All Articles

Ordered by Date Received : Year: "2022" Month: "09" Day: "30" Hour: "14"
Page: 1 (of 0)

Total Articles in this collection: 17

Navigation Help at the bottom of the page
Article: More Signs of Low iPhone 14 Demand Emerge Across Resale Market and Supply Chain - published about 2 years ago.
Content:
https://www.macrumors.com/2022/09/30/more-signs-of-low-iphone-14-demand-emerge/   
Published: 2022 09 30 14:35:39
Received: 2022 09 30 14:54:01
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: More Signs of Low iPhone 14 Demand Emerge Across Resale Market and Supply Chain - published about 2 years ago.
Content:
https://www.macrumors.com/2022/09/30/more-signs-of-low-iphone-14-demand-emerge/   
Published: 2022 09 30 14:35:39
Received: 2022 09 30 14:54:01
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Germany arrests hacker for stealing €4 million via phishing attacks - published about 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/germany-arrests-hacker-for-stealing-4-million-via-phishing-attacks/   
Published: 2022 09 30 14:31:26
Received: 2022 09 30 14:43:38
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Germany arrests hacker for stealing €4 million via phishing attacks - published about 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/germany-arrests-hacker-for-stealing-4-million-via-phishing-attacks/   
Published: 2022 09 30 14:31:26
Received: 2022 09 30 14:43:38
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Security Vulnerabilities in Covert CIA Websites - published about 2 years ago.
Content: Back in 2018, we learned that covert system of websites that the CIA used for communications was compromised by—at least—China and Iran, and that the blunder caused a bunch of arrests, imprisonments, and executions. We’re now learning that the CIA is still “using an irresponsibly secured system for asset communication.” Citizen Lab did the research: Using on...
https://www.schneier.com/blog/archives/2022/09/security-vulnerabilities-in-covert-cia-websites.html   
Published: 2022 09 30 14:19:16
Received: 2022 09 30 14:30:16
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Security Vulnerabilities in Covert CIA Websites - published about 2 years ago.
Content: Back in 2018, we learned that covert system of websites that the CIA used for communications was compromised by—at least—China and Iran, and that the blunder caused a bunch of arrests, imprisonments, and executions. We’re now learning that the CIA is still “using an irresponsibly secured system for asset communication.” Citizen Lab did the research: Using on...
https://www.schneier.com/blog/archives/2022/09/security-vulnerabilities-in-covert-cia-websites.html   
Published: 2022 09 30 14:19:16
Received: 2022 09 30 14:30:16
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Microsoft Includes Systemd Support to WSL With Windows 11 - published about 2 years ago.
Content:
https://latesthackingnews.com/2022/09/30/microsoft-includes-systemd-support-to-wsl-with-windows-11/   
Published: 2022 09 30 14:02:55
Received: 2022 09 30 14:30:09
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft Includes Systemd Support to WSL With Windows 11 - published about 2 years ago.
Content:
https://latesthackingnews.com/2022/09/30/microsoft-includes-systemd-support-to-wsl-with-windows-11/   
Published: 2022 09 30 14:02:55
Received: 2022 09 30 14:30:09
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: CVE-2022-38699 (armoury_crate_service) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38699   
Published: 2022 09 28 04:15:13
Received: 2022 09 30 14:23:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-38699 (armoury_crate_service) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38699   
Published: 2022 09 28 04:15:13
Received: 2022 09 30 14:23:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-37028 (isams) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37028   
Published: 2022 09 27 23:15:14
Received: 2022 09 30 14:23:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-37028 (isams) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37028   
Published: 2022 09 27 23:15:14
Received: 2022 09 30 14:23:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2022-3348 (tooljet) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3348   
Published: 2022 09 28 09:15:09
Received: 2022 09 30 14:23:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-3348 (tooljet) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3348   
Published: 2022 09 28 09:15:09
Received: 2022 09 30 14:23:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-30935 (b2evolution) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30935   
Published: 2022 09 28 11:15:09
Received: 2022 09 30 14:23:49
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-30935 (b2evolution) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30935   
Published: 2022 09 28 11:15:09
Received: 2022 09 30 14:23:49
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2022-22523 (cpy_car_park_server, uwp_3.0_monitoring_gateway_and_controller_firmware) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22523   
Published: 2022 09 28 14:15:10
Received: 2022 09 30 14:23:43
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22523 (cpy_car_park_server, uwp_3.0_monitoring_gateway_and_controller_firmware) - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22523   
Published: 2022 09 28 14:15:10
Received: 2022 09 30 14:23:43
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Exchange Server 0-Day Actively Exploited, (Fri, Sep 30th) - published about 2 years ago.
Content: In a blog post, Vietnamese security company GTSC noted that they saw evidence of a new "ProxyShell" like vulnerability being exploited in the wild. The evidence came from compromised Exchange servers GTSC observed when responding to incidents [1]. Later, Trend Micro confirmed that two vulnerabilities tracked by Trend Micro's zero-day initiative were involved...
https://isc.sans.edu/diary/rss/29106   
Published: 2022 09 30 13:43:24
Received: 2022 09 30 14:23:26
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: Exchange Server 0-Day Actively Exploited, (Fri, Sep 30th) - published about 2 years ago.
Content: In a blog post, Vietnamese security company GTSC noted that they saw evidence of a new "ProxyShell" like vulnerability being exploited in the wild. The evidence came from compromised Exchange servers GTSC observed when responding to incidents [1]. Later, Trend Micro confirmed that two vulnerabilities tracked by Trend Micro's zero-day initiative were involved...
https://isc.sans.edu/diary/rss/29106   
Published: 2022 09 30 13:43:24
Received: 2022 09 30 14:23:26
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: With the Software Supply Chain, You Can't Secure What You Don't Measure - published about 2 years ago.
Content:
https://www.darkreading.com/vulnerabilities-threats/with-the-software-supply-chain-you-can-t-secure-what-you-don-t-measure   
Published: 2022 09 30 14:00:00
Received: 2022 09 30 14:14:06
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: With the Software Supply Chain, You Can't Secure What You Don't Measure - published about 2 years ago.
Content:
https://www.darkreading.com/vulnerabilities-threats/with-the-software-supply-chain-you-can-t-secure-what-you-don-t-measure   
Published: 2022 09 30 14:00:00
Received: 2022 09 30 14:14:06
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Pmanager - Store And Retrieve Your Passwords From A Secure Offline Database. Check If Your Passwords Has Leaked Previously To Prevent Targeted Password Reuse Attacks - published about 2 years ago.
Content:
http://www.kitploit.com/2022/09/pmanager-store-and-retrieve-your.html   
Published: 2022 09 30 11:30:00
Received: 2022 09 30 14:13:44
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Pmanager - Store And Retrieve Your Passwords From A Secure Offline Database. Check If Your Passwords Has Leaked Previously To Prevent Targeted Password Reuse Attacks - published about 2 years ago.
Content:
http://www.kitploit.com/2022/09/pmanager-store-and-retrieve-your.html   
Published: 2022 09 30 11:30:00
Received: 2022 09 30 14:13:44
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Attackers use novel technique, malware to compromise hypervisors and virtual machines - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/09/30/compromise-hypervisors-virtual-machines/   
Published: 2022 09 30 13:13:03
Received: 2022 09 30 14:11:06
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Attackers use novel technique, malware to compromise hypervisors and virtual machines - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/09/30/compromise-hypervisors-virtual-machines/   
Published: 2022 09 30 13:13:03
Received: 2022 09 30 14:11:06
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: S3 Ep102: How to avoid a data breach [Audio + Transcript] - published about 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/09/29/s3-ep102-sorting-fact-from-fiction-in-hyped-up-cybersecurity-news-stories/   
Published: 2022 09 29 18:45:29
Received: 2022 09 30 14:10:56
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: S3 Ep102: How to avoid a data breach [Audio + Transcript] - published about 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/09/29/s3-ep102-sorting-fact-from-fiction-in-hyped-up-cybersecurity-news-stories/   
Published: 2022 09 29 18:45:29
Received: 2022 09 30 14:10:56
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: URGENT! Microsoft Exchange double zero-day – “like ProxyShell, only different” - published about 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/09/30/urgent-microsoft-exchange-double-zero-day-like-proxyshell-only-different/   
Published: 2022 09 30 13:25:11
Received: 2022 09 30 14:10:56
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: URGENT! Microsoft Exchange double zero-day – “like ProxyShell, only different” - published about 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/09/30/urgent-microsoft-exchange-double-zero-day-like-proxyshell-only-different/   
Published: 2022 09 30 13:25:11
Received: 2022 09 30 14:10:56
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: How to mitigate the threat of deepfakes to enterprise organizations - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98419-how-to-mitigate-the-threat-of-deepfakes-to-enterprise-organizations   
Published: 2022 09 30 14:00:00
Received: 2022 09 30 14:03:36
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: How to mitigate the threat of deepfakes to enterprise organizations - published about 2 years ago.
Content:
https://www.securitymagazine.com/articles/98419-how-to-mitigate-the-threat-of-deepfakes-to-enterprise-organizations   
Published: 2022 09 30 14:00:00
Received: 2022 09 30 14:03:36
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security

All Articles

Ordered by Date Received : Year: "2022" Month: "09" Day: "30" Hour: "14"
Page: 1 (of 0)

Total Articles in this collection: 17


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor