All Articles

Ordered by Date Received : Year: "2021" Month: "06" Day: "06" Hour: "11"

Total Articles in this collection: 62

Navigation Help at the bottom of the page
Article: Apple Music Announces 'Special Event' Tomorrow, Immediately After WWDC Keynote - published almost 3 years ago.
Content:
https://www.macrumors.com/2021/06/06/apple-music-event-june7-after-wwdc/   
Published: 2021 06 06 11:28:29
Received: 2021 06 06 11:31:16
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Music Announces 'Special Event' Tomorrow, Immediately After WWDC Keynote - published almost 3 years ago.
Content:
https://www.macrumors.com/2021/06/06/apple-music-event-june7-after-wwdc/   
Published: 2021 06 06 11:28:29
Received: 2021 06 06 11:31:16
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Microsoft Teams To Introduce End-to-End Encryption To Calls - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/06/06/microsoft-teams-to-introduce-end-to-end-encryption-to-calls/   
Published: 2021 06 06 09:14:10
Received: 2021 06 06 11:30:56
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft Teams To Introduce End-to-End Encryption To Calls - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/06/06/microsoft-teams-to-introduce-end-to-end-encryption-to-calls/   
Published: 2021 06 06 09:14:10
Received: 2021 06 06 11:30:56
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: JBS Ransomware Attack Update: JBS Operations Restored; FBI Names REvil Behind The Attack - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/06/06/jbs-ransomware-attack-update-jbs-operations-restored-fbi-names-revil-behind-the-attack/   
Published: 2021 06 06 10:30:20
Received: 2021 06 06 11:30:56
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: JBS Ransomware Attack Update: JBS Operations Restored; FBI Names REvil Behind The Attack - published almost 3 years ago.
Content:
https://latesthackingnews.com/2021/06/06/jbs-ransomware-attack-update-jbs-operations-restored-fbi-names-revil-behind-the-attack/   
Published: 2021 06 06 10:30:20
Received: 2021 06 06 11:30:56
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Froala Editor Version 3.2.6 - High-Risk XSS Bug - published almost 3 years ago.
Content: submitted by /u/breach_house [link] [comments]
https://www.reddit.com/r/netsec/comments/nqpqrh/froala_editor_version_326_highrisk_xss_bug/   
Published: 2021 06 02 16:25:32
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Froala Editor Version 3.2.6 - High-Risk XSS Bug - published almost 3 years ago.
Content: submitted by /u/breach_house [link] [comments]
https://www.reddit.com/r/netsec/comments/nqpqrh/froala_editor_version_326_highrisk_xss_bug/   
Published: 2021 06 02 16:25:32
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Vault1317 protocol: a modern approach for metadata protection with deniability - published almost 3 years ago.
Content: submitted by /u/hardenedvault [link] [comments]
https://www.reddit.com/r/netsec/comments/nqhz9p/vault1317_protocol_a_modern_approach_for_metadata/   
Published: 2021 06 02 09:40:47
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Vault1317 protocol: a modern approach for metadata protection with deniability - published almost 3 years ago.
Content: submitted by /u/hardenedvault [link] [comments]
https://www.reddit.com/r/netsec/comments/nqhz9p/vault1317_protocol_a_modern_approach_for_metadata/   
Published: 2021 06 02 09:40:47
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Guide to P-code Injection: Changing the intermediate representation of code on the fly in Ghidra - published almost 3 years ago.
Content: submitted by /u/yarbabin [link] [comments]
https://www.reddit.com/r/netsec/comments/nqnlna/guide_to_pcode_injection_changing_the/   
Published: 2021 06 02 14:52:54
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Guide to P-code Injection: Changing the intermediate representation of code on the fly in Ghidra - published almost 3 years ago.
Content: submitted by /u/yarbabin [link] [comments]
https://www.reddit.com/r/netsec/comments/nqnlna/guide_to_pcode_injection_changing_the/   
Published: 2021 06 02 14:52:54
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Revisiting Realtek – A New Set of Critical Wi-Fi Vulnerabilities Discovered by Automated Zero-Day Analysis - published almost 3 years ago.
Content: submitted by /u/SRMish3 [link] [comments]
https://www.reddit.com/r/netsec/comments/nqkqat/revisiting_realtek_a_new_set_of_critical_wifi/   
Published: 2021 06 02 12:32:58
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Revisiting Realtek – A New Set of Critical Wi-Fi Vulnerabilities Discovered by Automated Zero-Day Analysis - published almost 3 years ago.
Content: submitted by /u/SRMish3 [link] [comments]
https://www.reddit.com/r/netsec/comments/nqkqat/revisiting_realtek_a_new_set_of_critical_wifi/   
Published: 2021 06 02 12:32:58
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: New CVE database that visualizes CVEs and shows exploit price and eco impact - published almost 3 years ago.
Content: submitted by /u/vowie92 [link] [comments]
https://www.reddit.com/r/netsec/comments/nqgw6j/new_cve_database_that_visualizes_cves_and_shows/   
Published: 2021 06 02 08:23:20
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: New CVE database that visualizes CVEs and shows exploit price and eco impact - published almost 3 years ago.
Content: submitted by /u/vowie92 [link] [comments]
https://www.reddit.com/r/netsec/comments/nqgw6j/new_cve_database_that_visualizes_cves_and_shows/   
Published: 2021 06 02 08:23:20
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: WE.LOCK: Unlocking Smart Locks with Web Vulnerabilities - published almost 3 years ago.
Content: submitted by /u/CriticalSec [link] [comments]
https://www.reddit.com/r/netsec/comments/nqmnyq/welock_unlocking_smart_locks_with_web/   
Published: 2021 06 02 14:09:59
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: WE.LOCK: Unlocking Smart Locks with Web Vulnerabilities - published almost 3 years ago.
Content: submitted by /u/CriticalSec [link] [comments]
https://www.reddit.com/r/netsec/comments/nqmnyq/welock_unlocking_smart_locks_with_web/   
Published: 2021 06 02 14:09:59
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Exploiting a zero-day WebAssembly Vulnerability (CVE-2021-30734) in Apple Safari - published almost 3 years ago.
Content: submitted by /u/gaasedelen [link] [comments]
https://www.reddit.com/r/netsec/comments/nqo190/exploiting_a_zeroday_webassembly_vulnerability/   
Published: 2021 06 02 15:14:27
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Exploiting a zero-day WebAssembly Vulnerability (CVE-2021-30734) in Apple Safari - published almost 3 years ago.
Content: submitted by /u/gaasedelen [link] [comments]
https://www.reddit.com/r/netsec/comments/nqo190/exploiting_a_zeroday_webassembly_vulnerability/   
Published: 2021 06 02 15:14:27
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: UI Security - Thinking Outside the Viewport - published almost 3 years ago.
Content: submitted by /u/albinowax [link] [comments]
https://www.reddit.com/r/netsec/comments/nr7rbb/ui_security_thinking_outside_the_viewport/   
Published: 2021 06 03 07:41:27
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: UI Security - Thinking Outside the Viewport - published almost 3 years ago.
Content: submitted by /u/albinowax [link] [comments]
https://www.reddit.com/r/netsec/comments/nr7rbb/ui_security_thinking_outside_the_viewport/   
Published: 2021 06 03 07:41:27
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: WebLogic RCE Leads to XMRig - published almost 3 years ago.
Content: submitted by /u/TheDFIRReport [link] [comments]
https://www.reddit.com/r/netsec/comments/nrfpt9/weblogic_rce_leads_to_xmrig/   
Published: 2021 06 03 15:07:44
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: WebLogic RCE Leads to XMRig - published almost 3 years ago.
Content: submitted by /u/TheDFIRReport [link] [comments]
https://www.reddit.com/r/netsec/comments/nrfpt9/weblogic_rce_leads_to_xmrig/   
Published: 2021 06 03 15:07:44
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Why We Hash Passwords - published almost 3 years ago.
Content: submitted by /u/dennisbyrne [link] [comments]
https://www.reddit.com/r/netsec/comments/nr10cj/why_we_hash_passwords/   
Published: 2021 06 03 00:53:11
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Why We Hash Passwords - published almost 3 years ago.
Content: submitted by /u/dennisbyrne [link] [comments]
https://www.reddit.com/r/netsec/comments/nr10cj/why_we_hash_passwords/   
Published: 2021 06 03 00:53:11
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: OSX/Hydromac: A new macOS malware leaked from a Flashcards app - published almost 3 years ago.
Content: submitted by /u/lordx64 [link] [comments]...
https://www.reddit.com/r/netsec/comments/nrjw0w/osxhydromac_a_new_macos_malware_leaked_from_a/   
Published: 2021 06 03 18:09:06
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: OSX/Hydromac: A new macOS malware leaked from a Flashcards app - published almost 3 years ago.
Content: submitted by /u/lordx64 [link] [comments]...
https://www.reddit.com/r/netsec/comments/nrjw0w/osxhydromac_a_new_macos_malware_leaked_from_a/   
Published: 2021 06 03 18:09:06
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: More macOS Installer Flaws - published almost 3 years ago.
Content: submitted by /u/dinobyt3s [link] [comments]
https://www.reddit.com/r/netsec/comments/nrd07m/more_macos_installer_flaws/   
Published: 2021 06 03 13:03:19
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: More macOS Installer Flaws - published almost 3 years ago.
Content: submitted by /u/dinobyt3s [link] [comments]
https://www.reddit.com/r/netsec/comments/nrd07m/more_macos_installer_flaws/   
Published: 2021 06 03 13:03:19
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Automatically deploy only relevant security updates for Linux CentOS using Errata plugin from Vulners - published almost 3 years ago.
Content: submitted by /u/redsailor [link] [comments]
https://www.reddit.com/r/netsec/comments/nrgx2a/automatically_deploy_only_relevant_security/   
Published: 2021 06 03 16:00:38
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Automatically deploy only relevant security updates for Linux CentOS using Errata plugin from Vulners - published almost 3 years ago.
Content: submitted by /u/redsailor [link] [comments]
https://www.reddit.com/r/netsec/comments/nrgx2a/automatically_deploy_only_relevant_security/   
Published: 2021 06 03 16:00:38
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: XSS in the AWS Console - published almost 3 years ago.
Content: submitted by /u/RedTermSession [link] [comments]
https://www.reddit.com/r/netsec/comments/nrlln6/xss_in_the_aws_console/   
Published: 2021 06 03 19:22:39
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: XSS in the AWS Console - published almost 3 years ago.
Content: submitted by /u/RedTermSession [link] [comments]
https://www.reddit.com/r/netsec/comments/nrlln6/xss_in_the_aws_console/   
Published: 2021 06 03 19:22:39
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: ASP.NET Cryptography for Pentesters - published almost 3 years ago.
Content: submitted by /u/L1QU1DF1R3 [link] [comments]
https://www.reddit.com/r/netsec/comments/nrnttz/aspnet_cryptography_for_pentesters/   
Published: 2021 06 03 20:58:37
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: ASP.NET Cryptography for Pentesters - published almost 3 years ago.
Content: submitted by /u/L1QU1DF1R3 [link] [comments]
https://www.reddit.com/r/netsec/comments/nrnttz/aspnet_cryptography_for_pentesters/   
Published: 2021 06 03 20:58:37
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Easy Hypervisor Heap Visualization with PyPANDA and HeapInspect - published almost 3 years ago.
Content: submitted by /u/lacraig2 [link] [comments]
https://www.reddit.com/r/netsec/comments/nrtq66/easy_hypervisor_heap_visualization_with_pypanda/   
Published: 2021 06 04 01:47:25
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Easy Hypervisor Heap Visualization with PyPANDA and HeapInspect - published almost 3 years ago.
Content: submitted by /u/lacraig2 [link] [comments]
https://www.reddit.com/r/netsec/comments/nrtq66/easy_hypervisor_heap_visualization_with_pypanda/   
Published: 2021 06 04 01:47:25
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Open source CIS Benchmark scan for Zoom security and compliance - published almost 3 years ago.
Content: submitted by /u/CloudSpout [link] [comments]
https://www.reddit.com/r/netsec/comments/nrk1zh/open_source_cis_benchmark_scan_for_zoom_security/   
Published: 2021 06 03 18:16:14
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Open source CIS Benchmark scan for Zoom security and compliance - published almost 3 years ago.
Content: submitted by /u/CloudSpout [link] [comments]
https://www.reddit.com/r/netsec/comments/nrk1zh/open_source_cis_benchmark_scan_for_zoom_security/   
Published: 2021 06 03 18:16:14
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: QNAP Q’center Post-Auth Remote Code Execution via QPKG - published almost 3 years ago.
Content: submitted by /u/smaury [link] [comments]
https://www.reddit.com/r/netsec/comments/nsbu3o/qnap_qcenter_postauth_remote_code_execution_via/   
Published: 2021 06 04 18:24:14
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: QNAP Q’center Post-Auth Remote Code Execution via QPKG - published almost 3 years ago.
Content: submitted by /u/smaury [link] [comments]
https://www.reddit.com/r/netsec/comments/nsbu3o/qnap_qcenter_postauth_remote_code_execution_via/   
Published: 2021 06 04 18:24:14
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: SSRF Cheat Sheet & Bypass Techniques - published almost 3 years ago.
Content: submitted by /u/HighOnCoffee [link] [comments]
https://www.reddit.com/r/netsec/comments/ns0oti/ssrf_cheat_sheet_bypass_techniques/   
Published: 2021 06 04 09:09:24
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: SSRF Cheat Sheet & Bypass Techniques - published almost 3 years ago.
Content: submitted by /u/HighOnCoffee [link] [comments]
https://www.reddit.com/r/netsec/comments/ns0oti/ssrf_cheat_sheet_bypass_techniques/   
Published: 2021 06 04 09:09:24
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: iOS User Enrollment and Trusted Certificates - or how BYOD can lead to certificates being trusted by your personal apps.. - published almost 3 years ago.
Content: submitted by /u/digicat [link] [comments]
https://www.reddit.com/r/netsec/comments/nsc0eu/ios_user_enrollment_and_trusted_certificates_or/   
Published: 2021 06 04 18:32:28
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: iOS User Enrollment and Trusted Certificates - or how BYOD can lead to certificates being trusted by your personal apps.. - published almost 3 years ago.
Content: submitted by /u/digicat [link] [comments]
https://www.reddit.com/r/netsec/comments/nsc0eu/ios_user_enrollment_and_trusted_certificates_or/   
Published: 2021 06 04 18:32:28
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: An In-memory Embedding of CPython with SCYTHE - published almost 3 years ago.
Content: submitted by /u/0xdea [link] [comments]
https://www.reddit.com/r/netsec/comments/nsoxea/an_inmemory_embedding_of_cpython_with_scythe/   
Published: 2021 06 05 05:53:32
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: An In-memory Embedding of CPython with SCYTHE - published almost 3 years ago.
Content: submitted by /u/0xdea [link] [comments]
https://www.reddit.com/r/netsec/comments/nsoxea/an_inmemory_embedding_of_cpython_with_scythe/   
Published: 2021 06 05 05:53:32
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Dynamic payload generation with mingw - published almost 3 years ago.
Content: submitted by /u/cysboy [link] [comments]
https://www.reddit.com/r/netsec/comments/nsxg1w/dynamic_payload_generation_with_mingw/   
Published: 2021 06 05 14:53:10
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Dynamic payload generation with mingw - published almost 3 years ago.
Content: submitted by /u/cysboy [link] [comments]
https://www.reddit.com/r/netsec/comments/nsxg1w/dynamic_payload_generation_with_mingw/   
Published: 2021 06 05 14:53:10
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Kubernetes Goat - Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security - published almost 3 years ago.
Content: submitted by /u/madhuakula [link] [comments]
https://www.reddit.com/r/netsec/comments/nsidm1/kubernetes_goat_designed_to_be_an_intentionally/   
Published: 2021 06 04 23:26:21
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Kubernetes Goat - Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security - published almost 3 years ago.
Content: submitted by /u/madhuakula [link] [comments]
https://www.reddit.com/r/netsec/comments/nsidm1/kubernetes_goat_designed_to_be_an_intentionally/   
Published: 2021 06 04 23:26:21
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: hashlookup.circl.lu - public ReST API to lookup hash values against known database of files (NSRL NDS) - published almost 3 years ago.
Content: submitted by /u/adulau [link] [comments]
https://www.reddit.com/r/netsec/comments/nt54op/hashlookupcircllu_public_rest_api_to_lookup_hash/   
Published: 2021 06 05 20:54:14
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: hashlookup.circl.lu - public ReST API to lookup hash values against known database of files (NSRL NDS) - published almost 3 years ago.
Content: submitted by /u/adulau [link] [comments]
https://www.reddit.com/r/netsec/comments/nt54op/hashlookupcircllu_public_rest_api_to_lookup_hash/   
Published: 2021 06 05 20:54:14
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Password Managers. - published almost 3 years ago.
Content: submitted by /u/ScottContini [link] [comments]
https://www.reddit.com/r/netsec/comments/ntdmxw/password_managers/   
Published: 2021 06 06 04:36:10
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Password Managers. - published almost 3 years ago.
Content: submitted by /u/ScottContini [link] [comments]
https://www.reddit.com/r/netsec/comments/ntdmxw/password_managers/   
Published: 2021 06 06 04:36:10
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: /r/netsec's Q2 2021 Information Security Hiring Thread - published about 3 years ago.
Content: Overview If you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company. We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing thei...
https://www.reddit.com/r/netsec/comments/mi5lrc/rnetsecs_q2_2021_information_security_hiring/   
Published: 2021 04 01 21:33:37
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: /r/netsec's Q2 2021 Information Security Hiring Thread - published about 3 years ago.
Content: Overview If you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company. We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing thei...
https://www.reddit.com/r/netsec/comments/mi5lrc/rnetsecs_q2_2021_information_security_hiring/   
Published: 2021 04 01 21:33:37
Received: 2021 06 06 11:30:43
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Sigreturn Oriented Programming (Erik Bosman's OHM2013 work) - published over 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/1rpvzh/sigreturn_oriented_programming_erik_bosmans/   
Published: 2013 11 29 17:19:55
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Sigreturn Oriented Programming (Erik Bosman's OHM2013 work) - published over 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/1rpvzh/sigreturn_oriented_programming_erik_bosmans/   
Published: 2013 11 29 17:19:55
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: KASLR Bypass Mitigations in Windows 8.1 - Alex Ionescu (November 2013) - published over 10 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]
https://www.reddit.com/r/vrd/comments/1rpsj5/kaslr_bypass_mitigations_in_windows_81_alex/   
Published: 2013 11 29 16:29:41
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: KASLR Bypass Mitigations in Windows 8.1 - Alex Ionescu (November 2013) - published over 10 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]
https://www.reddit.com/r/vrd/comments/1rpsj5/kaslr_bypass_mitigations_in_windows_81_alex/   
Published: 2013 11 29 16:29:41
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Taming ROP on Sandy Bridge - Georg Wicherski (May 2013) - published over 10 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]...
https://www.reddit.com/r/vrd/comments/1s15el/taming_rop_on_sandy_bridge_georg_wicherski_may/   
Published: 2013 12 03 23:17:28
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Taming ROP on Sandy Bridge - Georg Wicherski (May 2013) - published over 10 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]...
https://www.reddit.com/r/vrd/comments/1s15el/taming_rop_on_sandy_bridge_georg_wicherski_may/   
Published: 2013 12 03 23:17:28
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Bochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns - Mateusz "j00ru" Jurczyk and Gynvael Coldwind (May 2013) - published over 10 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]
https://www.reddit.com/r/vrd/comments/1s14rw/bochspwn_exploiting_kernel_race_conditions_found/   
Published: 2013 12 03 23:10:59
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Bochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns - Mateusz "j00ru" Jurczyk and Gynvael Coldwind (May 2013) - published over 10 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]
https://www.reddit.com/r/vrd/comments/1s14rw/bochspwn_exploiting_kernel_race_conditions_found/   
Published: 2013 12 03 23:10:59
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Swarm Testing by Alex Groce, Chaoqiang Zhang, Eric Eide, Yang Chen, and John Regehr [PDF] - published about 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/1xgdid/swarm_testing_by_alex_groce_chaoqiang_zhang_eric/   
Published: 2014 02 09 19:45:14
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Swarm Testing by Alex Groce, Chaoqiang Zhang, Eric Eide, Yang Chen, and John Regehr [PDF] - published about 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/1xgdid/swarm_testing_by_alex_groce_chaoqiang_zhang_eric/   
Published: 2014 02 09 19:45:14
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: ROPs are for the 99% - Yang Yu (March 2014) - published about 10 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]...
https://www.reddit.com/r/vrd/comments/20o1qk/rops_are_for_the_99_yang_yu_march_2014/   
Published: 2014 03 17 22:28:27
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: ROPs are for the 99% - Yang Yu (March 2014) - published about 10 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]...
https://www.reddit.com/r/vrd/comments/20o1qk/rops_are_for_the_99_yang_yu_march_2014/   
Published: 2014 03 17 22:28:27
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Hacking Blind by Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh [PDF] - published about 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/20nyk5/hacking_blind_by_andrea_bittau_adam_belay_ali/   
Published: 2014 03 17 21:58:24
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Hacking Blind by Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh [PDF] - published about 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/20nyk5/hacking_blind_by_andrea_bittau_adam_belay_ali/   
Published: 2014 03 17 21:58:24
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Out Of Control: Overcoming Control-Flow Integrity by Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis [PDF] - published about 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/20wrse/out_of_control_overcoming_controlflow_integrity/   
Published: 2014 03 20 15:36:19
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Out Of Control: Overcoming Control-Flow Integrity by Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis [PDF] - published about 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/20wrse/out_of_control_overcoming_controlflow_integrity/   
Published: 2014 03 20 15:36:19
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: KLEE used to find NULL pointer dereference in OpenSSL - published almost 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/24i2zh/klee_used_to_find_null_pointer_dereference_in/   
Published: 2014 05 02 00:25:08
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: KLEE used to find NULL pointer dereference in OpenSSL - published almost 10 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/24i2zh/klee_used_to_find_null_pointer_dereference_in/   
Published: 2014 05 02 00:25:08
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Advanced Exploitation of VirtualBox 3D Acceleration VM Escape Vulnerability / Exploit (CVE-2014-0983), VUPEN (July 2014) - published almost 10 years ago.
Content: submitted by /u/stormehh [link] [comments]
https://www.reddit.com/r/vrd/comments/2bp9v7/advanced_exploitation_of_virtualbox_3d/   
Published: 2014 07 25 16:08:47
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Advanced Exploitation of VirtualBox 3D Acceleration VM Escape Vulnerability / Exploit (CVE-2014-0983), VUPEN (July 2014) - published almost 10 years ago.
Content: submitted by /u/stormehh [link] [comments]
https://www.reddit.com/r/vrd/comments/2bp9v7/advanced_exploitation_of_virtualbox_3d/   
Published: 2014 07 25 16:08:47
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Smashing The Browser: From Vulnerability Discovery To Exploit - published over 9 years ago.
Content: submitted by /u/demi6od [link] [comments]
https://www.reddit.com/r/vrd/comments/2evme2/smashing_the_browser_from_vulnerability_discovery/   
Published: 2014 08 29 01:16:01
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Smashing The Browser: From Vulnerability Discovery To Exploit - published over 9 years ago.
Content: submitted by /u/demi6od [link] [comments]
https://www.reddit.com/r/vrd/comments/2evme2/smashing_the_browser_from_vulnerability_discovery/   
Published: 2014 08 29 01:16:01
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Using SystemTap to determine the exploitability of unbound memory overflows - published over 9 years ago.
Content: submitted by /u/pwnwaffe [link] [comments]
https://www.reddit.com/r/vrd/comments/2lkagk/using_systemtap_to_determine_the_exploitability/   
Published: 2014 11 07 08:23:18
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Using SystemTap to determine the exploitability of unbound memory overflows - published over 9 years ago.
Content: submitted by /u/pwnwaffe [link] [comments]
https://www.reddit.com/r/vrd/comments/2lkagk/using_systemtap_to_determine_the_exploitability/   
Published: 2014 11 07 08:23:18
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: How I Evolved your Fuzzer: Techniques for Black-Box Evolutionary Fuzzing by Fabien Duchene [PDF] - published over 9 years ago.
Content: submitted by /u/turnersr [link] [comments]...
https://www.reddit.com/r/vrd/comments/2s812x/how_i_evolved_your_fuzzer_techniques_for_blackbox/   
Published: 2015 01 12 23:55:46
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: How I Evolved your Fuzzer: Techniques for Black-Box Evolutionary Fuzzing by Fabien Duchene [PDF] - published over 9 years ago.
Content: submitted by /u/turnersr [link] [comments]...
https://www.reddit.com/r/vrd/comments/2s812x/how_i_evolved_your_fuzzer_techniques_for_blackbox/   
Published: 2015 01 12 23:55:46
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Preventing Use-after-free with Dangling Pointers Nullification by Byoungyoung Lee, Chengyu Song, Yeongjin Jang, and Tielei Wang [PDF] - published over 9 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/2sppt4/preventing_useafterfree_with_dangling_pointers/   
Published: 2015 01 17 06:43:25
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Preventing Use-after-free with Dangling Pointers Nullification by Byoungyoung Lee, Chengyu Song, Yeongjin Jang, and Tielei Wang [PDF] - published over 9 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/2sppt4/preventing_useafterfree_with_dangling_pointers/   
Published: 2015 01 17 06:43:25
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines by Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis [PDF] - published over 9 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/2sppvi/the_devil_is_in_the_constants_bypassing_defenses/   
Published: 2015 01 17 06:44:33
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines by Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis [PDF] - published over 9 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/2sppvi/the_devil_is_in_the_constants_bypassing_defenses/   
Published: 2015 01 17 06:44:33
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Blind Return Oriented Programming (BROP) Attack - published about 9 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/2u7wxo/blind_return_oriented_programming_brop_attack/   
Published: 2015 01 30 18:06:05
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Blind Return Oriented Programming (BROP) Attack - published about 9 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/2u7wxo/blind_return_oriented_programming_brop_attack/   
Published: 2015 01 30 18:06:05
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Building a exploit for CVE-2015-5090 - SYSTEM-level code execution in Adobe Reader - published almost 9 years ago.
Content: submitted by /u/RedmondSecGnome [link] [comments]...
https://www.reddit.com/r/vrd/comments/3dibtp/building_a_exploit_for_cve20155090_systemlevel/   
Published: 2015 07 16 14:36:46
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Building a exploit for CVE-2015-5090 - SYSTEM-level code execution in Adobe Reader - published almost 9 years ago.
Content: submitted by /u/RedmondSecGnome [link] [comments]...
https://www.reddit.com/r/vrd/comments/3dibtp/building_a_exploit_for_cve20155090_systemlevel/   
Published: 2015 07 16 14:36:46
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Modern Binary Attacks and Defences in the Windows Environment – Fighting Against Microsoft EMET in Seven Rounds by Zoltan L. Nemeth - published over 8 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/3vgb0n/modern_binary_attacks_and_defences_in_the_windows/   
Published: 2015 12 04 19:35:23
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Modern Binary Attacks and Defences in the Windows Environment – Fighting Against Microsoft EMET in Seven Rounds by Zoltan L. Nemeth - published over 8 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/3vgb0n/modern_binary_attacks_and_defences_in_the_windows/   
Published: 2015 12 04 19:35:23
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Six Ways to Automatically Find Software Bugs by Fan Gang [PDF] - published over 8 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/3wu1py/six_ways_to_automatically_find_software_bugs_by/   
Published: 2015 12 14 21:03:42
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Six Ways to Automatically Find Software Bugs by Fan Gang [PDF] - published over 8 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/3wu1py/six_ways_to_automatically_find_software_bugs_by/   
Published: 2015 12 14 21:03:42
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: From Crash To Exploit: CVE-2015-6086 – Out of Bound Read/ASLR Bypass - published over 8 years ago.
Content: submitted by /u/hacksysteam [link] [comments]
https://www.reddit.com/r/vrd/comments/41mr2q/from_crash_to_exploit_cve20156086_out_of_bound/   
Published: 2016 01 19 03:42:14
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: From Crash To Exploit: CVE-2015-6086 – Out of Bound Read/ASLR Bypass - published over 8 years ago.
Content: submitted by /u/hacksysteam [link] [comments]
https://www.reddit.com/r/vrd/comments/41mr2q/from_crash_to_exploit_cve20156086_out_of_bound/   
Published: 2016 01 19 03:42:14
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: [a little old, but a very interesting writeup] Android privilege escalation to mediaserver from zero permissions (CVE-2014-7920 + CVE-2014-7921) - published over 8 years ago.
Content: submitted by /u/0x3d5157636b525761 [link] [comments]...
https://www.reddit.com/r/vrd/comments/42k7vf/a_little_old_but_a_very_interesting_writeup/   
Published: 2016 01 25 07:16:11
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: [a little old, but a very interesting writeup] Android privilege escalation to mediaserver from zero permissions (CVE-2014-7920 + CVE-2014-7921) - published over 8 years ago.
Content: submitted by /u/0x3d5157636b525761 [link] [comments]...
https://www.reddit.com/r/vrd/comments/42k7vf/a_little_old_but_a_very_interesting_writeup/   
Published: 2016 01 25 07:16:11
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Exploiting the parsing of Internet Key Exchange payloads in Cisco's ASA software - published about 8 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/45eq3o/exploiting_the_parsing_of_internet_key_exchange/   
Published: 2016 02 12 13:32:25
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Exploiting the parsing of Internet Key Exchange payloads in Cisco's ASA software - published about 8 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/45eq3o/exploiting_the_parsing_of_internet_key_exchange/   
Published: 2016 02 12 13:32:25
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: KLEE LLVM Execution Engine - published about 8 years ago.
Content: [link] [comments]
https://www.reddit.com/r/vrd/comments/47g35g/klee_llvm_execution_engine/   
Published: 2016 02 25 00:16:31
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: KLEE LLVM Execution Engine - published about 8 years ago.
Content: [link] [comments]
https://www.reddit.com/r/vrd/comments/47g35g/klee_llvm_execution_engine/   
Published: 2016 02 25 00:16:31
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Project Triforce: Run AFL on Everything by NCCGroup - published almost 8 years ago.
Content: submitted by /u/svieg [link] [comments]...
https://www.reddit.com/r/vrd/comments/4q5z5w/project_triforce_run_afl_on_everything_by_nccgroup/   
Published: 2016 06 27 22:05:05
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Project Triforce: Run AFL on Everything by NCCGroup - published almost 8 years ago.
Content: submitted by /u/svieg [link] [comments]...
https://www.reddit.com/r/vrd/comments/4q5z5w/project_triforce_run_afl_on_everything_by_nccgroup/   
Published: 2016 06 27 22:05:05
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Exploiting the DRAM Rowhammer bug to gain kernel privileges - Matthew Dempsky and Thomas Dullien - March 9, 2015 - published over 7 years ago.
Content: submitted by /u/jikjordan [link] [comments]...
https://www.reddit.com/r/vrd/comments/5h7n2c/exploiting_the_dram_rowhammer_bug_to_gain_kernel/   
Published: 2016 12 08 15:53:55
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Exploiting the DRAM Rowhammer bug to gain kernel privileges - Matthew Dempsky and Thomas Dullien - March 9, 2015 - published over 7 years ago.
Content: submitted by /u/jikjordan [link] [comments]...
https://www.reddit.com/r/vrd/comments/5h7n2c/exploiting_the_dram_rowhammer_bug_to_gain_kernel/   
Published: 2016 12 08 15:53:55
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: HealthForYou 1.11.1 / HealthCoach 2.9.2 Account Takeover - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2021060029   
Published: 2021 06 06 11:25:49
Received: 2021 06 06 11:26:12
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: HealthForYou 1.11.1 / HealthCoach 2.9.2 Account Takeover - published almost 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2021060029   
Published: 2021 06 06 11:25:49
Received: 2021 06 06 11:26:12
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: How to Protect Your Files From Ransomware - published almost 3 years ago.
Content:
https://www.wired.com/story/how-to-protect-files-ransomware-tips   
Published: 2021 06 06 11:00:00
Received: 2021 06 06 11:21:22
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: How to Protect Your Files From Ransomware - published almost 3 years ago.
Content:
https://www.wired.com/story/how-to-protect-files-ransomware-tips   
Published: 2021 06 06 11:00:00
Received: 2021 06 06 11:21:22
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Operation Overlord, June 6, 1944 - published almost 3 years ago.
Content:
https://securityboulevard.com/2021/06/operation-overlord-june-6-1944/   
Published: 2021 06 06 08:00:00
Received: 2021 06 06 11:05:14
Feed: Security Bloggers Network
Source: Security Bloggers Network
Category: Cyber Security
Topic: Cyber Security
Article: Operation Overlord, June 6, 1944 - published almost 3 years ago.
Content:
https://securityboulevard.com/2021/06/operation-overlord-june-6-1944/   
Published: 2021 06 06 08:00:00
Received: 2021 06 06 11:05:14
Feed: Security Bloggers Network
Source: Security Bloggers Network
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: ECJ Commission to form NIDS Inspectorate - published almost 3 years ago.
Content: ... persons ordinarily resident in Jamaica, thereby allowing for the strengthening of identity security, cyber security and simplification of bureaucracy.
https://www.jamaicaobserver.com/news/ecj-commission-to_223137?profile=1373   
Published: 2021 06 06 05:08:51
Received: 2021 06 06 11:00:37
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: ECJ Commission to form NIDS Inspectorate - published almost 3 years ago.
Content: ... persons ordinarily resident in Jamaica, thereby allowing for the strengthening of identity security, cyber security and simplification of bureaucracy.
https://www.jamaicaobserver.com/news/ecj-commission-to_223137?profile=1373   
Published: 2021 06 06 05:08:51
Received: 2021 06 06 11:00:37
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Fostering defence and aerospace industry eco-system - published almost 3 years ago.
Content: Of the 18 students, 13 are being placed within Raytheon Emirates' Cyber Security and Legal and Business Development departments in Abu Dhabi.
http://www.tradearabia.com/news/IND_383160.html   
Published: 2021 06 06 09:33:45
Received: 2021 06 06 11:00:37
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Fostering defence and aerospace industry eco-system - published almost 3 years ago.
Content: Of the 18 students, 13 are being placed within Raytheon Emirates' Cyber Security and Legal and Business Development departments in Abu Dhabi.
http://www.tradearabia.com/news/IND_383160.html   
Published: 2021 06 06 09:33:45
Received: 2021 06 06 11:00:37
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: Saudi Arabia teams up with black hat organisers to launch world class hacking event @hack - published almost 3 years ago.
Content: Premiere edition of @Hack to be one of the largest cyber security events in the ... The Saudi Federation of Cybersecurity, Programming and Drones ...
https://www.zawya.com/mena/en/story/Saudi_Arabia_teams_up_with_black_hat_organisers_to_launch_world_class_hacking_event_hack-ZAWYA20210606085222/   
Published: 2021 06 06 08:48:45
Received: 2021 06 06 11:00:04
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Saudi Arabia teams up with black hat organisers to launch world class hacking event @hack - published almost 3 years ago.
Content: Premiere edition of @Hack to be one of the largest cyber security events in the ... The Saudi Federation of Cybersecurity, Programming and Drones ...
https://www.zawya.com/mena/en/story/Saudi_Arabia_teams_up_with_black_hat_organisers_to_launch_world_class_hacking_event_hack-ZAWYA20210606085222/   
Published: 2021 06 06 08:48:45
Received: 2021 06 06 11:00:04
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Forge A Career In Cybersecurity And It With This Bundle On Sale - published almost 3 years ago.
Content: The demand for cybersecurity skills is at an all-time high. According to the U.S. Bureau of Labor Statistics, the employment of cybersecurity experts is ...
https://www.blackenterprise.com/forge-a-career-in-cybersecurity-and-it-with-this-bundle-on-sale/   
Published: 2021 06 06 09:22:30
Received: 2021 06 06 11:00:04
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Forge A Career In Cybersecurity And It With This Bundle On Sale - published almost 3 years ago.
Content: The demand for cybersecurity skills is at an all-time high. According to the U.S. Bureau of Labor Statistics, the employment of cybersecurity experts is ...
https://www.blackenterprise.com/forge-a-career-in-cybersecurity-and-it-with-this-bundle-on-sale/   
Published: 2021 06 06 09:22:30
Received: 2021 06 06 11:00:04
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Best Practices from Maria Thompson, an Exceptional Cyber Leader - published almost 3 years ago.
Content: Maria Thompson has led North Carolina government's cybersecurity organization for the past six and a half years, and it has been quite an amazing ...
https://www.govtech.com/blogs/lohrmann-on-cybersecurity/best-practices-from-maria-thompson-an-exceptional-cyber-leader   
Published: 2021 06 06 09:33:45
Received: 2021 06 06 11:00:04
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Best Practices from Maria Thompson, an Exceptional Cyber Leader - published almost 3 years ago.
Content: Maria Thompson has led North Carolina government's cybersecurity organization for the past six and a half years, and it has been quite an amazing ...
https://www.govtech.com/blogs/lohrmann-on-cybersecurity/best-practices-from-maria-thompson-an-exceptional-cyber-leader   
Published: 2021 06 06 09:33:45
Received: 2021 06 06 11:00:04
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate

All Articles

Ordered by Date Received : Year: "2021" Month: "06" Day: "06" Hour: "11"

Total Articles in this collection: 62


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor