All Articles

Ordered by Date Received : Year: "2024" Month: "12" Day: "19" Hour: "11"
Page: 1 (of 0)

Total Articles in this collection: 28

Navigation Help at the bottom of the page
Article: Jr. DevSecOps Engineer @ World Wide Technology - Teal - published 17 days ago.
Content: New opening - Full-time Jr. DevSecOps Engineer at World Wide Technology position hiring now. View the role details and bookmark this job with ...
https://www.tealhq.com/job/jr-dev-sec-ops-engineer_0dcaaf91-951a-4cfc-8f8f-08469a1bdcd2   
Published: 2024 12 18 22:42:42
Received: 2024 12 19 11:43:03
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Jr. DevSecOps Engineer @ World Wide Technology - Teal - published 17 days ago.
Content: New opening - Full-time Jr. DevSecOps Engineer at World Wide Technology position hiring now. View the role details and bookmark this job with ...
https://www.tealhq.com/job/jr-dev-sec-ops-engineer_0dcaaf91-951a-4cfc-8f8f-08469a1bdcd2   
Published: 2024 12 18 22:42:42
Received: 2024 12 19 11:43:03
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer - Cleared Careers - published 17 days ago.
Content: DevSecOps Engineer · Job ID: 683283BR · Date posted: Dec. · Description:Space is a critical domain, connecting our technologies, our security and our ...
https://clearedcareers.com/job/595622/devsecops-engineer/   
Published: 2024 12 19 08:14:00
Received: 2024 12 19 11:43:01
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer - Cleared Careers - published 17 days ago.
Content: DevSecOps Engineer · Job ID: 683283BR · Date posted: Dec. · Description:Space is a critical domain, connecting our technologies, our security and our ...
https://clearedcareers.com/job/595622/devsecops-engineer/   
Published: 2024 12 19 08:14:00
Received: 2024 12 19 11:43:01
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Apple Faces Criticism Over AI-Generated News Headline Summaries - published 17 days ago.
Content:
https://www.macrumors.com/2024/12/19/apple-faces-criticism-new-notification-summaries/   
Published: 2024 12 19 11:39:31
Received: 2024 12 19 11:42:24
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Faces Criticism Over AI-Generated News Headline Summaries - published 17 days ago.
Content:
https://www.macrumors.com/2024/12/19/apple-faces-criticism-new-notification-summaries/   
Published: 2024 12 19 11:39:31
Received: 2024 12 19 11:42:24
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Why Big Data Will Rule Cybersecurity in 2025 - CyberWire - published 17 days ago.
Content: Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity ...
https://thecyberwire.com/podcasts/threat-vector/47/notes   
Published: 2024 12 19 07:19:18
Received: 2024 12 19 11:41:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Why Big Data Will Rule Cybersecurity in 2025 - CyberWire - published 17 days ago.
Content: Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity ...
https://thecyberwire.com/podcasts/threat-vector/47/notes   
Published: 2024 12 19 07:19:18
Received: 2024 12 19 11:41:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Free Cybersecurity Documents, PDFs, and Resources | PrintFriendly - published 17 days ago.
Content: Browse our extensive collection of Cybersecurity PDFs and resources. Access free, categorized documents on a variety of Cybersecurity topics, ...
https://www.printfriendly.com/docs/cybersecurity   
Published: 2024 12 19 07:23:19
Received: 2024 12 19 11:41:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Free Cybersecurity Documents, PDFs, and Resources | PrintFriendly - published 17 days ago.
Content: Browse our extensive collection of Cybersecurity PDFs and resources. Access free, categorized documents on a variety of Cybersecurity topics, ...
https://www.printfriendly.com/docs/cybersecurity   
Published: 2024 12 19 07:23:19
Received: 2024 12 19 11:41:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: SITI attends Cybersecurity Symposium 2024 (with photos) - published 17 days ago.
Content: The Secretary for Innovation, Technology and Industry, Professor Sun Dong, officiated at the Cybersecurity Symposium 2024 today (December 19) and ...
https://www.info.gov.hk/gia/general/202412/19/P2024121900473.htm   
Published: 2024 12 19 10:59:09
Received: 2024 12 19 11:41:15
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: SITI attends Cybersecurity Symposium 2024 (with photos) - published 17 days ago.
Content: The Secretary for Innovation, Technology and Industry, Professor Sun Dong, officiated at the Cybersecurity Symposium 2024 today (December 19) and ...
https://www.info.gov.hk/gia/general/202412/19/P2024121900473.htm   
Published: 2024 12 19 10:59:09
Received: 2024 12 19 11:41:15
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: The strength of the ICS COI is the team - published over 2022 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/strength-of-ics-coi-is-the-team   
Published: 0002 09 20 06:58:19
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: The strength of the ICS COI is the team - published over 2022 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/strength-of-ics-coi-is-the-team   
Published: 0002 09 20 06:58:19
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Thanking the vulnerability research community with NCSC Challenge Coins - published over 2010 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/thanking-vulnerability-research-community-ncsc-challenge-coins   
Published: 0014 07 29 08:14:06
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Thanking the vulnerability research community with NCSC Challenge Coins - published over 2010 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/thanking-vulnerability-research-community-ncsc-challenge-coins   
Published: 0014 07 29 08:14:06
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: How the NCSC thinks about security architecture - published over 1995 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/how-ncsc-thinks-about-security-architecture   
Published: 0029 08 16 14:06:26
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: How the NCSC thinks about security architecture - published over 1995 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/how-ncsc-thinks-about-security-architecture   
Published: 0029 08 16 14:06:26
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Growing positive security cultures - published over 1967 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/growing-positive-security-cultures   
Published: 0057 05 07 14:54:04
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Growing positive security cultures - published over 1967 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/growing-positive-security-cultures   
Published: 0057 05 07 14:54:04
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Telling users to ‘avoid clicking bad links’ still isn’t working - published about 1759 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working   
Published: 0265 12 12 11:49:05
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Telling users to ‘avoid clicking bad links’ still isn’t working - published about 1759 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working   
Published: 0265 12 12 11:49:05
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Security, complexity and Huawei; protecting the UK's telecoms networks - published over 1715 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/blog-post-security-complexity-and-huawei-protecting-uks-telecoms-networks   
Published: 0309 05 26 09:58:00
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Security, complexity and Huawei; protecting the UK's telecoms networks - published over 1715 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/blog-post-security-complexity-and-huawei-protecting-uks-telecoms-networks   
Published: 0309 05 26 09:58:00
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: A decade of Cyber Essentials: the journey towards a safer digital future - published about 1662 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-essentials-decade   
Published: 0362 11 15 08:58:12
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: A decade of Cyber Essentials: the journey towards a safer digital future - published about 1662 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cyber-essentials-decade   
Published: 0362 11 15 08:58:12
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: SBOMs and the importance of inventory - published over 1527 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory   
Published: 0497 09 11 09:28:12
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: SBOMs and the importance of inventory - published over 1527 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory   
Published: 0497 09 11 09:28:12
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: So long and thanks for all the bits - published over 1001 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/so-long-thanks-for-all-the-bits   
Published: 1023 04 12 14:15:31
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: So long and thanks for all the bits - published over 1001 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/so-long-thanks-for-all-the-bits   
Published: 1023 04 12 14:15:31
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Smart devices: new law helps citizens to choose secure products - published about 497 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/smart-devices-law   
Published: 1527 11 16 16:49:15
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Smart devices: new law helps citizens to choose secure products - published about 497 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/smart-devices-law   
Published: 1527 11 16 16:49:15
Received: 2024 12 19 11:40:31
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Protecting parked domains for the UK public sector - published over 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/protecting-parked-domains   
Published: 2019 07 10 10:19:19
Received: 2024 12 19 11:40:30
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Protecting parked domains for the UK public sector - published over 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/protecting-parked-domains   
Published: 2019 07 10 10:19:19
Received: 2024 12 19 11:40:30
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Revolutionising identity services using AI - published 11 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/revolutionising-identity-services-using-ai   
Published: 2024 02 16 14:16:28
Received: 2024 12 19 11:40:19
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Revolutionising identity services using AI - published 11 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/revolutionising-identity-services-using-ai   
Published: 2024 02 16 14:16:28
Received: 2024 12 19 11:40:19
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Introducing PDNS for Schools - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-pdns-for-schools   
Published: 2024 05 29 05:29:00
Received: 2024 12 19 11:40:17
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Introducing PDNS for Schools - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-pdns-for-schools   
Published: 2024 05 29 05:29:00
Received: 2024 12 19 11:40:17
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Researching the hard problems in hardware security - published almost 100 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-hardware-security-problem-book   
Published: 2124 11 11 09:14:44
Received: 2024 12 19 11:40:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Researching the hard problems in hardware security - published almost 100 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-hardware-security-problem-book   
Published: 2124 11 11 09:14:44
Received: 2024 12 19 11:40:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Securing Office 365 with better configuration - published over 1702 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/securing-office-365-with-better-configuration   
Published: 3727 09 24 11:37:45
Received: 2024 12 19 11:40:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Securing Office 365 with better configuration - published over 1702 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/securing-office-365-with-better-configuration   
Published: 3727 09 24 11:37:45
Received: 2024 12 19 11:40:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: How to talk to board members about cyber - published over 3899 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/how-to-talk-to-board-members-about-cyber   
Published: 5924 08 07 07:22:59
Received: 2024 12 19 11:40:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: How to talk to board members about cyber - published over 3899 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/how-to-talk-to-board-members-about-cyber   
Published: 5924 08 07 07:22:59
Received: 2024 12 19 11:40:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Introducing Cyber Advisors... - published over 200282 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-cyber-advisors   
Published: 202307 04 17 07:01:55
Received: 2024 12 19 11:40:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Introducing Cyber Advisors... - published over 200282 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-cyber-advisors   
Published: 202307 04 17 07:01:55
Received: 2024 12 19 11:40:13
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Silent Heists: The Danger of Insider Threats - published 17 days ago.
Content:
https://www.tripwire.com/state-of-security/insider-threats-root-causes-mitigation-practices   
Published: 2024 12 19 10:32:58
Received: 2024 12 19 11:38:48
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Silent Heists: The Danger of Insider Threats - published 17 days ago.
Content:
https://www.tripwire.com/state-of-security/insider-threats-root-causes-mitigation-practices   
Published: 2024 12 19 10:32:58
Received: 2024 12 19 11:38:48
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: This VPN Lets Anyone Use Your Internet Connection. What Could Go Wrong? - published 17 days ago.
Content:
https://www.wired.com/story/residential-proxy-network-cybercrime-vpn/   
Published: 2024 12 19 11:00:00
Received: 2024 12 19 11:21:23
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: This VPN Lets Anyone Use Your Internet Connection. What Could Go Wrong? - published 17 days ago.
Content:
https://www.wired.com/story/residential-proxy-network-cybercrime-vpn/   
Published: 2024 12 19 11:00:00
Received: 2024 12 19 11:21:23
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: Welcome to the Drone Age, New Jersey - published 17 days ago.
Content:
https://www.computerworld.com/article/3627402/welcome-to-the-drone-age-new-jersey.html   
Published: 2024 12 19 11:00:00
Received: 2024 12 19 11:18:23
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: Welcome to the Drone Age, New Jersey - published 17 days ago.
Content:
https://www.computerworld.com/article/3627402/welcome-to-the-drone-age-new-jersey.html   
Published: 2024 12 19 11:00:00
Received: 2024 12 19 11:18:23
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Переход на продукт отечественного вендора позволяет сделать безопасную ... - published 17 days ago.
Content: Платформа AppSec.Hub позволяет быстро интегрировать практики обеспечения информационной безопасности приложений и реализовать полноценный DevSecOps.
https://www.press-release.ru/branches/hitech/__18_12_2024_11_22/   
Published: 2024 12 19 07:23:02
Received: 2024 12 19 11:02:04
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Переход на продукт отечественного вендора позволяет сделать безопасную ... - published 17 days ago.
Content: Платформа AppSec.Hub позволяет быстро интегрировать практики обеспечения информационной безопасности приложений и реализовать полноценный DevSecOps.
https://www.press-release.ru/branches/hitech/__18_12_2024_11_22/   
Published: 2024 12 19 07:23:02
Received: 2024 12 19 11:02:04
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Oh my Word: Phishing campaign targets Microsoft Word - published 17 days ago.
Content: A new phishing campaign has been discovered and warnings have been issued due to its use of corrupted Microsoft Word documents to bypass email security software. This approach exploits Word's file recovery feature, allowing the malicious files to evade detection while remaining accessible to the targeted victims. The phishing attack begins with emails pu...
https://www.emcrc.co.uk/post/oh-my-word-phishing-campaign-targets-microsoft-word   
Published: 2024 12 19 10:53:19
Received: 2024 12 19 11:01:42
Feed: The Cyber Resilience Centre for the East Midlands
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Oh my Word: Phishing campaign targets Microsoft Word - published 17 days ago.
Content: A new phishing campaign has been discovered and warnings have been issued due to its use of corrupted Microsoft Word documents to bypass email security software. This approach exploits Word's file recovery feature, allowing the malicious files to evade detection while remaining accessible to the targeted victims. The phishing attack begins with emails pu...
https://www.emcrc.co.uk/post/oh-my-word-phishing-campaign-targets-microsoft-word   
Published: 2024 12 19 10:53:19
Received: 2024 12 19 11:01:42
Feed: The Cyber Resilience Centre for the East Midlands
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security

All Articles

Ordered by Date Received : Year: "2024" Month: "12" Day: "19" Hour: "11"
Page: 1 (of 0)

Total Articles in this collection: 28


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor