All Articles

Ordered by Date Received : Year: "2025" Month: "02" Day: "13" Hour: "00"
Page: 1 (of 0)

Total Articles in this collection: 30

Navigation Help at the bottom of the page
Article: Sophos sheds 6% of staff after swallowing Secureworks - published about 10 hours ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2025/02/13/sophos_secureworks_layoff/   
Published: 2025 02 13 00:34:57
Received: 2025 02 13 00:41:40
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Sophos sheds 6% of staff after swallowing Secureworks - published about 10 hours ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2025/02/13/sophos_secureworks_layoff/   
Published: 2025 02 13 00:34:57
Received: 2025 02 13 00:41:40
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Astra Security: Funding Raised To Simplify Cybersecurity With Pentesting - published about 11 hours ago.
Content: Astra Security, a security platform with continuous vulnerability scanning and pentests, announced the closing of a growth capital round—led by ...
https://pulse2.com/astra-security-funding-raised-to-simplify-cybersecurity-with-pentesting/   
Published: 2025 02 12 23:27:36
Received: 2025 02 13 00:41:32
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Astra Security: Funding Raised To Simplify Cybersecurity With Pentesting - published about 11 hours ago.
Content: Astra Security, a security platform with continuous vulnerability scanning and pentests, announced the closing of a growth capital round—led by ...
https://pulse2.com/astra-security-funding-raised-to-simplify-cybersecurity-with-pentesting/   
Published: 2025 02 12 23:27:36
Received: 2025 02 13 00:41:32
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Zacks (2024) - 11,994,223 breached accounts - published about 11 hours ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#Zacks2024   
Published: 2025 02 12 23:19:43
Received: 2025 02 13 00:39:49
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Article: Zacks (2024) - 11,994,223 breached accounts - published about 11 hours ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#Zacks2024   
Published: 2025 02 12 23:19:43
Received: 2025 02 13 00:39:49
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Sophos sheds 6% of staff after swallowing Secureworks - published about 10 hours ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2025/02/13/sophos_secureworks_layoff/   
Published: 2025 02 13 00:34:57
Received: 2025 02 13 00:38:12
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Sophos sheds 6% of staff after swallowing Secureworks - published about 10 hours ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2025/02/13/sophos_secureworks_layoff/   
Published: 2025 02 13 00:34:57
Received: 2025 02 13 00:38:12
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Wifi Honey - Creates fake APs using all encryption - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/wifi-honey-creates-fake-aps-using-all.html   
Published: 2012 11 03 21:13:00
Received: 2025 02 13 00:22:25
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Wifi Honey - Creates fake APs using all encryption - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/wifi-honey-creates-fake-aps-using-all.html   
Published: 2012 11 03 21:13:00
Received: 2025 02 13 00:22:25
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/spooftooph-052-automated-spoofing-or.html   
Published: 2012 11 03 21:21:00
Received: 2025 02 13 00:22:25
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/spooftooph-052-automated-spoofing-or.html   
Published: 2012 11 03 21:21:00
Received: 2025 02 13 00:22:25
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: BeEF 0.4.3.8 - Browser Exploitation Framework - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/beef-0438-browser-exploitation-framework.html   
Published: 2012 11 03 21:37:00
Received: 2025 02 13 00:22:25
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: BeEF 0.4.3.8 - Browser Exploitation Framework - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/beef-0438-browser-exploitation-framework.html   
Published: 2012 11 03 21:37:00
Received: 2025 02 13 00:22:25
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Joomscan updated - now can identify 673 joomla vulnerabilities - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/joomscan-updated-now-can-identify-673.html   
Published: 2012 11 03 21:45:00
Received: 2025 02 13 00:22:25
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Joomscan updated - now can identify 673 joomla vulnerabilities - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/joomscan-updated-now-can-identify-673.html   
Published: 2012 11 03 21:45:00
Received: 2025 02 13 00:22:25
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: ExploitShield Browser Edition - Forget about browser vulnerabilities - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/exploitshield-browser-edition-forget.html   
Published: 2012 11 04 12:32:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: ExploitShield Browser Edition - Forget about browser vulnerabilities - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/exploitshield-browser-edition-forget.html   
Published: 2012 11 04 12:32:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: PySQLi - Python SQL injection framework - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/pysqli-python-sql-injection-framework.html   
Published: 2012 11 04 18:03:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PySQLi - Python SQL injection framework - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/pysqli-python-sql-injection-framework.html   
Published: 2012 11 04 18:03:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: TXDNS v 2.2.1 - Aggressive multithreaded DNS digger - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/txdns-v-221-aggressive-multithreaded.html   
Published: 2012 11 10 15:13:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: TXDNS v 2.2.1 - Aggressive multithreaded DNS digger - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/txdns-v-221-aggressive-multithreaded.html   
Published: 2012 11 10 15:13:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: NetSleuth : Open source Network Forensics And Analysis Tools - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/netsleuth-open-source-network-forensics.html   
Published: 2012 11 10 15:21:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: NetSleuth : Open source Network Forensics And Analysis Tools - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/netsleuth-open-source-network-forensics.html   
Published: 2012 11 10 15:21:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/sslsplit-v-045-man-in-middle-attacks.html   
Published: 2012 11 10 15:30:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/sslsplit-v-045-man-in-middle-attacks.html   
Published: 2012 11 10 15:30:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/pwnpi-v20-pen-test-drop-box-distro-for.html   
Published: 2012 11 10 15:42:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/pwnpi-v20-pen-test-drop-box-distro-for.html   
Published: 2012 11 10 15:42:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: PwnStar latest version with new Exploits released - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/pwnstar-latest-version-with-new.html   
Published: 2012 11 10 15:53:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnStar latest version with new Exploits released - published over 12 years ago.
Content:
http://thntools999.blogspot.com/2012/11/pwnstar-latest-version-with-new.html   
Published: 2012 11 10 15:53:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: BlindElephant – Web Application Fingerprinting - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/blindelephant-web-application.html   
Published: 2013 02 15 14:47:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: BlindElephant – Web Application Fingerprinting - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/blindelephant-web-application.html   
Published: 2013 02 15 14:47:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Automated HTTP Enumeration Tool - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/automated-http-enumeration-tool.html   
Published: 2013 02 15 16:07:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Automated HTTP Enumeration Tool - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/automated-http-enumeration-tool.html   
Published: 2013 02 15 16:07:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Weevely : Stealth PHP web shell with telnet style console - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/weevely-stealth-php-web-shell-with.html   
Published: 2013 02 15 16:48:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Weevely : Stealth PHP web shell with telnet style console - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/weevely-stealth-php-web-shell-with.html   
Published: 2013 02 15 16:48:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Password Cracker Tool Hashkill version 0.3.1 released - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/password-cracker-tool-hashkill-version.html   
Published: 2013 02 15 17:02:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Password Cracker Tool Hashkill version 0.3.1 released - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/password-cracker-tool-hashkill-version.html   
Published: 2013 02 15 17:02:00
Received: 2025 02 13 00:22:24
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: WAppEx v2.0 : Web Application exploitation Tool - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/wappex-v20-web-application-exploitation.html   
Published: 2013 02 15 17:15:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: WAppEx v2.0 : Web Application exploitation Tool - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/wappex-v20-web-application-exploitation.html   
Published: 2013 02 15 17:15:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Unhide Forensic Tool, Find hidden processes and ports - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/unhide-forensic-tool-find-hidden.html   
Published: 2013 02 15 17:39:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Unhide Forensic Tool, Find hidden processes and ports - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/unhide-forensic-tool-find-hidden.html   
Published: 2013 02 15 17:39:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Recon-ng : Web Reconnaisance framework for Penetration testers - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/recon-ng-web-reconnaisance-framework.html   
Published: 2013 02 17 17:12:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Recon-ng : Web Reconnaisance framework for Penetration testers - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/02/recon-ng-web-reconnaisance-framework.html   
Published: 2013 02 17 17:12:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Snort 2.9.4.1 - Network intrusion detection system - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/snort-2941-network-intrusion-detection.html   
Published: 2013 03 05 07:46:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Snort 2.9.4.1 - Network intrusion detection system - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/snort-2941-network-intrusion-detection.html   
Published: 2013 03 05 07:46:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Pentoo 2013.0 RC1.1 Released - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/pentoo-20130-rc11-released.html   
Published: 2013 03 10 06:21:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Pentoo 2013.0 RC1.1 Released - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/pentoo-20130-rc11-released.html   
Published: 2013 03 10 06:21:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Phrozen Keylogger Lite v1.0 download - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/phrozen-keylogger-lite-v10-download.html   
Published: 2013 03 10 06:27:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Phrozen Keylogger Lite v1.0 download - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/phrozen-keylogger-lite-v10-download.html   
Published: 2013 03 10 06:27:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Biggest password cracking wordlist with millions of words - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/biggest-password-cracking-wordlist-with.html   
Published: 2013 03 10 17:01:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Biggest password cracking wordlist with millions of words - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/biggest-password-cracking-wordlist-with.html   
Published: 2013 03 10 17:01:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The Social-Engineer Toolkit (SET) v4.7 released - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/the-social-engineer-toolkit-set-v47.html   
Published: 2013 03 15 18:10:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: The Social-Engineer Toolkit (SET) v4.7 released - published almost 12 years ago.
Content:
http://thntools999.blogspot.com/2013/03/the-social-engineer-toolkit-set-v47.html   
Published: 2013 03 15 18:10:00
Received: 2025 02 13 00:22:23
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Smashing Security podcast #404: Podcast not found - published about 11 hours ago.
Content:
https://grahamcluley.com/smashing-security-podcast-404/   
Published: 2025 02 13 00:00:46
Received: 2025 02 13 00:19:00
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: Smashing Security podcast #404: Podcast not found - published about 11 hours ago.
Content:
https://grahamcluley.com/smashing-security-podcast-404/   
Published: 2025 02 13 00:00:46
Received: 2025 02 13 00:19:00
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: DevSecOps Engineer - JB5242359 | Riyadh, Saudi Arabia - Giza Systems - published about 15 hours ago.
Content: The general roles and responsibilities of a DevSecOps engineer revolve around integrating security practices seamlessly into the software ...
https://www.gizasystemscareers.com/en/saudi-arabia/jobs/devsecops-engineer-5242359/   
Published: 2025 02 12 19:41:06
Received: 2025 02 13 00:04:17
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer - JB5242359 | Riyadh, Saudi Arabia - Giza Systems - published about 15 hours ago.
Content: The general roles and responsibilities of a DevSecOps engineer revolve around integrating security practices seamlessly into the software ...
https://www.gizasystemscareers.com/en/saudi-arabia/jobs/devsecops-engineer-5242359/   
Published: 2025 02 12 19:41:06
Received: 2025 02 13 00:04:17
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The New Stack on X: "Agentic AI Powers New Harness DevSecOps Suite | By @jburttech ... - published about 14 hours ago.
Content: Agentic AI Powers New Harness DevSecOps Suite | By @jburttech feat. @jyotibansalsf, @harnessio, @traceableai https://t.co/Os1XbrbAZg.
https://twitter.com/thenewstack/status/1889752331090030964   
Published: 2025 02 12 20:59:34
Received: 2025 02 13 00:04:17
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: The New Stack on X: "Agentic AI Powers New Harness DevSecOps Suite | By @jburttech ... - published about 14 hours ago.
Content: Agentic AI Powers New Harness DevSecOps Suite | By @jburttech feat. @jyotibansalsf, @harnessio, @traceableai https://t.co/Os1XbrbAZg.
https://twitter.com/thenewstack/status/1889752331090030964   
Published: 2025 02 12 20:59:34
Received: 2025 02 13 00:04:17
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)

All Articles

Ordered by Date Received : Year: "2025" Month: "02" Day: "13" Hour: "00"
Page: 1 (of 0)

Total Articles in this collection: 30


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor