All Articles

Ordered by Date Received : Year: "2021" Month: "06"
Page: << < 192 (of 221) > >>

Total Articles in this collection: 11,093

Navigation Help at the bottom of the page
Article: Weekly Update 242 - published over 3 years ago.
Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.A fairly hectic week this one, in a large part due to chasing down really flakey network issues that are causing devices (namely Shelly relays) to be inaccessible. I suspect it's ARP related and as of now, it's still...
https://www.troyhunt.com/weekly-update-242/   
Published: 2021 05 09 06:01:18
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 242 - published over 3 years ago.
Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.A fairly hectic week this one, in a large part due to chasing down really flakey network issues that are causing devices (namely Shelly relays) to be inaccessible. I suspect it's ARP related and as of now, it's still...
https://www.troyhunt.com/weekly-update-242/   
Published: 2021 05 09 06:01:18
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 243 - published over 3 years ago.
Content: Presently sponsored by: ANY.RUN sandbox reveals a malicious sample in seconds. Try the unique approach with an interactive and easy process of analysis!This one is a real short intro as right now, it hurts to type (copy and paste is earlier 😊): I’m Back at a *REAL* Conference; Dealing with RSI; Shellies and MQTT; My IoT Aircon Hack; Drowning in Data Breaches...
https://www.troyhunt.com/weekly-update-243/   
Published: 2021 05 14 07:41:40
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 243 - published over 3 years ago.
Content: Presently sponsored by: ANY.RUN sandbox reveals a malicious sample in seconds. Try the unique approach with an interactive and easy process of analysis!This one is a real short intro as right now, it hurts to type (copy and paste is earlier 😊): I’m Back at a *REAL* Conference; Dealing with RSI; Shellies and MQTT; My IoT Aircon Hack; Drowning in Data Breaches...
https://www.troyhunt.com/weekly-update-243/   
Published: 2021 05 14 07:41:40
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Welcoming the Swedish Government to Have I Been Pwned - published over 3 years ago.
Content: Presently sponsored by: ANY.RUN sandbox reveals a malicious sample in seconds. Try the unique approach with an interactive and easy process of analysis!Today I'm very happy to welcome the 16th government to Have I Been Pwned, Sweden. The Swedish National Computer Security Incident Response Team CERT-SE now has full and free access to query all government dom...
https://www.troyhunt.com/welcoming-the-swedish-government-to-have-i-been-pwned/   
Published: 2021 05 18 08:29:05
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Welcoming the Swedish Government to Have I Been Pwned - published over 3 years ago.
Content: Presently sponsored by: ANY.RUN sandbox reveals a malicious sample in seconds. Try the unique approach with an interactive and easy process of analysis!Today I'm very happy to welcome the 16th government to Have I Been Pwned, Sweden. The Swedish National Computer Security Incident Response Team CERT-SE now has full and free access to query all government dom...
https://www.troyhunt.com/welcoming-the-swedish-government-to-have-i-been-pwned/   
Published: 2021 05 18 08:29:05
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Weekly Update 244 - published over 3 years ago.
Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.For a week where I didn't think I had much to talk about, I was surprised by what I ended up with by the time I sat down to broadcast. Turns out there's always a lot to discuss, and that's before questions from the l...
https://www.troyhunt.com/weekly-update-244/   
Published: 2021 05 22 08:30:50
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 244 - published over 3 years ago.
Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.For a week where I didn't think I had much to talk about, I was surprised by what I ended up with by the time I sat down to broadcast. Turns out there's always a lot to discuss, and that's before questions from the l...
https://www.troyhunt.com/weekly-update-244/   
Published: 2021 05 22 08:30:50
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Welcoming the Trinidad & Tobago Government to Have I Been Pwned - published over 3 years ago.
Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.Today I'm very happy to welcome the first Caribbean government to Have I Been Pwned, Trinidad &amp; Tobago. As of today, the Trinidad and Tobago Cyber Security Incident Response Team (TT-CSIRT) has full and free acce...
https://www.troyhunt.com/welcoming-the-trinidad-and-tobago-government-to-have-i-been-pwned/   
Published: 2021 05 24 07:40:40
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Welcoming the Trinidad & Tobago Government to Have I Been Pwned - published over 3 years ago.
Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.Today I'm very happy to welcome the first Caribbean government to Have I Been Pwned, Trinidad &amp; Tobago. As of today, the Trinidad and Tobago Cyber Security Incident Response Team (TT-CSIRT) has full and free acce...
https://www.troyhunt.com/welcoming-the-trinidad-and-tobago-government-to-have-i-been-pwned/   
Published: 2021 05 24 07:40:40
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Pwned Passwords, Open Source in the .NET Foundation and Working with the FBI - published over 3 years ago.
Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.I've got 2 massive things to announce today that have been a long time in the works and by pure coincidence, have aligned such that I can share them together here today. One you would have been waiting for and one totall...
https://www.troyhunt.com/pwned-passwords-open-source-in-the-dot-net-foundation-and-working-with-the-fbi/   
Published: 2021 05 27 15:00:00
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Pwned Passwords, Open Source in the .NET Foundation and Working with the FBI - published over 3 years ago.
Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.I've got 2 massive things to announce today that have been a long time in the works and by pure coincidence, have aligned such that I can share them together here today. One you would have been waiting for and one totall...
https://www.troyhunt.com/pwned-passwords-open-source-in-the-dot-net-foundation-and-working-with-the-fbi/   
Published: 2021 05 27 15:00:00
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Weekly Update 245 - published over 3 years ago.
Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.This week is the culmination of planning that began all the way back in August last year when I announced the intention to start open sourcing the HIBP code base. Today, it's finally happened with Pwned Passwords now com...
https://www.troyhunt.com/weekly-update-245/   
Published: 2021 05 28 07:22:54
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 245 - published over 3 years ago.
Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.This week is the culmination of planning that began all the way back in August last year when I announced the intention to start open sourcing the HIBP code base. Today, it's finally happened with Pwned Passwords now com...
https://www.troyhunt.com/weekly-update-245/   
Published: 2021 05 28 07:22:54
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Welcoming the Dominican Republic Government to Have I Been Pwned - published over 3 years ago.
Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.Continuing with the launch of the Have I Been Pwned Domain Search API to national government cyber agencies, I am very happy to welcome the first Latin American country on board, the Dominican Republic. Their National Cy...
https://www.troyhunt.com/welcoming-the-dominican-republic-government-to-have-i-been-pwned/   
Published: 2021 05 31 07:12:04
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Welcoming the Dominican Republic Government to Have I Been Pwned - published over 3 years ago.
Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.Continuing with the launch of the Have I Been Pwned Domain Search API to national government cyber agencies, I am very happy to welcome the first Latin American country on board, the Dominican Republic. Their National Cy...
https://www.troyhunt.com/welcoming-the-dominican-republic-government-to-have-i-been-pwned/   
Published: 2021 05 31 07:12:04
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Welcoming the Belgian Government to Have I Been Pwned - published over 3 years ago.
Content: Presently sponsored by: AppTrana Ranks #1 on Customer Experience in 2021 Gartner Peer Insights 'Voice of Customer' for WAF. Only Vendor with 100% recommendation.Supporting national CERTs with free API domain searches across their assets is becoming an increasing focus for Have I Been Pwned and today I'm happy to welcome the 19th government on board, Belgium....
https://www.troyhunt.com/welcoming-the-belgian-government-to-have-i-been-pwned/   
Published: 2021 06 03 21:04:32
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Welcoming the Belgian Government to Have I Been Pwned - published over 3 years ago.
Content: Presently sponsored by: AppTrana Ranks #1 on Customer Experience in 2021 Gartner Peer Insights 'Voice of Customer' for WAF. Only Vendor with 100% recommendation.Supporting national CERTs with free API domain searches across their assets is becoming an increasing focus for Have I Been Pwned and today I'm happy to welcome the 19th government on board, Belgium....
https://www.troyhunt.com/welcoming-the-belgian-government-to-have-i-been-pwned/   
Published: 2021 06 03 21:04:32
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Weekly Update 246 - published over 3 years ago.
Content: Presently sponsored by: AppTrana Ranks #1 on Customer Experience in 2021 Gartner Peer Insights 'Voice of Customer' for WAF. Only Vendor with 100% recommendation.This week has been absolutely dominated by code contributions to Pwned Passwords. This is such an awesome, humbling experience that so many people have wanted to contribute their time to something th...
https://www.troyhunt.com/weekly-update-246/   
Published: 2021 06 06 01:36:19
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 246 - published over 3 years ago.
Content: Presently sponsored by: AppTrana Ranks #1 on Customer Experience in 2021 Gartner Peer Insights 'Voice of Customer' for WAF. Only Vendor with 100% recommendation.This week has been absolutely dominated by code contributions to Pwned Passwords. This is such an awesome, humbling experience that so many people have wanted to contribute their time to something th...
https://www.troyhunt.com/weekly-update-246/   
Published: 2021 06 06 01:36:19
Received: 2021 06 06 09:04:46
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Ofwat reveals it has received 20,000 spam and phishing emails so far this year - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/muddy-waters-ofwat-received-20000-spam-and-phishing-emails/   
Published: 2021 05 13 13:21:42
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Ofwat reveals it has received 20,000 spam and phishing emails so far this year - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/muddy-waters-ofwat-received-20000-spam-and-phishing-emails/   
Published: 2021 05 13 13:21:42
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: New Executive Order Seeks to Strengthen Security of Federal Government Networks - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/government/new-executive-order-seeks-to-strengthen-security-of-federal-government-networks/   
Published: 2021 05 14 14:39:16
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: New Executive Order Seeks to Strengthen Security of Federal Government Networks - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/government/new-executive-order-seeks-to-strengthen-security-of-federal-government-networks/   
Published: 2021 05 14 14:39:16
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Mind the GAAP: A Lens for Understanding the Importance of the CIS Controls - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/security-controls/mind-the-gaap-a-lens-for-understanding-the-importance-of-the-cis-controls/   
Published: 2021 05 17 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Mind the GAAP: A Lens for Understanding the Importance of the CIS Controls - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/security-controls/mind-the-gaap-a-lens-for-understanding-the-importance-of-the-cis-controls/   
Published: 2021 05 17 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Ghosts in the Machine – OT and IT Convergence - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/ics-security/ghosts-in-the-machine-ot-and-it-convergence/   
Published: 2021 05 18 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Ghosts in the Machine – OT and IT Convergence - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/ics-security/ghosts-in-the-machine-ot-and-it-convergence/   
Published: 2021 05 18 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Cybersecurity Training: Raising Awareness And Securing Your Business - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/cybersecurity-training-raising-awareness-and-securing-your-business/   
Published: 2021 05 18 03:01:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Cybersecurity Training: Raising Awareness And Securing Your Business - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/cybersecurity-training-raising-awareness-and-securing-your-business/   
Published: 2021 05 18 03:01:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Hacker Tools Used for Good as Exposed Amazon Cloud Storage Accounts Get Warnings - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/hacker-tools-amazon-cloud-storage/   
Published: 2021 05 18 08:42:49
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Hacker Tools Used for Good as Exposed Amazon Cloud Storage Accounts Get Warnings - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/hacker-tools-amazon-cloud-storage/   
Published: 2021 05 18 08:42:49
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Google’s Office of the CISO Points the Way Towards Scaling Security - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/googles-office-of-the-ciso-points-the-way-towards-scaling-security/   
Published: 2021 05 19 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Google’s Office of the CISO Points the Way Towards Scaling Security - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/googles-office-of-the-ciso-points-the-way-towards-scaling-security/   
Published: 2021 05 19 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: IT Network Attacks Can Impact Your OT Networks, Too - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/ics-security/it-network-attacks-can-impact-your-ot-networks-too/   
Published: 2021 05 20 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: IT Network Attacks Can Impact Your OT Networks, Too - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/ics-security/it-network-attacks-can-impact-your-ot-networks-too/   
Published: 2021 05 20 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Qlocker ransomware gang shuts shop after extorting owners of QNAP NAS drives - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/qlocker-ransomware-gang-shuts-shop-extorting-qnap-nas-drives/   
Published: 2021 05 20 12:54:28
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Qlocker ransomware gang shuts shop after extorting owners of QNAP NAS drives - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/qlocker-ransomware-gang-shuts-shop-extorting-qnap-nas-drives/   
Published: 2021 05 20 12:54:28
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: 5 Things to Do with MITRE ATT&CK – Tips and Tricks Special - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/mitre-framework/things-to-do-with-mitre-attck-tips-and-tricks-special/   
Published: 2021 05 21 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: 5 Things to Do with MITRE ATT&CK – Tips and Tricks Special - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/mitre-framework/things-to-do-with-mitre-attck-tips-and-tricks-special/   
Published: 2021 05 21 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Impact of GDPR on Cloud Service Providers - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/impact-of-gdpr-on-cloud-service-providers/   
Published: 2021 05 24 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Impact of GDPR on Cloud Service Providers - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/impact-of-gdpr-on-cloud-service-providers/   
Published: 2021 05 24 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Superior Integrity Monitoring: Getting Beyond Checkbox FIM - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/security-controls/superior-integrity-monitoring-getting-beyond-checkbox-fim/   
Published: 2021 05 24 08:42:28
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Superior Integrity Monitoring: Getting Beyond Checkbox FIM - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/security-controls/superior-integrity-monitoring-getting-beyond-checkbox-fim/   
Published: 2021 05 24 08:42:28
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: “Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/network-security-biggest-concern-for-public-cloud-adoption-reveals-survey/   
Published: 2021 05 25 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: “Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/network-security-biggest-concern-for-public-cloud-adoption-reveals-survey/   
Published: 2021 05 25 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: 2021 Cybersecurity: Mitigating Mobile Security Risks for CISOs - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/risk-based-security-for-executives/risk-management/cybersecurity-mitigating-mobile-security-risks-for-cisos/   
Published: 2021 05 26 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: 2021 Cybersecurity: Mitigating Mobile Security Risks for CISOs - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/risk-based-security-for-executives/risk-management/cybersecurity-mitigating-mobile-security-risks-for-cisos/   
Published: 2021 05 26 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Tripwire Patch Priority Index for May 2021 - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/vert/tripwire-patch-priority-index-for-may-2021/   
Published: 2021 05 27 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Tripwire Patch Priority Index for May 2021 - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/vert/tripwire-patch-priority-index-for-may-2021/   
Published: 2021 05 27 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: A Fifth of IT Decision-Makers Not Confident in Their OT System Security, Reveals Survey - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/ics-security/it-decision-makers-not-confident-in-ot-system-security-survey/   
Published: 2021 05 27 03:01:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: A Fifth of IT Decision-Makers Not Confident in Their OT System Security, Reveals Survey - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/ics-security/it-decision-makers-not-confident-in-ot-system-security-survey/   
Published: 2021 05 27 03:01:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cryptocurrency scam attack on Twitter reminds users to check their app connections - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/cryptocurrency-scam-attack-twitter-check-app-connections/   
Published: 2021 05 27 12:58:58
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Cryptocurrency scam attack on Twitter reminds users to check their app connections - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/cryptocurrency-scam-attack-twitter-check-app-connections/   
Published: 2021 05 27 12:58:58
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Where Should I Spend My Time? Looking at Verizon DBIR & Executive Order - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/podcast/where-should-i-spend-my-time-looking-at-verizon-dbir-executive-order/   
Published: 2021 05 31 07:25:16
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Where Should I Spend My Time? Looking at Verizon DBIR & Executive Order - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/podcast/where-should-i-spend-my-time-looking-at-verizon-dbir-executive-order/   
Published: 2021 05 31 07:25:16
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: U.S. Critical Infrastructure: Addressing Cyber Threats and the Importance of Prevention - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/critical-infrastructure-addressing-cyber-threats-importance-of-prevention/   
Published: 2021 05 31 07:30:47
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: U.S. Critical Infrastructure: Addressing Cyber Threats and the Importance of Prevention - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/critical-infrastructure-addressing-cyber-threats-importance-of-prevention/   
Published: 2021 05 31 07:30:47
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: How to Apply the Risk Management Framework (RMF) - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/government/applying-risk-management-framework/   
Published: 2021 06 01 09:34:05
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: How to Apply the Risk Management Framework (RMF) - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/government/applying-risk-management-framework/   
Published: 2021 06 01 09:34:05
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Understanding the Cloud Security Challenges for SMBs - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/understanding-the-cloud-security-challenges-for-smbs/   
Published: 2021 06 02 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Understanding the Cloud Security Challenges for SMBs - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cloud/understanding-the-cloud-security-challenges-for-smbs/   
Published: 2021 06 02 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Overcoming Compliance Issues in Cloud Computing - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/overcoming-compliance-issues-in-cloud-computing/   
Published: 2021 06 03 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Overcoming Compliance Issues in Cloud Computing - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/overcoming-compliance-issues-in-cloud-computing/   
Published: 2021 06 03 03:00:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: #TripwireBookClub – The Crypto Dictionary - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/vert/tripwirebookclub-the-crypto-dictionary/   
Published: 2021 06 03 03:01:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: #TripwireBookClub – The Crypto Dictionary - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/vert/tripwirebookclub-the-crypto-dictionary/   
Published: 2021 06 03 03:01:00
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cryptocurrency hacks wanted – $100,000 prize fund offered in cybercrime forum contest - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cryptocurrency-hacks-wanted-100000-prize-fund-offered-in-cybercrime-forum-contest/   
Published: 2021 06 03 16:05:55
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Cryptocurrency hacks wanted – $100,000 prize fund offered in cybercrime forum contest - published over 3 years ago.
Content:
https://www.tripwire.com/state-of-security/security-data-protection/cryptocurrency-hacks-wanted-100000-prize-fund-offered-in-cybercrime-forum-contest/   
Published: 2021 06 03 16:05:55
Received: 2021 06 06 09:04:46
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Testing - published over 6 years ago.
Content: Watch this video on YouTube. The post Testing appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2018/06/testing/   
Published: 2018 06 23 16:27:33
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Testing - published over 6 years ago.
Content: Watch this video on YouTube. The post Testing appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2018/06/testing/   
Published: 2018 06 23 16:27:33
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Tuning up my WordPress Install - published over 6 years ago.
Content: Dreamhost was sending me cryptic emails about my site using too many resources then dieing as a result. Then Jetpack site monitoring was finding the site down, presumably due to running out of resources. And the homepage loaded too slowly. So a technical problem was at hand. There aren’t a lot of resources out there for troubleshooting this sort of issue. ...
https://www.infosecblog.org/2018/06/tuning-up-my-wordpress-install/   
Published: 2018 06 24 01:22:12
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Tuning up my WordPress Install - published over 6 years ago.
Content: Dreamhost was sending me cryptic emails about my site using too many resources then dieing as a result. Then Jetpack site monitoring was finding the site down, presumably due to running out of resources. And the homepage loaded too slowly. So a technical problem was at hand. There aren’t a lot of resources out there for troubleshooting this sort of issue. ...
https://www.infosecblog.org/2018/06/tuning-up-my-wordpress-install/   
Published: 2018 06 24 01:22:12
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Link – What happens when you reply to spam email (Veitch) - published over 6 years ago.
Content: There are people who enjoy messing with scammers by replying to scam, or implementing the Jolly Roger Telephone company. While its a few years old, I just watched a couple of James Veitch Ted Talks on what happens when you reply to spam email. Its hilarious. Watch this video on YouTube. The post Link – What happens when you reply to spam email (Veitch) appea...
https://www.infosecblog.org/2018/08/link-what-happens-when-you-reply-to-spam-email-veitch/   
Published: 2018 08 15 11:56:45
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Link – What happens when you reply to spam email (Veitch) - published over 6 years ago.
Content: There are people who enjoy messing with scammers by replying to scam, or implementing the Jolly Roger Telephone company. While its a few years old, I just watched a couple of James Veitch Ted Talks on what happens when you reply to spam email. Its hilarious. Watch this video on YouTube. The post Link – What happens when you reply to spam email (Veitch) appea...
https://www.infosecblog.org/2018/08/link-what-happens-when-you-reply-to-spam-email-veitch/   
Published: 2018 08 15 11:56:45
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Airplay Annoyance - published over 6 years ago.
Content: I’ve never used Apple Airplay before.   I have an AppleTV that was free for paying  for a 3 month subscription with DirecTV Now.  But I hadn’t intentionally fired it up since cancelling that subscription. This week I bought a new TV.   While watching The Dark Knight on Netflix, suddenly the TV changes inputs to the AppleTV and Katherines Ipad is requesting t...
https://www.infosecblog.org/2018/08/airplay-annoyance/   
Published: 2018 08 18 03:22:57
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Airplay Annoyance - published over 6 years ago.
Content: I’ve never used Apple Airplay before.   I have an AppleTV that was free for paying  for a 3 month subscription with DirecTV Now.  But I hadn’t intentionally fired it up since cancelling that subscription. This week I bought a new TV.   While watching The Dark Knight on Netflix, suddenly the TV changes inputs to the AppleTV and Katherines Ipad is requesting t...
https://www.infosecblog.org/2018/08/airplay-annoyance/   
Published: 2018 08 18 03:22:57
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Kanye’s Password - published about 6 years ago.
Content: Everyone and his brother, inside of infosec and outside has been chortling at Kanye’s iPhone password.   Its 00000. Not everyone is in on the joke. Some express OUTRAGE.  “how dare you share that man’s password” (it was on CNN, its out there now). Some (and these remind me of the 4D Chess MAGA people) theorize that Kanye is thinking 12 steps ahead.  He knew...
https://www.infosecblog.org/2018/10/kanyes-password/   
Published: 2018 10 12 22:48:44
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Kanye’s Password - published about 6 years ago.
Content: Everyone and his brother, inside of infosec and outside has been chortling at Kanye’s iPhone password.   Its 00000. Not everyone is in on the joke. Some express OUTRAGE.  “how dare you share that man’s password” (it was on CNN, its out there now). Some (and these remind me of the 4D Chess MAGA people) theorize that Kanye is thinking 12 steps ahead.  He knew...
https://www.infosecblog.org/2018/10/kanyes-password/   
Published: 2018 10 12 22:48:44
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Its the most wonderful time of the year – Patching - published almost 6 years ago.
Content: does that say patching plaster or patch faster? Remember back when Summer and Christmas break was a high time of concern.  The kids were out of college and ready to try out their skills.  Christmas was worse because so many people were out of the office, no one would notice.  Or if they did the response would be limited.   Now that’s what we call Tuesday af...
https://www.infosecblog.org/2018/12/its-the-most-wonderful-time-of-the-year-patching/   
Published: 2018 12 19 23:46:33
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Its the most wonderful time of the year – Patching - published almost 6 years ago.
Content: does that say patching plaster or patch faster? Remember back when Summer and Christmas break was a high time of concern.  The kids were out of college and ready to try out their skills.  Christmas was worse because so many people were out of the office, no one would notice.  Or if they did the response would be limited.   Now that’s what we call Tuesday af...
https://www.infosecblog.org/2018/12/its-the-most-wonderful-time-of-the-year-patching/   
Published: 2018 12 19 23:46:33
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Secure File Deletion - published almost 6 years ago.
Content: Today I received an email inviting me to buy a Easy File Shredder product for a special price of $15 instead of the usual price of $50. Securely deleting sensitive data is really important. But is buying a product really needed? This type of thing has generally been needed because when you delete a file, you are essentially marking the file space as...
https://www.infosecblog.org/2019/02/secure-file-deletion/   
Published: 2019 02 23 19:12:08
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Secure File Deletion - published almost 6 years ago.
Content: Today I received an email inviting me to buy a Easy File Shredder product for a special price of $15 instead of the usual price of $50. Securely deleting sensitive data is really important. But is buying a product really needed? This type of thing has generally been needed because when you delete a file, you are essentially marking the file space as...
https://www.infosecblog.org/2019/02/secure-file-deletion/   
Published: 2019 02 23 19:12:08
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Beginner’s Mind - published over 5 years ago.
Content: Shoshin is a word from Zen Buddhism meaning “beginner’s mind.” It refers to having an attitude of openness, eagerness, and a lack of preconceptions when studying a subject, even when studying at an advanced level. As IT people we aren’t always known for our attitude of openness, eagerness and lack of preconceptions. Its an easy field to get burnt out. ...
https://www.infosecblog.org/2019/05/beginners-mind/   
Published: 2019 05 28 13:53:39
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Beginner’s Mind - published over 5 years ago.
Content: Shoshin is a word from Zen Buddhism meaning “beginner’s mind.” It refers to having an attitude of openness, eagerness, and a lack of preconceptions when studying a subject, even when studying at an advanced level. As IT people we aren’t always known for our attitude of openness, eagerness and lack of preconceptions. Its an easy field to get burnt out. ...
https://www.infosecblog.org/2019/05/beginners-mind/   
Published: 2019 05 28 13:53:39
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CISSPs from Around the World - published about 4 years ago.
Content: ISC2’s blog has an feature where they interview CISSPs from around the world, and I see this month they interview Javvad Malik. Its a nice interview, but nothing compared to his original piece on the benefits of being a CISSP. Watch this video on YouTube. The post CISSPs from Around the World appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2020/11/cissps-from-around-the-world/   
Published: 2020 11 10 00:08:07
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: CISSPs from Around the World - published about 4 years ago.
Content: ISC2’s blog has an feature where they interview CISSPs from around the world, and I see this month they interview Javvad Malik. Its a nice interview, but nothing compared to his original piece on the benefits of being a CISSP. Watch this video on YouTube. The post CISSPs from Around the World appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2020/11/cissps-from-around-the-world/   
Published: 2020 11 10 00:08:07
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: CloudFlare Gateway DNS Filtering - published almost 4 years ago.
Content: With some downtime over the holidays, I was checking in to see if my ISP has added IPv6 support yet. But sadly nothing had changed in months. So just for fun, I reset up a 6 in 4 tunnel to Hurricane Electric from my router. Sending traffic in a tunnel to HE rather than directly to its destination isn’t exactly going to speed things up. I’ve also he...
https://www.infosecblog.org/2020/12/cloudflare-gateway-dns-filtering/   
Published: 2020 12 28 03:57:45
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: CloudFlare Gateway DNS Filtering - published almost 4 years ago.
Content: With some downtime over the holidays, I was checking in to see if my ISP has added IPv6 support yet. But sadly nothing had changed in months. So just for fun, I reset up a 6 in 4 tunnel to Hurricane Electric from my router. Sending traffic in a tunnel to HE rather than directly to its destination isn’t exactly going to speed things up. I’ve also he...
https://www.infosecblog.org/2020/12/cloudflare-gateway-dns-filtering/   
Published: 2020 12 28 03:57:45
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: No Really – What’s AI? - published over 4 years ago.
Content: Last week I was speaking on a panel about the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference on “Building an AI Powered Intelligence Community”. It was fascinating to listen to some of the panels with people from the Hill talking about AI. I was specifically impressed with the really educated views on i...
https://raffy.ch/blog/2020/03/09/no-really-whats-ai/   
Published: 2020 03 10 03:30:59
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: No Really – What’s AI? - published over 4 years ago.
Content: Last week I was speaking on a panel about the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference on “Building an AI Powered Intelligence Community”. It was fascinating to listen to some of the panels with people from the Hill talking about AI. I was specifically impressed with the really educated views on i...
https://raffy.ch/blog/2020/03/09/no-really-whats-ai/   
Published: 2020 03 10 03:30:59
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Use of AI for Cyber Security in the Intelligence Community - published over 4 years ago.
Content: This post is about capturing my talking points from the recent conference panel on the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference. You can find my musings on the term AI in my previous blog post. Building an AI Powered Intelligence Community (Click image for video) Here is the list of topics I inje...
https://raffy.ch/blog/2020/03/16/use-of-ai-for-cyber-security-in-the-intelligence-community/   
Published: 2020 03 16 14:47:13
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Use of AI for Cyber Security in the Intelligence Community - published over 4 years ago.
Content: This post is about capturing my talking points from the recent conference panel on the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference. You can find my musings on the term AI in my previous blog post. Building an AI Powered Intelligence Community (Click image for video) Here is the list of topics I inje...
https://raffy.ch/blog/2020/03/16/use-of-ai-for-cyber-security-in-the-intelligence-community/   
Published: 2020 03 16 14:47:13
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published almost 4 years ago.
Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ...
https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/   
Published: 2021 02 02 23:18:40
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published almost 4 years ago.
Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ...
https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/   
Published: 2021 02 02 23:18:40
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published almost 4 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/   
Published: 2021 02 08 16:22:11
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published almost 4 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/   
Published: 2021 02 08 16:22:11
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: 2021 Cyber Security Focus: “Unbound” - published over 3 years ago.
Content: It’s already early March and the year is in full swing. Covid is still raging and we have been seeing some crazy weather patterns, especially in the south of the United States. While snowed in here in Texas, I took some time to reflect on what’s driving cyber security spend and customer focus this year. Overall, we can summarize the 2021 trends under the ter...
https://raffy.ch/blog/2021/03/03/2021-cyber-security-focus-unbound/   
Published: 2021 03 03 16:32:52
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: 2021 Cyber Security Focus: “Unbound” - published over 3 years ago.
Content: It’s already early March and the year is in full swing. Covid is still raging and we have been seeing some crazy weather patterns, especially in the south of the United States. While snowed in here in Texas, I took some time to reflect on what’s driving cyber security spend and customer focus this year. Overall, we can summarize the 2021 trends under the ter...
https://raffy.ch/blog/2021/03/03/2021-cyber-security-focus-unbound/   
Published: 2021 03 03 16:32:52
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Asset Management – Back To The Roots - published over 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management: How many assets are in the environment? A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/   
Published: 2021 03 31 13:47:25
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Asset Management – Back To The Roots - published over 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management: How many assets are in the environment? A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/   
Published: 2021 03 31 13:47:25
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/   
Published: 2021 04 16 21:30:24
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/   
Published: 2021 04 16 21:30:24
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/   
Published: 2021 05 19 22:04:11
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/   
Published: 2021 05 19 22:04:11
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: How To Drive Value with Security Data - published over 3 years ago.
Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co...
https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/   
Published: 2021 06 03 16:55:18
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data - published over 3 years ago.
Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co...
https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/   
Published: 2021 06 03 16:55:18
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Shell Shock Rapid 7 Threatsweeper - published about 10 years ago.
Content: By now, you may have heard about CVE-2014-6271, also known as the “bash bug“, or even “Shell Shock”, that may affect your organisation. It’s rated the maximum CVSS score of 10 for impact and ease of exploitability. The affected software, Bash (the Bourne Again SHell), is present on most Linux, BSD, and Unix-like systems, including Mac OS X. New packages were...
https://penturalabs.wordpress.com/2014/09/26/shell-shock-rapid-7-threatsweeper/   
Published: 2014 09 26 09:27:31
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Shell Shock Rapid 7 Threatsweeper - published about 10 years ago.
Content: By now, you may have heard about CVE-2014-6271, also known as the “bash bug“, or even “Shell Shock”, that may affect your organisation. It’s rated the maximum CVSS score of 10 for impact and ease of exploitability. The affected software, Bash (the Bourne Again SHell), is present on most Linux, BSD, and Unix-like systems, including Mac OS X. New packages were...
https://penturalabs.wordpress.com/2014/09/26/shell-shock-rapid-7-threatsweeper/   
Published: 2014 09 26 09:27:31
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: New security flaw uncovered in WordPress - published about 10 years ago.
Content: Researchers have revealed a potentially serious flaw in WordPress software, that allows hackers to search for abandoned or inactive WordPress sites before mounting phishing attacks aimed at enticing users to install infected updates.  Hackers can then quickly hijack the website and direct visitors to deliver malicious content. WordPress is by far the most po...
https://penturalabs.wordpress.com/2014/10/03/new-security-flaw-uncovered-in-wordpress/   
Published: 2014 10 03 14:19:49
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: New security flaw uncovered in WordPress - published about 10 years ago.
Content: Researchers have revealed a potentially serious flaw in WordPress software, that allows hackers to search for abandoned or inactive WordPress sites before mounting phishing attacks aimed at enticing users to install infected updates.  Hackers can then quickly hijack the website and direct visitors to deliver malicious content. WordPress is by far the most po...
https://penturalabs.wordpress.com/2014/10/03/new-security-flaw-uncovered-in-wordpress/   
Published: 2014 10 03 14:19:49
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: AT&T suffers insider data breach - published about 10 years ago.
Content: AT&amp;T has become the latest multinational company to suffer a data breach after one of its own employees gained access to customer data. The US mobile telecoms giant has started informing around 1,600 customers in Vermont that their personal data was breached in August. In a letter posted on the Vermont government’s website, AT&amp;T confirmed that a form...
https://penturalabs.wordpress.com/2014/10/09/att-suffers-insider-data-breach/   
Published: 2014 10 09 14:32:02
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: AT&T suffers insider data breach - published about 10 years ago.
Content: AT&amp;T has become the latest multinational company to suffer a data breach after one of its own employees gained access to customer data. The US mobile telecoms giant has started informing around 1,600 customers in Vermont that their personal data was breached in August. In a letter posted on the Vermont government’s website, AT&amp;T confirmed that a form...
https://penturalabs.wordpress.com/2014/10/09/att-suffers-insider-data-breach/   
Published: 2014 10 09 14:32:02
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Kmart hit by card hack attack - published about 10 years ago.
Content: It’s been revealed that a data breach at US retail chain Kmart that compromised card details lasted over a month. The discount department store said that the malware was discovered last week but had been operating since early September. Based on its investigation so far, the company said that it believes credit and debit cards were exposed but that no person...
https://penturalabs.wordpress.com/2014/10/22/kmart-hit-by-card-hack-attack/   
Published: 2014 10 22 15:20:17
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Kmart hit by card hack attack - published about 10 years ago.
Content: It’s been revealed that a data breach at US retail chain Kmart that compromised card details lasted over a month. The discount department store said that the malware was discovered last week but had been operating since early September. Based on its investigation so far, the company said that it believes credit and debit cards were exposed but that no person...
https://penturalabs.wordpress.com/2014/10/22/kmart-hit-by-card-hack-attack/   
Published: 2014 10 22 15:20:17
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Research Reveals Cost of Online Fraud to UK - published about 10 years ago.
Content: This week has been Get Safe Online Week and to coincide with the event, the National Fraud Intelligence Bureau researched cyber-crime in the UK. The research found that over the last year, the ten biggest online scams cost victims over £670m – although the actual figure is thought to be significantly higher than that due to unreported crimes. A separate poll...
https://penturalabs.wordpress.com/2014/10/30/research-reveals-cost-of-online-fraud-to-uk/   
Published: 2014 10 30 10:21:43
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Research Reveals Cost of Online Fraud to UK - published about 10 years ago.
Content: This week has been Get Safe Online Week and to coincide with the event, the National Fraud Intelligence Bureau researched cyber-crime in the UK. The research found that over the last year, the ten biggest online scams cost victims over £670m – although the actual figure is thought to be significantly higher than that due to unreported crimes. A separate poll...
https://penturalabs.wordpress.com/2014/10/30/research-reveals-cost-of-online-fraud-to-uk/   
Published: 2014 10 30 10:21:43
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: Most businesses do not understand data breach risks - published about 10 years ago.
Content: Research by HP has uncovered a lack of understanding among businesses of the risks associated with data breaches. More than 70% of US and UK executives surveyed by the Ponemon Institute said that their organisation does not understand fully the dangers of breaches, while less than half of top executives and board members are kept informed about the response ...
https://penturalabs.wordpress.com/2014/11/07/most-businesses-do-not-understand-data-breach-risks/   
Published: 2014 11 07 16:19:54
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Most businesses do not understand data breach risks - published about 10 years ago.
Content: Research by HP has uncovered a lack of understanding among businesses of the risks associated with data breaches. More than 70% of US and UK executives surveyed by the Ponemon Institute said that their organisation does not understand fully the dangers of breaches, while less than half of top executives and board members are kept informed about the response ...
https://penturalabs.wordpress.com/2014/11/07/most-businesses-do-not-understand-data-breach-risks/   
Published: 2014 11 07 16:19:54
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: [IRCCloud] Inadequate input validation on API endpoint leading to self denial of service and increased system load - published about 9 years ago.
Content: So as you do, I was just looking around, manually fuzzing some Web Sockets requests, seeing if I could get any sort of XSS, Remote IRC Command Injection or SQLi mainly – ended up that I didn’t find much there that worse worth noting. So I started seeing if their logic was all alright, so one of their requests looked similar to: {“_reqid”:1234, “cid”:5678, “t...
https://penturalabs.wordpress.com/2015/10/13/fuzzing-for-fun-and-profit/   
Published: 2015 10 13 12:04:47
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: [IRCCloud] Inadequate input validation on API endpoint leading to self denial of service and increased system load - published about 9 years ago.
Content: So as you do, I was just looking around, manually fuzzing some Web Sockets requests, seeing if I could get any sort of XSS, Remote IRC Command Injection or SQLi mainly – ended up that I didn’t find much there that worse worth noting. So I started seeing if their logic was all alright, so one of their requests looked similar to: {“_reqid”:1234, “cid”:5678, “t...
https://penturalabs.wordpress.com/2015/10/13/fuzzing-for-fun-and-profit/   
Published: 2015 10 13 12:04:47
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: [IRCCloud] History and Another XSS Bug Bounty - published about 9 years ago.
Content: Personally, I have been a user of IRC since 2004 on some private networks and some other well-known ones such as Freenode. However, it was always inconvenient to have to set up an IRC Bouncer, so when IRCCloud came around, I was excited to try it and see if it provided me with a method of staying connected to all the required networks without having to downl...
https://penturalabs.wordpress.com/2015/10/14/irccloud-history-and-another-xss-bug-bounty/   
Published: 2015 10 14 10:50:15
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: [IRCCloud] History and Another XSS Bug Bounty - published about 9 years ago.
Content: Personally, I have been a user of IRC since 2004 on some private networks and some other well-known ones such as Freenode. However, it was always inconvenient to have to set up an IRC Bouncer, so when IRCCloud came around, I was excited to try it and see if it provided me with a method of staying connected to all the required networks without having to downl...
https://penturalabs.wordpress.com/2015/10/14/irccloud-history-and-another-xss-bug-bounty/   
Published: 2015 10 14 10:50:15
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Finding and Exploiting Same Origin Method Execution vulnerabilities - published almost 9 years ago.
Content: Recently it came to my attention that it was possible to abuse JSONP callbacks using a vulnerability known as SOME – Same Origin Method Execution which can be used by an attacker to widely abuse a user’s trust between the web application and the intended flow of execution. For example, using the SOME attack it is possible for an attacker to trick a user to v...
https://penturalabs.wordpress.com/2015/12/30/finding-and-exploiting-same-origin-method-execution-vulnerabilities/   
Published: 2015 12 30 23:37:46
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Finding and Exploiting Same Origin Method Execution vulnerabilities - published almost 9 years ago.
Content: Recently it came to my attention that it was possible to abuse JSONP callbacks using a vulnerability known as SOME – Same Origin Method Execution which can be used by an attacker to widely abuse a user’s trust between the web application and the intended flow of execution. For example, using the SOME attack it is possible for an attacker to trick a user to v...
https://penturalabs.wordpress.com/2015/12/30/finding-and-exploiting-same-origin-method-execution-vulnerabilities/   
Published: 2015 12 30 23:37:46
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: SNMPPLUX - published over 8 years ago.
Content: Pentura continually develop new tools and scripts to improve the effectiveness of the team. One such tool called SNMPPLUX is an offshoot of a larger development project (ORR). SNMPPLUX is a USM compliant SNMPv1, SNMPv2c and SNMPv3 authentication scanner powered by pysnmp, re, sys, getopt, array, time and multiprocessing python modules. As well as providin...
https://penturalabs.wordpress.com/2016/04/01/snmpplux/   
Published: 2016 04 01 08:21:28
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: SNMPPLUX - published over 8 years ago.
Content: Pentura continually develop new tools and scripts to improve the effectiveness of the team. One such tool called SNMPPLUX is an offshoot of a larger development project (ORR). SNMPPLUX is a USM compliant SNMPv1, SNMPv2c and SNMPv3 authentication scanner powered by pysnmp, re, sys, getopt, array, time and multiprocessing python modules. As well as providin...
https://penturalabs.wordpress.com/2016/04/01/snmpplux/   
Published: 2016 04 01 08:21:28
Received: 2021 06 06 09:04:46
Feed: Pentura Labs's Blog
Source: Pentura Labs's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Regulator fines COVID-19 tracker for turning contact data into sales leads - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/19/regulator-fines-covid-19-tracker-for-turning-contact-data-into-sales-leads/   
Published: 2021 05 19 18:53:54
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: Regulator fines COVID-19 tracker for turning contact data into sales leads - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/19/regulator-fines-covid-19-tracker-for-turning-contact-data-into-sales-leads/   
Published: 2021 05 19 18:53:54
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: S3 Ep33: Eufy camera leak, Afterburner crisis, and AirTags (again) [Podcast] - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/20/s3-ep33-eufy-camera-leak-afterburner-crisis-and-airtags-again-podcast/   
Published: 2021 05 20 18:59:14
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: S3 Ep33: Eufy camera leak, Afterburner crisis, and AirTags (again) [Podcast] - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/20/s3-ep33-eufy-camera-leak-afterburner-crisis-and-airtags-again-podcast/   
Published: 2021 05 20 18:59:14
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Naked Security Live – Jacked and hacked: how safe are tracking tags? - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/24/naked-security-live-jacked-and-hacked-how-safe-are-tracking-tags/   
Published: 2021 05 24 18:48:27
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: Naked Security Live – Jacked and hacked: how safe are tracking tags? - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/24/naked-security-live-jacked-and-hacked-how-safe-are-tracking-tags/   
Published: 2021 05 24 18:48:27
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: Eight suspects busted in raid on “home delivery” scamming operation - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/25/eight-suspects-busted-in-raid-on-home-delivery-scamming-operation/   
Published: 2021 05 25 01:15:41
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: Eight suspects busted in raid on “home delivery” scamming operation - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/25/eight-suspects-busted-in-raid-on-home-delivery-scamming-operation/   
Published: 2021 05 25 01:15:41
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Apple patches dangerous security holes, one in active use – update now! - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/25/apple-patches-dangerous-security-holes-one-in-active-use-update-now/   
Published: 2021 05 25 18:30:33
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: Apple patches dangerous security holes, one in active use – update now! - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/25/apple-patches-dangerous-security-holes-one-in-active-use-update-now/   
Published: 2021 05 25 18:30:33
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: S3 Ep34: Apple bugs, scammers busted, and how crooks bypass 2FA [Podcast] - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/26/s3-ep34-apple-bugs-scammers-busted-and-how-crooks-bypass-2fa-podcast/   
Published: 2021 05 26 18:56:50
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: S3 Ep34: Apple bugs, scammers busted, and how crooks bypass 2FA [Podcast] - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/26/s3-ep34-apple-bugs-scammers-busted-and-how-crooks-bypass-2fa-podcast/   
Published: 2021 05 26 18:56:50
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: “Unpatchable” vuln in Apple’s new Mac chip – what you need to know - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/27/unpatchable-vuln-in-apples-new-mac-chip-what-you-need-to-know/   
Published: 2021 05 27 18:59:00
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: “Unpatchable” vuln in Apple’s new Mac chip – what you need to know - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/05/27/unpatchable-vuln-in-apples-new-mac-chip-what-you-need-to-know/   
Published: 2021 05 27 18:59:00
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: “Have I Been Pwned” breach site partners with… the FBI! - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/06/02/have-i-been-pwned-breach-site-partners-with-the-fbi/   
Published: 2021 06 02 18:55:00
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: “Have I Been Pwned” breach site partners with… the FBI! - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/06/02/have-i-been-pwned-breach-site-partners-with-the-fbi/   
Published: 2021 06 02 18:55:00
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: S3 Ep35: Apple chip flaw, Have I Been Pwned, and Covid tracker trouble [Podcast] - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/06/03/s3-ep35-apple-chip-flaw-have-i-been-pwned-and-covid-tracker-trouble-podcast/   
Published: 2021 06 03 18:34:23
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: S3 Ep35: Apple chip flaw, Have I Been Pwned, and Covid tracker trouble [Podcast] - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/06/03/s3-ep35-apple-chip-flaw-have-i-been-pwned-and-covid-tracker-trouble-podcast/   
Published: 2021 06 03 18:34:23
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: How to hack into 5500 accounts… just using “credential stuffing” - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/06/04/how-to-hack-into-5500-accounts-just-using-credential-stuffing/   
Published: 2021 06 04 18:09:26
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: How to hack into 5500 accounts… just using “credential stuffing” - published over 3 years ago.
Content:
https://nakedsecurity.sophos.com/2021/06/04/how-to-hack-into-5500-accounts-just-using-credential-stuffing/   
Published: 2021 06 04 18:09:26
Received: 2021 06 06 09:04:45
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Apple releases iOS 8 with 56 security patches - published about 10 years ago.
Content:
http://www.livehacking.com/2014/09/18/apple-releases-ios-8-with-56-security-patches/   
Published: 2014 09 18 07:22:43
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Apple releases iOS 8 with 56 security patches - published about 10 years ago.
Content:
http://www.livehacking.com/2014/09/18/apple-releases-ios-8-with-56-security-patches/   
Published: 2014 09 18 07:22:43
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Shellshock: Code injection vulnerability found in Bash - published about 10 years ago.
Content:
http://www.livehacking.com/2014/09/26/shellshock-code-injection-vulnerability-found-in-bash/   
Published: 2014 09 26 06:54:53
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Shellshock: Code injection vulnerability found in Bash - published about 10 years ago.
Content:
http://www.livehacking.com/2014/09/26/shellshock-code-injection-vulnerability-found-in-bash/   
Published: 2014 09 26 06:54:53
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Source code for BadUSB vulnerability posted on GitHub - published about 10 years ago.
Content:
http://www.livehacking.com/2014/10/07/source-code-for-badusb-vulnerability-posted-on-github/   
Published: 2014 10 07 11:10:03
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Source code for BadUSB vulnerability posted on GitHub - published about 10 years ago.
Content:
http://www.livehacking.com/2014/10/07/source-code-for-badusb-vulnerability-posted-on-github/   
Published: 2014 10 07 11:10:03
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Alleged Dropbox hack underlines danger of reusing passwords - published about 10 years ago.
Content:
http://www.livehacking.com/2014/10/15/alleged-dropbox-hack-underlines-danger-of-reusing-passwords/   
Published: 2014 10 15 08:03:16
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Alleged Dropbox hack underlines danger of reusing passwords - published about 10 years ago.
Content:
http://www.livehacking.com/2014/10/15/alleged-dropbox-hack-underlines-danger-of-reusing-passwords/   
Published: 2014 10 15 08:03:16
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple release iOS 8.1 and Apple TV 7.0.1 with new security patches - published about 10 years ago.
Content:
http://www.livehacking.com/2014/10/21/apple-release-ios-8-1-and-apple-tv-7-0-1-with-new-security-patches/   
Published: 2014 10 21 06:46:28
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Apple release iOS 8.1 and Apple TV 7.0.1 with new security patches - published about 10 years ago.
Content:
http://www.livehacking.com/2014/10/21/apple-release-ios-8-1-and-apple-tv-7-0-1-with-new-security-patches/   
Published: 2014 10 21 06:46:28
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Email addresses stolen from CurrentC - published about 10 years ago.
Content:
http://www.livehacking.com/2014/10/31/email-addresses-stolen-from-currentc/   
Published: 2014 10 31 10:07:54
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Email addresses stolen from CurrentC - published about 10 years ago.
Content:
http://www.livehacking.com/2014/10/31/email-addresses-stolen-from-currentc/   
Published: 2014 10 31 10:07:54
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Apple patches security flaws in iOS 8, OS X 10.10 and Apple TV 7 - published about 10 years ago.
Content:
http://www.livehacking.com/2014/11/18/apple-patches-security-flaws-in-ios-8-os-x-10-10-and-apple-tv-7/   
Published: 2014 11 18 07:15:30
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Apple patches security flaws in iOS 8, OS X 10.10 and Apple TV 7 - published about 10 years ago.
Content:
http://www.livehacking.com/2014/11/18/apple-patches-security-flaws-in-ios-8-os-x-10-10-and-apple-tv-7/   
Published: 2014 11 18 07:15:30
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Sony hack shows that the company kept passwords stored in a folder called “Password” - published almost 10 years ago.
Content:
http://www.livehacking.com/2014/12/05/sony-hacks-shows-that-the-company-kept-passwords-stored-in-a-folder-called-password/   
Published: 2014 12 05 10:48:59
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Sony hack shows that the company kept passwords stored in a folder called “Password” - published almost 10 years ago.
Content:
http://www.livehacking.com/2014/12/05/sony-hacks-shows-that-the-company-kept-passwords-stored-in-a-folder-called-password/   
Published: 2014 12 05 10:48:59
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft fixes 24 security vulnerabilities in December’s Patch Tuesday - published almost 10 years ago.
Content:
http://www.livehacking.com/2014/12/10/microsoft-fixes-24-security-vulnerabilities-in-decembers-patch-tuesday/   
Published: 2014 12 10 07:34:11
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft fixes 24 security vulnerabilities in December’s Patch Tuesday - published almost 10 years ago.
Content:
http://www.livehacking.com/2014/12/10/microsoft-fixes-24-security-vulnerabilities-in-decembers-patch-tuesday/   
Published: 2014 12 10 07:34:11
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple updates OS X’s NTP server to address recently disclosed NTP vulnerabilities - published almost 10 years ago.
Content:
http://www.livehacking.com/2014/12/23/apple-updates-os-xs-to-address-ntp-vulnerabilities/   
Published: 2014 12 23 08:39:04
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Apple updates OS X’s NTP server to address recently disclosed NTP vulnerabilities - published almost 10 years ago.
Content:
http://www.livehacking.com/2014/12/23/apple-updates-os-xs-to-address-ntp-vulnerabilities/   
Published: 2014 12 23 08:39:04
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Microsoft to fix Windows vulnerability that Google publicly disclosed last week - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/01/13/microsoft-to-fix-windows-vulnerability-that-google-publicly-disclosed-last-week/   
Published: 2015 01 13 07:43:54
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft to fix Windows vulnerability that Google publicly disclosed last week - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/01/13/microsoft-to-fix-windows-vulnerability-that-google-publicly-disclosed-last-week/   
Published: 2015 01 13 07:43:54
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Google discloses three more zero-day vulnerabilities, this time for OS X - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/01/23/google-discloses-three-more-zero-day-vulnerabilities-this-time-for-os-x/   
Published: 2015 01 23 07:45:27
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Google discloses three more zero-day vulnerabilities, this time for OS X - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/01/23/google-discloses-three-more-zero-day-vulnerabilities-this-time-for-os-x/   
Published: 2015 01 23 07:45:27
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple updates iOS, OS X and Apple TV in monster patch release - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/01/28/apple-updates-ios-os-x-and-apple-tv/   
Published: 2015 01 28 12:56:01
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Apple updates iOS, OS X and Apple TV in monster patch release - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/01/28/apple-updates-ios-os-x-and-apple-tv/   
Published: 2015 01 28 12:56:01
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Cross Site Scripting vulnerability found in IE 11 - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/02/04/cross-site-scripting-vulnerability-found-in-ie-11/   
Published: 2015 02 04 09:46:59
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Cross Site Scripting vulnerability found in IE 11 - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/02/04/cross-site-scripting-vulnerability-found-in-ie-11/   
Published: 2015 02 04 09:46:59
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Google backpedals on its arbitrary vulnerability disclosure policy - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/02/14/google-backpedals-on-its-arbitrary-vulnerability-disclosure-policy/   
Published: 2015 02 14 10:58:46
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Google backpedals on its arbitrary vulnerability disclosure policy - published almost 10 years ago.
Content:
http://www.livehacking.com/2015/02/14/google-backpedals-on-its-arbitrary-vulnerability-disclosure-policy/   
Published: 2015 02 14 10:58:46
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: WP-Slimstat vulnerability exposes WordPress websites to SQL injection attacks - published over 9 years ago.
Content:
http://www.livehacking.com/2015/02/25/wp-slimstat-vulnerability/   
Published: 2015 02 25 11:37:19
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: WP-Slimstat vulnerability exposes WordPress websites to SQL injection attacks - published over 9 years ago.
Content:
http://www.livehacking.com/2015/02/25/wp-slimstat-vulnerability/   
Published: 2015 02 25 11:37:19
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: FREAK vulnerability weakens secure Web sites - published over 9 years ago.
Content:
http://www.livehacking.com/2015/03/04/freak/   
Published: 2015 03 04 09:24:02
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: FREAK vulnerability weakens secure Web sites - published over 9 years ago.
Content:
http://www.livehacking.com/2015/03/04/freak/   
Published: 2015 03 04 09:24:02
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: The OpenSSL project releases new versions of its software to squash 12 security vulnerabilities - published over 9 years ago.
Content:
http://www.livehacking.com/2015/03/19/new-versions-openssl-to-squash-12-security-vulnerabilities/   
Published: 2015 03 19 14:56:46
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: The OpenSSL project releases new versions of its software to squash 12 security vulnerabilities - published over 9 years ago.
Content:
http://www.livehacking.com/2015/03/19/new-versions-openssl-to-squash-12-security-vulnerabilities/   
Published: 2015 03 19 14:56:46
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple fixes security vulnerabilities in Safari, OS X, iOS and Apple TV - published over 9 years ago.
Content:
http://www.livehacking.com/2015/04/09/apple-fixes-security-vulnerabilities-in-safari-os-x-ios-and-apple-tv/   
Published: 2015 04 09 07:37:20
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Article: Apple fixes security vulnerabilities in Safari, OS X, iOS and Apple TV - published over 9 years ago.
Content:
http://www.livehacking.com/2015/04/09/apple-fixes-security-vulnerabilities-in-safari-os-x-ios-and-apple-tv/   
Published: 2015 04 09 07:37:20
Received: 2021 06 06 09:04:45
Feed: LIVE HACKING
Source: LIVE HACKING
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report

All Articles

Ordered by Date Received : Year: "2021" Month: "06"
Page: << < 192 (of 221) > >>

Total Articles in this collection: 11,093


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor