All Articles

Ordered by Date Published : Year: "2022" Month: "07"
and by Page: << < 194 (of 225) > >>

Total Articles in this collection: 11,252

Navigation Help at the bottom of the page
Article: Develop DevSecops Target stage architecture and planning - Freelance Job in DevOps ... - Upwork - published over 2 years ago.
Content: Required to design DevSecops framework for which required inputs will be provided.
https://www.upwork.com/freelance-jobs/apply/Develop-DevSecops-Target-stage-architecture-and-planning_~0136fd617f683f2731/   
Published: 2022 07 06 16:50:44
Received: 2022 07 07 11:34:36
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Develop DevSecops Target stage architecture and planning - Freelance Job in DevOps ... - Upwork - published over 2 years ago.
Content: Required to design DevSecops framework for which required inputs will be provided.
https://www.upwork.com/freelance-jobs/apply/Develop-DevSecops-Target-stage-architecture-and-planning_~0136fd617f683f2731/   
Published: 2022 07 06 16:50:44
Received: 2022 07 07 11:34:36
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: NIST Announces First Four Quantum-Resistant Cryptographic Algorithms - published over 2 years ago.
Content: NIST’s post-quantum computing cryptography standard process is entering its final phases. It announced the first four algorithms: For general encryption, used when we access secure websites, NIST has selected the CRYSTALS-Kyber algorithm. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed o...
https://www.schneier.com/blog/archives/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms.html   
Published: 2022 07 06 16:49:42
Received: 2022 07 06 16:51:12
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: NIST Announces First Four Quantum-Resistant Cryptographic Algorithms - published over 2 years ago.
Content: NIST’s post-quantum computing cryptography standard process is entering its final phases. It announced the first four algorithms: For general encryption, used when we access secure websites, NIST has selected the CRYSTALS-Kyber algorithm. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed o...
https://www.schneier.com/blog/archives/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms.html   
Published: 2022 07 06 16:49:42
Received: 2022 07 06 16:51:12
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Why DevSecOps Is Crucial to a Successful Cloud Cybersecurity Strategy - published over 2 years ago.
Content: As IT moves to the cloud, new threats emerge. DevSecOps is the answer to incorporating security throughout the continuous software lifecycle.
https://accelerationeconomy.com/cybersecurity/why-devsecops-is-crucial-to-a-successful-cloud-cybersecurity-strategy/   
Published: 2022 07 06 16:46:12
Received: 2022 07 06 17:33:47
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Why DevSecOps Is Crucial to a Successful Cloud Cybersecurity Strategy - published over 2 years ago.
Content: As IT moves to the cloud, new threats emerge. DevSecOps is the answer to incorporating security throughout the continuous software lifecycle.
https://accelerationeconomy.com/cybersecurity/why-devsecops-is-crucial-to-a-successful-cloud-cybersecurity-strategy/   
Published: 2022 07 06 16:46:12
Received: 2022 07 06 17:33:47
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Pass-The-Salt 2022 Wrap-Up - published over 2 years ago.
Content: Conferences are back! After Botconf in April, that’s Pass-The-Salt that is organized this week in Lille, France. After the two years break, the formula did not change: same location, free, presentations around security, and free software! And, most important, the same atmosphere. The first day started in the afternoon and talks are grouped by topic. The...
https://blog.rootshell.be/2022/07/06/pass-the-salt-2022-wrap-up/   
Published: 2022 07 06 16:42:30
Received: 2022 07 06 18:08:58
Feed: /dev/random
Source: /dev/random
Category: Cyber Security
Topic: Cyber Security
Article: Pass-The-Salt 2022 Wrap-Up - published over 2 years ago.
Content: Conferences are back! After Botconf in April, that’s Pass-The-Salt that is organized this week in Lille, France. After the two years break, the formula did not change: same location, free, presentations around security, and free software! And, most important, the same atmosphere. The first day started in the afternoon and talks are grouped by topic. The...
https://blog.rootshell.be/2022/07/06/pass-the-salt-2022-wrap-up/   
Published: 2022 07 06 16:42:30
Received: 2022 07 06 18:08:58
Feed: /dev/random
Source: /dev/random
Category: Cyber Security
Topic: Cyber Security
Article: Google patches zero-day vulnerability for millions of users - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97944-google-patches-zero-day-vulnerability-for-millions-of-users   
Published: 2022 07 06 16:30:00
Received: 2022 07 06 17:02:23
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Google patches zero-day vulnerability for millions of users - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97944-google-patches-zero-day-vulnerability-for-millions-of-users   
Published: 2022 07 06 16:30:00
Received: 2022 07 06 17:02:23
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-33738 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33738   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:24:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-33738 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33738   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:24:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2022-33737 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33737   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:24:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-33737 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33737   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:24:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2021-3697 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3697   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:23:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-3697 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3697   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:23:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-3696 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3696   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:23:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-3696 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3696   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:23:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: CVE-2021-3695 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3695   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:23:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-3695 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3695   
Published: 2022 07 06 16:15:08
Received: 2022 07 06 18:23:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Cloud Misconfig Exposes 3TB of Sensitive Airport Data in Amazon S3 Bucket: 'Lives at Stake' - published over 2 years ago.
Content:
https://www.darkreading.com/application-security/cloud-misconfig-exposes-3tb-sensitive-airport-data-amazon-s3-bucket   
Published: 2022 07 06 16:02:45
Received: 2022 07 06 16:32:29
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Cloud Misconfig Exposes 3TB of Sensitive Airport Data in Amazon S3 Bucket: 'Lives at Stake' - published over 2 years ago.
Content:
https://www.darkreading.com/application-security/cloud-misconfig-exposes-3tb-sensitive-airport-data-amazon-s3-bucket   
Published: 2022 07 06 16:02:45
Received: 2022 07 06 16:32:29
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Why passwords are on the way out, and why we need them anyways - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97945-why-passwords-are-on-the-way-out-and-why-we-need-them-anyways   
Published: 2022 07 06 15:50:00
Received: 2022 07 06 16:03:23
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Why passwords are on the way out, and why we need them anyways - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97945-why-passwords-are-on-the-way-out-and-why-we-need-them-anyways   
Published: 2022 07 06 15:50:00
Received: 2022 07 06 16:03:23
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: AstraLocker 2.0 Ransomware Spreads Via Phishing Campaigns Including Malicious Microsoft Word Files - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/07/06/astralocker-2-0-ransomware-spreads-via-phishing-campaigns-including-malicious-microsoft-word-files/   
Published: 2022 07 06 15:49:33
Received: 2022 07 06 18:29:47
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: AstraLocker 2.0 Ransomware Spreads Via Phishing Campaigns Including Malicious Microsoft Word Files - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/07/06/astralocker-2-0-ransomware-spreads-via-phishing-campaigns-including-malicious-microsoft-word-files/   
Published: 2022 07 06 15:49:33
Received: 2022 07 06 18:29:47
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Engineering job at Boeing Company - Senior Software Engineer - DevSecOps - JSfirm.com - published over 2 years ago.
Content: Senior Software Engineer - DevSecOps jobs in Chicago for Boeing Company. View additional job detail and apply directly to Boeing Company.
https://www.jsfirm.com/job/Engineering+Senior+Software+Engineer+-+DevSecOps/Herndon-Virginia/jobID_1035751   
Published: 2022 07 06 15:43:09
Received: 2022 07 07 04:33:15
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Engineering job at Boeing Company - Senior Software Engineer - DevSecOps - JSfirm.com - published over 2 years ago.
Content: Senior Software Engineer - DevSecOps jobs in Chicago for Boeing Company. View additional job detail and apply directly to Boeing Company.
https://www.jsfirm.com/job/Engineering+Senior+Software+Engineer+-+DevSecOps/Herndon-Virginia/jobID_1035751   
Published: 2022 07 06 15:43:09
Received: 2022 07 07 04:33:15
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Zeek 5.0.0 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167712/zeek-5.0.0.tar.gz   
Published: 2022 07 06 15:42:15
Received: 2022 07 06 15:51:34
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Article: Zeek 5.0.0 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167712/zeek-5.0.0.tar.gz   
Published: 2022 07 06 15:42:15
Received: 2022 07 06 15:51:34
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Being hit with a cyber-attack is bad. Not having a recovery plan is worse - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/07/06/being_hit_with_a_cyberattack/   
Published: 2022 07 06 15:42:11
Received: 2022 07 06 16:02:49
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Being hit with a cyber-attack is bad. Not having a recovery plan is worse - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/07/06/being_hit_with_a_cyberattack/   
Published: 2022 07 06 15:42:11
Received: 2022 07 06 16:02:49
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Windows Kerberos Redirected Logon Buffer Privilege Escalation - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167711/GS20220706153551.tgz   
Published: 2022 07 06 15:37:14
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Windows Kerberos Redirected Logon Buffer Privilege Escalation - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167711/GS20220706153551.tgz   
Published: 2022 07 06 15:37:14
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Xen PV Guest Non-SELFSNOOP CPU Memory Corruption - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167710/GS20220706153018.txt   
Published: 2022 07 06 15:33:21
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Xen PV Guest Non-SELFSNOOP CPU Memory Corruption - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167710/GS20220706153018.txt   
Published: 2022 07 06 15:33:21
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: 10 Undeniable Benefits of Outsourcing Software Development - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/07/06/10-undeniable-benefits-of-outsourcing-software-development/   
Published: 2022 07 06 15:31:28
Received: 2022 07 06 18:29:47
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: 10 Undeniable Benefits of Outsourcing Software Development - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/07/06/10-undeniable-benefits-of-outsourcing-software-development/   
Published: 2022 07 06 15:31:28
Received: 2022 07 06 18:29:47
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Red Hat Security Advisory 2022-5498-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167709/RHSA-2022-5498-01.txt   
Published: 2022 07 06 15:29:45
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-5498-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167709/RHSA-2022-5498-01.txt   
Published: 2022 07 06 15:29:45
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5502-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167708/USN-5502-1.txt   
Published: 2022 07 06 15:29:36
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5502-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167708/USN-5502-1.txt   
Published: 2022 07 06 15:29:36
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Ubuntu Security Notice USN-5503-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167707/USN-5503-1.txt   
Published: 2022 07 06 15:29:29
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5503-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167707/USN-5503-1.txt   
Published: 2022 07 06 15:29:29
Received: 2022 07 06 15:51:31
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: EQS Integrity Line Cross Site Scripting / Information Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167706/eqsintegrityline-xss.txt   
Published: 2022 07 06 15:25:59
Received: 2022 07 06 15:51:32
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: EQS Integrity Line Cross Site Scripting / Information Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167706/eqsintegrityline-xss.txt   
Published: 2022 07 06 15:25:59
Received: 2022 07 06 15:51:32
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: TSA intercepted 17 guns per day in first half of 2022 - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97946-tsa-intercepted-17-guns-per-day-in-first-half-of-2022   
Published: 2022 07 06 15:25:55
Received: 2022 07 06 16:43:06
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: TSA intercepted 17 guns per day in first half of 2022 - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97946-tsa-intercepted-17-guns-per-day-in-first-half-of-2022   
Published: 2022 07 06 15:25:55
Received: 2022 07 06 16:43:06
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Identity Access Management Is Set for Exploding Growth, Big Changes — Report - published over 2 years ago.
Content:
https://www.darkreading.com/application-security/identity-access-management-exploding-growth-big-changes   
Published: 2022 07 06 15:23:04
Received: 2022 07 06 16:11:58
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Identity Access Management Is Set for Exploding Growth, Big Changes — Report - published over 2 years ago.
Content:
https://www.darkreading.com/application-security/identity-access-management-exploding-growth-big-changes   
Published: 2022 07 06 15:23:04
Received: 2022 07 06 16:11:58
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Magnolia CMS 6.2.19 Cross Site Scripting - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167705/magnoliacms6219-xss.txt   
Published: 2022 07 06 15:20:07
Received: 2022 07 06 15:51:32
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Magnolia CMS 6.2.19 Cross Site Scripting - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167705/magnoliacms6219-xss.txt   
Published: 2022 07 06 15:20:07
Received: 2022 07 06 15:51:32
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: CVE-2022-30929 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30929   
Published: 2022 07 06 15:15:08
Received: 2022 07 06 16:24:58
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-30929 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30929   
Published: 2022 07 06 15:15:08
Received: 2022 07 06 16:24:58
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: OpenSSL Releases Security Update - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/07/06/openssl-releases-security-update   
Published: 2022 07 06 15:00:00
Received: 2022 07 06 17:03:06
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: OpenSSL Releases Security Update - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/07/06/openssl-releases-security-update   
Published: 2022 07 06 15:00:00
Received: 2022 07 06 17:03:06
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Solving the key CX issues for Gen Z consumers - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97941-solving-the-key-cx-issues-for-gen-z-consumers   
Published: 2022 07 06 14:55:00
Received: 2022 07 06 15:22:51
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Solving the key CX issues for Gen Z consumers - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97941-solving-the-key-cx-issues-for-gen-z-consumers   
Published: 2022 07 06 14:55:00
Received: 2022 07 06 15:22:51
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: US govt warns of Maui ransomware attacks against healthcare orgs - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/us-govt-warns-of-maui-ransomware-attacks-against-healthcare-orgs/   
Published: 2022 07 06 14:47:32
Received: 2022 07 06 15:03:24
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: US govt warns of Maui ransomware attacks against healthcare orgs - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/us-govt-warns-of-maui-ransomware-attacks-against-healthcare-orgs/   
Published: 2022 07 06 14:47:32
Received: 2022 07 06 15:03:24
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Cybersecurity teams and employees disagree on shadow IT use - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97940-cybersecurity-teams-and-employees-disagree-on-shadow-it-use   
Published: 2022 07 06 14:37:52
Received: 2022 07 06 15:42:55
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Cybersecurity teams and employees disagree on shadow IT use - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97940-cybersecurity-teams-and-employees-disagree-on-shadow-it-use   
Published: 2022 07 06 14:37:52
Received: 2022 07 06 15:42:55
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Typo-squatting NPM software supply chain attack uncovered - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/07/06/npm_supply_chain_attack/   
Published: 2022 07 06 14:30:06
Received: 2022 07 06 14:41:56
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Typo-squatting NPM software supply chain attack uncovered - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/07/06/npm_supply_chain_attack/   
Published: 2022 07 06 14:30:06
Received: 2022 07 06 14:41:56
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: For the Love of the Wild Web 🖤 - published over 2 years ago.
Content:
https://www.eff.org/deeplinks/2022/07/do-it-love-wild-web   
Published: 2022 07 06 14:29:38
Received: 2022 07 06 15:11:28
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: For the Love of the Wild Web 🖤 - published over 2 years ago.
Content:
https://www.eff.org/deeplinks/2022/07/do-it-love-wild-web   
Published: 2022 07 06 14:29:38
Received: 2022 07 06 15:11:28
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Sumeru Solutions hiring DevSecOps Engineer in Canada | LinkedIn - published over 2 years ago.
Content: Posted 2:18:31 PM. o Bachelor's degree or higher in Computer Science, Engineering, or other Engineering or…See this and similar jobs on LinkedIn.
https://ca.linkedin.com/jobs/view/devsecops-engineer-at-sumeru-solutions-3157703678   
Published: 2022 07 06 14:18:37
Received: 2022 07 07 09:32:41
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Sumeru Solutions hiring DevSecOps Engineer in Canada | LinkedIn - published over 2 years ago.
Content: Posted 2:18:31 PM. o Bachelor's degree or higher in Computer Science, Engineering, or other Engineering or…See this and similar jobs on LinkedIn.
https://ca.linkedin.com/jobs/view/devsecops-engineer-at-sumeru-solutions-3157703678   
Published: 2022 07 06 14:18:37
Received: 2022 07 07 09:32:41
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Deals: Take Up to $250 Off Apple's 14-Inch and 16-Inch MacBook Pros on Amazon - published over 2 years ago.
Content:
https://www.macrumors.com/2022/07/06/deals-apples-14-inch-16-inch-macbook-pro/   
Published: 2022 07 06 14:18:20
Received: 2022 07 06 14:33:34
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Deals: Take Up to $250 Off Apple's 14-Inch and 16-Inch MacBook Pros on Amazon - published over 2 years ago.
Content:
https://www.macrumors.com/2022/07/06/deals-apples-14-inch-16-inch-macbook-pro/   
Published: 2022 07 06 14:18:20
Received: 2022 07 06 14:33:34
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-30619 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30619   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:58
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-30619 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30619   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:58
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-23714 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23714   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23714 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23714   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23713 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23713   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23713 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23713   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-23173 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23173   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23173 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23173   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: CVE-2022-23172 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23172   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23172 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23172   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-21787 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21787   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-21787 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21787   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: CVE-2022-21786 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21786   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-21786 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21786   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-21785 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21785   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-21785 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21785   
Published: 2022 07 06 14:15:18
Received: 2022 07 06 16:24:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities

All Articles

Ordered by Date Published : Year: "2022" Month: "07"
Page: << < 194 (of 225) > >>

Total Articles in this collection: 11,252


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor