All Articles

Ordered by Date Received : Year: "2023" Month: "03"
Page: << < 2 (of 208) > >>

Total Articles in this collection: 10,403

Navigation Help at the bottom of the page
Article: CVE-2023-23594 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23594   
Published: 2023 03 31 19:15:07
Received: 2023 03 31 20:15:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-23594 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23594   
Published: 2023 03 31 19:15:07
Received: 2023 03 31 20:15:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-48428 (teamcity) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48428   
Published: 2023 03 27 17:15:09
Received: 2023 03 31 20:15:32
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-48428 (teamcity) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48428   
Published: 2023 03 27 17:15:09
Received: 2023 03 31 20:15:32
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: CVE-2022-48427 (teamcity) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48427   
Published: 2023 03 27 17:15:09
Received: 2023 03 31 20:15:32
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-48427 (teamcity) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48427   
Published: 2023 03 27 17:15:09
Received: 2023 03 31 20:15:32
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: UK Probe Into Apple's Mobile Browser Restrictions Shut Down After Apple Argues Regulators Waited Too Long to Open Investigation - published about 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/uk-apple-browser-probe-shut-down/   
Published: 2023 03 31 20:04:00
Received: 2023 03 31 20:05:39
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: UK Probe Into Apple's Mobile Browser Restrictions Shut Down After Apple Argues Regulators Waited Too Long to Open Investigation - published about 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/uk-apple-browser-probe-shut-down/   
Published: 2023 03 31 20:04:00
Received: 2023 03 31 20:05:39
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Twitter open-sources recommendation algorithm code - published about 1 year ago.
Content:
https://www.bleepingcomputer.com/news/technology/twitter-open-sources-recommendation-algorithm-code/   
Published: 2023 03 31 20:02:17
Received: 2023 03 31 20:04:05
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Twitter open-sources recommendation algorithm code - published about 1 year ago.
Content:
https://www.bleepingcomputer.com/news/technology/twitter-open-sources-recommendation-algorithm-code/   
Published: 2023 03 31 20:02:17
Received: 2023 03 31 20:04:05
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Florida city water cyber incident allegedly caused by employee error - published about 1 year ago.
Content:
https://www.databreaches.net/florida-city-water-cyber-incident-allegedly-caused-by-employee-error/   
Published: 2023 03 31 19:22:56
Received: 2023 03 31 19:45:46
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Florida city water cyber incident allegedly caused by employee error - published about 1 year ago.
Content:
https://www.databreaches.net/florida-city-water-cyber-incident-allegedly-caused-by-employee-error/   
Published: 2023 03 31 19:22:56
Received: 2023 03 31 19:45:46
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: How to Solve IoT's Identity Problem - published about 1 year ago.
Content:
https://www.darkreading.com/dr-tech/how-to-solve-iot-s-identity-problem   
Published: 2023 03 31 19:00:00
Received: 2023 03 31 19:45:00
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: How to Solve IoT's Identity Problem - published about 1 year ago.
Content:
https://www.darkreading.com/dr-tech/how-to-solve-iot-s-identity-problem   
Published: 2023 03 31 19:00:00
Received: 2023 03 31 19:45:00
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Adaptive Access Technologies Gaining Traction for Security, Agility - published about 1 year ago.
Content:
https://www.darkreading.com/emerging-tech/adaptive-access-technologies-gaining-traction-for-security-agility   
Published: 2023 03 31 19:15:10
Received: 2023 03 31 19:24:30
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Adaptive Access Technologies Gaining Traction for Security, Agility - published about 1 year ago.
Content:
https://www.darkreading.com/emerging-tech/adaptive-access-technologies-gaining-traction-for-security-agility   
Published: 2023 03 31 19:15:10
Received: 2023 03 31 19:24:30
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: 15 million public-facing services vulnerable to CISA KEV flaws - published about 1 year ago.
Content:
https://www.bleepingcomputer.com/news/security/15-million-public-facing-services-vulnerable-to-cisa-kev-flaws/   
Published: 2023 03 31 19:23:08
Received: 2023 03 31 19:24:09
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: 15 million public-facing services vulnerable to CISA KEV flaws - published about 1 year ago.
Content:
https://www.bleepingcomputer.com/news/security/15-million-public-facing-services-vulnerable-to-cisa-kev-flaws/   
Published: 2023 03 31 19:23:08
Received: 2023 03 31 19:24:09
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Experts weigh in on CIRCIA one year later - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99138-experts-weigh-in-on-circia-one-year-later   
Published: 2023 03 31 18:43:28
Received: 2023 03 31 19:24:04
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Experts weigh in on CIRCIA one year later - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99138-experts-weigh-in-on-circia-one-year-later   
Published: 2023 03 31 18:43:28
Received: 2023 03 31 19:24:04
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: 63,341 customers impacted in Blue Shield of California data breach - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99139-63-341-customers-impacted-in-blue-shield-of-california-data-breach   
Published: 2023 03 31 19:17:30
Received: 2023 03 31 19:24:04
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: 63,341 customers impacted in Blue Shield of California data breach - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99139-63-341-customers-impacted-in-blue-shield-of-california-data-breach   
Published: 2023 03 31 19:17:30
Received: 2023 03 31 19:24:04
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Experts weigh in on CIRCIA one year later - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99138-experts-weigh-in-on-circia-one-year-later   
Published: 2023 03 31 18:43:28
Received: 2023 03 31 19:23:17
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Experts weigh in on CIRCIA one year later - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99138-experts-weigh-in-on-circia-one-year-later   
Published: 2023 03 31 18:43:28
Received: 2023 03 31 19:23:17
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: 63,341 customers impacted in Blue Shield of California data breach - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99139-63-341-customers-impacted-in-blue-shield-of-california-data-breach   
Published: 2023 03 31 19:17:30
Received: 2023 03 31 19:23:16
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: 63,341 customers impacted in Blue Shield of California data breach - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99139-63-341-customers-impacted-in-blue-shield-of-california-data-breach   
Published: 2023 03 31 19:17:30
Received: 2023 03 31 19:23:16
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Hulu App on Apple TV Gets New Interface With Vertical Sidebar - published about 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/hulu-apple-tv-interface-update/   
Published: 2023 03 31 19:03:11
Received: 2023 03 31 19:04:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Hulu App on Apple TV Gets New Interface With Vertical Sidebar - published about 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/hulu-apple-tv-interface-update/   
Published: 2023 03 31 19:03:11
Received: 2023 03 31 19:04:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Experts weight in on CIRCIA one year later - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99138-experts-weight-in-on-circia-one-year-later   
Published: 2023 03 31 18:43:28
Received: 2023 03 31 19:03:37
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Experts weight in on CIRCIA one year later - published about 1 year ago.
Content:
https://www.securitymagazine.com/articles/99138-experts-weight-in-on-circia-one-year-later   
Published: 2023 03 31 18:43:28
Received: 2023 03 31 19:03:37
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Understand your open source software supply chain dependency risks - published about 1 year ago.
Content: submitted by /u/nicksthehacker_ [link] [comments]
https://www.reddit.com/r/netsec/comments/127vhuz/understand_your_open_source_software_supply_chain/   
Published: 2023 03 31 19:01:57
Received: 2023 03 31 19:02:39
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Understand your open source software supply chain dependency risks - published about 1 year ago.
Content: submitted by /u/nicksthehacker_ [link] [comments]
https://www.reddit.com/r/netsec/comments/127vhuz/understand_your_open_source_software_supply_chain/   
Published: 2023 03 31 19:01:57
Received: 2023 03 31 19:02:39
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: After Students Challenged Proctoring Software, French Court Slaps TestWe App With a Suspension - published about 1 year ago.
Content:
https://www.eff.org/deeplinks/2023/03/after-students-challenged-proctoring-software-french-court-slaps-testwe-app   
Published: 2023 03 31 18:33:05
Received: 2023 03 31 18:43:53
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: After Students Challenged Proctoring Software, French Court Slaps TestWe App With a Suspension - published about 1 year ago.
Content:
https://www.eff.org/deeplinks/2023/03/after-students-challenged-proctoring-software-french-court-slaps-testwe-app   
Published: 2023 03 31 18:33:05
Received: 2023 03 31 18:43:53
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: UK Sets Up Fake Booter Sites To Muddy DDoS Market - published about 1 year ago.
Content: The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. The warning displayed to users on one of the NCA’s fake booter sites. Image...
https://krebsonsecurity.com/2023/03/uk-sets-up-fake-booter-sites-to-muddy-ddos-market/   
Published: 2023 03 28 17:26:07
Received: 2023 03 31 18:42:47
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Article: UK Sets Up Fake Booter Sites To Muddy DDoS Market - published about 1 year ago.
Content: The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. The warning displayed to users on one of the NCA’s fake booter sites. Image...
https://krebsonsecurity.com/2023/03/uk-sets-up-fake-booter-sites-to-muddy-ddos-market/   
Published: 2023 03 28 17:26:07
Received: 2023 03 31 18:42:47
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Article: German Police Raid DDoS-Friendly Host ‘FlyHosting’ - published about 1 year ago.
Content: Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a rel...
https://krebsonsecurity.com/2023/03/german-police-raid-ddos-friendly-host-flyhosting/   
Published: 2023 03 31 18:35:15
Received: 2023 03 31 18:42:47
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Article: German Police Raid DDoS-Friendly Host ‘FlyHosting’ - published about 1 year ago.
Content: Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a rel...
https://krebsonsecurity.com/2023/03/german-police-raid-ddos-friendly-host-flyhosting/   
Published: 2023 03 31 18:35:15
Received: 2023 03 31 18:42:47
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem - published about 1 year ago.
Content:
https://www.csoonline.com/article/3692354/spyware-vendors-use-exploit-chains-to-take-advantage-of-patch-delays-in-mobile-ecosystem.html#tk.rss_physicalsecurity   
Published: 2023 03 31 15:09:00
Received: 2023 03 31 18:27:51
Feed: CSO Online - Physical Security
Source: CSO Online
Category: News
Topic: Physical Security
Article: Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem - published about 1 year ago.
Content:
https://www.csoonline.com/article/3692354/spyware-vendors-use-exploit-chains-to-take-advantage-of-patch-delays-in-mobile-ecosystem.html#tk.rss_physicalsecurity   
Published: 2023 03 31 15:09:00
Received: 2023 03 31 18:27:51
Feed: CSO Online - Physical Security
Source: CSO Online
Category: News
Topic: Physical Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Is Decentralized Identity About to Reach an Inflection Point? - published about 1 year ago.
Content:
https://www.darkreading.com/omdia/is-decentralized-identity-about-to-reach-an-inflection-point-   
Published: 2023 03 31 18:16:00
Received: 2023 03 31 18:26:51
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Is Decentralized Identity About to Reach an Inflection Point? - published about 1 year ago.
Content:
https://www.darkreading.com/omdia/is-decentralized-identity-about-to-reach-an-inflection-point-   
Published: 2023 03 31 18:16:00
Received: 2023 03 31 18:26:51
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: SafeDep Vet - Open Source Software Supply Chain Dependency Risks 🚀 - published about 1 year ago.
Content: submitted by /u/madhuakula [link] [comments]
https://www.reddit.com/r/netsec/comments/127tzis/safedep_vet_open_source_software_supply_chain/   
Published: 2023 03 31 18:12:03
Received: 2023 03 31 18:25:32
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: SafeDep Vet - Open Source Software Supply Chain Dependency Risks 🚀 - published about 1 year ago.
Content: submitted by /u/madhuakula [link] [comments]
https://www.reddit.com/r/netsec/comments/127tzis/safedep_vet_open_source_software_supply_chain/   
Published: 2023 03 31 18:12:03
Received: 2023 03 31 18:25:32
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-28879 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28879   
Published: 2023 03 31 17:15:06
Received: 2023 03 31 18:17:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-28879 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28879   
Published: 2023 03 31 17:15:06
Received: 2023 03 31 18:17:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2023-28877 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28877   
Published: 2023 03 31 17:15:06
Received: 2023 03 31 18:17:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-28877 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28877   
Published: 2023 03 31 17:15:06
Received: 2023 03 31 18:17:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-28862 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28862   
Published: 2023 03 31 17:15:06
Received: 2023 03 31 18:17:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-28862 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28862   
Published: 2023 03 31 17:15:06
Received: 2023 03 31 18:17:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-28464 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28464   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:46
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-28464 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28464   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:46
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CVE-2023-26830 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26830   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:41
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-26830 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26830   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:41
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-26829 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26829   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:41
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-26829 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26829   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:41
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-1093 (oauth_single_sign_on) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1093   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 18:17:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1093 (oauth_single_sign_on) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1093   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 18:17:11
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-1089 (coupon_zen) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1089   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 18:17:10
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1089 (coupon_zen) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1089   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 18:17:10
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1088 (wp_plugin_manager) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1088   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 18:17:10
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-1088 (wp_plugin_manager) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1088   
Published: 2023 03 27 16:15:09
Received: 2023 03 31 18:17:10
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-0484 (contact_form_7_widget_for_elementor_page_builder_&_gutenberg_blocks) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0484   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 18:17:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0484 (contact_form_7_widget_for_elementor_page_builder_&_gutenberg_blocks) - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0484   
Published: 2023 03 27 16:15:08
Received: 2023 03 31 18:17:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-0432 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0432   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0432 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0432   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0344 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0344   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0344 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0344   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-0343 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0343   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0343 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0343   
Published: 2023 03 31 16:15:07
Received: 2023 03 31 18:17:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-3192 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3192   
Published: 2023 03 31 17:15:06
Received: 2023 03 31 18:16:33
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-3192 - published about 1 year ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3192   
Published: 2023 03 31 17:15:06
Received: 2023 03 31 18:16:33
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: Best Apple Deals of the Week: Get 20% Off Sitewide at Satechi, Plus Record Lows on AirPods, MagSafe Chargers, and iPad Mini - published about 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/best-apple-deals-of-the-week-3-31-23/   
Published: 2023 03 31 17:52:00
Received: 2023 03 31 18:06:42
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Best Apple Deals of the Week: Get 20% Off Sitewide at Satechi, Plus Record Lows on AirPods, MagSafe Chargers, and iPad Mini - published about 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/best-apple-deals-of-the-week-3-31-23/   
Published: 2023 03 31 17:52:00
Received: 2023 03 31 18:06:42
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple Removing Keynote App's Presentation Sharing Feature in Future Update - published about 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/apple-removing-keynote-live-feature/   
Published: 2023 03 31 18:03:12
Received: 2023 03 31 18:06:42
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Removing Keynote App's Presentation Sharing Feature in Future Update - published about 1 year ago.
Content:
https://www.macrumors.com/2023/03/31/apple-removing-keynote-live-feature/   
Published: 2023 03 31 18:03:12
Received: 2023 03 31 18:06:42
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically - published almost 2 years ago.
Content: Posted by Jonathan Metzman, Dongge Liu and Oliver Chang, Google Open Source Security Team Recently, OSS-Fuzz—our community fuzzing service that regularly checks 700 critical open source projects for bugs—detected a serious vulnerability (CVE-2022-3008): a bug in the TinyGLTF project that could have allowed attackers to execute malicious code in projects us...
http://security.googleblog.com/2022/09/fuzzing-beyond-memory-corruption.html   
Published: 2022 09 08 16:00:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically - published almost 2 years ago.
Content: Posted by Jonathan Metzman, Dongge Liu and Oliver Chang, Google Open Source Security Team Recently, OSS-Fuzz—our community fuzzing service that regularly checks 700 critical open source projects for bugs—detected a serious vulnerability (CVE-2022-3008): a bug in the TinyGLTF project that could have allowed attackers to execute malicious code in projects us...
http://security.googleblog.com/2022/09/fuzzing-beyond-memory-corruption.html   
Published: 2022 09 08 16:00:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Use-after-freedom: MiraclePtr - published over 1 year ago.
Content: Posted by Adrian Taylor, Bartek Nowierski and Kentaro Hara on behalf of the MiraclePtr team Memory safety bugs are the most numerous category of Chrome security issues and we’re continuing to investigate many solutions – both in C++ and in new programming languages. The most common type of memory safety bug is the “use-after-free”. We recently posted abou...
http://security.googleblog.com/2022/09/use-after-freedom-miracleptr.html   
Published: 2022 09 13 16:59:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Use-after-freedom: MiraclePtr - published over 1 year ago.
Content: Posted by Adrian Taylor, Bartek Nowierski and Kentaro Hara on behalf of the MiraclePtr team Memory safety bugs are the most numerous category of Chrome security issues and we’re continuing to investigate many solutions – both in C++ and in new programming languages. The most common type of memory safety bug is the “use-after-free”. We recently posted abou...
http://security.googleblog.com/2022/09/use-after-freedom-miracleptr.html   
Published: 2022 09 13 16:59:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security - published over 1 year ago.
Content: Dave Kleidermacher, Jesse Seed, Brandon Barbello, Sherif Hanna, Eugene Liderman, Android, Pixel, and Silicon Security Teams Every day, billions of people around the world trust Google products to enrich their lives and provide helpful features – across mobile devices, smart home devices, health and fitness devices, and more. We keep more people safe onlin...
http://security.googleblog.com/2022/10/google-pixel-7-and-pixel-7-pro-next.html   
Published: 2022 10 11 17:01:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security - published over 1 year ago.
Content: Dave Kleidermacher, Jesse Seed, Brandon Barbello, Sherif Hanna, Eugene Liderman, Android, Pixel, and Silicon Security Teams Every day, billions of people around the world trust Google products to enrich their lives and provide helpful features – across mobile devices, smart home devices, health and fitness devices, and more. We keep more people safe onlin...
http://security.googleblog.com/2022/10/google-pixel-7-and-pixel-7-pro-next.html   
Published: 2022 10 11 17:01:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Announcing GUAC, a great pairing with SLSA (and SBOM)! - published over 1 year ago.
Content: Posted by Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team Supply chain security is at the fore of the industry’s collective consciousness. We’ve recently seen a significant rise in software supply chain attacks, a Log4j vulnerability of catastrophic severity and breadth, and even an Executive Order on Cybersecurity. It is a...
http://security.googleblog.com/2022/10/announcing-guac-great-pairing-with-slsa.html   
Published: 2022 10 20 17:01:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Announcing GUAC, a great pairing with SLSA (and SBOM)! - published over 1 year ago.
Content: Posted by Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team Supply chain security is at the fore of the industry’s collective consciousness. We’ve recently seen a significant rise in software supply chain attacks, a Log4j vulnerability of catastrophic severity and breadth, and even an Executive Order on Cybersecurity. It is a...
http://security.googleblog.com/2022/10/announcing-guac-great-pairing-with-slsa.html   
Published: 2022 10 20 17:01:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Our Principles for IoT Security Labeling - published over 1 year ago.
Content: Posted by Dave Kleidermacher, Eugene Liderman, and Android and Made by Google security teams We believe that security and transparency are paramount pillars for electronic products connected to the Internet. Over the past year, we’ve been excited to see more focused activity across policymakers, industry partners, developers, and public interest advocates...
http://security.googleblog.com/2022/11/our-principles-for-iot-security-labeling.html   
Published: 2022 11 02 17:00:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Our Principles for IoT Security Labeling - published over 1 year ago.
Content: Posted by Dave Kleidermacher, Eugene Liderman, and Android and Made by Google security teams We believe that security and transparency are paramount pillars for electronic products connected to the Internet. Over the past year, we’ve been excited to see more focused activity across policymakers, industry partners, developers, and public interest advocates...
http://security.googleblog.com/2022/11/our-principles-for-iot-security-labeling.html   
Published: 2022 11 02 17:00:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Memory Safe Languages in Android 13 - published over 1 year ago.
Content: Posted by Jeffrey Vander Stoep For more than a decade, memory safety vulnerabilities have consistently represented more than 65% of vulnerabilities across products, and across the industry. On Android, we’re now seeing something different - a significant drop in memory safety vulnerabilities and an associated drop in the severity of our vulnerabilities. ...
http://security.googleblog.com/2022/12/memory-safe-languages-in-android-13.html   
Published: 2022 12 01 16:58:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Memory Safe Languages in Android 13 - published over 1 year ago.
Content: Posted by Jeffrey Vander Stoep For more than a decade, memory safety vulnerabilities have consistently represented more than 65% of vulnerabilities across products, and across the industry. On Android, we’re now seeing something different - a significant drop in memory safety vulnerabilities and an associated drop in the severity of our vulnerabilities. ...
http://security.googleblog.com/2022/12/memory-safe-languages-in-android-13.html   
Published: 2022 12 01 16:58:00
Received: 2023 03 31 16:42:22
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Enhanced Protection - The strongest level of Safe Browsing protection Google Chrome has to offer - published over 1 year ago.
Content: Posted by Benjamin Ackerman, Chrome Security and Jonathan Li, Safe Browsing As a follow-up to a previous blog post about How Hash-Based Safe Browsing Works in Google Chrome, we wanted to provide more details about Safe Browsing’s Enhanced Protection mode in Chrome. Specifically, how it came about, the protections that are offered and what it means for you...
http://security.googleblog.com/2022/12/enhanced-protection-strongest-level-of.html   
Published: 2022 12 05 18:03:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Enhanced Protection - The strongest level of Safe Browsing protection Google Chrome has to offer - published over 1 year ago.
Content: Posted by Benjamin Ackerman, Chrome Security and Jonathan Li, Safe Browsing As a follow-up to a previous blog post about How Hash-Based Safe Browsing Works in Google Chrome, we wanted to provide more details about Safe Browsing’s Enhanced Protection mode in Chrome. Specifically, how it came about, the protections that are offered and what it means for you...
http://security.googleblog.com/2022/12/enhanced-protection-strongest-level-of.html   
Published: 2022 12 05 18:03:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trust in transparency: Private Compute Core - published over 1 year ago.
Content: Posted by Dave Kleidermacher, Dianne Hackborn, and Eugenio Marchiori We care deeply about privacy. We also know that trust is built by transparency. This blog, and the technical paper reference within, is an example of that commitment: we describe an important new Android privacy infrastructure called Private Compute Core (PCC). Some of our most excitin...
http://security.googleblog.com/2022/12/trust-in-transparency-private-compute.html   
Published: 2022 12 08 16:59:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trust in transparency: Private Compute Core - published over 1 year ago.
Content: Posted by Dave Kleidermacher, Dianne Hackborn, and Eugenio Marchiori We care deeply about privacy. We also know that trust is built by transparency. This blog, and the technical paper reference within, is an example of that commitment: we describe an important new Android privacy infrastructure called Private Compute Core (PCC). Some of our most excitin...
http://security.googleblog.com/2022/12/trust-in-transparency-private-compute.html   
Published: 2022 12 08 16:59:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Announcing OSV-Scanner: Vulnerability Scanner for Open Source - published over 1 year ago.
Content: Posted by Rex Pan, software engineer, Google Open Source Security Team Today, we’re launching the OSV-Scanner, a free tool that gives open source developers easy access to vulnerability information relevant to their project. Last year, we undertook an effort to improve vulnerability triage for developers and consumers of open source software. This involve...
http://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html   
Published: 2022 12 13 18:00:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Announcing OSV-Scanner: Vulnerability Scanner for Open Source - published over 1 year ago.
Content: Posted by Rex Pan, software engineer, Google Open Source Security Team Today, we’re launching the OSV-Scanner, a free tool that gives open source developers easy access to vulnerability information relevant to their project. Last year, we undertook an effort to improve vulnerability triage for developers and consumers of open source software. This involve...
http://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html   
Published: 2022 12 13 18:00:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Expanding the App Defense Alliance - published over 1 year ago.
Content: Posted by Brooke Davis, Android Security and Privacy Team The App Defense Alliance launched in 2019 with a mission to protect Android users from bad apps through shared intelligence and coordinated detection between alliance partners. Earlier this year, the App Defense Alliance expanded to include new initiatives outside of malware detection and is now th...
http://security.googleblog.com/2022/12/app-defense-alliance-expansion.html   
Published: 2022 12 15 16:59:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Expanding the App Defense Alliance - published over 1 year ago.
Content: Posted by Brooke Davis, Android Security and Privacy Team The App Defense Alliance launched in 2019 with a mission to protect Android users from bad apps through shared intelligence and coordinated detection between alliance partners. Earlier this year, the App Defense Alliance expanded to include new initiatives outside of malware detection and is now th...
http://security.googleblog.com/2022/12/app-defense-alliance-expansion.html   
Published: 2022 12 15 16:59:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Supporting the Use of Rust in the Chromium Project - published over 1 year ago.
Content: Posted by Dana Jansens (she/her), Chrome Security Team We are pleased to announce that moving forward, the Chromium project is going to support the use of third-party Rust libraries from C++ in Chromium. To do so, we are now actively pursuing adding a production Rust toolchain to our build system. This will enable us to include Rust code in the Chrome bin...
http://security.googleblog.com/2023/01/supporting-use-of-rust-in-chromium.html   
Published: 2023 01 12 17:26:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Supporting the Use of Rust in the Chromium Project - published over 1 year ago.
Content: Posted by Dana Jansens (she/her), Chrome Security Team We are pleased to announce that moving forward, the Chromium project is going to support the use of third-party Rust libraries from C++ in Chromium. To do so, we are now actively pursuing adding a production Rust toolchain to our build system. This will enable us to include Rust code in the Chrome bin...
http://security.googleblog.com/2023/01/supporting-use-of-rust-in-chromium.html   
Published: 2023 01 12 17:26:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Sustaining Digital Certificate Security - TrustCor Certificate Distrust - published over 1 year ago.
Content: Posted by Chrome Root Program, Chrome Security Team Note: This post is a follow-up to discussions carried out on the Mozilla “Dev Security Policy” Web PKI public discussion forum Google Group in December 2022. Google Chrome communicated its distrust of TrustCor in the public forum on December 15, 2022. The Chrome Security Team prioritizes the security an...
http://security.googleblog.com/2023/01/sustaining-digital-certificate-security_13.html   
Published: 2023 01 13 17:29:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Sustaining Digital Certificate Security - TrustCor Certificate Distrust - published over 1 year ago.
Content: Posted by Chrome Root Program, Chrome Security Team Note: This post is a follow-up to discussions carried out on the Mozilla “Dev Security Policy” Web PKI public discussion forum Google Group in December 2022. Google Chrome communicated its distrust of TrustCor in the public forum on December 15, 2022. The Chrome Security Team prioritizes the security an...
http://security.googleblog.com/2023/01/sustaining-digital-certificate-security_13.html   
Published: 2023 01 13 17:29:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Taking the next step: OSS-Fuzz in 2023 - published over 1 year ago.
Content: Posted by Oliver Chang, OSS-Fuzz team Since launching in 2016, Google's free OSS-Fuzz code testing service has helped get over 8800 vulnerabilities and 28,000 bugs fixed across 850 projects. Today, we’re happy to announce an expansion of our OSS-Fuzz Rewards Program, plus new features in OSS-Fuzz and our involvement in supporting academic fuzzing research....
http://security.googleblog.com/2023/02/taking-next-step-oss-fuzz-in-2023.html   
Published: 2023 02 01 18:00:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Taking the next step: OSS-Fuzz in 2023 - published over 1 year ago.
Content: Posted by Oliver Chang, OSS-Fuzz team Since launching in 2016, Google's free OSS-Fuzz code testing service has helped get over 8800 vulnerabilities and 28,000 bugs fixed across 850 projects. Today, we’re happy to announce an expansion of our OSS-Fuzz Rewards Program, plus new features in OSS-Fuzz and our involvement in supporting academic fuzzing research....
http://security.googleblog.com/2023/02/taking-next-step-oss-fuzz-in-2023.html   
Published: 2023 02 01 18:00:00
Received: 2023 03 31 16:42:21
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: The US Government says companies should take more responsibility for cyberattacks. We agree. - published over 1 year ago.
Content: Posted by Kent Walker, President, Global Affairs &amp; Chief Legal Officer, Google &amp; Alphabet and Royal Hansen, Vice President of Engineering for Privacy, Safety, and Security Should companies be responsible for cyberattacks? The U.S. government thinks so – and frankly, we agree. Jen Easterly and Eric Goldstein of the Cybersecurity and Infrastructur...
http://security.googleblog.com/2023/02/the-us-government-says-companies-should.html   
Published: 2023 02 13 17:01:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: The US Government says companies should take more responsibility for cyberattacks. We agree. - published over 1 year ago.
Content: Posted by Kent Walker, President, Global Affairs &amp; Chief Legal Officer, Google &amp; Alphabet and Royal Hansen, Vice President of Engineering for Privacy, Safety, and Security Should companies be responsible for cyberattacks? The U.S. government thinks so – and frankly, we agree. Jen Easterly and Eric Goldstein of the Cybersecurity and Infrastructur...
http://security.googleblog.com/2023/02/the-us-government-says-companies-should.html   
Published: 2023 02 13 17:01:00
Received: 2023 03 31 16:42:20
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check

All Articles

Ordered by Date Received : Year: "2023" Month: "03"
Page: << < 2 (of 208) > >>

Total Articles in this collection: 10,403


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor