All Articles

Ordered by Date Received : Year: "2021" Month: "08"
Page: << < 19 (of 164) > >>

Total Articles in this collection: 8,221

Navigation Help at the bottom of the page
Article:  ICSJWG 2021 Fall Virtual Meeting - published about 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2021/08/27/icsjwg-2021-fall-virtual-meeting   
Published: 2021 08 27 15:04:30
Received: 2021 08 27 16:01:29
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article:  ICSJWG 2021 Fall Virtual Meeting - published about 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2021/08/27/icsjwg-2021-fall-virtual-meeting   
Published: 2021 08 27 15:04:30
Received: 2021 08 27 16:01:29
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: FBI Releases Indicators of Compromise Associated with Hive Ransomware - published about 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2021/08/27/fbi-releases-indicators-compromise-associated-hive-ransomware   
Published: 2021 08 27 15:19:51
Received: 2021 08 27 16:01:29
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: FBI Releases Indicators of Compromise Associated with Hive Ransomware - published about 3 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2021/08/27/fbi-releases-indicators-compromise-associated-hive-ransomware   
Published: 2021 08 27 15:19:51
Received: 2021 08 27 16:01:29
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Windows 10 upgrades blocked by old CryptoPro CSP versions - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/windows-10-upgrades-blocked-by-old-cryptopro-csp-versions/   
Published: 2021 08 27 14:22:36
Received: 2021 08 27 16:00:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Windows 10 upgrades blocked by old CryptoPro CSP versions - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/windows-10-upgrades-blocked-by-old-cryptopro-csp-versions/   
Published: 2021 08 27 14:22:36
Received: 2021 08 27 16:00:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Boston Public Library discloses cyberattack, system-wide technical outage - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/boston-public-library-discloses-cyberattack-system-wide-technical-outage/   
Published: 2021 08 27 15:18:27
Received: 2021 08 27 16:00:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Boston Public Library discloses cyberattack, system-wide technical outage - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/boston-public-library-discloses-cyberattack-system-wide-technical-outage/   
Published: 2021 08 27 15:18:27
Received: 2021 08 27 16:00:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: ShinyHunters threat group makes their return - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95968-shinyhunters-threat-group-makes-their-return   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 16:00:06
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: ShinyHunters threat group makes their return - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95968-shinyhunters-threat-group-makes-their-return   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 16:00:06
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Twitter Begins Rolling Out Ticketed Spaces on iOS - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/twitter-begins-rolling-out-ticketed-spaces-on-ios/   
Published: 2021 08 27 14:35:12
Received: 2021 08 27 15:06:53
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Twitter Begins Rolling Out Ticketed Spaces on iOS - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/twitter-begins-rolling-out-ticketed-spaces-on-ios/   
Published: 2021 08 27 14:35:12
Received: 2021 08 27 15:06:53
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: SEC Consult SA-20210827-1 :: XML Tag injection in BSCW Server - published about 3 years ago.
Content:
http://seclists.org/fulldisclosure/2021/Aug/23   
Published: 2021 08 27 14:02:20
Received: 2021 08 27 15:00:42
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: SEC Consult SA-20210827-1 :: XML Tag injection in BSCW Server - published about 3 years ago.
Content:
http://seclists.org/fulldisclosure/2021/Aug/23   
Published: 2021 08 27 14:02:20
Received: 2021 08 27 15:00:42
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: SEC Consult SA-20210827-0 :: Authenticated RCE in BSCW Server - published about 3 years ago.
Content:
http://seclists.org/fulldisclosure/2021/Aug/24   
Published: 2021 08 27 14:02:25
Received: 2021 08 27 15:00:42
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: SEC Consult SA-20210827-0 :: Authenticated RCE in BSCW Server - published about 3 years ago.
Content:
http://seclists.org/fulldisclosure/2021/Aug/24   
Published: 2021 08 27 14:02:25
Received: 2021 08 27 15:00:42
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2021-39291 (nb1600_firmware, nb1601_firmware, nb1800_firmware, nb1810_firmware, nb2700_firmware, nb2710_firmware, nb2800_firmware, nb2810_firmware, nb3700_firmware, nb3701_firmware, nb3710_firmware, nb3711_firmware, nb3720_firmware, nb3800_firmware, nb800_firmware) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39291   
Published: 2021 08 23 05:15:08
Received: 2021 08 27 15:00:30
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39291 (nb1600_firmware, nb1601_firmware, nb1800_firmware, nb1810_firmware, nb2700_firmware, nb2710_firmware, nb2800_firmware, nb2810_firmware, nb3700_firmware, nb3701_firmware, nb3710_firmware, nb3711_firmware, nb3720_firmware, nb3800_firmware, nb800_firmware) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39291   
Published: 2021 08 23 05:15:08
Received: 2021 08 27 15:00:30
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2021-39290 (nb1600_firmware, nb1601_firmware, nb1800_firmware, nb1810_firmware, nb2700_firmware, nb2710_firmware, nb2800_firmware, nb2810_firmware, nb3700_firmware, nb3701_firmware, nb3710_firmware, nb3711_firmware, nb3720_firmware, nb3800_firmware, nb800_firmware) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39290   
Published: 2021 08 23 05:15:08
Received: 2021 08 27 15:00:30
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39290 (nb1600_firmware, nb1601_firmware, nb1800_firmware, nb1810_firmware, nb2700_firmware, nb2710_firmware, nb2800_firmware, nb2810_firmware, nb3700_firmware, nb3701_firmware, nb3710_firmware, nb3711_firmware, nb3720_firmware, nb3800_firmware, nb800_firmware) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39290   
Published: 2021 08 23 05:15:08
Received: 2021 08 27 15:00:30
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39169 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39169   
Published: 2021 08 27 13:15:07
Received: 2021 08 27 15:00:30
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39169 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39169   
Published: 2021 08 27 13:15:07
Received: 2021 08 27 15:00:30
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: CVE-2021-3693 (debian_linux, ledgersmb) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3693   
Published: 2021 08 23 13:15:07
Received: 2021 08 27 15:00:29
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-3693 (debian_linux, ledgersmb) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3693   
Published: 2021 08 23 13:15:07
Received: 2021 08 27 15:00:29
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2021-24658 (erident_custom_login_and_dashboard) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24658   
Published: 2021 08 23 12:15:10
Received: 2021 08 27 15:00:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-24658 (erident_custom_login_and_dashboard) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24658   
Published: 2021 08 23 12:15:10
Received: 2021 08 27 15:00:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-24574 (simple_banner) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24574   
Published: 2021 08 23 12:15:10
Received: 2021 08 27 15:00:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-24574 (simple_banner) - published over 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24574   
Published: 2021 08 23 12:15:10
Received: 2021 08 27 15:00:21
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Windows 10 upgrades blocked by old CryptoPro SCP versions - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/windows-10-upgrades-blocked-by-old-cryptopro-scp-versions/   
Published: 2021 08 27 14:22:36
Received: 2021 08 27 15:00:08
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Windows 10 upgrades blocked by old CryptoPro SCP versions - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/windows-10-upgrades-blocked-by-old-cryptopro-scp-versions/   
Published: 2021 08 27 14:22:36
Received: 2021 08 27 15:00:08
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Deals: Amazon Drops Price of 256GB M1 MacBook Air to New Low of $849.99 ($149 Off) - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/deals-amazon-drops-macbook-air/   
Published: 2021 08 27 13:16:06
Received: 2021 08 27 14:07:04
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Deals: Amazon Drops Price of 256GB M1 MacBook Air to New Low of $849.99 ($149 Off) - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/deals-amazon-drops-macbook-air/   
Published: 2021 08 27 13:16:06
Received: 2021 08 27 14:07:04
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Watch Series 7 Clones Emerge in China - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/apple-watch-series-7-clones-emerge-in-china/   
Published: 2021 08 27 13:40:53
Received: 2021 08 27 14:07:04
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Watch Series 7 Clones Emerge in China - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/apple-watch-series-7-clones-emerge-in-china/   
Published: 2021 08 27 13:40:53
Received: 2021 08 27 14:07:04
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Notice to Developers: You Could Be Entitled to Between a $250 and $30,000 Payment From Apple - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/apple-small-developer-assistance-fund/   
Published: 2021 08 27 13:55:44
Received: 2021 08 27 14:07:04
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Notice to Developers: You Could Be Entitled to Between a $250 and $30,000 Payment From Apple - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/apple-small-developer-assistance-fund/   
Published: 2021 08 27 13:55:44
Received: 2021 08 27 14:07:04
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Details of the Recent T-Mobile Breach - published about 3 years ago.
Content: Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security. I’ve lost count of how many times T-Mobile has been hacked. ...
https://www.schneier.com/blog/archives/2021/08/details-of-the-recent-t-mobile-breach.html   
Published: 2021 08 27 13:37:12
Received: 2021 08 27 14:06:59
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Details of the Recent T-Mobile Breach - published about 3 years ago.
Content: Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security. I’ve lost count of how many times T-Mobile has been hacked. ...
https://www.schneier.com/blog/archives/2021/08/details-of-the-recent-t-mobile-breach.html   
Published: 2021 08 27 13:37:12
Received: 2021 08 27 14:06:59
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor - published about 3 years ago.
Content:
https://threatpost.com/ragnarok-releases-decryptor/168976/   
Published: 2021 08 27 13:50:44
Received: 2021 08 27 14:01:01
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor - published about 3 years ago.
Content:
https://threatpost.com/ragnarok-releases-decryptor/168976/   
Published: 2021 08 27 13:50:44
Received: 2021 08 27 14:01:01
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Top Strategies That Define the Success of a Modern Vulnerability Management Program - published about 3 years ago.
Content:
https://threatpost.com/top-strategies-that-define-the-success-of-a-modern-vulnerability-management-program/168604/   
Published: 2021 08 27 13:00:36
Received: 2021 08 27 14:00:50
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Top Strategies That Define the Success of a Modern Vulnerability Management Program - published about 3 years ago.
Content:
https://threatpost.com/top-strategies-that-define-the-success-of-a-modern-vulnerability-management-program/168604/   
Published: 2021 08 27 13:00:36
Received: 2021 08 27 14:00:50
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Fake DMCA complaints, DDoS threats lead to BazaLoader malware - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/fake-dmca-complaints-ddos-threats-lead-to-bazaloader-malware/   
Published: 2021 08 27 13:30:54
Received: 2021 08 27 14:00:34
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Fake DMCA complaints, DDoS threats lead to BazaLoader malware - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/fake-dmca-complaints-ddos-threats-lead-to-bazaloader-malware/   
Published: 2021 08 27 13:30:54
Received: 2021 08 27 14:00:34
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Top Strategies That Define the Success of a Modern Vulnerability Management Program - published about 3 years ago.
Content:
https://threatpost.com/top-strategies-that-define-the-success-of-a-modern-vulnerability-management-program/168604/   
Published: 2021 08 27 13:00:36
Received: 2021 08 27 14:00:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Top Strategies That Define the Success of a Modern Vulnerability Management Program - published about 3 years ago.
Content:
https://threatpost.com/top-strategies-that-define-the-success-of-a-modern-vulnerability-management-program/168604/   
Published: 2021 08 27 13:00:36
Received: 2021 08 27 14:00:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor - published about 3 years ago.
Content:
https://threatpost.com/ragnarok-releases-decryptor/168976/   
Published: 2021 08 27 13:50:44
Received: 2021 08 27 14:00:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor - published about 3 years ago.
Content:
https://threatpost.com/ragnarok-releases-decryptor/168976/   
Published: 2021 08 27 13:50:44
Received: 2021 08 27 14:00:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: adalanche - Active Directory ACL Visualizer and Explorer - published about 3 years ago.
Content:
http://www.kitploit.com/2021/08/adalanche-active-directory-acl.html   
Published: 2021 08 27 12:30:00
Received: 2021 08 27 13:07:16
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: adalanche - Active Directory ACL Visualizer and Explorer - published about 3 years ago.
Content:
http://www.kitploit.com/2021/08/adalanche-active-directory-acl.html   
Published: 2021 08 27 12:30:00
Received: 2021 08 27 13:07:16
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: [webapps] COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50231   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 13:01:38
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50231   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 13:01:38
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: [webapps] COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50232   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 13:01:38
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50232   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 13:01:38
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin - published about 3 years ago.
Content:
https://threatpost.com/man-sues-parents-teens-hijacked-1m-bitcoin/168964/   
Published: 2021 08 26 20:50:23
Received: 2021 08 27 13:00:52
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Article: Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin - published about 3 years ago.
Content:
https://threatpost.com/man-sues-parents-teens-hijacked-1m-bitcoin/168964/   
Published: 2021 08 26 20:50:23
Received: 2021 08 27 13:00:52
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:52
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:52
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: F5 Bug Could Lead to Complete System Takeover - published about 3 years ago.
Content:
https://threatpost.com/f5-critical-bug-system-takeover/168952/   
Published: 2021 08 26 16:40:38
Received: 2021 08 27 13:00:44
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: F5 Bug Could Lead to Complete System Takeover - published about 3 years ago.
Content:
https://threatpost.com/f5-critical-bug-system-takeover/168952/   
Published: 2021 08 26 16:40:38
Received: 2021 08 27 13:00:44
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:44
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:44
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: Podcast: Ransomware Up x10: Disrupting Cybercrime Suppy Chains an Opportunity - published over 3 years ago.
Content:
https://threatpost.com/podcast-ransomware-up-tenfold-telecoms/168913/   
Published: 2021 08 26 13:00:11
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Podcast: Ransomware Up x10: Disrupting Cybercrime Suppy Chains an Opportunity - published over 3 years ago.
Content:
https://threatpost.com/podcast-ransomware-up-tenfold-telecoms/168913/   
Published: 2021 08 26 13:00:11
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: F5 Bug Could Lead to Complete System Takeover - published about 3 years ago.
Content:
https://threatpost.com/f5-critical-bug-system-takeover/168952/   
Published: 2021 08 26 16:40:38
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: F5 Bug Could Lead to Complete System Takeover - published about 3 years ago.
Content:
https://threatpost.com/f5-critical-bug-system-takeover/168952/   
Published: 2021 08 26 16:40:38
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin - published about 3 years ago.
Content:
https://threatpost.com/man-sues-parents-teens-hijacked-1m-bitcoin/168964/   
Published: 2021 08 26 20:50:23
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin - published about 3 years ago.
Content:
https://threatpost.com/man-sues-parents-teens-hijacked-1m-bitcoin/168964/   
Published: 2021 08 26 20:50:23
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2021-35342 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35342   
Published: 2021 08 27 10:15:07
Received: 2021 08 27 13:00:26
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-35342 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35342   
Published: 2021 08 27 10:15:07
Received: 2021 08 27 13:00:26
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: Preventing toxic landfill fires with thermal surveillance - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95967-preventing-toxic-landfill-fires-with-thermal-surveillance   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 13:00:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Preventing toxic landfill fires with thermal surveillance - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95967-preventing-toxic-landfill-fires-with-thermal-surveillance   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 13:00:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Microsoft warns Azure customers of critical Cosmos DB vulnerability - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-azure-customers-of-critical-cosmos-db-vulnerability/   
Published: 2021 08 27 12:52:03
Received: 2021 08 27 13:00:10
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft warns Azure customers of critical Cosmos DB vulnerability - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-azure-customers-of-critical-cosmos-db-vulnerability/   
Published: 2021 08 27 12:52:03
Received: 2021 08 27 13:00:10
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Berkeley High alum, 19, posted stolen nude photos of underage girls online, police say - published about 3 years ago.
Content:
https://www.databreaches.net/berkeley-high-alum-19-posted-stolen-nude-photos-of-underage-girls-online-police-say/   
Published: 2021 08 27 11:14:28
Received: 2021 08 27 12:00:34
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Berkeley High alum, 19, posted stolen nude photos of underage girls online, police say - published about 3 years ago.
Content:
https://www.databreaches.net/berkeley-high-alum-19-posted-stolen-nude-photos-of-underage-girls-online-police-say/   
Published: 2021 08 27 11:14:28
Received: 2021 08 27 12:00:34
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: FBI Palantir glitch allowed unauthorized access to private data - published about 3 years ago.
Content:
https://www.databreaches.net/fbi-palantir-glitch-allowed-unauthorized-access-to-private-data/   
Published: 2021 08 27 11:14:45
Received: 2021 08 27 12:00:34
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: FBI Palantir glitch allowed unauthorized access to private data - published about 3 years ago.
Content:
https://www.databreaches.net/fbi-palantir-glitch-allowed-unauthorized-access-to-private-data/   
Published: 2021 08 27 11:14:45
Received: 2021 08 27 12:00:34
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: 5 minutes with Jeff Spoerndle - Planning for domestic violent extremism in large venues - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95966-minutes-with-jeff-spoerndle---planning-for-domestic-violent-extremism-in-large-venues   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 12:00:30
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: 5 minutes with Jeff Spoerndle - Planning for domestic violent extremism in large venues - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95966-minutes-with-jeff-spoerndle---planning-for-domestic-violent-extremism-in-large-venues   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 12:00:30
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/microsoft-google-to-invest-30-billion.html   
Published: 2021 08 28 16:09:58
Received: 2021 08 27 11:00:45
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/microsoft-google-to-invest-30-billion.html   
Published: 2021 08 28 16:09:58
Received: 2021 08 27 11:00:45
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: CVE-2021-40142 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-40142   
Published: 2021 08 27 07:15:08
Received: 2021 08 27 11:00:33
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-40142 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-40142   
Published: 2021 08 27 07:15:08
Received: 2021 08 27 11:00:33
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/microsoft-google-to-invest-30-billion.html   
Published: 2021 08 28 16:09:58
Received: 2021 08 27 11:00:07
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/microsoft-google-to-invest-30-billion.html   
Published: 2021 08 28 16:09:58
Received: 2021 08 27 11:00:07
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Kaseya Issues Patches for Two New 0-Day Flaws Affecting Unitrends Servers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/kaseya-issues-patches-for-two-new-0-day.html   
Published: 2021 08 27 09:24:09
Received: 2021 08 27 10:01:00
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Kaseya Issues Patches for Two New 0-Day Flaws Affecting Unitrends Servers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/kaseya-issues-patches-for-two-new-0-day.html   
Published: 2021 08 27 09:24:09
Received: 2021 08 27 10:01:00
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Weekly Threat Report 27th August 2021 - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-27th-august-2021   
Published: 2021 08 26 23:00:00
Received: 2021 08 27 09:08:06
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 27th August 2021 - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-27th-august-2021   
Published: 2021 08 26 23:00:00
Received: 2021 08 27 09:08:06
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Google Could Pay Apple $15 Billion to Maintain Default iOS Search Engine Status in 2021, Suggests Analyst - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/google-could-pay-apple-15-billion-default-search/   
Published: 2021 08 27 08:34:11
Received: 2021 08 27 09:07:35
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Google Could Pay Apple $15 Billion to Maintain Default iOS Search Engine Status in 2021, Suggests Analyst - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/google-could-pay-apple-15-billion-default-search/   
Published: 2021 08 27 08:34:11
Received: 2021 08 27 09:07:35
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Weekly Threat Report 27th August 2021 - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-27th-august-2021   
Published: 2021 08 26 23:00:00
Received: 2021 08 27 09:04:07
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Weekly Threat Report 27th August 2021 - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-27th-august-2021   
Published: 2021 08 26 23:00:00
Received: 2021 08 27 09:04:07
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: [webapps] CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated) - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50230   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 09:04:06
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated) - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50230   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 09:04:06
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Malicious actors deploying Gootkit Loader on Australian Networks - published about 3 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/alerts/malicious-actors-deploying-gootkit-loader-australian-networks   
Published: 2021 08 27 12:00:00
Received: 2021 08 27 09:01:32
Feed: ACSC – Alerts
Source: Australian Cyber Security Centre (ACSC)
Category: Alerts
Topic: Cyber Security
Article: Malicious actors deploying Gootkit Loader on Australian Networks - published about 3 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/alerts/malicious-actors-deploying-gootkit-loader-australian-networks   
Published: 2021 08 27 12:00:00
Received: 2021 08 27 09:01:32
Feed: ACSC – Alerts
Source: Australian Cyber Security Centre (ACSC)
Category: Alerts
Topic: Cyber Security
Article: First Episode of 'See' Season Two Premieres on Apple TV+ - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/see-second-season-premieres-apple-tv-plus/   
Published: 2021 08 27 08:05:35
Received: 2021 08 27 08:07:56
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: First Episode of 'See' Season Two Premieres on Apple TV+ - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/see-second-season-premieres-apple-tv-plus/   
Published: 2021 08 27 08:05:35
Received: 2021 08 27 08:07:56
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: 2021-007: Malicious actors deploying Gootkit Loader on Australian Networks - published about 3 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/advisories/2021-007-malicious-actors-deploying-gootkit-loader-australian-networks   
Published: 2021 08 27 12:00:00
Received: 2021 08 27 08:01:37
Feed: ACSC – Advisories
Source: Australian Cyber Security Centre (ACSC)
Category: Advisories
Topic: Cyber Security
Article: 2021-007: Malicious actors deploying Gootkit Loader on Australian Networks - published about 3 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/advisories/2021-007-malicious-actors-deploying-gootkit-loader-australian-networks   
Published: 2021 08 27 12:00:00
Received: 2021 08 27 08:01:37
Feed: ACSC – Advisories
Source: Australian Cyber Security Centre (ACSC)
Category: Advisories
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: F5 Releases Critical Security Patch for BIG-IP and BIG-IQ Devices - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/f5-releases-critical-security-patches.html   
Published: 2021 08 27 07:48:49
Received: 2021 08 27 08:00:44
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: F5 Releases Critical Security Patch for BIG-IP and BIG-IQ Devices - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/f5-releases-critical-security-patches.html   
Published: 2021 08 27 07:48:49
Received: 2021 08 27 08:00:44
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/critical-cosmos-database-flaw-affected.html   
Published: 2021 08 27 07:59:36
Received: 2021 08 27 08:00:44
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/critical-cosmos-database-flaw-affected.html   
Published: 2021 08 27 07:59:36
Received: 2021 08 27 08:00:44
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: F5 Releases Critical Security Patch for BIG-IP and BIG-IQ Devices - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/f5-releases-critical-security-patches.html   
Published: 2021 08 27 07:48:49
Received: 2021 08 27 08:00:23
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: F5 Releases Critical Security Patch for BIG-IP and BIG-IQ Devices - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/f5-releases-critical-security-patches.html   
Published: 2021 08 27 07:48:49
Received: 2021 08 27 08:00:23
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/critical-cosmos-database-flaw-affected.html   
Published: 2021 08 27 07:59:36
Received: 2021 08 27 08:00:23
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/critical-cosmos-database-flaw-affected.html   
Published: 2021 08 27 07:59:36
Received: 2021 08 27 08:00:23
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Risky Business: Why CS Risk is Never Worth the Price - published about 3 years ago.
Content: submitted by /u/SnooSongs2448 [link] [comments]
https://www.reddit.com/r/netsec/comments/pcdd9z/risky_business_why_cs_risk_is_never_worth_the/   
Published: 2021 08 27 01:37:36
Received: 2021 08 27 07:05:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Risky Business: Why CS Risk is Never Worth the Price - published about 3 years ago.
Content: submitted by /u/SnooSongs2448 [link] [comments]
https://www.reddit.com/r/netsec/comments/pcdd9z/risky_business_why_cs_risk_is_never_worth_the/   
Published: 2021 08 27 01:37:36
Received: 2021 08 27 07:05:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: ChaosDB - Vulnerability in Azure Cosmos DB affecting thousands of customers - Manual Actions Required - published about 3 years ago.
Content: submitted by /u/sagitz_ [link] [comments]
https://www.reddit.com/r/netsec/comments/pcbpgb/chaosdb_vulnerability_in_azure_cosmos_db/   
Published: 2021 08 26 23:57:15
Received: 2021 08 27 07:05:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: ChaosDB - Vulnerability in Azure Cosmos DB affecting thousands of customers - Manual Actions Required - published about 3 years ago.
Content: submitted by /u/sagitz_ [link] [comments]
https://www.reddit.com/r/netsec/comments/pcbpgb/chaosdb_vulnerability_in_azure_cosmos_db/   
Published: 2021 08 26 23:57:15
Received: 2021 08 27 07:05:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: New infosec products of the week: August 27, 2021 - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/new-infosec-products-of-the-week-august-27-2021/   
Published: 2021 08 27 06:00:52
Received: 2021 08 27 07:05:15
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: New infosec products of the week: August 27, 2021 - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/new-infosec-products-of-the-week-august-27-2021/   
Published: 2021 08 27 06:00:52
Received: 2021 08 27 07:05:15
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: ProcessMaker 3.5.4 Local File inclusion - published about 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2021080095   
Published: 2021 08 27 06:06:31
Received: 2021 08 27 06:08:29
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: ProcessMaker 3.5.4 Local File inclusion - published about 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2021080095   
Published: 2021 08 27 06:06:31
Received: 2021 08 27 06:08:29
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: IndiaMART - 20,154,583 breached accounts - published about 3 years ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#IndiaMART   
Published: 2021 08 27 05:33:29
Received: 2021 08 27 06:08:20
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Article: IndiaMART - 20,154,583 breached accounts - published about 3 years ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#IndiaMART   
Published: 2021 08 27 05:33:29
Received: 2021 08 27 06:08:20
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Weekly Update 258 - published about 3 years ago.
Content: Presently sponsored by: 1Password is a secure password manager and digital wallet that keeps you safe onlineA really brief intro as this is my last key strokes before going properly off the grid for the next week (like really off the grid, middle of nowhere style). Lots of little things this week, hoping next week will be the big "hey, Pwned Passwords just p...
https://www.troyhunt.com/weekly-update-258/   
Published: 2021 08 27 06:02:50
Received: 2021 08 27 06:06:16
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 258 - published about 3 years ago.
Content: Presently sponsored by: 1Password is a secure password manager and digital wallet that keeps you safe onlineA really brief intro as this is my last key strokes before going properly off the grid for the next week (like really off the grid, middle of nowhere style). Lots of little things this week, hoping next week will be the big "hey, Pwned Passwords just p...
https://www.troyhunt.com/weekly-update-258/   
Published: 2021 08 27 06:02:50
Received: 2021 08 27 06:06:16
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trends in the OT/ICS security space and what’s to come - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/ot-ics-security-space/   
Published: 2021 08 27 05:00:08
Received: 2021 08 27 06:06:16
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Trends in the OT/ICS security space and what’s to come - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/ot-ics-security-space/   
Published: 2021 08 27 05:00:08
Received: 2021 08 27 06:06:16
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Your data, your choice - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/your-data-your-choice/   
Published: 2021 08 27 05:30:07
Received: 2021 08 27 06:06:16
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Your data, your choice - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/your-data-your-choice/   
Published: 2021 08 27 05:30:07
Received: 2021 08 27 06:06:16
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2021-39168 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39168   
Published: 2021 08 27 00:15:07
Received: 2021 08 27 06:00:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39168 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39168   
Published: 2021 08 27 00:15:07
Received: 2021 08 27 06:00:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39167 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39167   
Published: 2021 08 27 00:15:06
Received: 2021 08 27 06:00:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39167 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39167   
Published: 2021 08 27 00:15:06
Received: 2021 08 27 06:00:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: Risk assessment needs a redo - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95965-risk-assessment-needs-a-redo   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 05:07:42
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Risk assessment needs a redo - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95965-risk-assessment-needs-a-redo   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 05:07:42
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Challenges organizations face when implementing zero trust architecture - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/implementing-zero-trust-architecture/   
Published: 2021 08 27 04:00:55
Received: 2021 08 27 05:05:50
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Challenges organizations face when implementing zero trust architecture - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/implementing-zero-trust-architecture/   
Published: 2021 08 27 04:00:55
Received: 2021 08 27 05:05:50
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Risk assessment needs a redo - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95965-risk-assessment-needs-a-redo   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 05:00:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Risk assessment needs a redo - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95965-risk-assessment-needs-a-redo   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 05:00:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained

All Articles

Ordered by Date Received : Year: "2021" Month: "08"
Page: << < 19 (of 164) > >>

Total Articles in this collection: 8,221


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor