All Articles

Ordered by Date Received : Year: "2022" Month: "11" Day: "02" Hour: "21"
Page: 1 (of 0)

Total Articles in this collection: 15

Navigation Help at the bottom of the page
Article: Apple to Continue Using Qualcomm Modem Chips for 2023 iPhone 15 Models - published over 1 year ago.
Content:
https://www.macrumors.com/2022/11/02/apple-qualcomm-modem-chips-iphone-15/   
Published: 2022 11 02 21:14:19
Received: 2022 11 02 21:45:36
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple to Continue Using Qualcomm Modem Chips for 2023 iPhone 15 Models - published over 1 year ago.
Content:
https://www.macrumors.com/2022/11/02/apple-qualcomm-modem-chips-iphone-15/   
Published: 2022 11 02 21:14:19
Received: 2022 11 02 21:45:36
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple to Continue Use Qualcomm Modem Chips for 2023 iPhone 15 Models - published over 1 year ago.
Content:
https://www.macrumors.com/2022/11/02/apple-qualcomm-modem-chips-iphone-15/   
Published: 2022 11 02 21:14:19
Received: 2022 11 02 21:25:11
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple to Continue Use Qualcomm Modem Chips for 2023 iPhone 15 Models - published over 1 year ago.
Content:
https://www.macrumors.com/2022/11/02/apple-qualcomm-modem-chips-iphone-15/   
Published: 2022 11 02 21:14:19
Received: 2022 11 02 21:25:11
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Steampipe: Getting Started. Using AWS, Github and Docker plugins - published over 1 year ago.
Content: submitted by /u/stevecio [link] [comments]
https://www.reddit.com/r/netsec/comments/ykhlgv/steampipe_getting_started_using_aws_github_and/   
Published: 2022 11 02 21:11:53
Received: 2022 11 02 21:22:36
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Steampipe: Getting Started. Using AWS, Github and Docker plugins - published over 1 year ago.
Content: submitted by /u/stevecio [link] [comments]
https://www.reddit.com/r/netsec/comments/ykhlgv/steampipe_getting_started_using_aws_github_and/   
Published: 2022 11 02 21:11:53
Received: 2022 11 02 21:22:36
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Top 10 Cybersecurity Writing Mistakes - published over 4 years ago.
Content: Want to strengthen your writing in under an hour? Watch the video I recorded to help you avoid the top 10 writing mistakes I've encountered when working as a cybersecurity professional. The mistakes you'll see in this video—and the practical tips for avoiding them—span the key aspects of technical writing: structure, look, words, tone, and informat...
https://zeltser.com/cybersecurity-writing-mistakes/   
Published: 2019 10 05 01:00:36
Received: 2022 11 02 21:04:34
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: Top 10 Cybersecurity Writing Mistakes - published over 4 years ago.
Content: Want to strengthen your writing in under an hour? Watch the video I recorded to help you avoid the top 10 writing mistakes I've encountered when working as a cybersecurity professional. The mistakes you'll see in this video—and the practical tips for avoiding them—span the key aspects of technical writing: structure, look, words, tone, and informat...
https://zeltser.com/cybersecurity-writing-mistakes/   
Published: 2019 10 05 01:00:36
Received: 2022 11 02 21:04:34
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: What’s It Like for a New CISO? - published about 4 years ago.
Content: As of this writing, I've spent six months in the role of Chief Information Security Officer (CISO) at Axonius, a rapidly growing technology company. Though I've held a variety of leadership positions over the years, working in this capacity and setting is new for me. I've been capturing aspects of my journey in talks and articles so that others might learn ...
https://zeltser.com/new-ciso-impressions/   
Published: 2020 02 13 16:38:59
Received: 2022 11 02 21:04:34
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: What’s It Like for a New CISO? - published about 4 years ago.
Content: As of this writing, I've spent six months in the role of Chief Information Security Officer (CISO) at Axonius, a rapidly growing technology company. Though I've held a variety of leadership positions over the years, working in this capacity and setting is new for me. I've been capturing aspects of my journey in talks and articles so that others might learn ...
https://zeltser.com/new-ciso-impressions/   
Published: 2020 02 13 16:38:59
Received: 2022 11 02 21:04:34
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: How to Set Up a SpiderFoot Server for OSINT Research - published about 4 years ago.
Content: SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about IPs, domains, e-mail addresses, and other research targets from many data sources, including services such as Shodan and Have I Been Pwned. Steve Micallef, the tool's author, offers a free, open source version of SpiderFoot. His team also provides an affordable...
https://zeltser.com/spiderfoot-server-setup/   
Published: 2020 04 17 01:10:28
Received: 2022 11 02 21:04:34
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: How to Set Up a SpiderFoot Server for OSINT Research - published about 4 years ago.
Content: SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about IPs, domains, e-mail addresses, and other research targets from many data sources, including services such as Shodan and Have I Been Pwned. Steve Micallef, the tool's author, offers a free, open source version of SpiderFoot. His team also provides an affordable...
https://zeltser.com/spiderfoot-server-setup/   
Published: 2020 04 17 01:10:28
Received: 2022 11 02 21:04:34
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Learning Malware Analysis and Cybersecurity Writing Online - published about 4 years ago.
Content: You can now take my malware analysis and cybersecurity writing courses online in two formats at SANS Institute, depending on how you prefer to learn: OnDemand: Self-paced, recorded training with four months of access to course materials and labs. You'll like this if you prefer to start, stop, or speed up training any time they want or who need the flexib...
https://zeltser.com/malware-analysis-and-writing-online-training/   
Published: 2020 04 20 03:31:40
Received: 2022 11 02 21:04:34
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: Learning Malware Analysis and Cybersecurity Writing Online - published about 4 years ago.
Content: You can now take my malware analysis and cybersecurity writing courses online in two formats at SANS Institute, depending on how you prefer to learn: OnDemand: Self-paced, recorded training with four months of access to course materials and labs. You'll like this if you prefer to start, stop, or speed up training any time they want or who need the flexib...
https://zeltser.com/malware-analysis-and-writing-online-training/   
Published: 2020 04 20 03:31:40
Received: 2022 11 02 21:04:34
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: How You Can Write Better Threat Reports - published almost 4 years ago.
Content: Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack groups, is challenging for many reasons. How should you decide what details to include? How can you persuade the readers that your analysis is sound? How might you address the needs of multiple audiences? I'm happy to share what I've learned over the years abo...
https://zeltser.com/write-better-threat-reports/   
Published: 2020 07 01 13:42:51
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: How You Can Write Better Threat Reports - published almost 4 years ago.
Content: Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack groups, is challenging for many reasons. How should you decide what details to include? How can you persuade the readers that your analysis is sound? How might you address the needs of multiple audiences? I'm happy to share what I've learned over the years abo...
https://zeltser.com/write-better-threat-reports/   
Published: 2020 07 01 13:42:51
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Unemployment Insurance Fraud and Identity Theft: Up Close and Personal - published almost 4 years ago.
Content: In June 2020, the Federal Trade Commission (FTC) warned that "imposters are filing claims for unemployment benefits [in the US], using the names and personal information of people who have not filed claims." How do such scams look from the victim's perspective, and what can you do if you're affected? As a victim of this scheme, I'd like to share my experien...
https://zeltser.com/unemployment-fraud-and-identity-theft/   
Published: 2020 07 02 03:24:04
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: Unemployment Insurance Fraud and Identity Theft: Up Close and Personal - published almost 4 years ago.
Content: In June 2020, the Federal Trade Commission (FTC) warned that "imposters are filing claims for unemployment benefits [in the US], using the names and personal information of people who have not filed claims." How do such scams look from the victim's perspective, and what can you do if you're affected? As a victim of this scheme, I'd like to share my experien...
https://zeltser.com/unemployment-fraud-and-identity-theft/   
Published: 2020 07 02 03:24:04
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Version 7 of the REMnux Distro Is Now Available - published almost 4 years ago.
Content: 10 years after the initial release of REMnux, I'm thrilled to announce that REMnux version 7 is now available. This Linux distribution for malware analysis includes hundreds of new and classic tools for examining executables, documents, scripts, and other forms of malicious code. To start using REMnux v7, you can: Download REMnux as a virtual applianc...
https://zeltser.com/remnux-v7-release/   
Published: 2020 07 22 13:51:50
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: Version 7 of the REMnux Distro Is Now Available - published almost 4 years ago.
Content: 10 years after the initial release of REMnux, I'm thrilled to announce that REMnux version 7 is now available. This Linux distribution for malware analysis includes hundreds of new and classic tools for examining executables, documents, scripts, and other forms of malicious code. To start using REMnux v7, you can: Download REMnux as a virtual applianc...
https://zeltser.com/remnux-v7-release/   
Published: 2020 07 22 13:51:50
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: REMnux Tools List for Malware Analysis - published over 3 years ago.
Content: REMnux® offers a curated collection of free tools for reverse-engineering or otherwise analyzing malicious software. How to find the right tool for the job, given how many useful utilities come as part of the distro? To guide you through the process of examining malware, REMnux documentation lists the installed tools by category. Each grouping, which you...
https://zeltser.com/remnux-tools-list/   
Published: 2020 10 13 16:14:40
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: REMnux Tools List for Malware Analysis - published over 3 years ago.
Content: REMnux® offers a curated collection of free tools for reverse-engineering or otherwise analyzing malicious software. How to find the right tool for the job, given how many useful utilities come as part of the distro? To guide you through the process of examining malware, REMnux documentation lists the installed tools by category. Each grouping, which you...
https://zeltser.com/remnux-tools-list/   
Published: 2020 10 13 16:14:40
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: How You Can Start Learning Malware Analysis - published over 3 years ago.
Content: Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. You can get into this field by building upon your existing skills in any of these disciplines. As someone who's helped thousands of security professionals learn how to analyze malware at SANS Institute,...
https://zeltser.com/start-learning-malware-analysis/   
Published: 2021 01 06 16:09:04
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: How You Can Start Learning Malware Analysis - published over 3 years ago.
Content: Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. You can get into this field by building upon your existing skills in any of these disciplines. As someone who's helped thousands of security professionals learn how to analyze malware at SANS Institute,...
https://zeltser.com/start-learning-malware-analysis/   
Published: 2021 01 06 16:09:04
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: How to Ask Questions to Succeed with Security Projects - published over 2 years ago.
Content: No matter the years of experience in cybersecurity, security professionals are often in situations where crucial details are missing. Yet, we often hesitate to ask questions because we don't want to appear ignorant or don't know what to ask. I captured my perspective on asking questions in a constructive way in a three-post series. Read the posts to lear...
https://zeltser.com/how-to-ask-questions-to-succeed-with-security-projects/   
Published: 2021 10 14 14:53:00
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: How to Ask Questions to Succeed with Security Projects - published over 2 years ago.
Content: No matter the years of experience in cybersecurity, security professionals are often in situations where crucial details are missing. Yet, we often hesitate to ask questions because we don't want to appear ignorant or don't know what to ask. I captured my perspective on asking questions in a constructive way in a three-post series. Read the posts to lear...
https://zeltser.com/how-to-ask-questions-to-succeed-with-security-projects/   
Published: 2021 10 14 14:53:00
Received: 2022 11 02 21:04:33
Feed: Lenny Zeltser
Source: Lenny Zeltser
Category: Cyber Security
Topic: Cyber Security
Article: US Treasury thwarts DDoS attack from Russian Killnet group - published over 1 year ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/11/02/killnet_us_treasury_ddos/   
Published: 2022 11 02 20:45:13
Received: 2022 11 02 21:04:19
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: US Treasury thwarts DDoS attack from Russian Killnet group - published over 1 year ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/11/02/killnet_us_treasury_ddos/   
Published: 2022 11 02 20:45:13
Received: 2022 11 02 21:04:19
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis

All Articles

Ordered by Date Received : Year: "2022" Month: "11" Day: "02" Hour: "21"
Page: 1 (of 0)

Total Articles in this collection: 15


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor