All Articles

Ordered by Date Received : Year: "2022" Month: "08" Day: "10" Hour: "15"
Page: 1 (of 0)

Total Articles in this collection: 16

Navigation Help at the bottom of the page
Article: Zero Trust & XDR: The New Architecture of Defense - published about 2 years ago.
Content:
https://www.darkreading.com/endpoint/zero-trust-xdr-the-new-architecture-of-defense   
Published: 2022 08 10 14:00:00
Received: 2022 08 10 15:51:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Zero Trust & XDR: The New Architecture of Defense - published about 2 years ago.
Content:
https://www.darkreading.com/endpoint/zero-trust-xdr-the-new-architecture-of-defense   
Published: 2022 08 10 14:00:00
Received: 2022 08 10 15:51:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Bugcrowd Taps Top Hackers for Live Hacking Event with Indeed at 2022 Black Hat Conference - published about 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/bugcrowd-taps-top-hackers-for-live-hacking-event-with-indeed-at-2022-black-hat-conference   
Published: 2022 08 10 15:23:42
Received: 2022 08 10 15:51:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Bugcrowd Taps Top Hackers for Live Hacking Event with Indeed at 2022 Black Hat Conference - published about 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/bugcrowd-taps-top-hackers-for-live-hacking-event-with-indeed-at-2022-black-hat-conference   
Published: 2022 08 10 15:23:42
Received: 2022 08 10 15:51:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: 9 security threats in the metaverse - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98142-9-security-threats-in-the-metaverse   
Published: 2022 08 10 15:15:00
Received: 2022 08 10 15:42:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: 9 security threats in the metaverse - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98142-9-security-threats-in-the-metaverse   
Published: 2022 08 10 15:15:00
Received: 2022 08 10 15:42:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: AMA: Cybersecurity Leadership Edition — Meg West - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98131-ama-cybersecurity-leadership-edition-meg-west   
Published: 2022 08 10 15:30:00
Received: 2022 08 10 15:42:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: AMA: Cybersecurity Leadership Edition — Meg West - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98131-ama-cybersecurity-leadership-edition-meg-west   
Published: 2022 08 10 15:30:00
Received: 2022 08 10 15:42:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Christine Whichard promoted to CISO at SmartBear - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98144-christine-whichard-promoted-to-ciso-at-smartbear   
Published: 2022 08 10 15:35:00
Received: 2022 08 10 15:42:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Christine Whichard promoted to CISO at SmartBear - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98144-christine-whichard-promoted-to-ciso-at-smartbear   
Published: 2022 08 10 15:35:00
Received: 2022 08 10 15:42:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: 9 security threats in the metaverse - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98142-9-security-threats-in-the-metaverse   
Published: 2022 08 10 15:15:00
Received: 2022 08 10 15:41:42
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: 9 security threats in the metaverse - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98142-9-security-threats-in-the-metaverse   
Published: 2022 08 10 15:15:00
Received: 2022 08 10 15:41:42
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: AMA: Cybersecurity Leadership Edition — Meg West - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98131-ama-cybersecurity-leadership-edition-meg-west   
Published: 2022 08 10 15:30:00
Received: 2022 08 10 15:41:42
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: AMA: Cybersecurity Leadership Edition — Meg West - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98131-ama-cybersecurity-leadership-edition-meg-west   
Published: 2022 08 10 15:30:00
Received: 2022 08 10 15:41:42
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Microsoft Patch Tuesday, August 2022 Edition - published about 2 years ago.
Content: Microsoft today released updates to fix a record 141 security vulnerabilities in its Windows operating systems and related software. Once again, Microsoft is patching a zero-day vulnerability in the Microsoft Support Diagnostics Tool (MSDT), a service built into Windows. Redmond also addressed multiple flaws in Exchange Server — including one that was disclo...
https://krebsonsecurity.com/2022/08/microsoft-patch-tuesday-august-2022-edition/   
Published: 2022 08 09 23:01:10
Received: 2022 08 10 15:29:01
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft Patch Tuesday, August 2022 Edition - published about 2 years ago.
Content: Microsoft today released updates to fix a record 141 security vulnerabilities in its Windows operating systems and related software. Once again, Microsoft is patching a zero-day vulnerability in the Microsoft Support Diagnostics Tool (MSDT), a service built into Windows. Redmond also addressed multiple flaws in Exchange Server — including one that was disclo...
https://krebsonsecurity.com/2022/08/microsoft-patch-tuesday-august-2022-edition/   
Published: 2022 08 09 23:01:10
Received: 2022 08 10 15:29:01
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: The Security Pros and Cons of Using Email Aliases - published about 2 years ago.
Content: One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a “+” character after the username portion of your email address — followed by a notation specific to the site you’re signing up at — lets you create an infinite number of unique email addresses tied to the same account. Alias...
https://krebsonsecurity.com/2022/08/the-security-pros-and-cons-of-using-email-aliases/   
Published: 2022 08 10 15:10:59
Received: 2022 08 10 15:29:01
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Article: The Security Pros and Cons of Using Email Aliases - published about 2 years ago.
Content: One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a “+” character after the username portion of your email address — followed by a notation specific to the site you’re signing up at — lets you create an infinite number of unique email addresses tied to the same account. Alias...
https://krebsonsecurity.com/2022/08/the-security-pros-and-cons-of-using-email-aliases/   
Published: 2022 08 10 15:10:59
Received: 2022 08 10 15:29:01
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: And Here They Come Again: DNS Reflection Attacks, (Wed, Aug 10th) - published about 2 years ago.
Content: I know I have written about this same attack before [see here]. But well, it just doesn't stop. There has been a continuous stream of these requests to our sensors ever since. Some of the currently preferred queries used:
https://isc.sans.edu/diary/rss/28928   
Published: 2022 08 10 14:32:25
Received: 2022 08 10 15:23:06
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: And Here They Come Again: DNS Reflection Attacks, (Wed, Aug 10th) - published about 2 years ago.
Content: I know I have written about this same attack before [see here]. But well, it just doesn't stop. There has been a continuous stream of these requests to our sensors ever since. Some of the currently preferred queries used:
https://isc.sans.edu/diary/rss/28928   
Published: 2022 08 10 14:32:25
Received: 2022 08 10 15:23:06
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: CISA Releases Cybersecurity Toolkit to Protect U.S. Elections - published about 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/08/10/cisa-releases-cybersecurity-toolkit-protect-us-elections   
Published: 2022 08 10 14:29:31
Received: 2022 08 10 15:22:26
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: CISA Releases Cybersecurity Toolkit to Protect U.S. Elections - published about 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/08/10/cisa-releases-cybersecurity-toolkit-protect-us-elections   
Published: 2022 08 10 14:29:31
Received: 2022 08 10 15:22:26
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Microsoft urges Windows users to run patch for DogWalk zero-day exploit - published about 2 years ago.
Content:
https://www.computerworld.com/article/3669434/microsoft-urges-windows-users-to-run-patch-for-dogwalk-zero-day-exploit.html#tk.rss_all   
Published: 2022 08 10 14:37:00
Received: 2022 08 10 15:13:52
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft urges Windows users to run patch for DogWalk zero-day exploit - published about 2 years ago.
Content:
https://www.computerworld.com/article/3669434/microsoft-urges-windows-users-to-run-patch-for-dogwalk-zero-day-exploit.html#tk.rss_all   
Published: 2022 08 10 14:37:00
Received: 2022 08 10 15:13:52
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat Landscape - published about 2 years ago.
Content:
https://www.darkreading.com/cloud/deepfence-threatmapper-1-4-unveils-open-source-threat-graph-to-visualize-cloud-native-threat-landscape   
Published: 2022 08 10 14:46:53
Received: 2022 08 10 15:12:40
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat Landscape - published about 2 years ago.
Content:
https://www.darkreading.com/cloud/deepfence-threatmapper-1-4-unveils-open-source-threat-graph-to-visualize-cloud-native-threat-landscape   
Published: 2022 08 10 14:46:53
Received: 2022 08 10 15:12:40
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Dark Utilities C2 as a service tool leverages IPFS, targets several operating systems - published about 2 years ago.
Content:
https://www.techrepublic.com/article/dark-utilities-c2-as-a-service-tool-leverages-ipfs-targets-several-operating-systems/   
Published: 2022 08 10 14:53:46
Received: 2022 08 10 15:11:47
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Dark Utilities C2 as a service tool leverages IPFS, targets several operating systems - published about 2 years ago.
Content:
https://www.techrepublic.com/article/dark-utilities-c2-as-a-service-tool-leverages-ipfs-targets-several-operating-systems/   
Published: 2022 08 10 14:53:46
Received: 2022 08 10 15:11:47
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Cryptominer detection: a Machine Learning approach - published about 2 years ago.
Content: submitted by /u/MiguelHzBz [link] [comments]
https://www.reddit.com/r/netsec/comments/wkztxp/cryptominer_detection_a_machine_learning_approach/   
Published: 2022 08 10 15:07:35
Received: 2022 08 10 15:10:41
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Cryptominer detection: a Machine Learning approach - published about 2 years ago.
Content: submitted by /u/MiguelHzBz [link] [comments]
https://www.reddit.com/r/netsec/comments/wkztxp/cryptominer_detection_a_machine_learning_approach/   
Published: 2022 08 10 15:07:35
Received: 2022 08 10 15:10:41
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Executive protection strategies secure election observation in Lebanon - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98140-executive-protection-strategies-secure-election-observation-in-lebanon   
Published: 2022 08 10 13:51:29
Received: 2022 08 10 15:02:57
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Executive protection strategies secure election observation in Lebanon - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98140-executive-protection-strategies-secure-election-observation-in-lebanon   
Published: 2022 08 10 13:51:29
Received: 2022 08 10 15:02:57
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security

All Articles

Ordered by Date Received : Year: "2022" Month: "08" Day: "10" Hour: "15"
Page: 1 (of 0)

Total Articles in this collection: 16


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor