All Articles

Ordered by Date Received : Year: "2023" Month: "03" Day: "31" Hour: "16"
Page: 1 (of 0)

Total Articles in this collection: 42

Navigation Help at the bottom of the page
Article: Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically - published about 2 years ago.
Content: Posted by Jonathan Metzman, Dongge Liu and Oliver Chang, Google Open Source Security Team Recently, OSS-Fuzz—our community fuzzing service that regularly checks 700 critical open source projects for bugs—detected a serious vulnerability (CVE-2022-3008): a bug in the TinyGLTF project that could have allowed attackers to execute malicious code in projects us...
http://security.googleblog.com/2022/09/fuzzing-beyond-memory-corruption.html   
Published: 2022 09 08 16:00:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically - published about 2 years ago.
Content: Posted by Jonathan Metzman, Dongge Liu and Oliver Chang, Google Open Source Security Team Recently, OSS-Fuzz—our community fuzzing service that regularly checks 700 critical open source projects for bugs—detected a serious vulnerability (CVE-2022-3008): a bug in the TinyGLTF project that could have allowed attackers to execute malicious code in projects us...
http://security.googleblog.com/2022/09/fuzzing-beyond-memory-corruption.html   
Published: 2022 09 08 16:00:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Use-after-freedom: MiraclePtr - published about 2 years ago.
Content: Posted by Adrian Taylor, Bartek Nowierski and Kentaro Hara on behalf of the MiraclePtr team Memory safety bugs are the most numerous category of Chrome security issues and we’re continuing to investigate many solutions – both in C++ and in new programming languages. The most common type of memory safety bug is the “use-after-free”. We recently posted abou...
http://security.googleblog.com/2022/09/use-after-freedom-miracleptr.html   
Published: 2022 09 13 16:59:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Use-after-freedom: MiraclePtr - published about 2 years ago.
Content: Posted by Adrian Taylor, Bartek Nowierski and Kentaro Hara on behalf of the MiraclePtr team Memory safety bugs are the most numerous category of Chrome security issues and we’re continuing to investigate many solutions – both in C++ and in new programming languages. The most common type of memory safety bug is the “use-after-free”. We recently posted abou...
http://security.googleblog.com/2022/09/use-after-freedom-miracleptr.html   
Published: 2022 09 13 16:59:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security - published about 2 years ago.
Content: Dave Kleidermacher, Jesse Seed, Brandon Barbello, Sherif Hanna, Eugene Liderman, Android, Pixel, and Silicon Security Teams Every day, billions of people around the world trust Google products to enrich their lives and provide helpful features – across mobile devices, smart home devices, health and fitness devices, and more. We keep more people safe onlin...
http://security.googleblog.com/2022/10/google-pixel-7-and-pixel-7-pro-next.html   
Published: 2022 10 11 17:01:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security - published about 2 years ago.
Content: Dave Kleidermacher, Jesse Seed, Brandon Barbello, Sherif Hanna, Eugene Liderman, Android, Pixel, and Silicon Security Teams Every day, billions of people around the world trust Google products to enrich their lives and provide helpful features – across mobile devices, smart home devices, health and fitness devices, and more. We keep more people safe onlin...
http://security.googleblog.com/2022/10/google-pixel-7-and-pixel-7-pro-next.html   
Published: 2022 10 11 17:01:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Announcing GUAC, a great pairing with SLSA (and SBOM)! - published about 2 years ago.
Content: Posted by Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team Supply chain security is at the fore of the industry’s collective consciousness. We’ve recently seen a significant rise in software supply chain attacks, a Log4j vulnerability of catastrophic severity and breadth, and even an Executive Order on Cybersecurity. It is a...
http://security.googleblog.com/2022/10/announcing-guac-great-pairing-with-slsa.html   
Published: 2022 10 20 17:01:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Announcing GUAC, a great pairing with SLSA (and SBOM)! - published about 2 years ago.
Content: Posted by Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team Supply chain security is at the fore of the industry’s collective consciousness. We’ve recently seen a significant rise in software supply chain attacks, a Log4j vulnerability of catastrophic severity and breadth, and even an Executive Order on Cybersecurity. It is a...
http://security.googleblog.com/2022/10/announcing-guac-great-pairing-with-slsa.html   
Published: 2022 10 20 17:01:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Our Principles for IoT Security Labeling - published about 2 years ago.
Content: Posted by Dave Kleidermacher, Eugene Liderman, and Android and Made by Google security teams We believe that security and transparency are paramount pillars for electronic products connected to the Internet. Over the past year, we’ve been excited to see more focused activity across policymakers, industry partners, developers, and public interest advocates...
http://security.googleblog.com/2022/11/our-principles-for-iot-security-labeling.html   
Published: 2022 11 02 17:00:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Our Principles for IoT Security Labeling - published about 2 years ago.
Content: Posted by Dave Kleidermacher, Eugene Liderman, and Android and Made by Google security teams We believe that security and transparency are paramount pillars for electronic products connected to the Internet. Over the past year, we’ve been excited to see more focused activity across policymakers, industry partners, developers, and public interest advocates...
http://security.googleblog.com/2022/11/our-principles-for-iot-security-labeling.html   
Published: 2022 11 02 17:00:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Memory Safe Languages in Android 13 - published almost 2 years ago.
Content: Posted by Jeffrey Vander Stoep For more than a decade, memory safety vulnerabilities have consistently represented more than 65% of vulnerabilities across products, and across the industry. On Android, we’re now seeing something different - a significant drop in memory safety vulnerabilities and an associated drop in the severity of our vulnerabilities. ...
http://security.googleblog.com/2022/12/memory-safe-languages-in-android-13.html   
Published: 2022 12 01 16:58:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Memory Safe Languages in Android 13 - published almost 2 years ago.
Content: Posted by Jeffrey Vander Stoep For more than a decade, memory safety vulnerabilities have consistently represented more than 65% of vulnerabilities across products, and across the industry. On Android, we’re now seeing something different - a significant drop in memory safety vulnerabilities and an associated drop in the severity of our vulnerabilities. ...
http://security.googleblog.com/2022/12/memory-safe-languages-in-android-13.html   
Published: 2022 12 01 16:58:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Enhanced Protection - The strongest level of Safe Browsing protection Google Chrome has to offer - published almost 2 years ago.
Content: Posted by Benjamin Ackerman, Chrome Security and Jonathan Li, Safe Browsing As a follow-up to a previous blog post about How Hash-Based Safe Browsing Works in Google Chrome, we wanted to provide more details about Safe Browsing’s Enhanced Protection mode in Chrome. Specifically, how it came about, the protections that are offered and what it means for you...
http://security.googleblog.com/2022/12/enhanced-protection-strongest-level-of.html   
Published: 2022 12 05 18:03:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Enhanced Protection - The strongest level of Safe Browsing protection Google Chrome has to offer - published almost 2 years ago.
Content: Posted by Benjamin Ackerman, Chrome Security and Jonathan Li, Safe Browsing As a follow-up to a previous blog post about How Hash-Based Safe Browsing Works in Google Chrome, we wanted to provide more details about Safe Browsing’s Enhanced Protection mode in Chrome. Specifically, how it came about, the protections that are offered and what it means for you...
http://security.googleblog.com/2022/12/enhanced-protection-strongest-level-of.html   
Published: 2022 12 05 18:03:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trust in transparency: Private Compute Core - published almost 2 years ago.
Content: Posted by Dave Kleidermacher, Dianne Hackborn, and Eugenio Marchiori We care deeply about privacy. We also know that trust is built by transparency. This blog, and the technical paper reference within, is an example of that commitment: we describe an important new Android privacy infrastructure called Private Compute Core (PCC). Some of our most excitin...
http://security.googleblog.com/2022/12/trust-in-transparency-private-compute.html   
Published: 2022 12 08 16:59:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trust in transparency: Private Compute Core - published almost 2 years ago.
Content: Posted by Dave Kleidermacher, Dianne Hackborn, and Eugenio Marchiori We care deeply about privacy. We also know that trust is built by transparency. This blog, and the technical paper reference within, is an example of that commitment: we describe an important new Android privacy infrastructure called Private Compute Core (PCC). Some of our most excitin...
http://security.googleblog.com/2022/12/trust-in-transparency-private-compute.html   
Published: 2022 12 08 16:59:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Announcing OSV-Scanner: Vulnerability Scanner for Open Source - published almost 2 years ago.
Content: Posted by Rex Pan, software engineer, Google Open Source Security Team Today, we’re launching the OSV-Scanner, a free tool that gives open source developers easy access to vulnerability information relevant to their project. Last year, we undertook an effort to improve vulnerability triage for developers and consumers of open source software. This involve...
http://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html   
Published: 2022 12 13 18:00:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Announcing OSV-Scanner: Vulnerability Scanner for Open Source - published almost 2 years ago.
Content: Posted by Rex Pan, software engineer, Google Open Source Security Team Today, we’re launching the OSV-Scanner, a free tool that gives open source developers easy access to vulnerability information relevant to their project. Last year, we undertook an effort to improve vulnerability triage for developers and consumers of open source software. This involve...
http://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html   
Published: 2022 12 13 18:00:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Expanding the App Defense Alliance - published almost 2 years ago.
Content: Posted by Brooke Davis, Android Security and Privacy Team The App Defense Alliance launched in 2019 with a mission to protect Android users from bad apps through shared intelligence and coordinated detection between alliance partners. Earlier this year, the App Defense Alliance expanded to include new initiatives outside of malware detection and is now th...
http://security.googleblog.com/2022/12/app-defense-alliance-expansion.html   
Published: 2022 12 15 16:59:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Expanding the App Defense Alliance - published almost 2 years ago.
Content: Posted by Brooke Davis, Android Security and Privacy Team The App Defense Alliance launched in 2019 with a mission to protect Android users from bad apps through shared intelligence and coordinated detection between alliance partners. Earlier this year, the App Defense Alliance expanded to include new initiatives outside of malware detection and is now th...
http://security.googleblog.com/2022/12/app-defense-alliance-expansion.html   
Published: 2022 12 15 16:59:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Supporting the Use of Rust in the Chromium Project - published almost 2 years ago.
Content: Posted by Dana Jansens (she/her), Chrome Security Team We are pleased to announce that moving forward, the Chromium project is going to support the use of third-party Rust libraries from C++ in Chromium. To do so, we are now actively pursuing adding a production Rust toolchain to our build system. This will enable us to include Rust code in the Chrome bin...
http://security.googleblog.com/2023/01/supporting-use-of-rust-in-chromium.html   
Published: 2023 01 12 17:26:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Supporting the Use of Rust in the Chromium Project - published almost 2 years ago.
Content: Posted by Dana Jansens (she/her), Chrome Security Team We are pleased to announce that moving forward, the Chromium project is going to support the use of third-party Rust libraries from C++ in Chromium. To do so, we are now actively pursuing adding a production Rust toolchain to our build system. This will enable us to include Rust code in the Chrome bin...
http://security.googleblog.com/2023/01/supporting-use-of-rust-in-chromium.html   
Published: 2023 01 12 17:26:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Sustaining Digital Certificate Security - TrustCor Certificate Distrust - published almost 2 years ago.
Content: Posted by Chrome Root Program, Chrome Security Team Note: This post is a follow-up to discussions carried out on the Mozilla “Dev Security Policy” Web PKI public discussion forum Google Group in December 2022. Google Chrome communicated its distrust of TrustCor in the public forum on December 15, 2022. The Chrome Security Team prioritizes the security an...
http://security.googleblog.com/2023/01/sustaining-digital-certificate-security_13.html   
Published: 2023 01 13 17:29:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Sustaining Digital Certificate Security - TrustCor Certificate Distrust - published almost 2 years ago.
Content: Posted by Chrome Root Program, Chrome Security Team Note: This post is a follow-up to discussions carried out on the Mozilla “Dev Security Policy” Web PKI public discussion forum Google Group in December 2022. Google Chrome communicated its distrust of TrustCor in the public forum on December 15, 2022. The Chrome Security Team prioritizes the security an...
http://security.googleblog.com/2023/01/sustaining-digital-certificate-security_13.html   
Published: 2023 01 13 17:29:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Taking the next step: OSS-Fuzz in 2023 - published almost 2 years ago.
Content: Posted by Oliver Chang, OSS-Fuzz team Since launching in 2016, Google's free OSS-Fuzz code testing service has helped get over 8800 vulnerabilities and 28,000 bugs fixed across 850 projects. Today, we’re happy to announce an expansion of our OSS-Fuzz Rewards Program, plus new features in OSS-Fuzz and our involvement in supporting academic fuzzing research....
http://security.googleblog.com/2023/02/taking-next-step-oss-fuzz-in-2023.html   
Published: 2023 02 01 18:00:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Taking the next step: OSS-Fuzz in 2023 - published almost 2 years ago.
Content: Posted by Oliver Chang, OSS-Fuzz team Since launching in 2016, Google's free OSS-Fuzz code testing service has helped get over 8800 vulnerabilities and 28,000 bugs fixed across 850 projects. Today, we’re happy to announce an expansion of our OSS-Fuzz Rewards Program, plus new features in OSS-Fuzz and our involvement in supporting academic fuzzing research....
http://security.googleblog.com/2023/02/taking-next-step-oss-fuzz-in-2023.html   
Published: 2023 02 01 18:00:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: The US Government says companies should take more responsibility for cyberattacks. We agree. - published almost 2 years ago.
Content: Posted by Kent Walker, President, Global Affairs & Chief Legal Officer, Google & Alphabet and Royal Hansen, Vice President of Engineering for Privacy, Safety, and Security Should companies be responsible for cyberattacks? The U.S. government thinks so – and frankly, we agree. Jen Easterly and Eric Goldstein of the Cybersecurity and Infrastructur...
http://security.googleblog.com/2023/02/the-us-government-says-companies-should.html   
Published: 2023 02 13 17:01:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: The US Government says companies should take more responsibility for cyberattacks. We agree. - published almost 2 years ago.
Content: Posted by Kent Walker, President, Global Affairs & Chief Legal Officer, Google & Alphabet and Royal Hansen, Vice President of Engineering for Privacy, Safety, and Security Should companies be responsible for cyberattacks? The U.S. government thinks so – and frankly, we agree. Jen Easterly and Eric Goldstein of the Cybersecurity and Infrastructur...
http://security.googleblog.com/2023/02/the-us-government-says-companies-should.html   
Published: 2023 02 13 17:01:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Hardening Firmware Across the Android Ecosystem - published over 1 year ago.
Content: Posted by Roger Piqueras Jover, Ivan Lozano, Sudhi Herle, and Stephan Somogyi, Android Team A modern Android powered smartphone is a complex hardware device: Android OS runs on a multi-core CPU - also called an Application Processor (AP). And the AP is one of many such processors of a System On Chip (SoC). Other processors on the SoC perform various specia...
http://security.googleblog.com/2023/02/hardening-firmware-across-android.html   
Published: 2023 02 21 17:29:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Hardening Firmware Across the Android Ecosystem - published over 1 year ago.
Content: Posted by Roger Piqueras Jover, Ivan Lozano, Sudhi Herle, and Stephan Somogyi, Android Team A modern Android powered smartphone is a complex hardware device: Android OS runs on a multi-core CPU - also called an Application Processor (AP). And the AP is one of many such processors of a System On Chip (SoC). Other processors on the SoC perform various specia...
http://security.googleblog.com/2023/02/hardening-firmware-across-android.html   
Published: 2023 02 21 17:29:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Vulnerability Reward Program: 2022 Year in Review - published over 1 year ago.
Content: Posted by Sarah Jacobus, Vulnerability Rewards Team It has been another incredible year for the Vulnerability Reward Programs (VRPs) at Google! Working with security researchers throughout 2022, we have been able to identify and fix over 2,900 security issues and continue to make our products more secure for our users around the world. We are thrilled...
http://security.googleblog.com/2023/02/vulnerability-reward-program-2022-year.html   
Published: 2023 02 22 16:59:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Vulnerability Reward Program: 2022 Year in Review - published over 1 year ago.
Content: Posted by Sarah Jacobus, Vulnerability Rewards Team It has been another incredible year for the Vulnerability Reward Programs (VRPs) at Google! Working with security researchers throughout 2022, we have been able to identify and fix over 2,900 security issues and continue to make our products more secure for our users around the world. We are thrilled...
http://security.googleblog.com/2023/02/vulnerability-reward-program-2022-year.html   
Published: 2023 02 22 16:59:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Moving Connected Device Security Standards Forward - published over 1 year ago.
Content: Posted by Eugene Liderman, Director of Mobile Security Strategy, Google As Mobile World Congress approaches, we have the opportunity to have deep and meaningful conversations across the industry about the present and future of connected device security. Ahead of the event, we wanted to take a moment to recognize and share additional details on the notable...
http://security.googleblog.com/2023/02/moving-connected-device-security.html   
Published: 2023 02 23 16:59:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Moving Connected Device Security Standards Forward - published over 1 year ago.
Content: Posted by Eugene Liderman, Director of Mobile Security Strategy, Google As Mobile World Congress approaches, we have the opportunity to have deep and meaningful conversations across the industry about the present and future of connected device security. Ahead of the event, we wanted to take a moment to recognize and share additional details on the notable...
http://security.googleblog.com/2023/02/moving-connected-device-security.html   
Published: 2023 02 23 16:59:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: 8 ways to secure Chrome browser for Google Workspace users - published over 1 year ago.
Content: Posted by Kiran Nair, Product Manager, Chrome Browser 1. Bring Chrome under Cloud Management Your journey towards keeping your Google Workspace users and data safe, starts with bringing your Chrome browsers under Cloud Management at no additional cost. Chrome Browser Cloud Management is a single destination for applying Chrome Browser policies and sec...
http://security.googleblog.com/2023/03/8-ways-to-secure-chrome-browser-for.html   
Published: 2023 03 01 16:59:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: 8 ways to secure Chrome browser for Google Workspace users - published over 1 year ago.
Content: Posted by Kiran Nair, Product Manager, Chrome Browser 1. Bring Chrome under Cloud Management Your journey towards keeping your Google Workspace users and data safe, starts with bringing your Chrome browsers under Cloud Management at no additional cost. Chrome Browser Cloud Management is a single destination for applying Chrome Browser policies and sec...
http://security.googleblog.com/2023/03/8-ways-to-secure-chrome-browser-for.html   
Published: 2023 03 01 16:59:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Thank you and goodbye to the Chrome Cleanup Tool - published over 1 year ago.
Content: Posted by Jasika Bawa, Chrome Security Team Starting in Chrome 111 we will begin to turn down the Chrome Cleanup Tool, an application distributed to Chrome users on Windows to help find and remove unwanted software (UwS). Origin story The Chrome Cleanup Tool was introduced in 2015 to help users recover from unexpected settings changes, and to detect a...
http://security.googleblog.com/2023/03/thank-you-and-goodbye-to-chrome-cleanup.html   
Published: 2023 03 08 16:59:00
Received: 2023 03 31 16:42:19
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Thank you and goodbye to the Chrome Cleanup Tool - published over 1 year ago.
Content: Posted by Jasika Bawa, Chrome Security Team Starting in Chrome 111 we will begin to turn down the Chrome Cleanup Tool, an application distributed to Chrome users on Windows to help find and remove unwanted software (UwS). Origin story The Chrome Cleanup Tool was introduced in 2015 to help users recover from unexpected settings changes, and to detect a...
http://security.googleblog.com/2023/03/thank-you-and-goodbye-to-chrome-cleanup.html   
Published: 2023 03 08 16:59:00
Received: 2023 03 31 16:42:19
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: OSV and the Vulnerability Life Cycle - published over 1 year ago.
Content: Posted by Oliver Chang and Andrew Pollock, Google Open Source Security Team It is an interesting time for everyone concerned with open source vulnerabilities. The U.S. Executive Order on Improving the Nation's Cybersecurity requirements for vulnerability disclosure programs and assurances for software used by the US government will go into effect later thi...
http://security.googleblog.com/2023/03/osv-and-vulnerability-life-cycle.html   
Published: 2023 03 08 17:04:00
Received: 2023 03 31 16:42:19
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: OSV and the Vulnerability Life Cycle - published over 1 year ago.
Content: Posted by Oliver Chang and Andrew Pollock, Google Open Source Security Team It is an interesting time for everyone concerned with open source vulnerabilities. The U.S. Executive Order on Improving the Nation's Cybersecurity requirements for vulnerability disclosure programs and assurances for software used by the US government will go into effect later thi...
http://security.googleblog.com/2023/03/osv-and-vulnerability-life-cycle.html   
Published: 2023 03 08 17:04:00
Received: 2023 03 31 16:42:19
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-27296 (inlong) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27296   
Published: 2023 03 27 15:15:08
Received: 2023 03 31 16:16:25
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-27296 (inlong) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27296   
Published: 2023 03 27 15:15:08
Received: 2023 03 31 16:16:25
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: CVE-2023-25909 (oaklouds_portal) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25909   
Published: 2023 03 27 04:15:10
Received: 2023 03 31 16:16:18
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-25909 (oaklouds_portal) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25909   
Published: 2023 03 27 04:15:10
Received: 2023 03 31 16:16:18
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1087 (wc_sales_notification) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1087   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1087 (wc_sales_notification) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1087   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-1086 (preview_link_generator) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1086   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1086 (preview_link_generator) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1086   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2023-1079 (linux_kernel) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1079   
Published: 2023 03 27 21:15:10
Received: 2023 03 31 16:15:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1079 (linux_kernel) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1079   
Published: 2023 03 27 21:15:10
Received: 2023 03 31 16:15:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1069 (complianz) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1069   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1069 (complianz) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1069   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-1025 (simple_file_list) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1025   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1025 (simple_file_list) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1025   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CVE-2023-0955 (wp_statistics) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0955   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0955 (wp_statistics) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0955   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:54
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0660 (smart_slider_3) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0660   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0660 (smart_slider_3) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0660   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-0589 (wp_image_carousel) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0589   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0589 (wp_image_carousel) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0589   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-0505 (ever_compare) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0505   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0505 (ever_compare) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0505   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0504 (ht_politic) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0504   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0504 (ht_politic) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0504   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-0503 (free_woocommerce_theme_99fy_extension) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0503   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0503 (free_woocommerce_theme_99fy_extension) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0503   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:53
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-0499 (quickswish) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0499   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0499 (quickswish) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0499   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0498 (wp_education) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0498   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0498 (wp_education) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0498   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-0497 (ht_portfolio) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0497   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0497 (ht_portfolio) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0497   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-0491 (schedulicity) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0491   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0491 (schedulicity) - published over 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0491   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 16:15:52
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Deals: AirPods Pro 2 Hit Best Price Ever Seen at $194.99 ($55 Off) - published over 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/deals-airpods-pro-2-best-price/   
Published: 2023 03 31 15:56:42
Received: 2023 03 31 16:05:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Deals: AirPods Pro 2 Hit Best Price Ever Seen at $194.99 ($55 Off) - published over 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/deals-airpods-pro-2-best-price/   
Published: 2023 03 31 15:56:42
Received: 2023 03 31 16:05:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The MacRumors Show: WWDC 2023 Announced, but Will We See Apple's Mixed-Reality Headset? - published over 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/the-macrumors-show-wwdc-2023-announced/   
Published: 2023 03 31 16:00:08
Received: 2023 03 31 16:05:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: The MacRumors Show: WWDC 2023 Announced, but Will We See Apple's Mixed-Reality Headset? - published over 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/the-macrumors-show-wwdc-2023-announced/   
Published: 2023 03 31 16:00:08
Received: 2023 03 31 16:05:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs - published over 1 year ago.
Content:
https://www.bleepingcomputer.com/news/security/hackers-exploit-bug-in-elementor-pro-wordpress-plugin-with-11m-installs/   
Published: 2023 03 31 15:52:33
Received: 2023 03 31 16:04:24
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs - published over 1 year ago.
Content:
https://www.bleepingcomputer.com/news/security/hackers-exploit-bug-in-elementor-pro-wordpress-plugin-with-11m-installs/   
Published: 2023 03 31 15:52:33
Received: 2023 03 31 16:04:24
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: A Comparison of Exploit-DB and 0day.today - published over 1 year ago.
Content: submitted by /u/chicksdigthelongrun [link] [comments]
https://www.reddit.com/r/netsec/comments/127pexp/a_comparison_of_exploitdb_and_0daytoday/   
Published: 2023 03 31 15:41:02
Received: 2023 03 31 16:03:54
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: A Comparison of Exploit-DB and 0day.today - published over 1 year ago.
Content: submitted by /u/chicksdigthelongrun [link] [comments]
https://www.reddit.com/r/netsec/comments/127pexp/a_comparison_of_exploitdb_and_0daytoday/   
Published: 2023 03 31 15:41:02
Received: 2023 03 31 16:03:54
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)

All Articles

Ordered by Date Received : Year: "2023" Month: "03" Day: "31" Hour: "16"
Page: 1 (of 0)

Total Articles in this collection: 42


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor