All Articles

Ordered by Date Received : Year: "2022" Month: "02" Day: "16" Hour: "13"
Page: 1 (of 0)

Total Articles in this collection: 11

Navigation Help at the bottom of the page
Article: Emotet Now Spreading Through Malicious Excel Files - published about 2 years ago.
Content:
https://threatpost.com/emotet-spreading-malicious-excel-files/178444/   
Published: 2022 02 16 13:39:33
Received: 2022 02 16 13:41:49
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Emotet Now Spreading Through Malicious Excel Files - published about 2 years ago.
Content:
https://threatpost.com/emotet-spreading-malicious-excel-files/178444/   
Published: 2022 02 16 13:39:33
Received: 2022 02 16 13:41:49
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Windows vs. Linux: Which environment is more beneficial for use in Virtual Private Server (VPS)? - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/02/16/windows-vs-linux-which-environment-is-more-beneficial-for-use-in-virtual-private-server-vps/   
Published: 2022 02 16 10:33:07
Received: 2022 02 16 13:26:25
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Windows vs. Linux: Which environment is more beneficial for use in Virtual Private Server (VPS)? - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/02/16/windows-vs-linux-which-environment-is-more-beneficial-for-use-in-virtual-private-server-vps/   
Published: 2022 02 16 10:33:07
Received: 2022 02 16 13:26:25
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: CVE-2022-23358 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23358   
Published: 2022 02 16 12:15:07
Received: 2022 02 16 13:22:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-23358 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23358   
Published: 2022 02 16 12:15:07
Received: 2022 02 16 13:22:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: CVE-2022-0559 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0559   
Published: 2022 02 16 11:15:07
Received: 2022 02 16 13:22:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-0559 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0559   
Published: 2022 02 16 11:15:07
Received: 2022 02 16 13:22:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-46388 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46388   
Published: 2022 02 16 11:15:07
Received: 2022 02 16 13:22:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-46388 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46388   
Published: 2022 02 16 11:15:07
Received: 2022 02 16 13:22:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Nominate someone for Security's 2022 Women in Security Program! - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/96872-nominate-someone-for-securitys-2022-women-in-security-program   
Published: 2022 02 16 13:00:00
Received: 2022 02 16 13:21:53
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Nominate someone for Security's 2022 Women in Security Program! - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/96872-nominate-someone-for-securitys-2022-women-in-security-program   
Published: 2022 02 16 13:00:00
Received: 2022 02 16 13:21:53
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Behavioral psychology training reduces cybersecurity risks - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/97093-behavioral-psychology-training-reduces-cybersecurity-risks   
Published: 2022 02 16 13:00:00
Received: 2022 02 16 13:21:53
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Behavioral psychology training reduces cybersecurity risks - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/97093-behavioral-psychology-training-reduces-cybersecurity-risks   
Published: 2022 02 16 13:00:00
Received: 2022 02 16 13:21:53
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Ukrainian defense ministry hit by DDoS during tense standoff with Russia - published about 2 years ago.
Content:
https://www.databreaches.net/ukrainian-defense-ministry-hit-by-ddos-during-tense-standoff-with-russia/   
Published: 2022 02 16 12:56:57
Received: 2022 02 16 13:09:19
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Ukrainian defense ministry hit by DDoS during tense standoff with Russia - published about 2 years ago.
Content:
https://www.databreaches.net/ukrainian-defense-ministry-hit-by-ddos-during-tense-standoff-with-russia/   
Published: 2022 02 16 12:56:57
Received: 2022 02 16 13:09:19
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Cyber Attacks On Schools: Who, What, Why and Now What? - published about 2 years ago.
Content:
https://www.databreaches.net/cyber-attacks-on-schools-who-what-why-and-now-what/   
Published: 2022 02 16 12:57:03
Received: 2022 02 16 13:09:19
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Cyber Attacks On Schools: Who, What, Why and Now What? - published about 2 years ago.
Content:
https://www.databreaches.net/cyber-attacks-on-schools-who-what-why-and-now-what/   
Published: 2022 02 16 12:57:03
Received: 2022 02 16 13:09:19
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Vendors are Fixing Security Flaws Faster - published about 2 years ago.
Content: Google’s Project Zero is reporting that software vendors are patching their code faster. tl;dr In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago. In addition to the average now being well below the 90-day deadline, we have al...
https://www.schneier.com/blog/archives/2022/02/vendors-are-fixing-security-flaws-faster.html   
Published: 2022 02 16 13:00:59
Received: 2022 02 16 13:06:16
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Vendors are Fixing Security Flaws Faster - published about 2 years ago.
Content: Google’s Project Zero is reporting that software vendors are patching their code faster. tl;dr In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago. In addition to the average now being well below the 90-day deadline, we have al...
https://www.schneier.com/blog/archives/2022/02/vendors-are-fixing-security-flaws-faster.html   
Published: 2022 02 16 13:00:59
Received: 2022 02 16 13:06:16
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Behavioral psychology training reduces cybersecurity risks - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/97093-behavioral-psychology-training-reduces-cybersecurity-risks   
Published: 2022 02 16 13:00:00
Received: 2022 02 16 13:01:35
Feed: Security Magazine – Reports
Source: Security Magazine
Category: Reports
Topic: Cyber Security
Article: Behavioral psychology training reduces cybersecurity risks - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/97093-behavioral-psychology-training-reduces-cybersecurity-risks   
Published: 2022 02 16 13:00:00
Received: 2022 02 16 13:01:35
Feed: Security Magazine – Reports
Source: Security Magazine
Category: Reports
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment

All Articles

Ordered by Date Received : Year: "2022" Month: "02" Day: "16" Hour: "13"
Page: 1 (of 0)

Total Articles in this collection: 11


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor