shell Remote Command Execution - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080025   
Published: 2022 08 03 19:28:41
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: MobileIron Log4Shell Remote Command Execution - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080025   
Published: 2022 08 03 19:28:41
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Multi-Language Hotel Management 2022 1.0 SQL Injection - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080024   
Published: 2022 08 03 19:28:26
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: Multi-Language Hotel Management 2022 1.0 SQL Injection - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080024   
Published: 2022 08 03 19:28:26
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: IObit Malware Fighter 9.2 Tampering / Privilege Escalation - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080023   
Published: 2022 08 03 19:28:11
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: IObit Malware Fighter 9.2 Tampering / Privilege Escalation - published over 2 years ago.
Content:
https://cxsecurity.com/issue/WLB-2022080023   
Published: 2022 08 03 19:28:11
Received: 2022 08 03 19:42:08
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-31197 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31197   
Published: 2022 08 03 19:15:08
Received: 2022 08 03 20:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-31197 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31197   
Published: 2022 08 03 19:15:08
Received: 2022 08 03 20:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-31175 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31175   
Published: 2022 08 03 19:15:08
Received: 2022 08 03 20:23:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-31175 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31175   
Published: 2022 08 03 19:15:08
Received: 2022 08 03 20:23:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Apple's MacBook Pro Power Adapters Facing Up to Two-Month Shipping Delay - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/apple-96w-140w-power-adapters-shipping-delays/   
Published: 2022 08 03 19:08:35
Received: 2022 08 03 20:11:57
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple's MacBook Pro Power Adapters Facing Up to Two-Month Shipping Delay - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/apple-96w-140w-power-adapters-shipping-delays/   
Published: 2022 08 03 19:08:35
Received: 2022 08 03 20:11:57
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Post-quantum cryptography – new algorithm “gone in 60 minutes” - published over 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/08/03/post-quantum-cryptography-new-algorithm-gone-in-60-minutes/   
Published: 2022 08 03 18:55:20
Received: 2022 08 04 13:08:24
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: Post-quantum cryptography – new algorithm “gone in 60 minutes” - published over 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/08/03/post-quantum-cryptography-new-algorithm-gone-in-60-minutes/   
Published: 2022 08 03 18:55:20
Received: 2022 08 04 13:08:24
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: The Consequences of Inadequate Identity Management in your GitHub Organization - published over 2 years ago.
Content: submitted by /u/Hefty_Knowledge_7449 [link] [comments]...
https://www.reddit.com/r/netsec/comments/wfe0yw/the_consequences_of_inadequate_identity/   
Published: 2022 08 03 18:24:27
Received: 2022 08 03 18:28:50
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: The Consequences of Inadequate Identity Management in your GitHub Organization - published over 2 years ago.
Content: submitted by /u/Hefty_Knowledge_7449 [link] [comments]...
https://www.reddit.com/r/netsec/comments/wfe0yw/the_consequences_of_inadequate_identity/   
Published: 2022 08 03 18:24:27
Received: 2022 08 03 18:28:50
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CVE-2022-34992 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34992   
Published: 2022 08 03 18:15:12
Received: 2022 08 03 20:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-34992 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34992   
Published: 2022 08 03 18:15:12
Received: 2022 08 03 20:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Microsoft accounts targeted with new MFA-bypassing phishing kit - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/microsoft-accounts-targeted-with-new-mfa-bypassing-phishing-kit/   
Published: 2022 08 03 18:02:31
Received: 2022 08 03 18:22:08
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft accounts targeted with new MFA-bypassing phishing kit - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/microsoft-accounts-targeted-with-new-mfa-bypassing-phishing-kit/   
Published: 2022 08 03 18:02:31
Received: 2022 08 03 18:22:08
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Cyberattackers Drain Nearly $6M From Solana Crypto Wallets - published over 2 years ago.
Content:
https://www.darkreading.com/cloud/cyberattackers-drain-6m-solana-crypto-wallets   
Published: 2022 08 03 17:42:11
Received: 2022 08 03 17:51:14
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Cyberattackers Drain Nearly $6M From Solana Crypto Wallets - published over 2 years ago.
Content:
https://www.darkreading.com/cloud/cyberattackers-drain-6m-solana-crypto-wallets   
Published: 2022 08 03 17:42:11
Received: 2022 08 03 17:51:14
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cisco fixes critical remote code execution bug in VPN routers - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/cisco-fixes-critical-remote-code-execution-bug-in-vpn-routers/   
Published: 2022 08 03 17:26:50
Received: 2022 08 03 17:42:15
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Cisco fixes critical remote code execution bug in VPN routers - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/cisco-fixes-critical-remote-code-execution-bug-in-vpn-routers/   
Published: 2022 08 03 17:26:50
Received: 2022 08 03 17:42:15
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Apple to Delay iPadOS 16 Launch Until October - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/apple-ipados-16-delay-october/   
Published: 2022 08 03 17:26:19
Received: 2022 08 03 18:11:39
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple to Delay iPadOS 16 Launch Until October - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/apple-ipados-16-delay-october/   
Published: 2022 08 03 17:26:19
Received: 2022 08 03 18:11:39
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Sonatype shines light on typosquatting ransomware threat in PyPI - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/08/03/sonatype_typosquatting/   
Published: 2022 08 03 17:15:11
Received: 2022 08 03 17:30:17
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Sonatype shines light on typosquatting ransomware threat in PyPI - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/08/03/sonatype_typosquatting/   
Published: 2022 08 03 17:15:11
Received: 2022 08 03 17:30:17
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: l9explore and LeakIX Internet wide recon scans., (Wed, Aug 3rd) - published over 2 years ago.
Content: Earlier today, I noticed a scan for an odd set of vulnerabilities from
https://isc.sans.edu/diary/rss/28910   
Published: 2022 08 03 17:07:43
Received: 2022 08 03 18:43:02
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: l9explore and LeakIX Internet wide recon scans., (Wed, Aug 3rd) - published over 2 years ago.
Content: Earlier today, I noticed a scan for an odd set of vulnerabilities from
https://isc.sans.edu/diary/rss/28910   
Published: 2022 08 03 17:07:43
Received: 2022 08 03 18:43:02
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/single-core-cpu-cracked-post-quantum.html   
Published: 2022 08 03 17:01:11
Received: 2022 08 03 17:28:44
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/single-core-cpu-cracked-post-quantum.html   
Published: 2022 08 03 17:01:11
Received: 2022 08 03 17:28:44
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Zero-Day Defense: Tips for Defusing the Threat - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/zero-day-defense-tips-for-defusing-the-threat   
Published: 2022 08 03 17:00:00
Received: 2022 08 03 17:51:14
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Zero-Day Defense: Tips for Defusing the Threat - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/zero-day-defense-tips-for-defusing-the-threat   
Published: 2022 08 03 17:00:00
Received: 2022 08 03 17:51:14
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Post-quantum cryptography – new algorithm “gone in 60 minutes” - published over 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/08/03/post-quantum-cryptography-new-algorithm-gone-in-60-minutes/   
Published: 2022 08 03 16:55:20
Received: 2022 08 03 17:28:14
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: Post-quantum cryptography – new algorithm “gone in 60 minutes” - published over 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/08/03/post-quantum-cryptography-new-algorithm-gone-in-60-minutes/   
Published: 2022 08 03 16:55:20
Received: 2022 08 03 17:28:14
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The Microsoft Team Racing to Catch Bugs Before They Happen - published over 2 years ago.
Content:
https://www.wired.com/story/microsoft-morse-team/   
Published: 2022 08 03 16:43:50
Received: 2022 08 03 17:01:39
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: The Microsoft Team Racing to Catch Bugs Before They Happen - published over 2 years ago.
Content:
https://www.wired.com/story/microsoft-morse-team/   
Published: 2022 08 03 16:43:50
Received: 2022 08 03 17:01:39
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Hackers steal almost $200 million from crypto firm Nomad - published over 2 years ago.
Content:
https://www.techrepublic.com/article/hackers-steal-almost-200-million-from-crypto-firm-nomad/   
Published: 2022 08 03 16:37:49
Received: 2022 08 03 16:50:23
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Hackers steal almost $200 million from crypto firm Nomad - published over 2 years ago.
Content:
https://www.techrepublic.com/article/hackers-steal-almost-200-million-from-crypto-firm-nomad/   
Published: 2022 08 03 16:37:49
Received: 2022 08 03 16:50:23
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Proofpoint Warns UK Universities Failing On Email Security - published over 2 years ago.
Content:
https://www.silicon.co.uk/software/office-suites/proofpoint-warns-uk-universities-failing-on-email-security-469687   
Published: 2022 08 03 16:31:48
Received: 2022 08 03 16:41:58
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Proofpoint Warns UK Universities Failing On Email Security - published over 2 years ago.
Content:
https://www.silicon.co.uk/software/office-suites/proofpoint-warns-uk-universities-failing-on-email-security-469687   
Published: 2022 08 03 16:31:48
Received: 2022 08 03 16:41:58
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Hijacking email with Cloudflare Email Routing - published over 2 years ago.
Content: submitted by /u/jwizq [link] [comments]
https://www.reddit.com/r/netsec/comments/wfaxdb/hijacking_email_with_cloudflare_email_routing/   
Published: 2022 08 03 16:23:39
Received: 2022 08 03 16:29:01
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Hijacking email with Cloudflare Email Routing - published over 2 years ago.
Content: submitted by /u/jwizq [link] [comments]
https://www.reddit.com/r/netsec/comments/wfaxdb/hijacking_email_with_cloudflare_email_routing/   
Published: 2022 08 03 16:23:39
Received: 2022 08 03 16:29:01
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-28668 (dicom_viewer_pro) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28668   
Published: 2022 08 03 16:15:08
Received: 2022 08 08 20:23:12
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28668 (dicom_viewer_pro) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28668   
Published: 2022 08 03 16:15:08
Received: 2022 08 08 20:23:12
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2272 (sante_pacs_server) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2272   
Published: 2022 08 03 16:15:08
Received: 2022 08 08 20:22:59
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2272 (sante_pacs_server) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2272   
Published: 2022 08 03 16:15:08
Received: 2022 08 08 20:22:59
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-37396 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37396   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:13
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-37396 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37396   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:13
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-35867 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35867   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35867 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35867   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35866 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35866   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35866 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35866   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-35865 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35865   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35865 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35865   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-35864 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35864   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35864 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35864   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-34872 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34872   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-34872 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34872   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-34871 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34871   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-34871 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34871   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-28684 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28684   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28684 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28684   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28668 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28668   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28668 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28668   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-2272 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2272   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:22:58
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2272 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2272   
Published: 2022 08 03 16:15:08
Received: 2022 08 03 18:22:58
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/single-core-cpu-cracked-post-quantum.html   
Published: 2022 08 03 16:09:54
Received: 2022 08 03 16:28:30
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/single-core-cpu-cracked-post-quantum.html   
Published: 2022 08 03 16:09:54
Received: 2022 08 03 16:28:30
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft Teams App Gains Native Apple Silicon Support - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/microsoft-teams-native-apple-silicon-support/   
Published: 2022 08 03 16:06:40
Received: 2022 08 03 17:11:28
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Microsoft Teams App Gains Native Apple Silicon Support - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/microsoft-teams-native-apple-silicon-support/   
Published: 2022 08 03 16:06:40
Received: 2022 08 03 17:11:28
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Microsoft rolling out fix for Windows 10 language bar issues - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-rolling-out-fix-for-windows-10-language-bar-issues/   
Published: 2022 08 03 16:00:00
Received: 2022 08 03 17:42:15
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft rolling out fix for Windows 10 language bar issues - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-rolling-out-fix-for-windows-10-language-bar-issues/   
Published: 2022 08 03 16:00:00
Received: 2022 08 03 17:42:15
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Belkin's Wemo Brand Launches New Smart Dimmer With Thread Support - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/belkin-wemo-dimmer-thread/   
Published: 2022 08 03 16:00:00
Received: 2022 08 03 16:11:31
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Belkin's Wemo Brand Launches New Smart Dimmer With Thread Support - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/belkin-wemo-dimmer-thread/   
Published: 2022 08 03 16:00:00
Received: 2022 08 03 16:11:31
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Ukraine takes down 1,000,000 bots used for disinformation - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/ukraine-takes-down-1-000-000-bots-used-for-disinformation/   
Published: 2022 08 03 15:51:05
Received: 2022 08 03 16:02:20
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Ukraine takes down 1,000,000 bots used for disinformation - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/ukraine-takes-down-1-000-000-bots-used-for-disinformation/   
Published: 2022 08 03 15:51:05
Received: 2022 08 03 16:02:20
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: You can’t choose when you’ll be hit by ransomware, but you can choose how you prepare - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/08/03/you_cant_choose_when_youll/   
Published: 2022 08 03 15:46:04
Received: 2022 08 03 16:01:43
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: You can’t choose when you’ll be hit by ransomware, but you can choose how you prepare - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/08/03/you_cant_choose_when_youll/   
Published: 2022 08 03 15:46:04
Received: 2022 08 03 16:01:43
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: ShiftLeft Appoints Prevention-First, Cybersecurity Visionary and AI/ML Pioneer Stuart McClure as CEO - published over 2 years ago.
Content:
https://www.darkreading.com/application-security/shiftleft-appoints-prevention-first-cybersecurity-visionary-and-ai-ml-pioneer-stuart-mcclure-as-ceo   
Published: 2022 08 03 15:38:05
Received: 2022 08 03 15:51:01
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: ShiftLeft Appoints Prevention-First, Cybersecurity Visionary and AI/ML Pioneer Stuart McClure as CEO - published over 2 years ago.
Content:
https://www.darkreading.com/application-security/shiftleft-appoints-prevention-first-cybersecurity-visionary-and-ai-ml-pioneer-stuart-mcclure-as-ceo   
Published: 2022 08 03 15:38:05
Received: 2022 08 03 15:51:01
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CENSIS and Mazars team up to support cybersecurity diversity - DIGIT - published over 2 years ago.
Content: CENSIS is developing a new initiative alongside Mazars for UK students to support greater cybersecurity diversity and IoT resilience.
https://www.digit.fyi/censis-mazars-support-cybersecurity-diversity/   
Published: 2022 08 03 15:36:41
Received: 2022 08 04 04:41:34
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: CENSIS and Mazars team up to support cybersecurity diversity - DIGIT - published over 2 years ago.
Content: CENSIS is developing a new initiative alongside Mazars for UK students to support greater cybersecurity diversity and IoT resilience.
https://www.digit.fyi/censis-mazars-support-cybersecurity-diversity/   
Published: 2022 08 03 15:36:41
Received: 2022 08 04 04:41:34
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Pulling security to the left: How to think about security before writing code - published over 2 years ago.
Content:
https://www.techrepublic.com/article/pulling-security-left/   
Published: 2022 08 03 15:33:37
Received: 2022 08 03 15:50:13
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Pulling security to the left: How to think about security before writing code - published over 2 years ago.
Content:
https://www.techrepublic.com/article/pulling-security-left/   
Published: 2022 08 03 15:33:37
Received: 2022 08 03 15:50:13
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Druva Introduces the Data Resiliency Guarantee of up to $10 Million - published over 2 years ago.
Content:
https://www.darkreading.com/risk/druva-introduces-the-data-resiliency-guarantee-of-up-to-10-million   
Published: 2022 08 03 15:33:00
Received: 2022 08 03 15:51:01
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Druva Introduces the Data Resiliency Guarantee of up to $10 Million - published over 2 years ago.
Content:
https://www.darkreading.com/risk/druva-introduces-the-data-resiliency-guarantee-of-up-to-10-million   
Published: 2022 08 03 15:33:00
Received: 2022 08 03 15:51:01
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Camera Comparison: The New OnePlus 10T vs. iPhone 13 Pro Max - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/oneplus-10t-vs-iphone-13-pro-max-cameras/   
Published: 2022 08 03 15:30:00
Received: 2022 08 03 16:11:31
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Camera Comparison: The New OnePlus 10T vs. iPhone 13 Pro Max - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/oneplus-10t-vs-iphone-13-pro-max-cameras/   
Published: 2022 08 03 15:30:00
Received: 2022 08 03 16:11:31
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: IPFS phishing on the rise, makes campaign takedown more complicated - published over 2 years ago.
Content:
https://www.techrepublic.com/article/ipfs-phishing-on-the-rise-makes-campaign-takedown-more-complicated/   
Published: 2022 08 03 15:28:38
Received: 2022 08 03 15:30:02
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: IPFS phishing on the rise, makes campaign takedown more complicated - published over 2 years ago.
Content:
https://www.techrepublic.com/article/ipfs-phishing-on-the-rise-makes-campaign-takedown-more-complicated/   
Published: 2022 08 03 15:28:38
Received: 2022 08 03 15:30:02
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Zoho Password Manager Pro XML-RPC Java Deserialization - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167918/zoho_password_manager_pro_xml_rpc_rce.rb.txt   
Published: 2022 08 03 15:28:07
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Zoho Password Manager Pro XML-RPC Java Deserialization - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167918/zoho_password_manager_pro_xml_rpc_rce.rb.txt   
Published: 2022 08 03 15:28:07
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: MobileIron Log4Shell Remote Command Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167917/mobileiron_core_log4shell.rb.txt   
Published: 2022 08 03 15:25:45
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: MobileIron Log4Shell Remote Command Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167917/mobileiron_core_log4shell.rb.txt   
Published: 2022 08 03 15:25:45
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: VMWare Urges Users to Patch Critical Authentication Bypass Bug - published over 2 years ago.
Content:
https://threatpost.com/vmware-patch-critical-bug/180346/   
Published: 2022 08 03 15:23:16
Received: 2022 08 03 15:42:06
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: VMWare Urges Users to Patch Critical Authentication Bypass Bug - published over 2 years ago.
Content:
https://threatpost.com/vmware-patch-critical-bug/180346/   
Published: 2022 08 03 15:23:16
Received: 2022 08 03 15:42:06
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CompTIA CEO Outlines Initiative to Create the Pre-eminent Destination to Start, Build and ‘Supercharge’ a Tech Career - published over 2 years ago.
Content:
https://www.darkreading.com/careers-and-people/comptia-ceo-outlines-initiative-to-create-the-pre-eminent-destination-to-start-build-and-supercharge-a-tech-career   
Published: 2022 08 03 15:21:40
Received: 2022 08 03 15:30:48
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: CompTIA CEO Outlines Initiative to Create the Pre-eminent Destination to Start, Build and ‘Supercharge’ a Tech Career - published over 2 years ago.
Content:
https://www.darkreading.com/careers-and-people/comptia-ceo-outlines-initiative-to-create-the-pre-eminent-destination-to-start-build-and-supercharge-a-tech-career   
Published: 2022 08 03 15:21:40
Received: 2022 08 03 15:30:48
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: VMware Releases Security Updates - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/08/03/vmware-releases-security-updates   
Published: 2022 08 03 15:16:31
Received: 2022 08 09 18:42:00
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: VMware Releases Security Updates - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/08/03/vmware-releases-security-updates   
Published: 2022 08 03 15:16:31
Received: 2022 08 09 18:42:00
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: OWC's Ultra-Fast Portable SSD for Thunderbolt 3 Macs Now Available With Up to 4TB of Storage - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/owc-envoy-pro-fx-new-4tb-option/   
Published: 2022 08 03 15:16:05
Received: 2022 08 03 16:11:31
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: OWC's Ultra-Fast Portable SSD for Thunderbolt 3 Macs Now Available With Up to 4TB of Storage - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/03/owc-envoy-pro-fx-new-4tb-option/   
Published: 2022 08 03 15:16:05
Received: 2022 08 03 16:11:31
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-35620 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35620   
Published: 2022 08 03 15:15:07
Received: 2022 08 03 16:23:10
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35620 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35620   
Published: 2022 08 03 15:15:07
Received: 2022 08 03 16:23:10
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35619 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35619   
Published: 2022 08 03 15:15:07
Received: 2022 08 03 16:23:10
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35619 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35619   
Published: 2022 08 03 15:15:07
Received: 2022 08 03 16:23:10
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: CVE-2022-34974 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34974   
Published: 2022 08 03 15:15:07
Received: 2022 08 03 16:23:09
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-34974 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34974   
Published: 2022 08 03 15:15:07
Received: 2022 08 03 16:23:09
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-34973 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34973   
Published: 2022 08 03 15:15:07
Received: 2022 08 03 16:23:09
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-34973 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34973   
Published: 2022 08 03 15:15:07
Received: 2022 08 03 16:23:09
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: Top 10 universities in US, UK & Australia failing on DMARC - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98106-top-10-universities-in-us-uk-and-australia-failing-on-dmarc   
Published: 2022 08 03 15:15:00
Received: 2022 08 03 15:41:42
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Top 10 universities in US, UK & Australia failing on DMARC - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98106-top-10-universities-in-us-uk-and-australia-failing-on-dmarc   
Published: 2022 08 03 15:15:00
Received: 2022 08 03 15:41:42
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Ubuntu Security Notice USN-5545-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167915/USN-5545-1.txt   
Published: 2022 08 03 15:10:01
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5545-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167915/USN-5545-1.txt   
Published: 2022 08 03 15:10:01
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5463-2 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167914/USN-5463-2.txt   
Published: 2022 08 03 15:09:41
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5463-2 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167914/USN-5463-2.txt   
Published: 2022 08 03 15:09:41
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Multi-Language Hotel Management 2022 1.0 SQL Injection - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167912/mlhm202210-sql.txt   
Published: 2022 08 03 15:01:45
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Multi-Language Hotel Management 2022 1.0 SQL Injection - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167912/mlhm202210-sql.txt   
Published: 2022 08 03 15:01:45
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Ohio awards $47 million to K-12 schools for safety improvements - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98107-ohio-awards-47-million-to-k-12-schools-for-safety-improvements   
Published: 2022 08 03 14:37:51
Received: 2022 08 03 15:42:09
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Ohio awards $47 million to K-12 schools for safety improvements - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98107-ohio-awards-47-million-to-k-12-schools-for-safety-improvements   
Published: 2022 08 03 14:37:51
Received: 2022 08 03 15:42:09
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: 3207 apps are leaking Twitter API keys - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98104-3207-apps-are-leaking-twitter-api-keys   
Published: 2022 08 03 14:35:00
Received: 2022 08 03 15:01:53
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: 3207 apps are leaking Twitter API keys - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98104-3207-apps-are-leaking-twitter-api-keys   
Published: 2022 08 03 14:35:00
Received: 2022 08 03 15:01:53
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: IObit Malware Fighter 9.2 Tampering / Privilege Escalation - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167913/iobitmalwarefighter92-auth.txt   
Published: 2022 08 03 14:22:22
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: IObit Malware Fighter 9.2 Tampering / Privilege Escalation - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167913/iobitmalwarefighter92-auth.txt   
Published: 2022 08 03 14:22:22
Received: 2022 08 03 15:50:55
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Qualys adds external attack management capability to cloud security platform - published over 2 years ago.
Content:
https://www.csoonline.com/article/3668915/qualys-adds-external-attack-management-capability-to-cloud-security-platform.html#tk.rss_all   
Published: 2022 08 03 14:19:00
Received: 2022 08 03 16:12:06
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Qualys adds external attack management capability to cloud security platform - published over 2 years ago.
Content:
https://www.csoonline.com/article/3668915/qualys-adds-external-attack-management-capability-to-cloud-security-platform.html#tk.rss_all   
Published: 2022 08 03 14:19:00
Received: 2022 08 03 16:12:06
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Netskope Acquires Infiot, Will Deliver Fully Integrated, Single-Vendor SASE Platform - published over 2 years ago.
Content:
https://www.darkreading.com/cloud/netskope-acquires-infiot-will-deliver-fully-integrated-single-vendor-sase-platform   
Published: 2022 08 03 14:16:54
Received: 2022 08 03 15:11:45
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Netskope Acquires Infiot, Will Deliver Fully Integrated, Single-Vendor SASE Platform - published over 2 years ago.
Content:
https://www.darkreading.com/cloud/netskope-acquires-infiot-will-deliver-fully-integrated-single-vendor-sase-platform   
Published: 2022 08 03 14:16:54
Received: 2022 08 03 15:11:45
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: CVE-2022-36359 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36359   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-36359 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36359   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:23:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-32293 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-32293   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-32293 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-32293   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CVE-2022-32292 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-32292   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-32292 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-32292   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: CVE-2022-27484 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27484   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-27484 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27484   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23442 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23442   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:22:58
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23442 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23442   
Published: 2022 08 03 14:15:08
Received: 2022 08 03 16:22:58
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: NSF-funded research aims to improve equity in cybersecurity design - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98105-nsf-funded-research-aims-to-improve-equity-in-cybersecurity-design   
Published: 2022 08 03 14:12:07
Received: 2022 08 03 15:22:04
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: NSF-funded research aims to improve equity in cybersecurity design - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98105-nsf-funded-research-aims-to-improve-equity-in-cybersecurity-design   
Published: 2022 08 03 14:12:07
Received: 2022 08 03 15:22:04
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: $1b funding available for climate & disaster resiliency - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98102-1b-funding-available-for-climate-and-disaster-resiliency   
Published: 2022 08 03 14:10:00
Received: 2022 08 03 14:22:02
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: $1b funding available for climate & disaster resiliency - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98102-1b-funding-available-for-climate-and-disaster-resiliency   
Published: 2022 08 03 14:10:00
Received: 2022 08 03 14:22:02
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)

All Articles

Ordered by Date Published : Year: "2022" Month: "08"
Page: << < 224 (of 247) > >>

Total Articles in this collection: 12,389


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor