All Articles

Ordered by Date Published : Year: "2021"
and by Page: << < 1,454 (of 1,456) > >>

Total Articles in this collection: 72,818

Navigation Help at the bottom of the page
Article: Active Cyber Defence (ACD) - The Third Year - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 18 12:01:39
Received: 2023 11 22 12:21:03
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Active Cyber Defence (ACD) - The Third Year - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/acd-report-year-three   
Published: 2021 02 18 12:01:39
Received: 2023 11 22 12:21:03
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware - published over 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-048a   
Published: 2021 02 17 16:00:00
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware - published over 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-048a   
Published: 2021 02 17 16:00:00
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Mitigating Memory Safety Issues in Open Source Software - published over 3 years ago.
Content: Posted by Dan Lorenc, Infrastructure Security TeamMemory-safety vulnerabilities have dominated the security field for years and often lead to issues that can be exploited to take over entire systems. A recent study found that "~70% of the vulnerabilities addressed through a security update each year continue to be memory safety issues.” Another analysis on s...
http://security.googleblog.com/2021/02/mitigating-memory-safety-issues-in-open.html   
Published: 2021 02 17 14:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Mitigating Memory Safety Issues in Open Source Software - published over 3 years ago.
Content: Posted by Dan Lorenc, Infrastructure Security TeamMemory-safety vulnerabilities have dominated the security field for years and often lead to issues that can be exploited to take over entire systems. A recent study found that "~70% of the vulnerabilities addressed through a security update each year continue to be memory safety issues.” Another analysis on s...
http://security.googleblog.com/2021/02/mitigating-memory-safety-issues-in-open.html   
Published: 2021 02 17 14:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two) - published over 3 years ago.
Content: In this post, we continue our analysis of the SolarCity ConnectPort X2e Zigbee device (referred to throughout as X2e device). In Part One, we discussed the X2e at a high level, performed initial network-based attacks, then discussed the hardware techniques used to gain a remote shell on the X2e device as a non-privileged system user. In this se...
http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-two.html   
Published: 2021 02 17 13:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two) - published over 3 years ago.
Content: In this post, we continue our analysis of the SolarCity ConnectPort X2e Zigbee device (referred to throughout as X2e device). In Part One, we discussed the X2e at a high level, performed initial network-based attacks, then discussed the hardware techniques used to gain a remote shell on the X2e device as a non-privileged system user. In this se...
http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-two.html   
Published: 2021 02 17 13:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One) - published over 3 years ago.
Content: In 2019, Mandiant’s Red Team discovered a series of vulnerabilities present within Digi International’s ConnectPort X2e device, which allows for remote code execution as a privileged user. Specifically, Mandiant’s research focused on SolarCity’s (now owned by Tesla) rebranded ConnectPort X2e device, which is used in residential solar installations....
http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-one.html   
Published: 2021 02 17 13:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One) - published over 3 years ago.
Content: In 2019, Mandiant’s Red Team discovered a series of vulnerabilities present within Digi International’s ConnectPort X2e device, which allows for remote code execution as a privileged user. Specifically, Mandiant’s research focused on SolarCity’s (now owned by Tesla) rebranded ConnectPort X2e device, which is used in residential solar installations....
http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-one.html   
Published: 2021 02 17 13:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Building Web Check using PaaS - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/building-web-check-using-paas   
Published: 2021 02 17 08:09:16
Received: 2024 05 09 11:23:27
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Building Web Check using PaaS - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/building-web-check-using-paas   
Published: 2021 02 17 08:09:16
Received: 2024 05 09 11:23:27
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Better device configuration shouldn’t be like herding cats - published over 3 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/better-device-configuration-should-not-be-like-herding-cats   
Published: 2021 02 17 08:09:16
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Better device configuration shouldn’t be like herding cats - published over 3 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/better-device-configuration-should-not-be-like-herding-cats   
Published: 2021 02 17 08:09:16
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Let’s Encrypt Gears Up to Replace 200M Certificates a Day - published over 3 years ago.
Content:
https://threatpost.com/lets-encrypt-gears-up-to-replace-200m-certificates-a-day/164002/   
Published: 2021 02 16 21:47:30
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Let’s Encrypt Gears Up to Replace 200M Certificates a Day - published over 3 years ago.
Content:
https://threatpost.com/lets-encrypt-gears-up-to-replace-200m-certificates-a-day/164002/   
Published: 2021 02 16 21:47:30
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Cyber Accelerator - doing things differently - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-accelerator-doing-things-differently   
Published: 2021 02 16 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Cyber Accelerator - doing things differently - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-accelerator-doing-things-differently   
Published: 2021 02 16 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Weekly Threat Report 12th February 2021 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-12th-february-2021   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 12th February 2021 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-12th-february-2021   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Mobile Device Guidance updates: Chrome OS and Ubuntu - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/mobile-device-guidance-updates-chrome-os-and-ubuntu   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Mobile Device Guidance updates: Chrome OS and Ubuntu - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/mobile-device-guidance-updates-chrome-os-and-ubuntu   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Weekly Threat Report 12th February 2021 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-12th-february-2021   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Weekly Threat Report 12th February 2021 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-12th-february-2021   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:41
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Mobile Device Guidance updates: Chrome OS and Ubuntu - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/mobile-device-guidance-updates-chrome-os-and-ubuntu   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Mobile Device Guidance updates: Chrome OS and Ubuntu - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/mobile-device-guidance-updates-chrome-os-and-ubuntu   
Published: 2021 02 12 00:00:00
Received: 2021 04 18 14:04:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: AA21-042A: Compromise of U.S. Water Treatment Facility - published over 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-042a   
Published: 2021 02 11 19:15:49
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: AA21-042A: Compromise of U.S. Water Treatment Facility - published over 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa21-042a   
Published: 2021 02 11 19:15:49
Received: 2021 06 06 09:03:33
Feed: US-CERT Technical Cyber Security Alerts
Source: US-CERT Technical Cyber Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: I’ve made it! - published over 3 years ago.
Content: First off, happy new year! (Well if the tax man can start the new year in April, I can start it on Feb 11th!) Secondly, Infosecurity Magazine was ever so kind as to feature an interview with me in the Q1, 2021, Voume 18, Issue 1 edition. (the link should take you to the digital version if you’re so inclined). Of course, I won’t miss any opportuni...
https://javvadmalik.com/2021/02/11/ive-made-it/   
Published: 2021 02 11 13:10:22
Received: 2021 06 06 09:04:45
Feed: J4vv4D
Source: J4vv4D
Category: Cyber Security
Topic: Cyber Security
Article: I’ve made it! - published over 3 years ago.
Content: First off, happy new year! (Well if the tax man can start the new year in April, I can start it on Feb 11th!) Secondly, Infosecurity Magazine was ever so kind as to feature an interview with me in the Q1, 2021, Voume 18, Issue 1 edition. (the link should take you to the digital version if you’re so inclined). Of course, I won’t miss any opportuni...
https://javvadmalik.com/2021/02/11/ive-made-it/   
Published: 2021 02 11 13:10:22
Received: 2021 06 06 09:04:45
Feed: J4vv4D
Source: J4vv4D
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Top 10 Most Used MITRE ATT&CK Tactics & Techniques In 2020 - published over 3 years ago.
Content:
https://toolswatch.org/2021/02/top-10-most-used-mitre-attck-tactics-techniques-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-most-used-mitre-attck-tactics-techniques-in-2020   
Published: 2021 02 11 06:44:16
Received: 2023 01 25 14:23:47
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Article: Top 10 Most Used MITRE ATT&CK Tactics & Techniques In 2020 - published over 3 years ago.
Content:
https://toolswatch.org/2021/02/top-10-most-used-mitre-attck-tactics-techniques-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-most-used-mitre-attck-tactics-techniques-in-2020   
Published: 2021 02 11 06:44:16
Received: 2023 01 25 14:23:47
Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
Category: News
Topic: Security Tooling
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: The strength of the ICS COI is the team - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/strength-of-ics-coi-is-the-team   
Published: 2021 02 10 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: The strength of the ICS COI is the team - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/strength-of-ics-coi-is-the-team   
Published: 2021 02 10 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published over 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2023 12 10 04:21:09
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published over 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2023 12 10 04:21:09
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published over 3 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/   
Published: 2021 02 08 16:22:11
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published over 3 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/   
Published: 2021 02 08 16:22:11
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Is blockchain the right tool for you? - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/is-blockchain-the-right-tool-for-you   
Published: 2021 02 08 03:59:27
Received: 2023 12 05 16:42:19
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Is blockchain the right tool for you? - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/is-blockchain-the-right-tool-for-you   
Published: 2021 02 08 03:59:27
Received: 2023 12 05 16:42:19
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Launching OSV - Better vulnerability triage for open source - published over 3 years ago.
Content: Posted by Oliver Chang and Kim Lewandowski, Google Security TeamWe are excited to launch OSV (Open Source Vulnerabilities), our first step towards improving vulnerability triage for developers and consumers of open source software. The goal of OSV is to provide precise data on where a vulnerability was introduced and where it got fixed, thereby helping consu...
http://security.googleblog.com/2021/02/launching-osv-better-vulnerability.html   
Published: 2021 02 05 17:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Launching OSV - Better vulnerability triage for open source - published over 3 years ago.
Content: Posted by Oliver Chang and Kim Lewandowski, Google Security TeamWe are excited to launch OSV (Open Source Vulnerabilities), our first step towards improving vulnerability triage for developers and consumers of open source software. The goal of OSV is to provide precise data on where a vulnerability was introduced and where it got fixed, thereby helping consu...
http://security.googleblog.com/2021/02/launching-osv-better-vulnerability.html   
Published: 2021 02 05 17:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Defending software build pipelines from malicious attack - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 05 06:26:27
Received: 2024 02 14 12:02:29
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 05 06:26:27
Received: 2024 02 14 12:02:29
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 5th February 2021 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-5th-february-2021   
Published: 2021 02 05 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 5th February 2021 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-5th-february-2021   
Published: 2021 02 05 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Vulnerability Reward Program: 2020 Year in Review - published over 3 years ago.
Content: Posted by Anna Hupa, Senior Strategist, Vulnerability Rewards TeamDespite the challenges of this unprecedented year, our vulnerability researchers have achieved more than ever before, partnering with our Vulnerability Reward Programs (VRPs) to protect Google’s users by discovering security and abuse bugs and reporting them to us for remediation. Their dilige...
http://security.googleblog.com/2021/02/vulnerability-reward-program-2020-year.html   
Published: 2021 02 04 18:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Vulnerability Reward Program: 2020 Year in Review - published over 3 years ago.
Content: Posted by Anna Hupa, Senior Strategist, Vulnerability Rewards TeamDespite the challenges of this unprecedented year, our vulnerability researchers have achieved more than ever before, partnering with our Vulnerability Reward Programs (VRPs) to protect Google’s users by discovering security and abuse bugs and reporting them to us for remediation. Their dilige...
http://security.googleblog.com/2021/02/vulnerability-reward-program-2020-year.html   
Published: 2021 02 04 18:00:00
Received: 2021 06 06 09:04:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials - published over 3 years ago.
Content:
https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed   
Published: 2021 02 03 13:13:35
Received: 2021 06 06 09:04:42
Feed: Darknet - The Darkside
Source: Darknet - The Darkside
Category: Cyber Security
Topic: Cyber Security
Article: GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials - published over 3 years ago.
Content:
https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed   
Published: 2021 02 03 13:13:35
Received: 2021 06 06 09:04:42
Feed: Darknet - The Darkside
Source: Darknet - The Darkside
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Introducing the protocol design principles - published over 3 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/introducing-the-protocol-design-principles   
Published: 2021 02 03 11:58:27
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing the protocol design principles - published over 3 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/introducing-the-protocol-design-principles   
Published: 2021 02 03 11:58:27
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Defending software build pipelines from malicious attack - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 10:56:29
Received: 2024 01 25 15:42:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 10:56:29
Received: 2024 01 25 15:42:24
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Coming soon to ACD users...the 'MyNCSC' platform - published over 3 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/myncsc-coming-soon   
Published: 2021 02 03 09:17:13
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Coming soon to ACD users...the 'MyNCSC' platform - published over 3 years ago.
Content:
httpss://www.ncsc.gov.uk/blog-post/myncsc-coming-soon   
Published: 2021 02 03 09:17:13
Received: 2024 03 06 17:21:23
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Defending software build pipelines from malicious attack - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 00:00:23
Received: 2022 12 02 11:01:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 00:00:23
Received: 2022 12 02 11:01:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Exercise in a Box: Fitness tracking - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/exercise-in-a-box-fitness-tracking   
Published: 2021 02 03 00:00:00
Received: 2022 07 23 23:20:14
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Exercise in a Box: Fitness tracking - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/exercise-in-a-box-fitness-tracking   
Published: 2021 02 03 00:00:00
Received: 2022 07 23 23:20:14
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Defending software build pipelines from malicious attack - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 2021 02 03 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published over 3 years ago.
Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ...
https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/   
Published: 2021 02 02 23:18:40
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published over 3 years ago.
Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ...
https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/   
Published: 2021 02 02 23:18:40
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Crypto Crook Hired Steven Seagal to Promote Scam, Now Faces Charges - published over 3 years ago.
Content:
https://threatpost.com/crypto-crook-steven-segal-scam/163612/   
Published: 2021 02 02 18:17:18
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Crypto Crook Hired Steven Seagal to Promote Scam, Now Faces Charges - published over 3 years ago.
Content:
https://threatpost.com/crypto-crook-steven-segal-scam/163612/   
Published: 2021 02 02 18:17:18
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Coming soon to ACD users...the 'MyNCSC' platform - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/myncsc-coming-soon   
Published: 2021 02 02 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Coming soon to ACD users...the 'MyNCSC' platform - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/myncsc-coming-soon   
Published: 2021 02 02 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: 10 years of '10 Steps to Cyber Security' - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security   
Published: 2021 02 01 23:00:00
Received: 2022 02 16 11:20:52
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: 10 years of '10 Steps to Cyber Security' - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security   
Published: 2021 02 01 23:00:00
Received: 2022 02 16 11:20:52
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: SolarWinds Hack Prompts Congress to Put NSA in Encryption Hot Seat - published over 3 years ago.
Content:
https://threatpost.com/solarwinds-nsa-encryption/163561/   
Published: 2021 02 01 21:12:13
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: SolarWinds Hack Prompts Congress to Put NSA in Encryption Hot Seat - published over 3 years ago.
Content:
https://threatpost.com/solarwinds-nsa-encryption/163561/   
Published: 2021 02 01 21:12:13
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Critical Libgcrypt Crypto Bug Opens Machines to Arbitrary Code - published over 3 years ago.
Content:
https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/   
Published: 2021 02 01 16:59:19
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Critical Libgcrypt Crypto Bug Opens Machines to Arbitrary Code - published over 3 years ago.
Content:
https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/   
Published: 2021 02 01 16:59:19
Received: 2021 05 06 16:00:15
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark

All Articles

Ordered by Date Published : Year: "2021"
Page: << < 1,454 (of 1,456) > >>

Total Articles in this collection: 72,818


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor