All Articles

Ordered by Date Received : Year: "2023" Month: "01" Day: "03" Hour: "19"
Page: 1 (of 0)

Total Articles in this collection: 14

Navigation Help at the bottom of the page
Article: PyTorch suffers supply chain attack via dependency confusion - published almost 2 years ago.
Content:
https://www.csoonline.com/article/3684468/pytorch-suffers-supply-chain-attack-via-dependency-confusion.html#tk.rss_all   
Published: 2023 01 03 18:29:00
Received: 2023 01 03 19:45:07
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: PyTorch suffers supply chain attack via dependency confusion - published almost 2 years ago.
Content:
https://www.csoonline.com/article/3684468/pytorch-suffers-supply-chain-attack-via-dependency-confusion.html#tk.rss_all   
Published: 2023 01 03 18:29:00
Received: 2023 01 03 19:45:07
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Holiday Spirit? LockBit Gives Children's Hospital Free Decryptor - published almost 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/holiday-spirit-lockbit-children-s-hospital-free-decryptor   
Published: 2023 01 03 18:58:00
Received: 2023 01 03 19:24:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Holiday Spirit? LockBit Gives Children's Hospital Free Decryptor - published almost 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/holiday-spirit-lockbit-children-s-hospital-free-decryptor   
Published: 2023 01 03 18:58:00
Received: 2023 01 03 19:24:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Breaking RSA with a Quantum Computer - published almost 2 years ago.
Content: A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong. We have long known from Shor’s algorithm that factoring with a quantum computer is easy. But it takes a big quantum computer, on th...
https://www.schneier.com/blog/archives/2023/01/breaking-rsa-with-a-quantum-computer.html   
Published: 2023 01 03 17:38:12
Received: 2023 01 03 19:22:29
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Breaking RSA with a Quantum Computer - published almost 2 years ago.
Content: A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong. We have long known from Shor’s algorithm that factoring with a quantum computer is easy. But it takes a big quantum computer, on th...
https://www.schneier.com/blog/archives/2023/01/breaking-rsa-with-a-quantum-computer.html   
Published: 2023 01 03 17:38:12
Received: 2023 01 03 19:22:29
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: CVE-2022-42471 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-42471   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-42471 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-42471   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-41336 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41336   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-41336 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41336   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-39947 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39947   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-39947 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39947   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2022-35845 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35845   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:49
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-35845 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35845   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:49
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-32824 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32824   
Published: 2023 01 03 18:15:12
Received: 2023 01 03 19:14:45
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-32824 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32824   
Published: 2023 01 03 18:15:12
Received: 2023 01 03 19:14:45
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2021-32821 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32821   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:45
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-32821 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32821   
Published: 2023 01 03 17:15:10
Received: 2023 01 03 19:14:45
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Its about time: OS Fingerprinting using NTP, (Tue, Jan 3rd) - published almost 2 years ago.
Content: Most current operating systems, including many small systems like IoT devices, use some form of NTP to sync time. NTP is lightweight and reasonably accurate in most use cases to synchronize time across the internet with millisecond accuracy [1]. Some protocols, like PTP, are more accurate but are designed for local networks and may require special hardware o...
https://isc.sans.edu/diary/rss/29394   
Published: 2023 01 03 17:30:07
Received: 2023 01 03 19:14:21
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: Its about time: OS Fingerprinting using NTP, (Tue, Jan 3rd) - published almost 2 years ago.
Content: Most current operating systems, including many small systems like IoT devices, use some form of NTP to sync time. NTP is lightweight and reasonably accurate in most use cases to synchronize time across the internet with millisecond accuracy [1]. Some protocols, like PTP, are more accurate but are designed for local networks and may require special hardware o...
https://isc.sans.edu/diary/rss/29394   
Published: 2023 01 03 17:30:07
Received: 2023 01 03 19:14:21
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: Next-Generation Qi2 Wireless Charging Standard Embraces Apple's MagSafe for Universal Compatibility - published almost 2 years ago.
Content:
https://www.macrumors.com/2023/01/03/qi2-wireless-charging-standard-gains-magsafe/   
Published: 2023 01 03 18:53:58
Received: 2023 01 03 19:04:37
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Next-Generation Qi2 Wireless Charging Standard Embraces Apple's MagSafe for Universal Compatibility - published almost 2 years ago.
Content:
https://www.macrumors.com/2023/01/03/qi2-wireless-charging-standard-gains-magsafe/   
Published: 2023 01 03 18:53:58
Received: 2023 01 03 19:04:37
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: WordPress Sites Under Attack from Newly Found Linux Trojan - published almost 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/wordpress-under-attack-from-new-linux-backdoor-malware   
Published: 2023 01 03 19:03:00
Received: 2023 01 03 19:04:09
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: WordPress Sites Under Attack from Newly Found Linux Trojan - published almost 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/wordpress-under-attack-from-new-linux-backdoor-malware   
Published: 2023 01 03 19:03:00
Received: 2023 01 03 19:04:09
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Breaking RSA with a Quantum Computer - published almost 2 years ago.
Content: A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong. We have long known from Shor’s algorithm that factoring with a quantum computer is easy. But it takes a big quantum computer, on th...
https://www.schneier.com/blog/archives/2023/01/breaking-rsa-with-a-quantum-computer.html   
Published: 2023 01 03 17:38:12
Received: 2023 01 03 19:02:00
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Breaking RSA with a Quantum Computer - published almost 2 years ago.
Content: A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong. We have long known from Shor’s algorithm that factoring with a quantum computer is easy. But it takes a big quantum computer, on th...
https://www.schneier.com/blog/archives/2023/01/breaking-rsa-with-a-quantum-computer.html   
Published: 2023 01 03 17:38:12
Received: 2023 01 03 19:02:00
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Nuclear Pond: Scanning for Vulnerabilities at Scale for Less Than a Cup of Coffee - published almost 2 years ago.
Content: submitted by /u/crustysecurity [link] [comments]
https://www.reddit.com/r/netsec/comments/102foey/nuclear_pond_scanning_for_vulnerabilities_at/   
Published: 2023 01 03 18:38:16
Received: 2023 01 03 19:01:56
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Nuclear Pond: Scanning for Vulnerabilities at Scale for Less Than a Cup of Coffee - published almost 2 years ago.
Content: submitted by /u/crustysecurity [link] [comments]
https://www.reddit.com/r/netsec/comments/102foey/nuclear_pond_scanning_for_vulnerabilities_at/   
Published: 2023 01 03 18:38:16
Received: 2023 01 03 19:01:56
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained

All Articles

Ordered by Date Received : Year: "2023" Month: "01" Day: "03" Hour: "19"
Page: 1 (of 0)

Total Articles in this collection: 14


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor