All Articles

Ordered by Date Received : Year: "2023" Month: "12" Day: "01" Hour: "16"
Page: 1 (of 0)

Total Articles in this collection: 10

Navigation Help at the bottom of the page
Article: CISA Removes One Known Exploited Vulnerability From Catalog - published 11 months ago.
Content:
https://www.cisa.gov/news-events/alerts/2023/12/01/cisa-removes-one-known-exploited-vulnerability-catalog   
Published: 2023 12 01 12:00:00
Received: 2023 12 01 16:44:03
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: CISA Removes One Known Exploited Vulnerability From Catalog - published 11 months ago.
Content:
https://www.cisa.gov/news-events/alerts/2023/12/01/cisa-removes-one-known-exploited-vulnerability-catalog   
Published: 2023 12 01 12:00:00
Received: 2023 12 01 16:44:03
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: Natural Language Processing (NLP) in AI: Top 9 Use Cases - published 11 months ago.
Content:
https://latesthackingnews.com/2023/12/01/natural-language-processing-nlp-in-ai-top-9-use-cases/   
Published: 2023 12 01 14:35:57
Received: 2023 12 01 16:43:01
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Natural Language Processing (NLP) in AI: Top 9 Use Cases - published 11 months ago.
Content:
https://latesthackingnews.com/2023/12/01/natural-language-processing-nlp-in-ai-top-9-use-cases/   
Published: 2023 12 01 14:35:57
Received: 2023 12 01 16:43:01
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Buying and selling second-hand devices - published 11 months ago.
Content:
https://www.ncsc.gov.uk/guidance/buying-selling-second-hand-devices   
Published: 2023 12 01 16:24:07
Received: 2023 12 01 16:41:19
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Buying and selling second-hand devices - published 11 months ago.
Content:
https://www.ncsc.gov.uk/guidance/buying-selling-second-hand-devices   
Published: 2023 12 01 16:24:07
Received: 2023 12 01 16:41:19
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: LogoFAIL bugs in UEFI code allow planting bootkits via images - published 11 months ago.
Content:
https://www.bleepingcomputer.com/news/security/logofail-bugs-in-uefi-code-allow-planting-bootkits-via-images/   
Published: 2023 12 01 03:08:26
Received: 2023 12 01 16:24:42
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: LogoFAIL bugs in UEFI code allow planting bootkits via images - published 11 months ago.
Content:
https://www.bleepingcomputer.com/news/security/logofail-bugs-in-uefi-code-allow-planting-bootkits-via-images/   
Published: 2023 12 01 03:08:26
Received: 2023 12 01 16:24:42
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Why Small Business's Should Be Serious About Hackers - published about 11 years ago.
Content: I decided to write this blog post after I contacted a local business about a serious vulnerability (SQLi). The company is a luxury boat reseller. You simply select your boat and "checkout". The website handles Credit cards (CC) so SQLi is a incredibly dangerous vulnerability.   I reported the vulnerability and I received no response. So I decided to take act...
http://trojan7malware.blogspot.com/2013/08/why-small-business-should-be-serious.html   
Published: 2013 08 20 12:31:00
Received: 2023 12 01 16:22:31
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Why Small Business's Should Be Serious About Hackers - published about 11 years ago.
Content: I decided to write this blog post after I contacted a local business about a serious vulnerability (SQLi). The company is a luxury boat reseller. You simply select your boat and "checkout". The website handles Credit cards (CC) so SQLi is a incredibly dangerous vulnerability.   I reported the vulnerability and I received no response. So I decided to take act...
http://trojan7malware.blogspot.com/2013/08/why-small-business-should-be-serious.html   
Published: 2013 08 20 12:31:00
Received: 2023 12 01 16:22:31
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: NYT and Twitter hack wasn't that bad after all. - published about 11 years ago.
Content: Recently, the Syrian Electronic Army or SEA as they're commonly known as hijacked the DNS's of NYT and Twitter. They edited the front page of New York Times website to display a message and a image. This quickly became the top trend worldwide on twitter and everybody who's anybody knew about SEA and the hack. I'm sure many people in NYT office ran around lik...
http://trojan7malware.blogspot.com/2013/08/nyt-and-twitter-hack-wasn-that-bad.html   
Published: 2013 08 28 14:55:00
Received: 2023 12 01 16:22:31
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: NYT and Twitter hack wasn't that bad after all. - published about 11 years ago.
Content: Recently, the Syrian Electronic Army or SEA as they're commonly known as hijacked the DNS's of NYT and Twitter. They edited the front page of New York Times website to display a message and a image. This quickly became the top trend worldwide on twitter and everybody who's anybody knew about SEA and the hack. I'm sure many people in NYT office ran around lik...
http://trojan7malware.blogspot.com/2013/08/nyt-and-twitter-hack-wasn-that-bad.html   
Published: 2013 08 28 14:55:00
Received: 2023 12 01 16:22:31
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: iPhone 16 Pro: All the Rumors and Known Features So Far - published 11 months ago.
Content:
https://www.macrumors.com/2023/12/01/iphone-16-pro-rumors/   
Published: 2023 12 01 15:53:27
Received: 2023 12 01 16:04:36
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPhone 16 Pro: All the Rumors and Known Features So Far - published 11 months ago.
Content:
https://www.macrumors.com/2023/12/01/iphone-16-pro-rumors/   
Published: 2023 12 01 15:53:27
Received: 2023 12 01 16:04:36
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Apple Releases Security Updates for Multiple Products - published 11 months ago.
Content:
https://www.cisa.gov/news-events/alerts/2023/12/01/apple-releases-security-updates-multiple-products   
Published: 2023 12 01 12:00:00
Received: 2023 12 01 16:04:27
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: Apple Releases Security Updates for Multiple Products - published 11 months ago.
Content:
https://www.cisa.gov/news-events/alerts/2023/12/01/apple-releases-security-updates-multiple-products   
Published: 2023 12 01 12:00:00
Received: 2023 12 01 16:04:27
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Anna Mercardo Clark hired as Chief Information Security Officer at Phyllis Lytle - published 11 months ago.
Content:
https://www.securitymagazine.com/articles/100190-anna-mercardo-clark-hired-as-chief-information-security-officer-at-phyllis-lytle   
Published: 2023 12 01 15:33:27
Received: 2023 12 01 16:03:07
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Anna Mercardo Clark hired as Chief Information Security Officer at Phyllis Lytle - published 11 months ago.
Content:
https://www.securitymagazine.com/articles/100190-anna-mercardo-clark-hired-as-chief-information-security-officer-at-phyllis-lytle   
Published: 2023 12 01 15:33:27
Received: 2023 12 01 16:03:07
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security

All Articles

Ordered by Date Received : Year: "2023" Month: "12" Day: "01" Hour: "16"
Page: 1 (of 0)

Total Articles in this collection: 10


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor