All Articles

Ordered by Date Received : Year: "2024" Month: "10" Day: "30" Hour: "18"
Page: 1 (of 0)

Total Articles in this collection: 14

Navigation Help at the bottom of the page
Article: Corelight Included on Fortune Cyber 60 List of Fastest-Growing Private Cybersecurity Companies - published about 4 hours ago.
Content: ... cybersecurity solutions. Corelight was added to the growth stage companies category and is the only company providing NDR solutions included on ...
https://www.prnewswire.com/news-releases/corelight-included-on-fortune-cyber-60-list-of-fastest-growing-private-cybersecurity-companies-302291762.html   
Published: 2024 10 30 16:04:34
Received: 2024 10 30 18:41:18
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Corelight Included on Fortune Cyber 60 List of Fastest-Growing Private Cybersecurity Companies - published about 4 hours ago.
Content: ... cybersecurity solutions. Corelight was added to the growth stage companies category and is the only company providing NDR solutions included on ...
https://www.prnewswire.com/news-releases/corelight-included-on-fortune-cyber-60-list-of-fastest-growing-private-cybersecurity-companies-302291762.html   
Published: 2024 10 30 16:04:34
Received: 2024 10 30 18:41:18
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Simpson Garfinkel on Spooky Cryptographic Action at a Distance - published about 5 hours ago.
Content: Excellent read. One example: Consider the case of basic public key cryptography, in which a person’s public and private key are created together in a single operation. These two keys are entangled, not with quantum physics, but with math. When I create a virtual machine server in the Amazon cloud, I am prompted for an RSA public key that will be used to cont...
https://www.schneier.com/blog/archives/2024/10/simpson-garfinkel-on-spooky-cryptographic-action-at-a-distance.html   
Published: 2024 10 30 14:48:19
Received: 2024 10 30 18:39:51
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Simpson Garfinkel on Spooky Cryptographic Action at a Distance - published about 5 hours ago.
Content: Excellent read. One example: Consider the case of basic public key cryptography, in which a person’s public and private key are created together in a single operation. These two keys are entangled, not with quantum physics, but with math. When I create a virtual machine server in the Amazon cloud, I am prompted for an RSA public key that will be used to cont...
https://www.schneier.com/blog/archives/2024/10/simpson-garfinkel-on-spooky-cryptographic-action-at-a-distance.html   
Published: 2024 10 30 14:48:19
Received: 2024 10 30 18:39:51
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Give Me the Green Light Part 2: Dirty Little Secrets - published about 2 hours ago.
Content: submitted by /u/towtoo893 [link] [comments]
https://www.reddit.com/r/netsec/comments/1gftfly/give_me_the_green_light_part_2_dirty_little/   
Published: 2024 10 30 18:22:07
Received: 2024 10 30 18:39:48
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Give Me the Green Light Part 2: Dirty Little Secrets - published about 2 hours ago.
Content: submitted by /u/towtoo893 [link] [comments]
https://www.reddit.com/r/netsec/comments/1gftfly/give_me_the_green_light_part_2_dirty_little/   
Published: 2024 10 30 18:22:07
Received: 2024 10 30 18:39:48
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Update: oledump.py Version 0.0.77 - published 4 months ago.
Content: This is an update for plugin plugin_biff.py. Protected xls files (workbook protection, sheet protection) are protected with a password, but are not encrypted. The password is hashed to a 16-bit hash called verifier, such a short hash gives ample opportunity for hash collisions. I calculated passwords for all possible hash values (32768, or 0x8000) ...
https://blog.didierstevens.com/2024/07/11/update-oledump-py-version-0-0-77/   
Published: 2024 07 11 19:59:32
Received: 2024 10 30 18:38:16
Feed: Didier Stevens
Source: Didier Stevens
Category: Cyber Security
Topic: Cyber Security
Article: Update: oledump.py Version 0.0.77 - published 4 months ago.
Content: This is an update for plugin plugin_biff.py. Protected xls files (workbook protection, sheet protection) are protected with a password, but are not encrypted. The password is hashed to a 16-bit hash called verifier, such a short hash gives ample opportunity for hash collisions. I calculated passwords for all possible hash values (32768, or 0x8000) ...
https://blog.didierstevens.com/2024/07/11/update-oledump-py-version-0-0-77/   
Published: 2024 07 11 19:59:32
Received: 2024 10 30 18:38:16
Feed: Didier Stevens
Source: Didier Stevens
Category: Cyber Security
Topic: Cyber Security
Article: Quickpost: The Electric Energy Consumption Of LLMs - published 24 days ago.
Content: I’ve read claims that AI queries require a lot of energy. Today I heard another claim on the Nerdland Podcast (a popular science podcast here in Belgium): “letting ChatGPT write an email of 100 words requires 70 Wh” (if you’re interested, that’s said at 00:28:05 in this episode). I though to myself: that’s a lot of energy. 70 Wh is 252,000 Ws (70 W * 360...
https://blog.didierstevens.com/2024/10/06/quickpost-the-electric-energy-consumption-of-llms/   
Published: 2024 10 06 19:17:24
Received: 2024 10 30 18:38:15
Feed: Didier Stevens
Source: Didier Stevens
Category: Cyber Security
Topic: Cyber Security
Article: Quickpost: The Electric Energy Consumption Of LLMs - published 24 days ago.
Content: I’ve read claims that AI queries require a lot of energy. Today I heard another claim on the Nerdland Podcast (a popular science podcast here in Belgium): “letting ChatGPT write an email of 100 words requires 70 Wh” (if you’re interested, that’s said at 00:28:05 in this episode). I though to myself: that’s a lot of energy. 70 Wh is 252,000 Ws (70 W * 360...
https://blog.didierstevens.com/2024/10/06/quickpost-the-electric-energy-consumption-of-llms/   
Published: 2024 10 06 19:17:24
Received: 2024 10 30 18:38:15
Feed: Didier Stevens
Source: Didier Stevens
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Quickpost: The Electric Energy Consumption Of LLMs – No GPU - published 23 days ago.
Content: A friend asked me if I had used a GPU for my tests described in blog post “Quickpost: The Electric Energy Consumption Of LLMs”. Because he had tried running an LLM on a machine without GPU, and it was too slow. I did a quick test, just redoing previous test but without GPU (by setting environment variable CUDA_VISIBLE_DEVICES=-1). Answering my query t...
https://blog.didierstevens.com/2024/10/08/quickpost-the-electric-energy-consumption-of-llms-no-gpu/   
Published: 2024 10 08 00:00:00
Received: 2024 10 30 18:38:15
Feed: Didier Stevens
Source: Didier Stevens
Category: Cyber Security
Topic: Cyber Security
Article: Quickpost: The Electric Energy Consumption Of LLMs – No GPU - published 23 days ago.
Content: A friend asked me if I had used a GPU for my tests described in blog post “Quickpost: The Electric Energy Consumption Of LLMs”. Because he had tried running an LLM on a machine without GPU, and it was too slow. I did a quick test, just redoing previous test but without GPU (by setting environment variable CUDA_VISIBLE_DEVICES=-1). Answering my query t...
https://blog.didierstevens.com/2024/10/08/quickpost-the-electric-energy-consumption-of-llms-no-gpu/   
Published: 2024 10 08 00:00:00
Received: 2024 10 30 18:38:15
Feed: Didier Stevens
Source: Didier Stevens
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Pont a legidiótább dizájnbakiját nem korrigálja az Apple új egere - HWSW - published about 3 hours ago.
Content: A Gitlab mint DevSecOps platform (x). Gyere el Radovan Baćović (Gitlab, Data Engineer) előadására a november 7-i DevOps Natives meetupon. Hiszen az ...
https://www.hwsw.hu/daralo/68342/apple-magic-mouse-usb-typec.html   
Published: 2024 10 30 17:44:56
Received: 2024 10 30 18:22:13
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Pont a legidiótább dizájnbakiját nem korrigálja az Apple új egere - HWSW - published about 3 hours ago.
Content: A Gitlab mint DevSecOps platform (x). Gyere el Radovan Baćović (Gitlab, Data Engineer) előadására a november 7-i DevOps Natives meetupon. Hiszen az ...
https://www.hwsw.hu/daralo/68342/apple-magic-mouse-usb-typec.html   
Published: 2024 10 30 17:44:56
Received: 2024 10 30 18:22:13
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks - published about 2 hours ago.
Content:
https://www.techrepublic.com/article/operation-magnus-joint-law-enforcement-2024/   
Published: 2024 10 30 18:13:28
Received: 2024 10 30 18:19:47
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks - published about 2 hours ago.
Content:
https://www.techrepublic.com/article/operation-magnus-joint-law-enforcement-2024/   
Published: 2024 10 30 18:13:28
Received: 2024 10 30 18:19:47
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Exploiting a Blind Format String Vulnerability in Modern Binaries: A Case Study from Pwn2Own Ireland 2024 - published about 2 hours ago.
Content: submitted by /u/vrebtimaj [link] [comments]...
https://www.reddit.com/r/netsec/comments/1gftbkj/exploiting_a_blind_format_string_vulnerability_in/   
Published: 2024 10 30 18:17:25
Received: 2024 10 30 18:18:40
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Exploiting a Blind Format String Vulnerability in Modern Binaries: A Case Study from Pwn2Own Ireland 2024 - published about 2 hours ago.
Content: submitted by /u/vrebtimaj [link] [comments]...
https://www.reddit.com/r/netsec/comments/1gftbkj/exploiting_a_blind_format_string_vulnerability_in/   
Published: 2024 10 30 18:17:25
Received: 2024 10 30 18:18:40
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Apple’s new M4-based MacBook Pro line-up: signs of a rapid evolution - published about 2 hours ago.
Content:
https://www.computerworld.com/article/3595495/apples-new-m4-based-macbook-pro-line-up-signs-of-a-rapid-evolution.html   
Published: 2024 10 30 17:58:27
Received: 2024 10 30 18:17:18
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: Apple’s new M4-based MacBook Pro line-up: signs of a rapid evolution - published about 2 hours ago.
Content:
https://www.computerworld.com/article/3595495/apples-new-m4-based-macbook-pro-line-up-signs-of-a-rapid-evolution.html   
Published: 2024 10 30 17:58:27
Received: 2024 10 30 18:17:18
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: DevSecOps Research and Development Engineer - HigherEdJobs - published about 6 hours ago.
Content: ... DevSecOps functions. This position would work out of our State College ... Knowledge of DevSecOps tools/practices; Linux-based infrastructure ...
https://www.higheredjobs.com/state/details.cfm?JobCode=178966244&Title=DevSecOps%20Research%20and%20Development%20Engineer   
Published: 2024 10 30 13:54:47
Received: 2024 10 30 18:03:35
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Research and Development Engineer - HigherEdJobs - published about 6 hours ago.
Content: ... DevSecOps functions. This position would work out of our State College ... Knowledge of DevSecOps tools/practices; Linux-based infrastructure ...
https://www.higheredjobs.com/state/details.cfm?JobCode=178966244&Title=DevSecOps%20Research%20and%20Development%20Engineer   
Published: 2024 10 30 13:54:47
Received: 2024 10 30 18:03:35
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Apple's New M4 Macs Will Have Day One Update to Get Apple Intelligence Features - published about 3 hours ago.
Content:
https://www.macrumors.com/2024/10/30/m4-macs-day-one-apple-intelligence-update/   
Published: 2024 10 30 17:43:50
Received: 2024 10 30 18:03:00
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple's New M4 Macs Will Have Day One Update to Get Apple Intelligence Features - published about 3 hours ago.
Content:
https://www.macrumors.com/2024/10/30/m4-macs-day-one-apple-intelligence-update/   
Published: 2024 10 30 17:43:50
Received: 2024 10 30 18:03:00
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Amazon Cybersecurity Sleuths Emerge From the Shadows - Bloomberg News - published about 3 hours ago.
Content: Now, according to a cybersecurity firm, a remarkably similar botnet is raising eyebrows. Ryan Sherstobitoff, senior vice president of threat research ...
https://www.bloomberg.com/news/newsletters/2024-10-30/amazon-cybersecurity-sleuths-emerge-from-the-shadows   
Published: 2024 10 30 17:28:51
Received: 2024 10 30 18:01:13
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Amazon Cybersecurity Sleuths Emerge From the Shadows - Bloomberg News - published about 3 hours ago.
Content: Now, according to a cybersecurity firm, a remarkably similar botnet is raising eyebrows. Ryan Sherstobitoff, senior vice president of threat research ...
https://www.bloomberg.com/news/newsletters/2024-10-30/amazon-cybersecurity-sleuths-emerge-from-the-shadows   
Published: 2024 10 30 17:28:51
Received: 2024 10 30 18:01:13
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Video Quick Take: Cisco's Apolak Borthakur on Cybersecurity Solutions and a Way Forward - published about 3 hours ago.
Content: Great to be here. Todd Pruzan, HBR: Apolak, what is your experience at Cisco in developing and implementing cybersecurity strategies and solutions?
https://hbr.org/sponsored/2024/10/video-quick-take-ciscos-apolak-borthakur-on-cybersecurity-solutions-and-a-way-forward   
Published: 2024 10 30 17:45:53
Received: 2024 10 30 18:01:13
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Video Quick Take: Cisco's Apolak Borthakur on Cybersecurity Solutions and a Way Forward - published about 3 hours ago.
Content: Great to be here. Todd Pruzan, HBR: Apolak, what is your experience at Cisco in developing and implementing cybersecurity strategies and solutions?
https://hbr.org/sponsored/2024/10/video-quick-take-ciscos-apolak-borthakur-on-cybersecurity-solutions-and-a-way-forward   
Published: 2024 10 30 17:45:53
Received: 2024 10 30 18:01:13
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained

All Articles

Ordered by Date Received : Year: "2024" Month: "10" Day: "30" Hour: "18"
Page: 1 (of 0)

Total Articles in this collection: 14


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor