All Articles

Ordered by Date Received : Year: "2025" Month: "06" Day: "23" Hour: "11"
Page: 1 (of 0)

Total Articles in this collection: 29

Navigation Help at the bottom of the page
Article: Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) - published 3 months ago.
Content:
https://www.helpnetsecurity.com/2025/06/23/critical-citrix-netscaler-bug-fixed-upgrade-asap-cve-2025-5777/   
Published: 2025 06 23 11:12:41
Received: 2025 06 23 11:57:57
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) - published 3 months ago.
Content:
https://www.helpnetsecurity.com/2025/06/23/critical-citrix-netscaler-bug-fixed-upgrade-asap-cve-2025-5777/   
Published: 2025 06 23 11:12:41
Received: 2025 06 23 11:57:57
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit - published 3 months ago.
Content:
https://databreaches.net/2025/06/23/pro-russian-hackers-disrupt-dutch-government-websites-ahead-of-nato-summit/   
Published: 2025 06 23 11:24:55
Received: 2025 06 23 11:43:10
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit - published 3 months ago.
Content:
https://databreaches.net/2025/06/23/pro-russian-hackers-disrupt-dutch-government-websites-ahead-of-nato-summit/   
Published: 2025 06 23 11:24:55
Received: 2025 06 23 11:43:10
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks - published 3 months ago.
Content:
https://databreaches.net/2025/06/23/a-militarily-degraded-iran-may-turn-to-asymmetrical-warfare-raising-risk-of-proxy-and-cyber-attacks/   
Published: 2025 06 23 11:33:43
Received: 2025 06 23 11:43:10
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks - published 3 months ago.
Content:
https://databreaches.net/2025/06/23/a-militarily-degraded-iran-may-turn-to-asymmetrical-warfare-raising-risk-of-proxy-and-cyber-attacks/   
Published: 2025 06 23 11:33:43
Received: 2025 06 23 11:43:10
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Experts count staggering costs incurred by UK retail amid cyberattack hell - published 3 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2025/06/23/experts_count_the_staggering_costs/   
Published: 2025 06 23 11:29:33
Received: 2025 06 23 11:41:53
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Experts count staggering costs incurred by UK retail amid cyberattack hell - published 3 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2025/06/23/experts_count_the_staggering_costs/   
Published: 2025 06 23 11:29:33
Received: 2025 06 23 11:41:53
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: TikTok-style bite-sized videos are invading enterprises - published 3 months ago.
Content:
https://www.computerworld.com/article/4010168/tiktok-style-bite-sized-videos-are-invading-enterprises.html   
Published: 2025 06 23 11:21:42
Received: 2025 06 23 11:37:35
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Article: TikTok-style bite-sized videos are invading enterprises - published 3 months ago.
Content:
https://www.computerworld.com/article/4010168/tiktok-style-bite-sized-videos-are-invading-enterprises.html   
Published: 2025 06 23 11:21:42
Received: 2025 06 23 11:37:35
Feed: Computerworld Security News
Source: Computerworld Security News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: iPhone 18's Advanced A20 Chip Packaging Gains Momentum at TSMC - published 3 months ago.
Content:
https://www.macrumors.com/2025/06/23/iphone-18s-a20-chip-packaging-tsmc/   
Published: 2025 06 23 11:03:56
Received: 2025 06 23 11:23:30
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPhone 18's Advanced A20 Chip Packaging Gains Momentum at TSMC - published 3 months ago.
Content:
https://www.macrumors.com/2025/06/23/iphone-18s-a20-chip-packaging-tsmc/   
Published: 2025 06 23 11:03:56
Received: 2025 06 23 11:23:30
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks - published 3 months ago.
Content:
https://thehackernews.com/2025/06/google-adds-multi-layered-defenses-to.html   
Published: 2025 06 23 10:46:00
Received: 2025 06 23 11:22:35
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks - published 3 months ago.
Content:
https://thehackernews.com/2025/06/google-adds-multi-layered-defenses-to.html   
Published: 2025 06 23 10:46:00
Received: 2025 06 23 11:22:35
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: New techniques added to the NCSC’s ‘risk management toolbox’ - published over 2022 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/new-techniques-added-to-the-ncsc-risk-management-toolbox   
Published: 0003 06 20 14:28:07
Received: 2025 06 23 11:21:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: New techniques added to the NCSC’s ‘risk management toolbox’ - published over 2022 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/new-techniques-added-to-the-ncsc-risk-management-toolbox   
Published: 0003 06 20 14:28:07
Received: 2025 06 23 11:21:42
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: New ETSI standard protects AI systems from evolving cyber threats - published over 1000 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/new-etsi-standard-protects-ai-systems-from-evolving-cyber-threats   
Published: 1025 05 22 10:45:11
Received: 2025 06 23 11:21:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: New ETSI standard protects AI systems from evolving cyber threats - published over 1000 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/new-etsi-standard-protects-ai-systems-from-evolving-cyber-threats   
Published: 1025 05 22 10:45:11
Received: 2025 06 23 11:21:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: What exactly should we be logging? - published almost 800 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/what-exactly-should-we-be-logging   
Published: 1225 12 19 14:30:18
Received: 2025 06 23 11:21:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: What exactly should we be logging? - published almost 800 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/what-exactly-should-we-be-logging   
Published: 1225 12 19 14:30:18
Received: 2025 06 23 11:21:41
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: Zero Trust: Is it right for me? - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/zero-trust-is-it-right-for-me   
Published: 2022 08 04 16:38:13
Received: 2025 06 23 11:21:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Zero Trust: Is it right for me? - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/zero-trust-is-it-right-for-me   
Published: 2022 08 04 16:38:13
Received: 2025 06 23 11:21:38
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Principles and how they can help us with assurance - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/principles-and-how-they-can-help-us-with-assurance   
Published: 2025 02 28 07:54:03
Received: 2025 06 23 11:21:33
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Principles and how they can help us with assurance - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/principles-and-how-they-can-help-us-with-assurance   
Published: 2025 02 28 07:54:03
Received: 2025 06 23 11:21:33
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: "If you have knowledge, let others light their candles in it." - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/let-others-light-candles   
Published: 2025 03 12 12:02:36
Received: 2025 06 23 11:21:17
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: "If you have knowledge, let others light their candles in it." - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/let-others-light-candles   
Published: 2025 03 12 12:02:36
Received: 2025 06 23 11:21:17
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: ACD 2.0: Insights from the external attack surface management trials - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/active-cyber-defence-2-insights-easm-trials   
Published: 2025 03 12 12:09:46
Received: 2025 06 23 11:21:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: ACD 2.0: Insights from the external attack surface management trials - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/active-cyber-defence-2-insights-easm-trials   
Published: 2025 03 12 12:09:46
Received: 2025 06 23 11:21:15
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: New cloud guidance: how to 'lift and shift' successfully - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/new-cloud-guidance-lift-shift-successfully   
Published: 2025 03 12 18:11:16
Received: 2025 06 23 11:21:06
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: New cloud guidance: how to 'lift and shift' successfully - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/new-cloud-guidance-lift-shift-successfully   
Published: 2025 03 12 18:11:16
Received: 2025 06 23 11:21:06
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Protecting PBX from cyber attacks - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/protecting-pbx-from-cyber-attacks   
Published: 2025 03 13 07:58:20
Received: 2025 06 23 11:21:04
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Protecting PBX from cyber attacks - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/protecting-pbx-from-cyber-attacks   
Published: 2025 03 13 07:58:20
Received: 2025 06 23 11:21:04
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Refreshed 'cyber security toolkit' helps board members to govern online risk - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/refreshed-toolkit-helps-board-members-to-govern-cyber-risk   
Published: 2025 03 13 08:07:19
Received: 2025 06 23 11:21:04
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Refreshed 'cyber security toolkit' helps board members to govern online risk - published 7 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/refreshed-toolkit-helps-board-members-to-govern-cyber-risk   
Published: 2025 03 13 08:07:19
Received: 2025 06 23 11:21:04
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Have you got what it takes to be a 'Cyber Advisor'? - published 3 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/have-you-got-what-it-takes-to-be-a-cyber-advisor   
Published: 2025 06 23 11:13:35
Received: 2025 06 23 11:20:56
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Have you got what it takes to be a 'Cyber Advisor'? - published 3 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/have-you-got-what-it-takes-to-be-a-cyber-advisor   
Published: 2025 06 23 11:13:35
Received: 2025 06 23 11:20:56
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Revolutionising identity services using AI - published about 1 month ago.
Content:
https://www.ncsc.gov.uk/blog-post/revolutionising-identity-services-using-ai   
Published: 2025 11 06 18:23:25
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Revolutionising identity services using AI - published about 1 month ago.
Content:
https://www.ncsc.gov.uk/blog-post/revolutionising-identity-services-using-ai   
Published: 2025 11 06 18:23:25
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: TLS 1.3: better for individuals - harder for enterprises - published 3 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/tls-13-better-individuals-harder-enterprises   
Published: 2026 01 06 17:38:30
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: TLS 1.3: better for individuals - harder for enterprises - published 3 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/tls-13-better-individuals-harder-enterprises   
Published: 2026 01 06 17:38:30
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Using MSPs to administer your cloud services - published over 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/using-msps-to-administer-your-cloud-services   
Published: 2031 06 14 04:24:24
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Using MSPs to administer your cloud services - published over 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/using-msps-to-administer-your-cloud-services   
Published: 2031 06 14 04:24:24
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: A different future for telecoms in the UK - published almost 25 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk   
Published: 2050 09 20 07:44:47
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: A different future for telecoms in the UK - published almost 25 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk   
Published: 2050 09 20 07:44:47
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: SBOMs and the importance of inventory - published almost 168 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory   
Published: 2193 09 13 08:27:29
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: SBOMs and the importance of inventory - published almost 168 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory   
Published: 2193 09 13 08:27:29
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Cloud security made easier with Serverless - published over 20224 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cloud-security-made-easier-with-serverless   
Published: 22250 03 12 12:18:05
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Cloud security made easier with Serverless - published over 20224 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cloud-security-made-easier-with-serverless   
Published: 22250 03 12 12:18:05
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing Cyber Advisors... - published almost 36253 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-cyber-advisors   
Published: 38278 07 12 13:54:38
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Introducing Cyber Advisors... - published almost 36253 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-cyber-advisors   
Published: 38278 07 12 13:54:38
Received: 2025 06 23 11:20:55
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Largest DDoS Attack to Date - published 3 months ago.
Content: It was a recently unimaginable 7.3 Tbps: The vast majority of the attack was delivered in the form of User Datagram Protocol packets. Legitimate UDP-based transmissions are used in especially time-sensitive communications, such as those for video playback, gaming applications, and DNS lookups. It speeds up communications by not formally establishing a connec...
https://www.schneier.com/blog/archives/2025/06/largest-ddos-attack-to-date.html   
Published: 2025 06 23 11:04:52
Received: 2025 06 23 11:20:22
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Largest DDoS Attack to Date - published 3 months ago.
Content: It was a recently unimaginable 7.3 Tbps: The vast majority of the attack was delivered in the form of User Datagram Protocol packets. Legitimate UDP-based transmissions are used in especially time-sensitive communications, such as those for video playback, gaming applications, and DNS lookups. It speeds up communications by not formally establishing a connec...
https://www.schneier.com/blog/archives/2025/06/largest-ddos-attack-to-date.html   
Published: 2025 06 23 11:04:52
Received: 2025 06 23 11:20:22
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Have you got what it takes to be a 'Cyber Advisor'? - published 3 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/have-you-got-what-it-takes-to-be-a-cyber-advisor   
Published: 2025 06 23 11:13:35
Received: 2025 06 23 11:20:17
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Have you got what it takes to be a 'Cyber Advisor'? - published 3 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/have-you-got-what-it-takes-to-be-a-cyber-advisor   
Published: 2025 06 23 11:13:35
Received: 2025 06 23 11:20:17
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Novel SSRF Technique Involving HTTP Redirect Loops - published 3 months ago.
Content: submitted by /u/Mempodipper [link] [comments]...
https://www.reddit.com/r/netsec/comments/1lidqqw/novel_ssrf_technique_involving_http_redirect_loops/   
Published: 2025 06 23 11:05:39
Received: 2025 06 23 11:20:14
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Novel SSRF Technique Involving HTTP Redirect Loops - published 3 months ago.
Content: submitted by /u/Mempodipper [link] [comments]...
https://www.reddit.com/r/netsec/comments/1lidqqw/novel_ssrf_technique_involving_http_redirect_loops/   
Published: 2025 06 23 11:05:39
Received: 2025 06 23 11:20:14
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained

All Articles

Ordered by Date Received : Year: "2025" Month: "06" Day: "23" Hour: "11"
Page: 1 (of 0)

Total Articles in this collection: 29


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor