All Articles

Ordered by Date Received : Year: "2022" Month: "08" Day: "11" Hour: "18"
Page: 1 (of 0)

Total Articles in this collection: 22

Navigation Help at the bottom of the page
Article: Sonatype spots another PyPI package behaving badly - published about 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/08/11/sonatype/   
Published: 2022 08 11 18:30:13
Received: 2022 08 11 18:50:29
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Sonatype spots another PyPI package behaving badly - published about 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/08/11/sonatype/   
Published: 2022 08 11 18:30:13
Received: 2022 08 11 18:50:29
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: 85% of Android users are concerned about privacy - published about 2 years ago.
Content:
https://www.techrepublic.com/article/85-of-android-users-are-concerned-about-privacy/   
Published: 2022 08 11 18:26:43
Received: 2022 08 11 18:50:28
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: 85% of Android users are concerned about privacy - published about 2 years ago.
Content:
https://www.techrepublic.com/article/85-of-android-users-are-concerned-about-privacy/   
Published: 2022 08 11 18:26:43
Received: 2022 08 11 18:50:28
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Sonatype spots another PyPI package behaving badly - published about 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/08/11/sonatype/   
Published: 2022 08 11 18:30:13
Received: 2022 08 11 18:41:35
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Sonatype spots another PyPI package behaving badly - published about 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/08/11/sonatype/   
Published: 2022 08 11 18:30:13
Received: 2022 08 11 18:41:35
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Cyberattack on NHS IT provider confirmed as ransomware - published about 2 years ago.
Content:
https://www.csoonline.com/article/3669871/cyberattack-on-nhs-it-provider-confirmed-as-ransomware.html#tk.rss_all   
Published: 2022 08 11 17:36:00
Received: 2022 08 11 18:32:21
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Cyberattack on NHS IT provider confirmed as ransomware - published about 2 years ago.
Content:
https://www.csoonline.com/article/3669871/cyberattack-on-nhs-it-provider-confirmed-as-ransomware.html#tk.rss_all   
Published: 2022 08 11 17:36:00
Received: 2022 08 11 18:32:21
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Network mistakes, misconfigurations cost companies millions - published about 2 years ago.
Content:
https://www.csoonline.com/article/3670071/network-mistakes-misconfigurations-cost-companies-millions.html#tk.rss_all   
Published: 2022 08 11 17:58:00
Received: 2022 08 11 18:32:21
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Network mistakes, misconfigurations cost companies millions - published about 2 years ago.
Content:
https://www.csoonline.com/article/3670071/network-mistakes-misconfigurations-cost-companies-millions.html#tk.rss_all   
Published: 2022 08 11 17:58:00
Received: 2022 08 11 18:32:21
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Defend your network with Microsoft outside-in security services - published about 2 years ago.
Content:
https://www.techrepublic.com/article/defend-network-micosoft-security/   
Published: 2022 08 11 18:14:57
Received: 2022 08 11 18:30:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Defend your network with Microsoft outside-in security services - published about 2 years ago.
Content:
https://www.techrepublic.com/article/defend-network-micosoft-security/   
Published: 2022 08 11 18:14:57
Received: 2022 08 11 18:30:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2022-37452 (exim) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37452   
Published: 2022 08 07 18:15:08
Received: 2022 08 11 18:23:27
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-37452 (exim) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37452   
Published: 2022 08 07 18:15:08
Received: 2022 08 11 18:23:27
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2704 (simple_e-learning_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2704   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2704 (simple_e-learning_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2704   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2022-2703 (gym_management_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2703   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2703 (gym_management_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2703   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-2702 (company_website/cms) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2702   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2702 (company_website/cms) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2702   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2700 (gym_management_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2700   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2700 (gym_management_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2700   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: CVE-2022-2698 (simple_e-learning_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2698   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2698 (simple_e-learning_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2698   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2022-2697 (simple_e-learning_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2697   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2697 (simple_e-learning_system) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2697   
Published: 2022 08 08 13:15:08
Received: 2022 08 11 18:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: Conti Cybercrime Cartel Using 'BazarCall' Phishing Attacks as Initial Attack Vector - published about 2 years ago.
Content:
https://thehackernews.com/2022/08/conti-cybercrime-cartel-using-bazarcall.html   
Published: 2022 08 11 17:52:44
Received: 2022 08 11 18:21:46
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Conti Cybercrime Cartel Using 'BazarCall' Phishing Attacks as Initial Attack Vector - published about 2 years ago.
Content:
https://thehackernews.com/2022/08/conti-cybercrime-cartel-using-bazarcall.html   
Published: 2022 08 11 17:52:44
Received: 2022 08 11 18:21:46
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: The US Offers a $10M Bounty for Intel on Conti Ransomware Gang - published about 2 years ago.
Content:
https://www.wired.com/story/conti-group-ransomware-members-reward-target/   
Published: 2022 08 11 18:09:27
Received: 2022 08 11 18:21:33
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: The US Offers a $10M Bounty for Intel on Conti Ransomware Gang - published about 2 years ago.
Content:
https://www.wired.com/story/conti-group-ransomware-members-reward-target/   
Published: 2022 08 11 18:09:27
Received: 2022 08 11 18:21:33
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Ransomware potentially exposed 2,000 Ypsilanti-area utility customers’ bank information - published about 2 years ago.
Content:
https://www.databreaches.net/ransomware-potentially-exposed-2000-ypsilanti-area-utility-customers-bank-information/   
Published: 2022 08 11 18:08:28
Received: 2022 08 11 18:13:47
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Ransomware potentially exposed 2,000 Ypsilanti-area utility customers’ bank information - published about 2 years ago.
Content:
https://www.databreaches.net/ransomware-potentially-exposed-2000-ypsilanti-area-utility-customers-bank-information/   
Published: 2022 08 11 18:08:28
Received: 2022 08 11 18:13:47
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study – NCC Group Research - published about 2 years ago.
Content: submitted by /u/digicat [link] [comments]...
https://www.reddit.com/r/netsec/comments/wlww5x/detecting_dns_implants_old_kitten_new_tricks_a/   
Published: 2022 08 11 17:20:16
Received: 2022 08 11 18:10:50
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study – NCC Group Research - published about 2 years ago.
Content: submitted by /u/digicat [link] [comments]...
https://www.reddit.com/r/netsec/comments/wlww5x/detecting_dns_implants_old_kitten_new_tricks_a/   
Published: 2022 08 11 17:20:16
Received: 2022 08 11 18:10:50
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Hunting for Low and Slow Password Sprays Using Machine Learning (ML Deep Dive) - published about 2 years ago.
Content: submitted by /u/SCI_Rusher [link] [comments]...
https://www.reddit.com/r/netsec/comments/wlw011/hunting_for_low_and_slow_password_sprays_using/   
Published: 2022 08 11 16:42:42
Received: 2022 08 11 18:10:49
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Hunting for Low and Slow Password Sprays Using Machine Learning (ML Deep Dive) - published about 2 years ago.
Content: submitted by /u/SCI_Rusher [link] [comments]...
https://www.reddit.com/r/netsec/comments/wlw011/hunting_for_low_and_slow_password_sprays_using/   
Published: 2022 08 11 16:42:42
Received: 2022 08 11 18:10:49
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Conti Cybercrime Cartel Using 'BazarCall' Phishing Attacks as Initial Attack Vector - published about 2 years ago.
Content:
https://thehackernews.com/2022/08/conti-cybercrime-cartel-using-bazarcall.html   
Published: 2022 08 11 17:52:44
Received: 2022 08 11 18:09:22
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Conti Cybercrime Cartel Using 'BazarCall' Phishing Attacks as Initial Attack Vector - published about 2 years ago.
Content:
https://thehackernews.com/2022/08/conti-cybercrime-cartel-using-bazarcall.html   
Published: 2022 08 11 17:52:44
Received: 2022 08 11 18:09:22
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: The Security Pros and Cons of Using Email Aliases - published about 2 years ago.
Content: One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a “+” character after the username portion of your email address — followed by a notation specific to the site you’re signing up at — lets you create an infinite number of unique email addresses tied to the same account. Alias...
https://krebsonsecurity.com/2022/08/the-security-pros-and-cons-of-using-email-aliases/   
Published: 2022 08 10 15:10:59
Received: 2022 08 11 18:09:11
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Article: The Security Pros and Cons of Using Email Aliases - published about 2 years ago.
Content: One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a “+” character after the username portion of your email address — followed by a notation specific to the site you’re signing up at — lets you create an infinite number of unique email addresses tied to the same account. Alias...
https://krebsonsecurity.com/2022/08/the-security-pros-and-cons-of-using-email-aliases/   
Published: 2022 08 10 15:10:59
Received: 2022 08 11 18:09:11
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: It Might Be Our Data, But It’s Not Our Breach - published about 2 years ago.
Content: Image: Shutterstock. A cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on nearly 23 million Americans. The firm’s analysis of the data suggests it corresponds to current and former customers of AT&T. The telecommunication...
https://krebsonsecurity.com/2022/08/it-might-be-our-data-but-its-not-our-breach/   
Published: 2022 08 11 17:45:31
Received: 2022 08 11 18:09:11
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Article: It Might Be Our Data, But It’s Not Our Breach - published about 2 years ago.
Content: Image: Shutterstock. A cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on nearly 23 million Americans. The firm’s analysis of the data suggests it corresponds to current and former customers of AT&T. The telecommunication...
https://krebsonsecurity.com/2022/08/it-might-be-our-data-but-its-not-our-breach/   
Published: 2022 08 11 17:45:31
Received: 2022 08 11 18:09:11
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Photos: Black Hat USA 2022, part 2 - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/08/11/photos-black-hat-usa-2022-part-2/   
Published: 2022 08 11 17:00:39
Received: 2022 08 11 18:09:02
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Photos: Black Hat USA 2022, part 2 - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/08/11/photos-black-hat-usa-2022-part-2/   
Published: 2022 08 11 17:00:39
Received: 2022 08 11 18:09:02
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security

All Articles

Ordered by Date Received : Year: "2022" Month: "08" Day: "11" Hour: "18"
Page: 1 (of 0)

Total Articles in this collection: 22


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor