All Articles

Ordered by Date Received : Year: "2022" Month: "01" Day: "20"
Page: << < 2 (of 3) > >>

Total Articles in this collection: 186

Navigation Help at the bottom of the page
Article: Microsoft Sees Log4j Attacks Exploiting SolarWinds Serv-U Bug - published over 2 years ago.
Content:
https://threatpost.com/microsoft-log4j-attackssolarwinds-serv-u-bug/177824/   
Published: 2022 01 20 18:39:21
Received: 2022 01 20 18:41:12
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Microsoft Sees Log4j Attacks Exploiting SolarWinds Serv-U Bug - published over 2 years ago.
Content:
https://threatpost.com/microsoft-log4j-attackssolarwinds-serv-u-bug/177824/   
Published: 2022 01 20 18:39:21
Received: 2022 01 20 18:41:12
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: FBI links Diavol ransomware to the TrickBot cybercrime group - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/fbi-links-diavol-ransomware-to-the-trickbot-cybercrime-group/   
Published: 2022 01 20 18:37:25
Received: 2022 01 20 18:40:30
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: FBI links Diavol ransomware to the TrickBot cybercrime group - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/fbi-links-diavol-ransomware-to-the-trickbot-cybercrime-group/   
Published: 2022 01 20 18:37:25
Received: 2022 01 20 18:40:30
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Griggsville-Perry School District hit by ransomware attack; early dismissal - published over 2 years ago.
Content:
https://www.databreaches.net/griggsville-perry-school-district-hit-by-ransomware-attack-early-dismissal/   
Published: 2022 01 20 18:17:26
Received: 2022 01 20 18:26:46
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Griggsville-Perry School District hit by ransomware attack; early dismissal - published over 2 years ago.
Content:
https://www.databreaches.net/griggsville-perry-school-district-hit-by-ransomware-attack-early-dismissal/   
Published: 2022 01 20 18:17:26
Received: 2022 01 20 18:26:46
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Apple Seeds iOS 15.3 and iPadOS 15.3 Release Candidates to Developers - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/apple-seeds-ios-15-3-rc/   
Published: 2022 01 20 18:13:23
Received: 2022 01 20 18:26:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Seeds iOS 15.3 and iPadOS 15.3 Release Candidates to Developers - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/apple-seeds-ios-15-3-rc/   
Published: 2022 01 20 18:13:23
Received: 2022 01 20 18:26:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: Apple Seeds macOS Monterey 12.2 Release Candidate to Developers - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/apple-macos-monterey-12-2-rc/   
Published: 2022 01 20 18:22:10
Received: 2022 01 20 18:26:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Seeds macOS Monterey 12.2 Release Candidate to Developers - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/apple-macos-monterey-12-2-rc/   
Published: 2022 01 20 18:22:10
Received: 2022 01 20 18:26:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Enterprises Are Sailing Into a Perfect Storm of Cloud Risk - published over 2 years ago.
Content:
https://www.darkreading.com/cloud/enterprises-are-sailing-into-a-perfect-storm-of-cloud-risk   
Published: 2022 01 20 18:00:00
Received: 2022 01 20 18:07:19
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Enterprises Are Sailing Into a Perfect Storm of Cloud Risk - published over 2 years ago.
Content:
https://www.darkreading.com/cloud/enterprises-are-sailing-into-a-perfect-storm-of-cloud-risk   
Published: 2022 01 20 18:00:00
Received: 2022 01 20 18:07:19
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Cybersecurity memo standardizes federal incident response - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96951-cybersecurity-memo-standardizes-federal-incident-response   
Published: 2022 01 20 16:40:11
Received: 2022 01 20 18:06:34
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Cybersecurity memo standardizes federal incident response - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96951-cybersecurity-memo-standardizes-federal-incident-response   
Published: 2022 01 20 16:40:11
Received: 2022 01 20 18:06:34
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: F5 Releases January 2022 Quarterly Security Notification - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/01/20/f5-releases-january-2022-quarterly-security-notification   
Published: 2022 01 20 17:40:38
Received: 2022 01 20 18:02:10
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: F5 Releases January 2022 Quarterly Security Notification - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/01/20/f5-releases-january-2022-quarterly-security-notification   
Published: 2022 01 20 17:40:38
Received: 2022 01 20 18:02:10
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: Crypto.com confirms 483 accounts hacked, $34 million withdrawn - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/cryptocom-confirms-483-accounts-hacked-34-million-withdrawn/   
Published: 2022 01 20 09:10:00
Received: 2022 01 20 18:00:31
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Crypto.com confirms 483 accounts hacked, $34 million withdrawn - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/cryptocom-confirms-483-accounts-hacked-34-million-withdrawn/   
Published: 2022 01 20 09:10:00
Received: 2022 01 20 18:00:31
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: S3 Ep66: Cybercrime busts, wormable Windows, and the crisis of featuritis [Podcast + Transcript] - published over 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/01/20/661378/   
Published: 2022 01 20 19:28:11
Received: 2022 01 20 17:47:02
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: S3 Ep66: Cybercrime busts, wormable Windows, and the crisis of featuritis [Podcast + Transcript] - published over 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/01/20/661378/   
Published: 2022 01 20 19:28:11
Received: 2022 01 20 17:47:02
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Cybersecurity memo standardizes federal incident response - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96951-cybersecurity-memo-standardizes-federal-incident-response   
Published: 2022 01 20 16:40:11
Received: 2022 01 20 17:46:09
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Cybersecurity memo standardizes federal incident response - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96951-cybersecurity-memo-standardizes-federal-incident-response   
Published: 2022 01 20 16:40:11
Received: 2022 01 20 17:46:09
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Being 'Threat-Led' is the answer. Your ISO certificate won’t save you from a breach! - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/security_compliance_issues/   
Published: 2022 01 20 07:30:13
Received: 2022 01 20 17:41:00
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Being 'Threat-Led' is the answer. Your ISO certificate won’t save you from a breach! - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/security_compliance_issues/   
Published: 2022 01 20 07:30:13
Received: 2022 01 20 17:41:00
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: UK mulls making MSPs subject to mandatory security standards where they provide critical infrastructure - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/uk_nis_regulations_msp_plans/   
Published: 2022 01 20 17:15:13
Received: 2022 01 20 17:24:22
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: UK mulls making MSPs subject to mandatory security standards where they provide critical infrastructure - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/uk_nis_regulations_msp_plans/   
Published: 2022 01 20 17:15:13
Received: 2022 01 20 17:24:22
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: CISA Releases Final Version of Guidance: IPv6 Considerations for TIC 3.0 - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/01/20/cisa-releases-final-version-guidance-ipv6-considerations-tic-30   
Published: 2022 01 20 14:51:18
Received: 2022 01 20 17:21:47
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: CISA Releases Final Version of Guidance: IPv6 Considerations for TIC 3.0 - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/01/20/cisa-releases-final-version-guidance-ipv6-considerations-tic-30   
Published: 2022 01 20 14:51:18
Received: 2022 01 20 17:21:47
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: UK mulls making MSPs subject to mandatory security standards where they provide critical infrastructure - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/uk_nis_regulations_msp_plans/   
Published: 2022 01 20 17:15:13
Received: 2022 01 20 17:21:03
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: UK mulls making MSPs subject to mandatory security standards where they provide critical infrastructure - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/uk_nis_regulations_msp_plans/   
Published: 2022 01 20 17:15:13
Received: 2022 01 20 17:21:03
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Pervasive Apple Safari Bug Exposes Web-Browsing Data, Google IDs - published over 2 years ago.
Content:
https://threatpost.com/apple-safari-bug-browsing-data-google-ids/177809/   
Published: 2022 01 20 16:50:30
Received: 2022 01 20 17:01:02
Feed: Threatpost – Mobile Security
Source: Threatpost
Category: News
Topic: Mobile Security
Article: Pervasive Apple Safari Bug Exposes Web-Browsing Data, Google IDs - published over 2 years ago.
Content:
https://threatpost.com/apple-safari-bug-browsing-data-google-ids/177809/   
Published: 2022 01 20 16:50:30
Received: 2022 01 20 17:01:02
Feed: Threatpost – Mobile Security
Source: Threatpost
Category: News
Topic: Mobile Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: New iPad Air, Macs, and iPhone SE With 5G Likely to Be Announced at Apple Event This Spring - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/apple-event-spring-2022-what-is-coming/   
Published: 2022 01 20 16:32:25
Received: 2022 01 20 16:46:10
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: New iPad Air, Macs, and iPhone SE With 5G Likely to Be Announced at Apple Event This Spring - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/apple-event-spring-2022-what-is-coming/   
Published: 2022 01 20 16:32:25
Received: 2022 01 20 16:46:10
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CISA Releases Final Version of Guidance: IPv6 Considerations for TIC 3.0 - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/01/20/cisa-releases-final-version-guidance-ipv6-considerations-tic-30   
Published: 2022 01 20 14:51:18
Received: 2022 01 20 16:41:41
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: CISA Releases Final Version of Guidance: IPv6 Considerations for TIC 3.0 - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/01/20/cisa-releases-final-version-guidance-ipv6-considerations-tic-30   
Published: 2022 01 20 14:51:18
Received: 2022 01 20 16:41:41
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: Red Cross ‘Appalled’ As Hackers Steal Humanitarian Data Of 515,000 People - published over 2 years ago.
Content:
https://www.silicon.co.uk/security/cyberwar/red-cross-appalled-hackers-steal-data-437953   
Published: 2022 01 20 16:39:32
Received: 2022 01 20 16:40:54
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Red Cross ‘Appalled’ As Hackers Steal Humanitarian Data Of 515,000 People - published over 2 years ago.
Content:
https://www.silicon.co.uk/security/cyberwar/red-cross-appalled-hackers-steal-data-437953   
Published: 2022 01 20 16:39:32
Received: 2022 01 20 16:40:54
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Cross Begs Attackers Not to Leak Stolen Data for 515K People - published over 2 years ago.
Content:
https://threatpost.com/red-cross-begs-attackers-not-to-leak-515k-peoples-stolen-data/177799/   
Published: 2022 01 20 15:49:56
Received: 2022 01 20 16:40:49
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Red Cross Begs Attackers Not to Leak Stolen Data for 515K People - published over 2 years ago.
Content:
https://threatpost.com/red-cross-begs-attackers-not-to-leak-515k-peoples-stolen-data/177799/   
Published: 2022 01 20 15:49:56
Received: 2022 01 20 16:40:49
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: WordPress plugin flaw puts users of 20,000 sites at phishing risk - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/wordpress-plugin-flaw-puts-users-of-20-000-sites-at-phishing-risk/   
Published: 2022 01 20 15:50:25
Received: 2022 01 20 16:40:28
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: WordPress plugin flaw puts users of 20,000 sites at phishing risk - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/wordpress-plugin-flaw-puts-users-of-20-000-sites-at-phishing-risk/   
Published: 2022 01 20 15:50:25
Received: 2022 01 20 16:40:28
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: ProtonMail introduces a new email tracker blocking system - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/protonmail-introduces-a-new-email-tracker-blocking-system/   
Published: 2022 01 20 16:25:12
Received: 2022 01 20 16:40:28
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: ProtonMail introduces a new email tracker blocking system - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/protonmail-introduces-a-new-email-tracker-blocking-system/   
Published: 2022 01 20 16:25:12
Received: 2022 01 20 16:40:28
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: US sanctions former Ukrainian official for helping Russian cyberspies - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/us-sanctions-former-ukrainian-official-for-helping-russian-cyberspies/   
Published: 2022 01 20 16:37:06
Received: 2022 01 20 16:40:28
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: US sanctions former Ukrainian official for helping Russian cyberspies - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/us-sanctions-former-ukrainian-official-for-helping-russian-cyberspies/   
Published: 2022 01 20 16:37:06
Received: 2022 01 20 16:40:28
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Pentest Collaboration Framework: tool which will help you to store/modify/share information about pentest/web analysis projects. OpenSource, Portable, CrossPlatform & completely free! Supports integration with 15 tools & user-defined report generation. For several teams: seperated workspaces! - published over 2 years ago.
Content: submitted by /u/Any_Gas_6250 [link] [comments]
https://www.reddit.com/r/netsec/comments/s8ltj9/pentest_collaboration_framework_tool_which_will/   
Published: 2022 01 20 15:43:36
Received: 2022 01 20 16:24:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Pentest Collaboration Framework: tool which will help you to store/modify/share information about pentest/web analysis projects. OpenSource, Portable, CrossPlatform & completely free! Supports integration with 15 tools & user-defined report generation. For several teams: seperated workspaces! - published over 2 years ago.
Content: submitted by /u/Any_Gas_6250 [link] [comments]
https://www.reddit.com/r/netsec/comments/s8ltj9/pentest_collaboration_framework_tool_which_will/   
Published: 2022 01 20 15:43:36
Received: 2022 01 20 16:24:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: HOUDINI: A web app with huge number of Docker Images for Network Security with run commands and cheatsheet (Hundreds of Offensive and Useful Docker Images for Network Intrusion ) - published over 2 years ago.
Content: submitted by /u/deleee [link] [comments]
https://www.reddit.com/r/netsec/comments/s8lrvt/houdini_a_web_app_with_huge_number_of_docker/   
Published: 2022 01 20 15:41:22
Received: 2022 01 20 16:24:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: HOUDINI: A web app with huge number of Docker Images for Network Security with run commands and cheatsheet (Hundreds of Offensive and Useful Docker Images for Network Intrusion ) - published over 2 years ago.
Content: submitted by /u/deleee [link] [comments]
https://www.reddit.com/r/netsec/comments/s8lrvt/houdini_a_web_app_with_huge_number_of_docker/   
Published: 2022 01 20 15:41:22
Received: 2022 01 20 16:24:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Episode #20: Digital Trust – An Imperative for Business Innovation - published over 2 years ago.
Content: Coming out of the cybersecurity, privacy, and data ethics fields, Digital Trust is becoming a requirement for doing business in the modern, hyperconnected world. There is a significant trust deficit – people are increasingly saying that they don’t trust science or technology (and especially not technology focused companies) to improve their lives. A global s...
https://cisomag.eccouncil.org/digital-trust-an-imperative-for-business-innovation/   
Published: 2022 01 20 16:00:28
Received: 2022 01 20 16:07:29
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Article: Episode #20: Digital Trust – An Imperative for Business Innovation - published over 2 years ago.
Content: Coming out of the cybersecurity, privacy, and data ethics fields, Digital Trust is becoming a requirement for doing business in the modern, hyperconnected world. There is a significant trust deficit – people are increasingly saying that they don’t trust science or technology (and especially not technology focused companies) to improve their lives. A global s...
https://cisomag.eccouncil.org/digital-trust-an-imperative-for-business-innovation/   
Published: 2022 01 20 16:00:28
Received: 2022 01 20 16:07:29
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: SnatchCrypto Campaign Installs Backdoors In Cryptocurrency Startups - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/01/20/snatchcrypto-campaign-installs-backdoors-in-cryptocurrency-startups/   
Published: 2022 01 20 13:57:19
Received: 2022 01 20 16:05:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: SnatchCrypto Campaign Installs Backdoors In Cryptocurrency Startups - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/01/20/snatchcrypto-campaign-installs-backdoors-in-cryptocurrency-startups/   
Published: 2022 01 20 13:57:19
Received: 2022 01 20 16:05:15
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data - published over 2 years ago.
Content:
https://threatpost.com/red-cross-begs-attackers-not-to-leak-515k-peoples-stolen-data/177799/   
Published: 2022 01 20 15:49:56
Received: 2022 01 20 16:01:59
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data - published over 2 years ago.
Content:
https://threatpost.com/red-cross-begs-attackers-not-to-leak-515k-peoples-stolen-data/177799/   
Published: 2022 01 20 15:49:56
Received: 2022 01 20 16:01:59
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack - published over 2 years ago.
Content:
https://threatpost.com/fortune-500-firm-ransomware/177787/   
Published: 2022 01 20 14:27:48
Received: 2022 01 20 16:01:57
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Article: SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack - published over 2 years ago.
Content:
https://threatpost.com/fortune-500-firm-ransomware/177787/   
Published: 2022 01 20 14:27:48
Received: 2022 01 20 16:01:57
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data - published over 2 years ago.
Content:
https://threatpost.com/red-cross-begs-attackers-not-to-leak-515k-peoples-stolen-data/177799/   
Published: 2022 01 20 15:49:56
Received: 2022 01 20 16:01:57
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Article: Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data - published over 2 years ago.
Content:
https://threatpost.com/red-cross-begs-attackers-not-to-leak-515k-peoples-stolen-data/177799/   
Published: 2022 01 20 15:49:56
Received: 2022 01 20 16:01:57
Feed: Threatpost – Hacks
Source: Threatpost
Category: News
Topic: Hacks
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Indonesia's central bank confirms ransomware attack, Conti leaks data - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/indonesias-central-bank-confirms-ransomware-attack-conti-leaks-data/   
Published: 2022 01 20 15:41:20
Received: 2022 01 20 16:00:43
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Indonesia's central bank confirms ransomware attack, Conti leaks data - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/indonesias-central-bank-confirms-ransomware-attack-conti-leaks-data/   
Published: 2022 01 20 15:41:20
Received: 2022 01 20 16:00:43
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data - published over 2 years ago.
Content:
https://threatpost.com/red-cross-begs-attackers-not-to-leak-515k-peoples-stolen-data/177799/   
Published: 2022 01 20 15:49:56
Received: 2022 01 20 16:00:40
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data - published over 2 years ago.
Content:
https://threatpost.com/red-cross-begs-attackers-not-to-leak-515k-peoples-stolen-data/177799/   
Published: 2022 01 20 15:49:56
Received: 2022 01 20 16:00:40
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Deals: Get Up to 40% Off Anker's USB-C Cables, MagSafe-Compatible Chargers, and More - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/deals-get-up-to-40-off-ankers/   
Published: 2022 01 20 15:41:58
Received: 2022 01 20 15:46:41
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Deals: Get Up to 40% Off Anker's USB-C Cables, MagSafe-Compatible Chargers, and More - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/deals-get-up-to-40-off-ankers/   
Published: 2022 01 20 15:41:58
Received: 2022 01 20 15:46:41
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Privacy is for paedophiles, UK government seems to be saying while spending £500k demonising online chat encryption - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/no_place_hide_campaign_anti_e2ee_ukgov/   
Published: 2022 01 20 15:06:24
Received: 2022 01 20 15:24:17
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Privacy is for paedophiles, UK government seems to be saying while spending £500k demonising online chat encryption - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/no_place_hide_campaign_anti_e2ee_ukgov/   
Published: 2022 01 20 15:06:24
Received: 2022 01 20 15:24:17
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: 4 Ways to Develop Your Team's Cyber Skills - published over 2 years ago.
Content:
https://www.darkreading.com/careers-and-people/4-ways-to-develop-your-team-s-cyber-skills   
Published: 2022 01 20 15:00:00
Received: 2022 01 20 15:08:03
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: 4 Ways to Develop Your Team's Cyber Skills - published over 2 years ago.
Content:
https://www.darkreading.com/careers-and-people/4-ways-to-develop-your-team-s-cyber-skills   
Published: 2022 01 20 15:00:00
Received: 2022 01 20 15:08:03
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Crypto.com Suffers Unauthorized Activity Affecting 483 Users - published over 2 years ago.
Content: Cryptocurrency exchange platform Crypto.com announced that unknown threat actors compromised its user accounts. In an official release, the company stated that a small number of users encountered unauthorized crypto withdrawals on their accounts. The intrusion reportedly affected 483 Crypto.com user accounts. The unauthorized withdrawals totaled 4,836.26 Eth...
https://cisomag.eccouncil.org/crypto-com-suffers-unauthorized-activity-affecting-483-users/   
Published: 2022 01 20 14:30:09
Received: 2022 01 20 14:46:45
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Article: Crypto.com Suffers Unauthorized Activity Affecting 483 Users - published over 2 years ago.
Content: Cryptocurrency exchange platform Crypto.com announced that unknown threat actors compromised its user accounts. In an official release, the company stated that a small number of users encountered unauthorized crypto withdrawals on their accounts. The intrusion reportedly affected 483 Crypto.com user accounts. The unauthorized withdrawals totaled 4,836.26 Eth...
https://cisomag.eccouncil.org/crypto-com-suffers-unauthorized-activity-affecting-483-users/   
Published: 2022 01 20 14:30:09
Received: 2022 01 20 14:46:45
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Article: How mail server related DNS settings (SPF, DKIM, DMARC, MTA-STS, DANE, BIMI) work and their usage stats in the top 1M domain - published over 2 years ago.
Content: submitted by /u/c0r0n3r [link] [comments]
https://www.reddit.com/r/netsec/comments/s8jj3o/how_mail_server_related_dns_settings_spf_dkim/   
Published: 2022 01 20 13:54:59
Received: 2022 01 20 14:44:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: How mail server related DNS settings (SPF, DKIM, DMARC, MTA-STS, DANE, BIMI) work and their usage stats in the top 1M domain - published over 2 years ago.
Content: submitted by /u/c0r0n3r [link] [comments]
https://www.reddit.com/r/netsec/comments/s8jj3o/how_mail_server_related_dns_settings_spf_dkim/   
Published: 2022 01 20 13:54:59
Received: 2022 01 20 14:44:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: 'Now' would be the right time to patch Ubuntu container hosts and ditch 21.04 thanks to heap buffer overflow bug - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/ubuntu_2104_eol/   
Published: 2022 01 20 14:38:26
Received: 2022 01 20 14:44:16
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: 'Now' would be the right time to patch Ubuntu container hosts and ditch 21.04 thanks to heap buffer overflow bug - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/ubuntu_2104_eol/   
Published: 2022 01 20 14:38:26
Received: 2022 01 20 14:44:16
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack - published over 2 years ago.
Content:
https://threatpost.com/fortune-500-firm-ransomware/177787/   
Published: 2022 01 20 14:27:48
Received: 2022 01 20 14:40:48
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack - published over 2 years ago.
Content:
https://threatpost.com/fortune-500-firm-ransomware/177787/   
Published: 2022 01 20 14:27:48
Received: 2022 01 20 14:40:48
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple Working To Patch Safari Data Leak Vulnerability - published over 2 years ago.
Content:
https://www.silicon.co.uk/workspace/browser/apple-working-to-patch-safari-data-leak-vulnerability-437826   
Published: 2022 01 20 14:17:41
Received: 2022 01 20 14:20:55
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Apple Working To Patch Safari Data Leak Vulnerability - published over 2 years ago.
Content:
https://www.silicon.co.uk/workspace/browser/apple-working-to-patch-safari-data-leak-vulnerability-437826   
Published: 2022 01 20 14:17:41
Received: 2022 01 20 14:20:55
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Microsoft fixes Outlook search issues for Windows 10 users - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-outlook-search-issues-for-windows-10-users/   
Published: 2022 01 20 10:08:45
Received: 2022 01 20 14:20:27
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft fixes Outlook search issues for Windows 10 users - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-outlook-search-issues-for-windows-10-users/   
Published: 2022 01 20 10:08:45
Received: 2022 01 20 14:20:27
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cisco bug gives remote attackers root privileges via debug mode - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/cisco-bug-gives-remote-attackers-root-privileges-via-debug-mode/   
Published: 2022 01 20 13:15:00
Received: 2022 01 20 14:00:33
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Cisco bug gives remote attackers root privileges via debug mode - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/cisco-bug-gives-remote-attackers-root-privileges-via-debug-mode/   
Published: 2022 01 20 13:15:00
Received: 2022 01 20 14:00:33
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Biden signs memo to boost US national security systems’ defenses - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/biden-signs-memo-to-boost-us-national-security-systems-defenses/   
Published: 2022 01 20 13:57:00
Received: 2022 01 20 14:00:33
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Biden signs memo to boost US national security systems’ defenses - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/biden-signs-memo-to-boost-us-national-security-systems-defenses/   
Published: 2022 01 20 13:57:00
Received: 2022 01 20 14:00:33
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Destructive Wiper Targeting Ukraine Aimed at Eroding Trust, Experts Say - published over 2 years ago.
Content:
https://threatpost.com/destructive-wiper-ukraine/177768/   
Published: 2022 01 19 20:55:28
Received: 2022 01 20 13:46:31
Feed: Threatpost – Government
Source: Threatpost
Category: News
Topic: Government
Article: Destructive Wiper Targeting Ukraine Aimed at Eroding Trust, Experts Say - published over 2 years ago.
Content:
https://threatpost.com/destructive-wiper-ukraine/177768/   
Published: 2022 01 19 20:55:28
Received: 2022 01 20 13:46:31
Feed: Threatpost – Government
Source: Threatpost
Category: News
Topic: Government
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Jail for prolific romance fraudster who fleeced besotted lonely hearts - published over 2 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/jail-for-prolific-romance-fraudster-who-fleeced-besotted-lonely-hearts/   
Published: 2022 01 20 13:34:44
Received: 2022 01 20 13:44:07
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Jail for prolific romance fraudster who fleeced besotted lonely hearts - published over 2 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/jail-for-prolific-romance-fraudster-who-fleeced-besotted-lonely-hearts/   
Published: 2022 01 20 13:34:44
Received: 2022 01 20 13:44:07
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Box 2FA Bypass Opens User Accounts to Attack - published over 2 years ago.
Content:
https://threatpost.com/box-2fa-bypass-accounts-attack/177760/   
Published: 2022 01 19 18:30:44
Received: 2022 01 20 13:41:45
Feed: Threatpost – Cloud Security
Source: Threatpost
Category: News
Topic: Cloud Security
Article: Box 2FA Bypass Opens User Accounts to Attack - published over 2 years ago.
Content:
https://threatpost.com/box-2fa-bypass-accounts-attack/177760/   
Published: 2022 01 19 18:30:44
Received: 2022 01 20 13:41:45
Feed: Threatpost – Cloud Security
Source: Threatpost
Category: News
Topic: Cloud Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Google Details Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers - published over 2 years ago.
Content:
https://thehackernews.com/2022/01/google-details-two-zero-day-bugs.html   
Published: 2022 01 22 06:28:23
Received: 2022 01 20 13:26:47
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Google Details Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers - published over 2 years ago.
Content:
https://thehackernews.com/2022/01/google-details-two-zero-day-bugs.html   
Published: 2022 01 22 06:28:23
Received: 2022 01 20 13:26:47
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: 3 Smartphone Safety Tips to Keep Your Online Data Secure - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/01/20/3-smartphone-safety-tips-to-keep-your-online-data-secure/   
Published: 2022 01 20 10:46:28
Received: 2022 01 20 13:04:42
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: 3 Smartphone Safety Tips to Keep Your Online Data Secure - published over 2 years ago.
Content:
https://latesthackingnews.com/2022/01/20/3-smartphone-safety-tips-to-keep-your-online-data-secure/   
Published: 2022 01 20 10:46:28
Received: 2022 01 20 13:04:42
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: New MoonBounce UEFI malware used by APT41 in targeted attacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/new-moonbounce-uefi-malware-used-by-apt41-in-targeted-attacks/   
Published: 2022 01 20 12:55:29
Received: 2022 01 20 13:00:58
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: New MoonBounce UEFI malware used by APT41 in targeted attacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/new-moonbounce-uefi-malware-used-by-apt41-in-targeted-attacks/   
Published: 2022 01 20 12:55:29
Received: 2022 01 20 13:00:58
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: [SANS ISC] RedLine Stealer Delivered Through FTP - published over 2 years ago.
Content: I published the following diary on isc.sans.edu: “RedLine Stealer Delivered Through FTP“: Here is a piece of malicious Python script that injects a RedLine stealer into its own process. Process injection is a common attacker’s technique these days (for a long time already). The difference, in this case, is that the payload is delivered through FTP! It’s ...
https://blog.rootshell.be/2022/01/20/sans-isc-redline-stealer-delivered-through-ftp/   
Published: 2022 01 20 12:26:41
Received: 2022 01 20 12:44:05
Feed: /dev/random
Source: /dev/random
Category: Cyber Security
Topic: Cyber Security
Article: [SANS ISC] RedLine Stealer Delivered Through FTP - published over 2 years ago.
Content: I published the following diary on isc.sans.edu: “RedLine Stealer Delivered Through FTP“: Here is a piece of malicious Python script that injects a RedLine stealer into its own process. Process injection is a common attacker’s technique these days (for a long time already). The difference, in this case, is that the payload is delivered through FTP! It’s ...
https://blog.rootshell.be/2022/01/20/sans-isc-redline-stealer-delivered-through-ftp/   
Published: 2022 01 20 12:26:41
Received: 2022 01 20 12:44:05
Feed: /dev/random
Source: /dev/random
Category: Cyber Security
Topic: Cyber Security
Article: San Francisco Police Illegally Spying on Protesters - published over 2 years ago.
Content: Last summer, the San Francisco police illegally used surveillance cameras at the George Floyd protests. The EFF is suing the police: This surveillance invaded the privacy of protesters, targeted people of color, and chills and deters participation and organizing for future protests. The SFPD also violated San Francisco’s new Surveillance Technology Ordinance...
https://www.schneier.com/blog/archives/2022/01/san-francisco-police-illegally-spying-on-protesters.html   
Published: 2022 01 20 12:13:24
Received: 2022 01 20 12:24:28
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Article: San Francisco Police Illegally Spying on Protesters - published over 2 years ago.
Content: Last summer, the San Francisco police illegally used surveillance cameras at the George Floyd protests. The EFF is suing the police: This surveillance invaded the privacy of protesters, targeted people of color, and chills and deters participation and organizing for future protests. The SFPD also violated San Francisco’s new Surveillance Technology Ordinance...
https://www.schneier.com/blog/archives/2022/01/san-francisco-police-illegally-spying-on-protesters.html   
Published: 2022 01 20 12:13:24
Received: 2022 01 20 12:24:28
Feed: Schneier on Security
Source: Schneier on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Smashing Security podcast #258: Tesla remote hijacks and revolting YouTubers - published over 2 years ago.
Content:
https://grahamcluley.com/smashing-security-podcast-258/   
Published: 2022 01 20 12:07:15
Received: 2022 01 20 12:23:56
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: Smashing Security podcast #258: Tesla remote hijacks and revolting YouTubers - published over 2 years ago.
Content:
https://grahamcluley.com/smashing-security-podcast-258/   
Published: 2022 01 20 12:07:15
Received: 2022 01 20 12:23:56
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: BadUSB explained: How rogue USBs threaten your organization - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647173/badusb-explained-how-rogue-usbs-threaten-your-organization.html#tk.rss_all   
Published: 2022 01 20 10:00:00
Received: 2022 01 20 12:00:04
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: BadUSB explained: How rogue USBs threaten your organization - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647173/badusb-explained-how-rogue-usbs-threaten-your-organization.html#tk.rss_all   
Published: 2022 01 20 10:00:00
Received: 2022 01 20 12:00:04
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: What CISOs can learn about insider threats from Iran's human espionage tactics - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647312/what-cisos-can-learn-about-insider-threats-from-irans-human-espionage-tactics.html#tk.rss_all   
Published: 2022 01 20 10:00:00
Received: 2022 01 20 12:00:04
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: What CISOs can learn about insider threats from Iran's human espionage tactics - published over 2 years ago.
Content:
https://www.csoonline.com/article/3647312/what-cisos-can-learn-about-insider-threats-from-irans-human-espionage-tactics.html#tk.rss_all   
Published: 2022 01 20 10:00:00
Received: 2022 01 20 12:00:04
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: NATO and Ukraine Sign Deal to Boost Cybersecurity - published over 2 years ago.
Content: The North Atlantic Treaty Organization (NATO) recently entered into a deal with Ukraine to boost cybersecurity capabilities in the country. The NATO Communications and Information (NCI) Agency and Ukraine signed a renewed Memorandum of Agreement to continue working on cybersecurity and other technology-related projects. The agreement comes after a series of ...
https://cisomag.eccouncil.org/nato-and-ukraine-sign-deal-to-boost-cybersecurity/   
Published: 2022 01 20 10:53:25
Received: 2022 01 20 11:46:31
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Article: NATO and Ukraine Sign Deal to Boost Cybersecurity - published over 2 years ago.
Content: The North Atlantic Treaty Organization (NATO) recently entered into a deal with Ukraine to boost cybersecurity capabilities in the country. The NATO Communications and Information (NCI) Agency and Ukraine signed a renewed Memorandum of Agreement to continue working on cybersecurity and other technology-related projects. The agreement comes after a series of ...
https://cisomag.eccouncil.org/nato-and-ukraine-sign-deal-to-boost-cybersecurity/   
Published: 2022 01 20 10:53:25
Received: 2022 01 20 11:46:31
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: iOS 15 Patched Security Hole That Potentially Exposed Users' Private Apple ID Information to Third-Party Apps - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/ios-15-security-patch-third-party-apps/   
Published: 2022 01 20 11:32:04
Received: 2022 01 20 11:46:25
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iOS 15 Patched Security Hole That Potentially Exposed Users' Private Apple ID Information to Third-Party Apps - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/ios-15-security-patch-third-party-apps/   
Published: 2022 01 20 11:32:04
Received: 2022 01 20 11:46:25
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Dep-Scan - Fully Open-Source Security Audit For Project Dependencies Based On Known Vulnerabilities And Advisories. Supports Both Local Repos And Container Images. Integrates With Various CI Environments Such As Azure Pipelines, CircleCI, Google CloudBuild - published over 2 years ago.
Content:
http://www.kitploit.com/2022/01/dep-scan-fully-open-source-security.html   
Published: 2022 01 20 11:30:00
Received: 2022 01 20 11:46:14
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Dep-Scan - Fully Open-Source Security Audit For Project Dependencies Based On Known Vulnerabilities And Advisories. Supports Both Local Repos And Container Images. Integrates With Various CI Environments Such As Azure Pipelines, CircleCI, Google CloudBuild - published over 2 years ago.
Content:
http://www.kitploit.com/2022/01/dep-scan-fully-open-source-security.html   
Published: 2022 01 20 11:30:00
Received: 2022 01 20 11:46:14
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: First Morello prototype architecture silicon (memory safety at a hardware level) - published over 2 years ago.
Content: submitted by /u/unaligned_access [link] [comments]
https://www.reddit.com/r/netsec/comments/s8h1de/first_morello_prototype_architecture_silicon/   
Published: 2022 01 20 11:37:12
Received: 2022 01 20 11:44:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: First Morello prototype architecture silicon (memory safety at a hardware level) - published over 2 years ago.
Content: submitted by /u/unaligned_access [link] [comments]
https://www.reddit.com/r/netsec/comments/s8h1de/first_morello_prototype_architecture_silicon/   
Published: 2022 01 20 11:37:12
Received: 2022 01 20 11:44:21
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: NortonLifeLock and Avast tie-up falls under UK competition regulator's spotlight - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/nortonlocklife_avast_cma/   
Published: 2022 01 20 11:03:06
Received: 2022 01 20 11:24:27
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: NortonLifeLock and Avast tie-up falls under UK competition regulator's spotlight - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/01/20/nortonlocklife_avast_cma/   
Published: 2022 01 20 11:03:06
Received: 2022 01 20 11:24:27
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Government Proposes New Laws In Cyber Security Review - published over 2 years ago.
Content:
https://www.silicon.co.uk/projects/outsourcing/government-proposes-new-laws-in-cyber-security-review-437751   
Published: 2022 01 20 11:20:01
Received: 2022 01 20 11:20:54
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Government Proposes New Laws In Cyber Security Review - published over 2 years ago.
Content:
https://www.silicon.co.uk/projects/outsourcing/government-proposes-new-laws-in-cyber-security-review-437751   
Published: 2022 01 20 11:20:01
Received: 2022 01 20 11:20:54
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: NATO and Ukraine Sign Deal to Boost Cybersecurity - published over 2 years ago.
Content: The North Atlantic Treaty Organization (NATO) recently entered into a deal with Ukraine to boost cybersecurity capabilities in the country. The NATO Communications and Information (NCI) Agency and Ukraine signed a renewed Memorandum of Agreement to continue working on cybersecurity and other technology-related projects. The agreement comes after a series of ...
https://cisomag.eccouncil.org/nato-and-ukraine-sign-deal-to-boost-cybersecurity/   
Published: 2022 01 20 10:53:25
Received: 2022 01 20 11:06:53
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Article: NATO and Ukraine Sign Deal to Boost Cybersecurity - published over 2 years ago.
Content: The North Atlantic Treaty Organization (NATO) recently entered into a deal with Ukraine to boost cybersecurity capabilities in the country. The NATO Communications and Information (NCI) Agency and Ukraine signed a renewed Memorandum of Agreement to continue working on cybersecurity and other technology-related projects. The agreement comes after a series of ...
https://cisomag.eccouncil.org/nato-and-ukraine-sign-deal-to-boost-cybersecurity/   
Published: 2022 01 20 10:53:25
Received: 2022 01 20 11:06:53
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Article: New SolarWinds Serv-U vulnerability exploited in Log4j-related attacks - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/20/cve-2021-35247/   
Published: 2022 01 20 10:18:46
Received: 2022 01 20 10:46:26
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: New SolarWinds Serv-U vulnerability exploited in Log4j-related attacks - published over 2 years ago.
Content:
https://www.helpnetsecurity.com/2022/01/20/cve-2021-35247/   
Published: 2022 01 20 10:18:46
Received: 2022 01 20 10:46:26
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Apple Music Is the World's Second Most Popular Music Streaming Service Behind Spotify - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/apple-music-second-biggest-behind-spotify-globally/   
Published: 2022 01 20 10:38:47
Received: 2022 01 20 10:46:00
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Music Is the World's Second Most Popular Music Streaming Service Behind Spotify - published over 2 years ago.
Content:
https://www.macrumors.com/2022/01/20/apple-music-second-biggest-behind-spotify-globally/   
Published: 2022 01 20 10:38:47
Received: 2022 01 20 10:46:00
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Interpol Busted 11 Members of Nigerian BEC Cybercrime Gang - published over 2 years ago.
Content:
https://thehackernews.com/2022/01/interpol-busted-11-members-of-nigerian.html   
Published: 2022 01 20 10:20:27
Received: 2022 01 20 10:41:48
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Interpol Busted 11 Members of Nigerian BEC Cybercrime Gang - published over 2 years ago.
Content:
https://thehackernews.com/2022/01/interpol-busted-11-members-of-nigerian.html   
Published: 2022 01 20 10:20:27
Received: 2022 01 20 10:41:48
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Microsoft fixes Windows 10 search issues in Outlook desktop app - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-10-search-issues-in-outlook-desktop-app/   
Published: 2022 01 20 10:08:45
Received: 2022 01 20 10:20:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft fixes Windows 10 search issues in Outlook desktop app - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-10-search-issues-in-outlook-desktop-app/   
Published: 2022 01 20 10:08:45
Received: 2022 01 20 10:20:12
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: SMBSR made it through another lockdown with some new interesting skills (and fixes). Go check out and judge it (respectfully) - published over 2 years ago.
Content: submitted by /u/oldboy21 [link] [comments]
https://www.reddit.com/r/netsec/comments/s8f9j0/smbsr_made_it_through_another_lockdown_with_some/   
Published: 2022 01 20 09:39:31
Received: 2022 01 20 09:44:11
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: SMBSR made it through another lockdown with some new interesting skills (and fixes). Go check out and judge it (respectfully) - published over 2 years ago.
Content: submitted by /u/oldboy21 [link] [comments]
https://www.reddit.com/r/netsec/comments/s8f9j0/smbsr_made_it_through_another_lockdown_with_some/   
Published: 2022 01 20 09:39:31
Received: 2022 01 20 09:44:11
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: 483 Crypto.com accounts compromised in $34 million hack - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/483-cryptocom-accounts-compromised-in-34-million-hack/   
Published: 2022 01 20 09:10:00
Received: 2022 01 20 09:20:37
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: 483 Crypto.com accounts compromised in $34 million hack - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/483-cryptocom-accounts-compromised-in-34-million-hack/   
Published: 2022 01 20 09:10:00
Received: 2022 01 20 09:20:37
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution

All Articles

Ordered by Date Received : Year: "2022" Month: "01" Day: "20"
Page: << < 2 (of 3) > >>

Total Articles in this collection: 186


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor