All Articles

Ordered by Date Received : Year: "2021" Month: "12" Day: "09" Hour: "16"
Page: 1 (of 0)

Total Articles in this collection: 13

Navigation Help at the bottom of the page
Article: Microsoft, Google OAuth flaws can be abused in phishing attacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/microsoft-google-oauth-flaws-can-be-abused-in-phishing-attacks/   
Published: 2021 12 09 16:21:47
Received: 2021 12 09 16:40:17
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft, Google OAuth flaws can be abused in phishing attacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/microsoft-google-oauth-flaws-can-be-abused-in-phishing-attacks/   
Published: 2021 12 09 16:21:47
Received: 2021 12 09 16:40:17
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: How cybersecurity and executive leaders communicate about ransomware - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96669-how-cybersecurity-and-executive-leaders-communicate-about-ransomware   
Published: 2021 12 09 15:58:00
Received: 2021 12 09 16:40:15
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: How cybersecurity and executive leaders communicate about ransomware - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96669-how-cybersecurity-and-executive-leaders-communicate-about-ransomware   
Published: 2021 12 09 15:58:00
Received: 2021 12 09 16:40:15
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: 2021 breaks the record for security vulnerabilities - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96668-2021-breaks-the-record-for-security-vulnerabilities   
Published: 2021 12 09 16:00:00
Received: 2021 12 09 16:26:29
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: 2021 breaks the record for security vulnerabilities - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96668-2021-breaks-the-record-for-security-vulnerabilities   
Published: 2021 12 09 16:00:00
Received: 2021 12 09 16:26:29
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: iOS 15 Now Installed On Nearly 60% Of Devices, Exactly 80 Days After Launch - published over 2 years ago.
Content:
https://www.macrumors.com/2021/12/09/ios-15-adoption-80-days-after-launch/   
Published: 2021 12 09 16:00:03
Received: 2021 12 09 16:08:22
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iOS 15 Now Installed On Nearly 60% Of Devices, Exactly 80 Days After Launch - published over 2 years ago.
Content:
https://www.macrumors.com/2021/12/09/ios-15-adoption-80-days-after-launch/   
Published: 2021 12 09 16:00:03
Received: 2021 12 09 16:08:22
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: A simple walkthrough of x86_64 stack-based buffer overflow exploitation with gdb - published over 2 years ago.
Content: submitted by /u/oxagast [link] [comments]
https://www.reddit.com/r/netsec/comments/rcknng/a_simple_walkthrough_of_x86_64_stackbased_buffer/   
Published: 2021 12 09 16:00:35
Received: 2021 12 09 16:04:00
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: A simple walkthrough of x86_64 stack-based buffer overflow exploitation with gdb - published over 2 years ago.
Content: submitted by /u/oxagast [link] [comments]
https://www.reddit.com/r/netsec/comments/rcknng/a_simple_walkthrough_of_x86_64_stackbased_buffer/   
Published: 2021 12 09 16:00:35
Received: 2021 12 09 16:04:00
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: How MikroTik Routers Became a Cybercriminal Target - published over 2 years ago.
Content:
https://threatpost.com/mikrotik-routers-cybercriminal-target/176894/   
Published: 2021 12 09 15:56:16
Received: 2021 12 09 16:00:52
Feed: Threatpost – Mobile Security
Source: Threatpost
Category: News
Topic: Mobile Security
Article: How MikroTik Routers Became a Cybercriminal Target - published over 2 years ago.
Content:
https://threatpost.com/mikrotik-routers-cybercriminal-target/176894/   
Published: 2021 12 09 15:56:16
Received: 2021 12 09 16:00:52
Feed: Threatpost – Mobile Security
Source: Threatpost
Category: News
Topic: Mobile Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: ‘Cuba’ Ransomware Gang Hauls in $44M in Payouts - published over 2 years ago.
Content:
https://threatpost.com/cuba-ransomware-gang-44m-payouts/176790/   
Published: 2021 12 06 18:29:59
Received: 2021 12 09 16:00:47
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: ‘Cuba’ Ransomware Gang Hauls in $44M in Payouts - published over 2 years ago.
Content:
https://threatpost.com/cuba-ransomware-gang-44m-payouts/176790/   
Published: 2021 12 06 18:29:59
Received: 2021 12 09 16:00:47
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: How MikroTik Routers Became a Cybercriminal Target - published over 2 years ago.
Content:
https://threatpost.com/mikrotik-routers-cybercriminal-target/176894/   
Published: 2021 12 09 15:56:16
Received: 2021 12 09 16:00:47
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: How MikroTik Routers Became a Cybercriminal Target - published over 2 years ago.
Content:
https://threatpost.com/mikrotik-routers-cybercriminal-target/176894/   
Published: 2021 12 09 15:56:16
Received: 2021 12 09 16:00:47
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate

All Articles

Ordered by Date Received : Year: "2021" Month: "12" Day: "09" Hour: "16"
Page: 1 (of 0)

Total Articles in this collection: 13


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor