All Articles

Ordered by Date Received : Year: "2022" Month: "08" Day: "02" Hour: "16"
Page: 1 (of 0)

Total Articles in this collection: 23

Navigation Help at the bottom of the page
Article: Opsera’s GitCustodian detects vulnerable data in source code - published almost 2 years ago.
Content:
https://www.csoonline.com/article/3668571/opsera-gitcustodian-detects-vulnerable-data-in-source-code.html#tk.rss_all   
Published: 2022 08 02 14:05:00
Received: 2022 08 02 16:53:12
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Opsera’s GitCustodian detects vulnerable data in source code - published almost 2 years ago.
Content:
https://www.csoonline.com/article/3668571/opsera-gitcustodian-detects-vulnerable-data-in-source-code.html#tk.rss_all   
Published: 2022 08 02 14:05:00
Received: 2022 08 02 16:53:12
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Michael Neuman named CISO at Backstop - published almost 2 years ago.
Content:
https://www.securitymagazine.com/articles/98095-michael-neuman-named-ciso-at-backstop   
Published: 2022 08 02 15:27:33
Received: 2022 08 02 16:41:47
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Michael Neuman named CISO at Backstop - published almost 2 years ago.
Content:
https://www.securitymagazine.com/articles/98095-michael-neuman-named-ciso-at-backstop   
Published: 2022 08 02 15:27:33
Received: 2022 08 02 16:41:47
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Gartner: Compliance reporting needs new value proposition - published almost 2 years ago.
Content:
https://www.securitymagazine.com/articles/98094-gartner-compliance-reporting-needs-new-value-proposition   
Published: 2022 08 02 16:20:00
Received: 2022 08 02 16:41:47
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Gartner: Compliance reporting needs new value proposition - published almost 2 years ago.
Content:
https://www.securitymagazine.com/articles/98094-gartner-compliance-reporting-needs-new-value-proposition   
Published: 2022 08 02 16:20:00
Received: 2022 08 02 16:41:47
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: New 'ParseThru' Parameter Smuggling Vulnerability Affects Golang-based Applications - published almost 2 years ago.
Content:
https://thehackernews.com/2022/08/new-parsethru-parameter-smuggling.html   
Published: 2022 08 02 15:54:15
Received: 2022 08 02 16:28:22
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: New 'ParseThru' Parameter Smuggling Vulnerability Affects Golang-based Applications - published almost 2 years ago.
Content:
https://thehackernews.com/2022/08/new-parsethru-parameter-smuggling.html   
Published: 2022 08 02 15:54:15
Received: 2022 08 02 16:28:22
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike - published almost 2 years ago.
Content:
https://thehackernews.com/2022/08/chinese-hackers-using-new-manjusaka.html   
Published: 2022 08 02 16:03:45
Received: 2022 08 02 16:28:22
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike - published almost 2 years ago.
Content:
https://thehackernews.com/2022/08/chinese-hackers-using-new-manjusaka.html   
Published: 2022 08 02 16:03:45
Received: 2022 08 02 16:28:22
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-34618 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34618   
Published: 2022 08 02 15:15:08
Received: 2022 08 02 16:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-34618 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34618   
Published: 2022 08 02 15:15:08
Received: 2022 08 02 16:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2022-34613 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34613   
Published: 2022 08 02 15:15:08
Received: 2022 08 02 16:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-34613 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34613   
Published: 2022 08 02 15:15:08
Received: 2022 08 02 16:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-29154 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29154   
Published: 2022 08 02 15:15:08
Received: 2022 08 02 16:22:57
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-29154 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29154   
Published: 2022 08 02 15:15:08
Received: 2022 08 02 16:22:57
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2022-25867 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25867   
Published: 2022 08 02 14:15:10
Received: 2022 08 02 16:22:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-25867 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25867   
Published: 2022 08 02 14:15:10
Received: 2022 08 02 16:22:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2021-23385 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23385   
Published: 2022 08 02 14:15:10
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-23385 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23385   
Published: 2022 08 02 14:15:10
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-7795 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-7795   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-7795 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-7795   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: CVE-2020-28453 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28453   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28453 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28453   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2020-28451 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28451   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28451 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28451   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28437 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28437   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28437 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28437   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CVE-2020-28434 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28434   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28434 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28434   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2020-28433 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28433   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28433 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28433   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28425 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28425   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28425 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28425   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2020-28424 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28424   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28424 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28424   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2020-28423 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28423   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-28423 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28423   
Published: 2022 08 02 14:15:09
Received: 2022 08 02 16:22:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: New 'ParseThru' Parameter Smuggling Vulnerability Affects Golang-based Applications - published almost 2 years ago.
Content:
https://thehackernews.com/2022/08/new-parsethru-parameter-smuggling.html   
Published: 2022 08 02 15:54:15
Received: 2022 08 02 16:21:37
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: New 'ParseThru' Parameter Smuggling Vulnerability Affects Golang-based Applications - published almost 2 years ago.
Content:
https://thehackernews.com/2022/08/new-parsethru-parameter-smuggling.html   
Published: 2022 08 02 15:54:15
Received: 2022 08 02 16:21:37
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike - published almost 2 years ago.
Content:
https://thehackernews.com/2022/08/chinese-hackers-using-new-manjusaka.html   
Published: 2022 08 02 16:03:45
Received: 2022 08 02 16:21:37
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike - published almost 2 years ago.
Content:
https://thehackernews.com/2022/08/chinese-hackers-using-new-manjusaka.html   
Published: 2022 08 02 16:03:45
Received: 2022 08 02 16:21:37
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: The Best Back to School Apple Accessory Deals From AT&T, ZAGG, and More - published almost 2 years ago.
Content:
https://www.macrumors.com/2022/08/02/best-back-to-school-apple-deals/   
Published: 2022 08 02 15:54:11
Received: 2022 08 02 16:11:10
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: The Best Back to School Apple Accessory Deals From AT&T, ZAGG, and More - published almost 2 years ago.
Content:
https://www.macrumors.com/2022/08/02/best-back-to-school-apple-deals/   
Published: 2022 08 02 15:54:11
Received: 2022 08 02 16:11:10
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware - published almost 2 years ago.
Content:
https://www.darkreading.com/vulnerabilities-threats/virustotal-threat-actors-mimic-legitimate-apps-use-stolen-certs-to-spread-malware   
Published: 2022 08 02 16:00:00
Received: 2022 08 02 16:10:49
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware - published almost 2 years ago.
Content:
https://www.darkreading.com/vulnerabilities-threats/virustotal-threat-actors-mimic-legitimate-apps-use-stolen-certs-to-spread-malware   
Published: 2022 08 02 16:00:00
Received: 2022 08 02 16:10:49
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)

All Articles

Ordered by Date Received : Year: "2022" Month: "08" Day: "02" Hour: "16"
Page: 1 (of 0)

Total Articles in this collection: 23


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor