All Articles

Ordered by Date Received : Year: "2021" Month: "08" Day: "27"
Page: << < 4 (of 5) > >>

Total Articles in this collection: 251

Navigation Help at the bottom of the page
Article: Notice to Developers: You Could Be Entitled to Between a $250 and $30,000 Payment From Apple - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/apple-small-developer-assistance-fund/   
Published: 2021 08 27 13:55:44
Received: 2021 08 27 14:07:04
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Notice to Developers: You Could Be Entitled to Between a $250 and $30,000 Payment From Apple - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/apple-small-developer-assistance-fund/   
Published: 2021 08 27 13:55:44
Received: 2021 08 27 14:07:04
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Details of the Recent T-Mobile Breach - published about 3 years ago.
Content: Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security. I’ve lost count of how many times T-Mobile has been hacked. ...
https://www.schneier.com/blog/archives/2021/08/details-of-the-recent-t-mobile-breach.html   
Published: 2021 08 27 13:37:12
Received: 2021 08 27 14:06:59
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: Details of the Recent T-Mobile Breach - published about 3 years ago.
Content: Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security. I’ve lost count of how many times T-Mobile has been hacked. ...
https://www.schneier.com/blog/archives/2021/08/details-of-the-recent-t-mobile-breach.html   
Published: 2021 08 27 13:37:12
Received: 2021 08 27 14:06:59
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor - published about 3 years ago.
Content:
https://threatpost.com/ragnarok-releases-decryptor/168976/   
Published: 2021 08 27 13:50:44
Received: 2021 08 27 14:01:01
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Article: Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor - published about 3 years ago.
Content:
https://threatpost.com/ragnarok-releases-decryptor/168976/   
Published: 2021 08 27 13:50:44
Received: 2021 08 27 14:01:01
Feed: Threatpost – Cryptography
Source: Threatpost
Category: News
Topic: Cryptography
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Top Strategies That Define the Success of a Modern Vulnerability Management Program - published about 3 years ago.
Content:
https://threatpost.com/top-strategies-that-define-the-success-of-a-modern-vulnerability-management-program/168604/   
Published: 2021 08 27 13:00:36
Received: 2021 08 27 14:00:50
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Top Strategies That Define the Success of a Modern Vulnerability Management Program - published about 3 years ago.
Content:
https://threatpost.com/top-strategies-that-define-the-success-of-a-modern-vulnerability-management-program/168604/   
Published: 2021 08 27 13:00:36
Received: 2021 08 27 14:00:50
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Fake DMCA complaints, DDoS threats lead to BazaLoader malware - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/fake-dmca-complaints-ddos-threats-lead-to-bazaloader-malware/   
Published: 2021 08 27 13:30:54
Received: 2021 08 27 14:00:34
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Fake DMCA complaints, DDoS threats lead to BazaLoader malware - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/security/fake-dmca-complaints-ddos-threats-lead-to-bazaloader-malware/   
Published: 2021 08 27 13:30:54
Received: 2021 08 27 14:00:34
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Top Strategies That Define the Success of a Modern Vulnerability Management Program - published about 3 years ago.
Content:
https://threatpost.com/top-strategies-that-define-the-success-of-a-modern-vulnerability-management-program/168604/   
Published: 2021 08 27 13:00:36
Received: 2021 08 27 14:00:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Top Strategies That Define the Success of a Modern Vulnerability Management Program - published about 3 years ago.
Content:
https://threatpost.com/top-strategies-that-define-the-success-of-a-modern-vulnerability-management-program/168604/   
Published: 2021 08 27 13:00:36
Received: 2021 08 27 14:00:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor - published about 3 years ago.
Content:
https://threatpost.com/ragnarok-releases-decryptor/168976/   
Published: 2021 08 27 13:50:44
Received: 2021 08 27 14:00:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor - published about 3 years ago.
Content:
https://threatpost.com/ragnarok-releases-decryptor/168976/   
Published: 2021 08 27 13:50:44
Received: 2021 08 27 14:00:04
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: adalanche - Active Directory ACL Visualizer and Explorer - published about 3 years ago.
Content:
http://www.kitploit.com/2021/08/adalanche-active-directory-acl.html   
Published: 2021 08 27 12:30:00
Received: 2021 08 27 13:07:16
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: adalanche - Active Directory ACL Visualizer and Explorer - published about 3 years ago.
Content:
http://www.kitploit.com/2021/08/adalanche-active-directory-acl.html   
Published: 2021 08 27 12:30:00
Received: 2021 08 27 13:07:16
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: [webapps] COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50231   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 13:01:38
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50231   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 13:01:38
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: [webapps] COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50232   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 13:01:38
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50232   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 13:01:38
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin - published about 3 years ago.
Content:
https://threatpost.com/man-sues-parents-teens-hijacked-1m-bitcoin/168964/   
Published: 2021 08 26 20:50:23
Received: 2021 08 27 13:00:52
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Article: Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin - published about 3 years ago.
Content:
https://threatpost.com/man-sues-parents-teens-hijacked-1m-bitcoin/168964/   
Published: 2021 08 26 20:50:23
Received: 2021 08 27 13:00:52
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:52
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:52
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: F5 Bug Could Lead to Complete System Takeover - published about 3 years ago.
Content:
https://threatpost.com/f5-critical-bug-system-takeover/168952/   
Published: 2021 08 26 16:40:38
Received: 2021 08 27 13:00:44
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: F5 Bug Could Lead to Complete System Takeover - published about 3 years ago.
Content:
https://threatpost.com/f5-critical-bug-system-takeover/168952/   
Published: 2021 08 26 16:40:38
Received: 2021 08 27 13:00:44
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:44
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:44
Feed: Threatpost – Vulnerabilities
Source: Threatpost
Category: News
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Podcast: Ransomware Up x10: Disrupting Cybercrime Suppy Chains an Opportunity - published about 3 years ago.
Content:
https://threatpost.com/podcast-ransomware-up-tenfold-telecoms/168913/   
Published: 2021 08 26 13:00:11
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Podcast: Ransomware Up x10: Disrupting Cybercrime Suppy Chains an Opportunity - published about 3 years ago.
Content:
https://threatpost.com/podcast-ransomware-up-tenfold-telecoms/168913/   
Published: 2021 08 26 13:00:11
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: F5 Bug Could Lead to Complete System Takeover - published about 3 years ago.
Content:
https://threatpost.com/f5-critical-bug-system-takeover/168952/   
Published: 2021 08 26 16:40:38
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: F5 Bug Could Lead to Complete System Takeover - published about 3 years ago.
Content:
https://threatpost.com/f5-critical-bug-system-takeover/168952/   
Published: 2021 08 26 16:40:38
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin - published about 3 years ago.
Content:
https://threatpost.com/man-sues-parents-teens-hijacked-1m-bitcoin/168964/   
Published: 2021 08 26 20:50:23
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin - published about 3 years ago.
Content:
https://threatpost.com/man-sues-parents-teens-hijacked-1m-bitcoin/168964/   
Published: 2021 08 26 20:50:23
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: ‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast - published about 3 years ago.
Content:
https://threatpost.com/ransom-humpty-dumpty-podcast/168962/   
Published: 2021 08 27 12:00:38
Received: 2021 08 27 13:00:42
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2021-35342 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35342   
Published: 2021 08 27 10:15:07
Received: 2021 08 27 13:00:26
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-35342 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35342   
Published: 2021 08 27 10:15:07
Received: 2021 08 27 13:00:26
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Preventing toxic landfill fires with thermal surveillance - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95967-preventing-toxic-landfill-fires-with-thermal-surveillance   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 13:00:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Preventing toxic landfill fires with thermal surveillance - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95967-preventing-toxic-landfill-fires-with-thermal-surveillance   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 13:00:10
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Microsoft warns Azure customers of critical Cosmos DB vulnerability - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-azure-customers-of-critical-cosmos-db-vulnerability/   
Published: 2021 08 27 12:52:03
Received: 2021 08 27 13:00:10
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft warns Azure customers of critical Cosmos DB vulnerability - published about 3 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-azure-customers-of-critical-cosmos-db-vulnerability/   
Published: 2021 08 27 12:52:03
Received: 2021 08 27 13:00:10
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Berkeley High alum, 19, posted stolen nude photos of underage girls online, police say - published about 3 years ago.
Content:
https://www.databreaches.net/berkeley-high-alum-19-posted-stolen-nude-photos-of-underage-girls-online-police-say/   
Published: 2021 08 27 11:14:28
Received: 2021 08 27 12:00:34
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Berkeley High alum, 19, posted stolen nude photos of underage girls online, police say - published about 3 years ago.
Content:
https://www.databreaches.net/berkeley-high-alum-19-posted-stolen-nude-photos-of-underage-girls-online-police-say/   
Published: 2021 08 27 11:14:28
Received: 2021 08 27 12:00:34
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: FBI Palantir glitch allowed unauthorized access to private data - published about 3 years ago.
Content:
https://www.databreaches.net/fbi-palantir-glitch-allowed-unauthorized-access-to-private-data/   
Published: 2021 08 27 11:14:45
Received: 2021 08 27 12:00:34
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: FBI Palantir glitch allowed unauthorized access to private data - published about 3 years ago.
Content:
https://www.databreaches.net/fbi-palantir-glitch-allowed-unauthorized-access-to-private-data/   
Published: 2021 08 27 11:14:45
Received: 2021 08 27 12:00:34
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: 5 minutes with Jeff Spoerndle - Planning for domestic violent extremism in large venues - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95966-minutes-with-jeff-spoerndle---planning-for-domestic-violent-extremism-in-large-venues   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 12:00:30
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: 5 minutes with Jeff Spoerndle - Planning for domestic violent extremism in large venues - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/95966-minutes-with-jeff-spoerndle---planning-for-domestic-violent-extremism-in-large-venues   
Published: 2021 08 27 04:00:00
Received: 2021 08 27 12:00:30
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/microsoft-google-to-invest-30-billion.html   
Published: 2021 08 28 16:09:58
Received: 2021 08 27 11:00:45
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/microsoft-google-to-invest-30-billion.html   
Published: 2021 08 28 16:09:58
Received: 2021 08 27 11:00:45
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2021-40142 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-40142   
Published: 2021 08 27 07:15:08
Received: 2021 08 27 11:00:33
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-40142 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-40142   
Published: 2021 08 27 07:15:08
Received: 2021 08 27 11:00:33
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/microsoft-google-to-invest-30-billion.html   
Published: 2021 08 28 16:09:58
Received: 2021 08 27 11:00:07
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/microsoft-google-to-invest-30-billion.html   
Published: 2021 08 28 16:09:58
Received: 2021 08 27 11:00:07
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Kaseya Issues Patches for Two New 0-Day Flaws Affecting Unitrends Servers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/kaseya-issues-patches-for-two-new-0-day.html   
Published: 2021 08 27 09:24:09
Received: 2021 08 27 10:01:00
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Kaseya Issues Patches for Two New 0-Day Flaws Affecting Unitrends Servers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/kaseya-issues-patches-for-two-new-0-day.html   
Published: 2021 08 27 09:24:09
Received: 2021 08 27 10:01:00
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Weekly Threat Report 27th August 2021 - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-27th-august-2021   
Published: 2021 08 26 23:00:00
Received: 2021 08 27 09:08:06
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Weekly Threat Report 27th August 2021 - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-27th-august-2021   
Published: 2021 08 26 23:00:00
Received: 2021 08 27 09:08:06
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Google Could Pay Apple $15 Billion to Maintain Default iOS Search Engine Status in 2021, Suggests Analyst - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/google-could-pay-apple-15-billion-default-search/   
Published: 2021 08 27 08:34:11
Received: 2021 08 27 09:07:35
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Google Could Pay Apple $15 Billion to Maintain Default iOS Search Engine Status in 2021, Suggests Analyst - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/google-could-pay-apple-15-billion-default-search/   
Published: 2021 08 27 08:34:11
Received: 2021 08 27 09:07:35
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Weekly Threat Report 27th August 2021 - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-27th-august-2021   
Published: 2021 08 26 23:00:00
Received: 2021 08 27 09:04:07
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Article: Weekly Threat Report 27th August 2021 - published about 3 years ago.
Content:
https://www.ncsc.gov.uk/report/weekly-threat-report-27th-august-2021   
Published: 2021 08 26 23:00:00
Received: 2021 08 27 09:04:07
Feed: NCSC – Report Feed
Source: National Cyber Security Centre (NCSC)
Category: Reports
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: [webapps] CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated) - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50230   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 09:04:06
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: [webapps] CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated) - published about 3 years ago.
Content:
https://www.exploit-db.com/exploits/50230   
Published: 2021 08 27 00:00:00
Received: 2021 08 27 09:04:06
Feed: Exploit-DB updates
Source: Exploit-DB updates
Category: News
Topic: Hacking
Article: Malicious actors deploying Gootkit Loader on Australian Networks - published about 3 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/alerts/malicious-actors-deploying-gootkit-loader-australian-networks   
Published: 2021 08 27 12:00:00
Received: 2021 08 27 09:01:32
Feed: ACSC – Alerts
Source: Australian Cyber Security Centre (ACSC)
Category: Alerts
Topic: Cyber Security
Article: Malicious actors deploying Gootkit Loader on Australian Networks - published about 3 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/alerts/malicious-actors-deploying-gootkit-loader-australian-networks   
Published: 2021 08 27 12:00:00
Received: 2021 08 27 09:01:32
Feed: ACSC – Alerts
Source: Australian Cyber Security Centre (ACSC)
Category: Alerts
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: First Episode of 'See' Season Two Premieres on Apple TV+ - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/see-second-season-premieres-apple-tv-plus/   
Published: 2021 08 27 08:05:35
Received: 2021 08 27 08:07:56
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: First Episode of 'See' Season Two Premieres on Apple TV+ - published about 3 years ago.
Content:
https://www.macrumors.com/2021/08/27/see-second-season-premieres-apple-tv-plus/   
Published: 2021 08 27 08:05:35
Received: 2021 08 27 08:07:56
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: 2021-007: Malicious actors deploying Gootkit Loader on Australian Networks - published about 3 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/advisories/2021-007-malicious-actors-deploying-gootkit-loader-australian-networks   
Published: 2021 08 27 12:00:00
Received: 2021 08 27 08:01:37
Feed: ACSC – Advisories
Source: Australian Cyber Security Centre (ACSC)
Category: Advisories
Topic: Cyber Security
Article: 2021-007: Malicious actors deploying Gootkit Loader on Australian Networks - published about 3 years ago.
Content:
https://www.cyber.gov.au/acsc/view-all-content/advisories/2021-007-malicious-actors-deploying-gootkit-loader-australian-networks   
Published: 2021 08 27 12:00:00
Received: 2021 08 27 08:01:37
Feed: ACSC – Advisories
Source: Australian Cyber Security Centre (ACSC)
Category: Advisories
Topic: Cyber Security
Article: F5 Releases Critical Security Patch for BIG-IP and BIG-IQ Devices - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/f5-releases-critical-security-patches.html   
Published: 2021 08 27 07:48:49
Received: 2021 08 27 08:00:44
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: F5 Releases Critical Security Patch for BIG-IP and BIG-IQ Devices - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/f5-releases-critical-security-patches.html   
Published: 2021 08 27 07:48:49
Received: 2021 08 27 08:00:44
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/critical-cosmos-database-flaw-affected.html   
Published: 2021 08 27 07:59:36
Received: 2021 08 27 08:00:44
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/critical-cosmos-database-flaw-affected.html   
Published: 2021 08 27 07:59:36
Received: 2021 08 27 08:00:44
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: F5 Releases Critical Security Patch for BIG-IP and BIG-IQ Devices - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/f5-releases-critical-security-patches.html   
Published: 2021 08 27 07:48:49
Received: 2021 08 27 08:00:23
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: F5 Releases Critical Security Patch for BIG-IP and BIG-IQ Devices - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/f5-releases-critical-security-patches.html   
Published: 2021 08 27 07:48:49
Received: 2021 08 27 08:00:23
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/critical-cosmos-database-flaw-affected.html   
Published: 2021 08 27 07:59:36
Received: 2021 08 27 08:00:23
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Critical Cosmos Database Flaw Affected Thousands of Microsoft Azure Customers - published about 3 years ago.
Content:
https://thehackernews.com/2021/08/critical-cosmos-database-flaw-affected.html   
Published: 2021 08 27 07:59:36
Received: 2021 08 27 08:00:23
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Risky Business: Why CS Risk is Never Worth the Price - published about 3 years ago.
Content: submitted by /u/SnooSongs2448 [link] [comments]
https://www.reddit.com/r/netsec/comments/pcdd9z/risky_business_why_cs_risk_is_never_worth_the/   
Published: 2021 08 27 01:37:36
Received: 2021 08 27 07:05:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Risky Business: Why CS Risk is Never Worth the Price - published about 3 years ago.
Content: submitted by /u/SnooSongs2448 [link] [comments]
https://www.reddit.com/r/netsec/comments/pcdd9z/risky_business_why_cs_risk_is_never_worth_the/   
Published: 2021 08 27 01:37:36
Received: 2021 08 27 07:05:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: ChaosDB - Vulnerability in Azure Cosmos DB affecting thousands of customers - Manual Actions Required - published about 3 years ago.
Content: submitted by /u/sagitz_ [link] [comments]
https://www.reddit.com/r/netsec/comments/pcbpgb/chaosdb_vulnerability_in_azure_cosmos_db/   
Published: 2021 08 26 23:57:15
Received: 2021 08 27 07:05:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: ChaosDB - Vulnerability in Azure Cosmos DB affecting thousands of customers - Manual Actions Required - published about 3 years ago.
Content: submitted by /u/sagitz_ [link] [comments]
https://www.reddit.com/r/netsec/comments/pcbpgb/chaosdb_vulnerability_in_azure_cosmos_db/   
Published: 2021 08 26 23:57:15
Received: 2021 08 27 07:05:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: New infosec products of the week: August 27, 2021 - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/new-infosec-products-of-the-week-august-27-2021/   
Published: 2021 08 27 06:00:52
Received: 2021 08 27 07:05:15
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: New infosec products of the week: August 27, 2021 - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/new-infosec-products-of-the-week-august-27-2021/   
Published: 2021 08 27 06:00:52
Received: 2021 08 27 07:05:15
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: ProcessMaker 3.5.4 Local File inclusion - published about 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2021080095   
Published: 2021 08 27 06:06:31
Received: 2021 08 27 06:08:29
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Article: ProcessMaker 3.5.4 Local File inclusion - published about 3 years ago.
Content:
https://cxsecurity.com/issue/WLB-2021080095   
Published: 2021 08 27 06:06:31
Received: 2021 08 27 06:08:29
Feed: WLB2 Database - CXSecurity.com
Source: WLB2 Database - CXSecurity.com
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: IndiaMART - 20,154,583 breached accounts - published about 3 years ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#IndiaMART   
Published: 2021 08 27 05:33:29
Received: 2021 08 27 06:08:20
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Article: IndiaMART - 20,154,583 breached accounts - published about 3 years ago.
Content:
https://haveibeenpwned.com/PwnedWebsites#IndiaMART   
Published: 2021 08 27 05:33:29
Received: 2021 08 27 06:08:20
Feed: Have I Been Pwned latest breaches
Source: Have I Been Pwned
Category: Data Breaches
Topic: Data Breaches
Article: Weekly Update 258 - published about 3 years ago.
Content: Presently sponsored by: 1Password is a secure password manager and digital wallet that keeps you safe onlineA really brief intro as this is my last key strokes before going properly off the grid for the next week (like really off the grid, middle of nowhere style). Lots of little things this week, hoping next week will be the big "hey, Pwned Passwords just p...
https://www.troyhunt.com/weekly-update-258/   
Published: 2021 08 27 06:02:50
Received: 2021 08 27 06:06:16
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 258 - published about 3 years ago.
Content: Presently sponsored by: 1Password is a secure password manager and digital wallet that keeps you safe onlineA really brief intro as this is my last key strokes before going properly off the grid for the next week (like really off the grid, middle of nowhere style). Lots of little things this week, hoping next week will be the big "hey, Pwned Passwords just p...
https://www.troyhunt.com/weekly-update-258/   
Published: 2021 08 27 06:02:50
Received: 2021 08 27 06:06:16
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Trends in the OT/ICS security space and what’s to come - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/ot-ics-security-space/   
Published: 2021 08 27 05:00:08
Received: 2021 08 27 06:06:16
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Trends in the OT/ICS security space and what’s to come - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/ot-ics-security-space/   
Published: 2021 08 27 05:00:08
Received: 2021 08 27 06:06:16
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Your data, your choice - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/your-data-your-choice/   
Published: 2021 08 27 05:30:07
Received: 2021 08 27 06:06:16
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Your data, your choice - published about 3 years ago.
Content:
https://www.helpnetsecurity.com/2021/08/27/your-data-your-choice/   
Published: 2021 08 27 05:30:07
Received: 2021 08 27 06:06:16
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: CVE-2021-39168 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39168   
Published: 2021 08 27 00:15:07
Received: 2021 08 27 06:00:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39168 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39168   
Published: 2021 08 27 00:15:07
Received: 2021 08 27 06:00:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: CVE-2021-39167 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39167   
Published: 2021 08 27 00:15:06
Received: 2021 08 27 06:00:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-39167 - published about 3 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39167   
Published: 2021 08 27 00:15:06
Received: 2021 08 27 06:00:23
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained

All Articles

Ordered by Date Received : Year: "2021" Month: "08" Day: "27"
Page: << < 4 (of 5) > >>

Total Articles in this collection: 251


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor