All Articles

Ordered by Date Received : Year: "2021" Month: "12" Day: "13" Hour: "15"
Page: 1 (of 3) > >>

Total Articles in this collection: 150

Navigation Help at the bottom of the page
Article: Did Snatch Ransomware Snitch Volvo Cars R&D Data? - published over 2 years ago.
Content: As news of ransomware attacks continue to grow, Volvo Cars is another name that has found a place on the victim list. By Minu Sirsalewala, Editorial Consultant, CISO MAG In a recent notice, Volvo Cars confirmed that it was a victim of data breach by a third-party; its R&D file repository was illegally accessed and some data was stolen. Snatch ransomware ...
https://cisomag.eccouncil.org/did-snatch-ransomware-snitch-volvo-cars-rd-data/   
Published: 2021 12 13 15:30:33
Received: 2021 12 13 15:46:23
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Article: Did Snatch Ransomware Snitch Volvo Cars R&D Data? - published over 2 years ago.
Content: As news of ransomware attacks continue to grow, Volvo Cars is another name that has found a place on the victim list. By Minu Sirsalewala, Editorial Consultant, CISO MAG In a recent notice, Volvo Cars confirmed that it was a victim of data breach by a third-party; its R&D file repository was illegally accessed and some data was stolen. Snatch ransomware ...
https://cisomag.eccouncil.org/did-snatch-ransomware-snitch-volvo-cars-rd-data/   
Published: 2021 12 13 15:30:33
Received: 2021 12 13 15:46:23
Feed: Ciso Mag - All
Source: CISO Mag
Category: Cyber Security
Topic: Cyber Security
Article: Zed Attack Proxy 2.11.1 Cross Platform Package - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165259/ZAP_2.11.1_Crossplatform.zip   
Published: 2021 12 13 15:24:08
Received: 2021 12 13 15:45:33
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Article: Zed Attack Proxy 2.11.1 Cross Platform Package - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165259/ZAP_2.11.1_Crossplatform.zip   
Published: 2021 12 13 15:24:08
Received: 2021 12 13 15:45:33
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: 2 Website Threats to Address for the Holiday Shopping Rush - published over 2 years ago.
Content:
https://www.darkreading.com/vulnerabilities-threats/2-website-threats-to-address-ahead-of-the-holiday-shopping-rush   
Published: 2021 12 13 15:15:00
Received: 2021 12 13 15:26:37
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: 2 Website Threats to Address for the Holiday Shopping Rush - published over 2 years ago.
Content:
https://www.darkreading.com/vulnerabilities-threats/2-website-threats-to-address-ahead-of-the-holiday-shopping-rush   
Published: 2021 12 13 15:15:00
Received: 2021 12 13 15:26:37
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Stop operating in the dark — we need continuous, runtime IaaS visibility - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96711-stop-operating-in-the-dark-we-need-continuous-runtime-iaas-visibility   
Published: 2021 12 13 05:00:00
Received: 2021 12 13 15:26:10
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Stop operating in the dark — we need continuous, runtime IaaS visibility - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96711-stop-operating-in-the-dark-we-need-continuous-runtime-iaas-visibility   
Published: 2021 12 13 05:00:00
Received: 2021 12 13 15:26:10
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: CVE-2021-43982 (cncsoft) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43982   
Published: 2021 12 09 22:15:07
Received: 2021 12 13 15:26:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-43982 (cncsoft) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43982   
Published: 2021 12 09 22:15:07
Received: 2021 12 13 15:26:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2021-4038 (network_security_manager) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4038   
Published: 2021 12 09 16:15:08
Received: 2021 12 13 15:26:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-4038 (network_security_manager) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4038   
Published: 2021 12 09 16:15:08
Received: 2021 12 13 15:26:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-4033 (kimai_2) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4033   
Published: 2021 12 09 20:15:08
Received: 2021 12 13 15:26:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-4033 (kimai_2) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4033   
Published: 2021 12 09 20:15:08
Received: 2021 12 13 15:26:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2021-37861 (mattermost) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37861   
Published: 2021 12 09 22:15:07
Received: 2021 12 13 15:26:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-37861 (mattermost) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37861   
Published: 2021 12 09 22:15:07
Received: 2021 12 13 15:26:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2021-36169 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36169   
Published: 2021 12 13 14:15:07
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-36169 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36169   
Published: 2021 12 13 14:15:07
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25525 (pay) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25525   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25525 (pay) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25525   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: CVE-2021-25524 (contacts) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25524   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25524 (contacts) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25524   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2021-25523 (dialer) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25523   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25523 (dialer) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25523   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25522 (smart_capture) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25522   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25522 (smart_capture) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25522   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2021-25521 (internet) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25521   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25521 (internet) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25521   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2021-25520 (internet) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25520   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-25520 (internet) - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25520   
Published: 2021 12 08 15:15:08
Received: 2021 12 13 15:26:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.Mechbot.a Insecure Permissions - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165238/MVID-2021-0417.txt   
Published: 2021 12 13 14:57:28
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Mechbot.a Insecure Permissions - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165238/MVID-2021-0417.txt   
Published: 2021 12 13 14:57:28
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Backdoor.IRC.Subhuman Unauthenticated Open Proxy - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165239/MVID-2021-0418.txt   
Published: 2021 12 13 14:57:48
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.IRC.Subhuman Unauthenticated Open Proxy - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165239/MVID-2021-0418.txt   
Published: 2021 12 13 14:57:48
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Backdoor.Win32.Asylum.014 Insecure Password Storage - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165240/MVID-2021-0419.txt   
Published: 2021 12 13 14:58:07
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Asylum.014 Insecure Password Storage - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165240/MVID-2021-0419.txt   
Published: 2021 12 13 14:58:07
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Nucleroot.mf Buffer Overflow - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165241/MVID-2021-0420.txt   
Published: 2021 12 13 14:59:08
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Nucleroot.mf Buffer Overflow - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165241/MVID-2021-0420.txt   
Published: 2021 12 13 14:59:08
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: HD-Network Real-Time Monitoring System 2.0 Local File Inclusion - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165242/hdrtms20-lfi.txt   
Published: 2021 12 13 14:59:44
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: HD-Network Real-Time Monitoring System 2.0 Local File Inclusion - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165242/hdrtms20-lfi.txt   
Published: 2021 12 13 14:59:44
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Backdoor.Win32.BackAttack.20 Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165245/MVID-2021-0423.txt   
Published: 2021 12 13 15:01:48
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.BackAttack.20 Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165245/MVID-2021-0423.txt   
Published: 2021 12 13 15:01:48
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5080-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165246/RHSA-2021-5080-01.txt   
Published: 2021 12 13 15:02:10
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5080-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165246/RHSA-2021-5080-01.txt   
Published: 2021 12 13 15:02:10
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Simple Forum-Discussion System 1.0 SQL Injection - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165247/sfds10-sql.txt   
Published: 2021 12 13 15:03:10
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Simple Forum-Discussion System 1.0 SQL Injection - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165247/sfds10-sql.txt   
Published: 2021 12 13 15:03:10
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Backdoor.Win32.BackAttack.20 Authentication Bypass / Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165248/MVID-2021-0424.txt   
Published: 2021 12 13 15:04:41
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.BackAttack.20 Authentication Bypass / Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165248/MVID-2021-0424.txt   
Published: 2021 12 13 15:04:41
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.FTP.Matiteman Weak Hardcoded Password - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165249/MVID-2021-0425.txt   
Published: 2021 12 13 15:04:59
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.FTP.Matiteman Weak Hardcoded Password - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165249/MVID-2021-0425.txt   
Published: 2021 12 13 15:04:59
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Red Hat Security Advisory 2021-5002-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165251/RHSA-2021-5002-01.txt   
Published: 2021 12 13 15:06:42
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5002-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165251/RHSA-2021-5002-01.txt   
Published: 2021 12 13 15:06:42
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: WebHMI 4.0 Remote Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165252/webhmi40-exec.txt   
Published: 2021 12 13 15:07:15
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: WebHMI 4.0 Remote Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165252/webhmi40-exec.txt   
Published: 2021 12 13 15:07:15
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Ramus Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165253/MVID-2021-0427.txt   
Published: 2021 12 13 15:09:07
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Ramus Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165253/MVID-2021-0427.txt   
Published: 2021 12 13 15:09:07
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Red Hat Security Advisory 2021-5082-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165254/RHSA-2021-5082-01.txt   
Published: 2021 12 13 15:10:06
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5082-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165254/RHSA-2021-5082-01.txt   
Published: 2021 12 13 15:10:06
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Oracle Database Protection Mechanism Bypass - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165255/SYSS-2021-061.txt   
Published: 2021 12 13 15:10:34
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Oracle Database Protection Mechanism Bypass - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165255/SYSS-2021-061.txt   
Published: 2021 12 13 15:10:34
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Phase.11 Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165256/MVID-2021-0428.txt   
Published: 2021 12 13 15:15:09
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Phase.11 Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165256/MVID-2021-0428.txt   
Published: 2021 12 13 15:15:09
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Red Hat Security Advisory 2021-5081-03 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165257/RHSA-2021-5081-03.txt   
Published: 2021 12 13 15:15:37
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2021-5081-03 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165257/RHSA-2021-5081-03.txt   
Published: 2021 12 13 15:15:37
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Oracle Database Weak NNE Integrity Key Derivation - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165258/SYSS-2021-062.txt   
Published: 2021 12 13 15:18:23
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Oracle Database Weak NNE Integrity Key Derivation - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/165258/SYSS-2021-062.txt   
Published: 2021 12 13 15:18:23
Received: 2021 12 13 15:25:30
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Timekeeping biz Kronos hit by ransomware and warns customers to engage biz continuity plans - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2021/12/13/ultimate_kronos_group_ransomware_attack/   
Published: 2021 12 13 15:07:05
Received: 2021 12 13 15:25:12
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Timekeeping biz Kronos hit by ransomware and warns customers to engage biz continuity plans - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2021/12/13/ultimate_kronos_group_ransomware_attack/   
Published: 2021 12 13 15:07:05
Received: 2021 12 13 15:25:12
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Google Rewards Cyber Security Expert Rony Das For Reporting Android Bug - Sentinelassam - published over 2 years ago.
Content: Guwahati: Rony Das, a cyber security expert from Bongaigaon, who reported a bug in the Android foreground services, has been rewarded with $5000 ...
https://www.sentinelassam.com/north-east-india-news/assam-news/google-rewards-cyber-security-expert-rony-das-for-reporting-android-bug-567671   
Published: 2021 12 13 12:37:16
Received: 2021 12 13 15:20:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Google Rewards Cyber Security Expert Rony Das For Reporting Android Bug - Sentinelassam - published over 2 years ago.
Content: Guwahati: Rony Das, a cyber security expert from Bongaigaon, who reported a bug in the Android foreground services, has been rewarded with $5000 ...
https://www.sentinelassam.com/north-east-india-news/assam-news/google-rewards-cyber-security-expert-rony-das-for-reporting-android-bug-567671   
Published: 2021 12 13 12:37:16
Received: 2021 12 13 15:20:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Deadline looms for cyber security apprenticeships in the North | Bdaily - published over 2 years ago.
Content: Young people from across the North East and North Yorkshire are being urged to apply for a cyber security apprenticeship with a mining firm.
https://bdaily.co.uk/articles/2021/12/13/deadline-looms-for-cyber-security-apprenticeships-in-the-north   
Published: 2021 12 13 13:27:18
Received: 2021 12 13 15:20:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Deadline looms for cyber security apprenticeships in the North | Bdaily - published over 2 years ago.
Content: Young people from across the North East and North Yorkshire are being urged to apply for a cyber security apprenticeship with a mining firm.
https://bdaily.co.uk/articles/2021/12/13/deadline-looms-for-cyber-security-apprenticeships-in-the-north   
Published: 2021 12 13 13:27:18
Received: 2021 12 13 15:20:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Internet facing most serious bug in recent years, warn cyber firms - The Siasat Daily - published over 2 years ago.
Content: New Delhi: Cyber security researchers on Monday warned that hackers are making over 100 attempts every minute to exploit a critical security ...
https://www.siasat.com/internet-facing-most-serious-bug-in-recent-years-warn-cyber-firms-2241020/   
Published: 2021 12 13 14:31:27
Received: 2021 12 13 15:20:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Internet facing most serious bug in recent years, warn cyber firms - The Siasat Daily - published over 2 years ago.
Content: New Delhi: Cyber security researchers on Monday warned that hackers are making over 100 attempts every minute to exploit a critical security ...
https://www.siasat.com/internet-facing-most-serious-bug-in-recent-years-warn-cyber-firms-2241020/   
Published: 2021 12 13 14:31:27
Received: 2021 12 13 15:20:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Kolkata: Online class disruption plaints pour in; cops, experts stress cyber security dos and don'ts - published over 2 years ago.
Content: The city police are probing several instances of online classes and webinars being disrupted by obscene messages posted by intruders.
https://timesofindia.indiatimes.com/city/kolkata/kolkata-online-class-disruption-plaints-pour-in-cops-experts-stress-cyber-security-dos-and-donts/articleshow/88247403.cms   
Published: 2021 12 13 14:42:07
Received: 2021 12 13 15:20:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Kolkata: Online class disruption plaints pour in; cops, experts stress cyber security dos and don'ts - published over 2 years ago.
Content: The city police are probing several instances of online classes and webinars being disrupted by obscene messages posted by intruders.
https://timesofindia.indiatimes.com/city/kolkata/kolkata-online-class-disruption-plaints-pour-in-cops-experts-stress-cyber-security-dos-and-donts/articleshow/88247403.cms   
Published: 2021 12 13 14:42:07
Received: 2021 12 13 15:20:55
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Iris On Watch Named Top Cyber Security Software Company of the Year - PR Newswire - published over 2 years ago.
Content: PRNewswire/ -- Iris Powered by Generali ("Iris") today announced the 2021 Cyber Security Awards selected Iris On Watch as their Cyber Security ...
https://www.prnewswire.com/news-releases/iris-on-watch-named-top-cyber-security-software-company-of-the-year-301442649.html   
Published: 2021 12 13 13:00:51
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Iris On Watch Named Top Cyber Security Software Company of the Year - PR Newswire - published over 2 years ago.
Content: PRNewswire/ -- Iris Powered by Generali ("Iris") today announced the 2021 Cyber Security Awards selected Iris On Watch as their Cyber Security ...
https://www.prnewswire.com/news-releases/iris-on-watch-named-top-cyber-security-software-company-of-the-year-301442649.html   
Published: 2021 12 13 13:00:51
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Globe keeps multimillion-dollar investment in cybersecurity amid worsening threats - published over 2 years ago.
Content: Industry giant Globe Telecom has already shelled out nearly $80 million in beefing up its cybersecurity since 2015, but it will continue to pour ...
https://www.cnnphilippines.com/business/2021/12/13/Globe-keeps-multimillion-dollar-investment-in-cybersecurity-amid-worsening-threats.html   
Published: 2021 12 13 14:55:01
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Globe keeps multimillion-dollar investment in cybersecurity amid worsening threats - published over 2 years ago.
Content: Industry giant Globe Telecom has already shelled out nearly $80 million in beefing up its cybersecurity since 2015, but it will continue to pour ...
https://www.cnnphilippines.com/business/2021/12/13/Globe-keeps-multimillion-dollar-investment-in-cybersecurity-amid-worsening-threats.html   
Published: 2021 12 13 14:55:01
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: 48% of businesses have insufficient cybersecurity for remote work - Business Leader News - published over 2 years ago.
Content: Almost half of IT leaders admit their organisation's cybersecurity isn't good enough for remote working, according to research from Distology.
https://www.businessleader.co.uk/48-of-businesses-have-insufficient-cybersecurity-for-remote-work/   
Published: 2021 12 13 15:02:07
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: 48% of businesses have insufficient cybersecurity for remote work - Business Leader News - published over 2 years ago.
Content: Almost half of IT leaders admit their organisation's cybersecurity isn't good enough for remote working, according to research from Distology.
https://www.businessleader.co.uk/48-of-businesses-have-insufficient-cybersecurity-for-remote-work/   
Published: 2021 12 13 15:02:07
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: As cyberthreats mount, India emerging as a global hub for cybersecurity products - The ... - published over 2 years ago.
Content: Last year, Indian companies generated $11 billion in revenues from cybersecurity with about 230 players in the space and this revenue base is growing ...
https://www.thehindubusinessline.com/info-tech/as-cyberthreats-mount-india-emerging-as-a-global-hub-for-cybersecurity-products/article37946170.ece   
Published: 2021 12 13 15:02:53
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: As cyberthreats mount, India emerging as a global hub for cybersecurity products - The ... - published over 2 years ago.
Content: Last year, Indian companies generated $11 billion in revenues from cybersecurity with about 230 players in the space and this revenue base is growing ...
https://www.thehindubusinessline.com/info-tech/as-cyberthreats-mount-india-emerging-as-a-global-hub-for-cybersecurity-products/article37946170.ece   
Published: 2021 12 13 15:02:53
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Washington's cybersecurity wish list for 2022 - POLITICO - published over 2 years ago.
Content: Also: Biden's ransomware talks with Russia are in jeopardy as Russian military forces continue massing on the Ukrainian border, cyber diplomacy ...
https://www.politico.com/newsletters/weekly-cybersecurity/2021/12/13/washingtons-cybersecurity-wish-list-for-2022-799422   
Published: 2021 12 13 15:05:05
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Washington's cybersecurity wish list for 2022 - POLITICO - published over 2 years ago.
Content: Also: Biden's ransomware talks with Russia are in jeopardy as Russian military forces continue massing on the Ukrainian border, cyber diplomacy ...
https://www.politico.com/newsletters/weekly-cybersecurity/2021/12/13/washingtons-cybersecurity-wish-list-for-2022-799422   
Published: 2021 12 13 15:05:05
Received: 2021 12 13 15:20:51
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Stop operating in the dark — we need continuous, runtime IaaS visibility - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96711-stop-operating-in-the-dark-we-need-continuous-runtime-iaas-visibility   
Published: 2021 12 13 05:00:00
Received: 2021 12 13 15:20:08
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Stop operating in the dark — we need continuous, runtime IaaS visibility - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96711-stop-operating-in-the-dark-we-need-continuous-runtime-iaas-visibility   
Published: 2021 12 13 05:00:00
Received: 2021 12 13 15:20:08
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Hackers Actively Exploit Log4Shell Flaw in Apache Log4j - published over 2 years ago.
Content: Log4Shell, a severe zero-day vulnerability in Apache Log4j library, sheds light on the risky practices of organizations relying on open-source code libraries to build enterprise-scale applications. The remote code execution (RCE) vulnerability CVE-2021-44228 reportedly allows remote hackers to execute arbitrary code and take full control of the vulnerable de...
https://cisomag.eccouncil.org/hackers-actively-exploit-log4shell-flaw-in-apache-log4j/   
Published: 2021 12 13 14:02:53
Received: 2021 12 13 15:06:45
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Article: Hackers Actively Exploit Log4Shell Flaw in Apache Log4j - published over 2 years ago.
Content: Log4Shell, a severe zero-day vulnerability in Apache Log4j library, sheds light on the risky practices of organizations relying on open-source code libraries to build enterprise-scale applications. The remote code execution (RCE) vulnerability CVE-2021-44228 reportedly allows remote hackers to execute arbitrary code and take full control of the vulnerable de...
https://cisomag.eccouncil.org/hackers-actively-exploit-log4shell-flaw-in-apache-log4j/   
Published: 2021 12 13 14:02:53
Received: 2021 12 13 15:06:45
Feed: CISO Mag - News
Source: CISO Mag
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Deals: Apple's 24-Inch iMac (8-Core, 256GB) Drops to New Low Price of $1,399 - published over 2 years ago.
Content:
https://www.macrumors.com/2021/12/13/deals-apples-24-inch-imac/   
Published: 2021 12 13 15:04:38
Received: 2021 12 13 15:06:42
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Deals: Apple's 24-Inch iMac (8-Core, 256GB) Drops to New Low Price of $1,399 - published over 2 years ago.
Content:
https://www.macrumors.com/2021/12/13/deals-apples-24-inch-imac/   
Published: 2021 12 13 15:04:38
Received: 2021 12 13 15:06:42
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: The sneaky security risk of overprovisioning the network - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96710-the-sneaky-security-risk-of-overprovisioning-the-network   
Published: 2021 12 13 05:00:00
Received: 2021 12 13 15:06:26
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: The sneaky security risk of overprovisioning the network - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/96710-the-sneaky-security-risk-of-overprovisioning-the-network   
Published: 2021 12 13 05:00:00
Received: 2021 12 13 15:06:26
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: UK.gov emits draft IoT and smartphone security law for Parliamentary scrutiny - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2021/11/25/product_security_telecoms_bill_parliament/   
Published: 2021 11 25 09:30:06
Received: 2021 12 13 15:05:22
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: UK.gov emits draft IoT and smartphone security law for Parliamentary scrutiny - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2021/11/25/product_security_telecoms_bill_parliament/   
Published: 2021 11 25 09:30:06
Received: 2021 12 13 15:05:22
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report

All Articles

Ordered by Date Received : Year: "2021" Month: "12" Day: "13" Hour: "15"
Page: 1 (of 3) > >>

Total Articles in this collection: 150


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor