All Articles

Ordered by Date Received : Year: "2022" Month: "08" Day: "01"
Page: << < 4 (of 8) > >>

Total Articles in this collection: 434

Navigation Help at the bottom of the page
Article: How to celebrate SysAdmin Day! - published over 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/07/29/how-to-celebrate-sysadmin-day/   
Published: 2022 07 29 18:37:12
Received: 2022 08 01 16:08:21
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: How to celebrate SysAdmin Day! - published over 2 years ago.
Content:
https://nakedsecurity.sophos.com/2022/07/29/how-to-celebrate-sysadmin-day/   
Published: 2022 07 29 18:37:12
Received: 2022 08 01 16:08:21
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: The Cyber Resilience Centre for Wales welcomes another prominent member to its board - published over 2 years ago.
Content: The Cyber Resilience Centre for Wales (WCRC) is delighted to announce its newest member to its board line-up – Robert Howell, who is Head of IT at Monmouthshire Building Society. Robert strengthens even further the centre’s already distinguished board bringing his insight and knowledge of the digital arena. Having been with the Society since 2000 when he joi...
https://www.wcrcentre.co.uk/post/the-cyber-resilience-centre-for-wales-welcomes-member-to-its-board   
Published: 2022 07 19 05:09:55
Received: 2022 08 01 15:52:30
Feed: The Cyber Resilience Centre for Wales
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: The Cyber Resilience Centre for Wales welcomes another prominent member to its board - published over 2 years ago.
Content: The Cyber Resilience Centre for Wales (WCRC) is delighted to announce its newest member to its board line-up – Robert Howell, who is Head of IT at Monmouthshire Building Society. Robert strengthens even further the centre’s already distinguished board bringing his insight and knowledge of the digital arena. Having been with the Society since 2000 when he joi...
https://www.wcrcentre.co.uk/post/the-cyber-resilience-centre-for-wales-welcomes-member-to-its-board   
Published: 2022 07 19 05:09:55
Received: 2022 08 01 15:52:30
Feed: The Cyber Resilience Centre for Wales
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: WWW…It's World Wide Web Day! - published over 2 years ago.
Content: How many of you were aware that the today marks World Wide Web Day? And why do we celebrate it? Well, it commemorates the idea that one man had - Sir Tim Berners-Lee, back in 1989, to create a system of interlinked virtual documents that could be accessed over the internet within a browser – and so WWW. was born!It took a further two years before the world’s...
https://www.wcrcentre.co.uk/post/www-its-world-wide-web-day   
Published: 2022 08 01 06:04:06
Received: 2022 08 01 15:52:30
Feed: The Cyber Resilience Centre for Wales
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: WWW…It's World Wide Web Day! - published over 2 years ago.
Content: How many of you were aware that the today marks World Wide Web Day? And why do we celebrate it? Well, it commemorates the idea that one man had - Sir Tim Berners-Lee, back in 1989, to create a system of interlinked virtual documents that could be accessed over the internet within a browser – and so WWW. was born!It took a further two years before the world’s...
https://www.wcrcentre.co.uk/post/www-its-world-wide-web-day   
Published: 2022 08 01 06:04:06
Received: 2022 08 01 15:52:30
Feed: The Cyber Resilience Centre for Wales
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Average cost of data breaches hits record high of $4.35 million: IBM - published over 2 years ago.
Content:
https://www.csoonline.com/article/3668655/average-cost-of-data-breaches-hits-record-high-of-435-million-ibm.html#tk.rss_all   
Published: 2022 08 01 14:44:00
Received: 2022 08 01 15:52:05
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Average cost of data breaches hits record high of $4.35 million: IBM - published over 2 years ago.
Content:
https://www.csoonline.com/article/3668655/average-cost-of-data-breaches-hits-record-high-of-435-million-ibm.html#tk.rss_all   
Published: 2022 08 01 14:44:00
Received: 2022 08 01 15:52:05
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Crime Reporting System 1.0 SQL Injection - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167906/crimereportingsystem10-sql.txt   
Published: 2022 08 01 15:01:11
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Crime Reporting System 1.0 SQL Injection - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167906/crimereportingsystem10-sql.txt   
Published: 2022 08 01 15:01:11
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: WordPress SeatReg 1.23.0 Open Redirect - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167888/wpseatreg1230-redirect.txt   
Published: 2022 08 01 15:04:24
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: WordPress SeatReg 1.23.0 Open Redirect - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167888/wpseatreg1230-redirect.txt   
Published: 2022 08 01 15:04:24
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Wavlink WN533A8 Cross Site Scripting - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167889/wavlinkwn533a8-xss.txt   
Published: 2022 08 01 15:05:50
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Wavlink WN533A8 Cross Site Scripting - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167889/wavlinkwn533a8-xss.txt   
Published: 2022 08 01 15:05:50
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Wavlink WN533A8 Password Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167890/wavlinkwn533a8-disclose.txt   
Published: 2022 08 01 15:06:55
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Wavlink WN533A8 Password Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167890/wavlinkwn533a8-disclose.txt   
Published: 2022 08 01 15:06:55
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Wavlink WN530HG4 Password Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167891/wavlinkwn530hg4-disclose.txt   
Published: 2022 08 01 15:08:37
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Wavlink WN530HG4 Password Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167891/wavlinkwn530hg4-disclose.txt   
Published: 2022 08 01 15:08:37
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Easy Chat Server 3.1 Buffer Overflow - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167892/easychatserver31-overflow.txt   
Published: 2022 08 01 15:10:08
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Easy Chat Server 3.1 Buffer Overflow - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167892/easychatserver31-overflow.txt   
Published: 2022 08 01 15:10:08
Received: 2022 08 01 15:51:03
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: CodeIgniter CMS 4.2.0 SQL Injection - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167893/codeignitercms420-sql.txt   
Published: 2022 08 01 15:13:36
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: CodeIgniter CMS 4.2.0 SQL Injection - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167893/codeignitercms420-sql.txt   
Published: 2022 08 01 15:13:36
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Webmin 1.996 Remote Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167894/webmin1996-exec.txt   
Published: 2022 08 01 15:14:43
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Webmin 1.996 Remote Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167894/webmin1996-exec.txt   
Published: 2022 08 01 15:14:43
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: WordPress Duplicator 1.4.7 Information Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167895/wpduplicator147-disclose.txt   
Published: 2022 08 01 15:17:50
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: WordPress Duplicator 1.4.7 Information Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167895/wpduplicator147-disclose.txt   
Published: 2022 08 01 15:17:50
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: WordPress Duplicator 1.4.6 Backup Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167896/wpduplicator146-disclose.txt   
Published: 2022 08 01 15:19:41
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: WordPress Duplicator 1.4.6 Backup Disclosure - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167896/wpduplicator146-disclose.txt   
Published: 2022 08 01 15:19:41
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: mPDF 7.0 Local File Inclusion - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167897/mpdf70-lfi.txt   
Published: 2022 08 01 15:21:08
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: mPDF 7.0 Local File Inclusion - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167897/mpdf70-lfi.txt   
Published: 2022 08 01 15:21:08
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Backdoor.Win32.Destrukor.20 MVID-2022-0626 Authentication Bypass / Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167898/MVID-2022-0626.txt   
Published: 2022 08 01 15:22:35
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Destrukor.20 MVID-2022-0626 Authentication Bypass / Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167898/MVID-2022-0626.txt   
Published: 2022 08 01 15:22:35
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: CuteEditor For PHP 6.6 Directory Traversal - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167899/cuteeditorforphp66-traversal.txt   
Published: 2022 08 01 15:24:10
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: CuteEditor For PHP 6.6 Directory Traversal - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167899/cuteeditorforphp66-traversal.txt   
Published: 2022 08 01 15:24:10
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Red Hat Security Advisory 2022-5767-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167900/RHSA-2022-5767-01.txt   
Published: 2022 08 01 15:25:35
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-5767-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167900/RHSA-2022-5767-01.txt   
Published: 2022 08 01 15:25:35
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: NanoCMS 0.4 Remote Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167901/nanocms04-exec.txt   
Published: 2022 08 01 15:26:13
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: NanoCMS 0.4 Remote Code Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167901/nanocms04-exec.txt   
Published: 2022 08 01 15:26:13
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-5770-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167902/RHSA-2022-5770-01.txt   
Published: 2022 08 01 15:27:46
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2022-5770-01 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167902/RHSA-2022-5770-01.txt   
Published: 2022 08 01 15:27:46
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Omnia MPX 1.5.0+r1 Path Traversal - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167903/omniampx150-traversal.txt   
Published: 2022 08 01 15:28:24
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Omnia MPX 1.5.0+r1 Path Traversal - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167903/omniampx150-traversal.txt   
Published: 2022 08 01 15:28:24
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Backdoor.Win32.Destrukor.20 MVID-2022-0627 Remote Command Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167904/MVID-2022-0627.txt   
Published: 2022 08 01 15:30:54
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Backdoor.Win32.Destrukor.20 MVID-2022-0627 Remote Command Execution - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167904/MVID-2022-0627.txt   
Published: 2022 08 01 15:30:54
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5542-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167905/USN-5542-1.txt   
Published: 2022 08 01 15:31:43
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-5542-1 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167905/USN-5542-1.txt   
Published: 2022 08 01 15:31:43
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Packet Storm New Exploits For July, 2022 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167907/202207-exploits.tgz   
Published: 2022 08 01 15:34:23
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Packet Storm New Exploits For July, 2022 - published over 2 years ago.
Content:
https://packetstormsecurity.com/files/167907/202207-exploits.tgz   
Published: 2022 08 01 15:34:23
Received: 2022 08 01 15:51:02
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Two Key Ways Development Teams Can Increase Their Security Maturity - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/two-key-ways-development-teams-can.html   
Published: 2022 08 01 14:05:14
Received: 2022 08 01 15:48:56
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Two Key Ways Development Teams Can Increase Their Security Maturity - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/two-key-ways-development-teams-can.html   
Published: 2022 08 01 14:05:14
Received: 2022 08 01 15:48:56
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/researchers-discover-nearly-3200-mobile.html   
Published: 2022 08 01 14:09:45
Received: 2022 08 01 15:48:56
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/researchers-discover-nearly-3200-mobile.html   
Published: 2022 08 01 14:09:45
Received: 2022 08 01 15:48:56
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: A Little DDoS In the Morning, (Mon, Aug 1st) - published over 2 years ago.
Content: Friday morning (at least it wasn't Friday afternoon), we got an alert that our database and web servers exceeded the expected load. Sometimes, this "happens." Often it is just some user innocently flooding our API with requests. We do use quite a bit of caching and such for requests, but it can happen that things pile up at the wrong time. So I took a look a...
https://isc.sans.edu/diary/rss/28900   
Published: 2022 08 01 14:44:45
Received: 2022 08 01 15:43:03
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: A Little DDoS In the Morning, (Mon, Aug 1st) - published over 2 years ago.
Content: Friday morning (at least it wasn't Friday afternoon), we got an alert that our database and web servers exceeded the expected load. Sometimes, this "happens." Often it is just some user innocently flooding our API with requests. We do use quite a bit of caching and such for requests, but it can happen that things pile up at the wrong time. So I took a look a...
https://isc.sans.edu/diary/rss/28900   
Published: 2022 08 01 14:44:45
Received: 2022 08 01 15:43:03
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Two Key Ways Development Teams Can Increase Their Security Maturity - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/two-key-ways-development-teams-can.html   
Published: 2022 08 01 14:05:14
Received: 2022 08 01 15:41:52
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Two Key Ways Development Teams Can Increase Their Security Maturity - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/two-key-ways-development-teams-can.html   
Published: 2022 08 01 14:05:14
Received: 2022 08 01 15:41:52
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/researchers-discover-nearly-3200-mobile.html   
Published: 2022 08 01 14:09:45
Received: 2022 08 01 15:41:52
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys - published over 2 years ago.
Content:
https://thehackernews.com/2022/08/researchers-discover-nearly-3200-mobile.html   
Published: 2022 08 01 14:09:45
Received: 2022 08 01 15:41:52
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Security compensation report available to practitioners - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98088-security-compensation-report-available-to-practitioners   
Published: 2022 08 01 15:00:00
Received: 2022 08 01 15:22:24
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Security compensation report available to practitioners - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98088-security-compensation-report-available-to-practitioners   
Published: 2022 08 01 15:00:00
Received: 2022 08 01 15:22:24
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: If you're in the legal sector, don't make the same mistake - published over 2 years ago.
Content: The risk to legal firms has not disappeared.There have been more recent attacks on legal firms, with ransomware being deployed after data has been stolen. The attacks have had significant impact so much so that the NCSC and the ICO have sent a joint letter to the Law Society and the Bar Association to ask them to reinforce the need for cyber resilience in ...
https://www.ecrcentre.co.uk/post/if-you-re-in-the-legal-sector-don-t-make-the-same-mistake   
Published: 2022 08 01 14:52:30
Received: 2022 08 01 15:12:44
Feed: The Eastern Cyber Resilience Centre
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: If you're in the legal sector, don't make the same mistake - published over 2 years ago.
Content: The risk to legal firms has not disappeared.There have been more recent attacks on legal firms, with ransomware being deployed after data has been stolen. The attacks have had significant impact so much so that the NCSC and the ICO have sent a joint letter to the Law Society and the Bar Association to ask them to reinforce the need for cyber resilience in ...
https://www.ecrcentre.co.uk/post/if-you-re-in-the-legal-sector-don-t-make-the-same-mistake   
Published: 2022 08 01 14:52:30
Received: 2022 08 01 15:12:44
Feed: The Eastern Cyber Resilience Centre
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Microsoft Outlook is crashing when reading Uber receipt emails - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-outlook-is-crashing-when-reading-uber-receipt-emails/   
Published: 2022 08 01 14:59:25
Received: 2022 08 01 15:02:35
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft Outlook is crashing when reading Uber receipt emails - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-outlook-is-crashing-when-reading-uber-receipt-emails/   
Published: 2022 08 01 14:59:25
Received: 2022 08 01 15:02:35
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple Just Patched 39 iPhone Security Bugs - published over 2 years ago.
Content:
https://www.wired.com/story/apple-ios-google-chrome-security-updates-july-2022/   
Published: 2022 07 31 11:00:00
Received: 2022 08 01 15:01:50
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: Apple Just Patched 39 iPhone Security Bugs - published over 2 years ago.
Content:
https://www.wired.com/story/apple-ios-google-chrome-security-updates-july-2022/   
Published: 2022 07 31 11:00:00
Received: 2022 08 01 15:01:50
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: New CosmicStrand rootkit targets Gigabyte and ASUS motherboards - published over 2 years ago.
Content:
https://www.techrepublic.com/article/new-cosmicstrand-rootkit-targets-gigabyte-and-asus-motherboards/   
Published: 2022 08 01 14:31:22
Received: 2022 08 01 14:50:17
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: New CosmicStrand rootkit targets Gigabyte and ASUS motherboards - published over 2 years ago.
Content:
https://www.techrepublic.com/article/new-cosmicstrand-rootkit-targets-gigabyte-and-asus-motherboards/   
Published: 2022 08 01 14:31:22
Received: 2022 08 01 14:50:17
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: A Detailed Analysis of the RedLine Stealer - published over 2 years ago.
Content: submitted by /u/CyberMasterV [link] [comments]
https://www.reddit.com/r/netsec/comments/wdi3yo/a_detailed_analysis_of_the_redline_stealer/   
Published: 2022 08 01 13:56:04
Received: 2022 08 01 14:49:11
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: A Detailed Analysis of the RedLine Stealer - published over 2 years ago.
Content: submitted by /u/CyberMasterV [link] [comments]
https://www.reddit.com/r/netsec/comments/wdi3yo/a_detailed_analysis_of_the_redline_stealer/   
Published: 2022 08 01 13:56:04
Received: 2022 08 01 14:49:11
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Wisconsin’s Deer District scores a winning security plan - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98073-wisconsins-deer-district-scores-a-winning-security-plan   
Published: 2022 08 01 04:00:00
Received: 2022 08 01 14:42:09
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Wisconsin’s Deer District scores a winning security plan - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98073-wisconsins-deer-district-scores-a-winning-security-plan   
Published: 2022 08 01 04:00:00
Received: 2022 08 01 14:42:09
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: The new face of corporate espionage and what can be done about it - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98087-the-new-face-of-corporate-espionage-and-what-can-be-done-about-it   
Published: 2022 08 01 14:15:00
Received: 2022 08 01 14:42:08
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: The new face of corporate espionage and what can be done about it - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98087-the-new-face-of-corporate-espionage-and-what-can-be-done-about-it   
Published: 2022 08 01 14:15:00
Received: 2022 08 01 14:42:08
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: CVE-2022-27255 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27255   
Published: 2022 08 01 12:15:08
Received: 2022 08 01 14:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-27255 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27255   
Published: 2022 08 01 12:15:08
Received: 2022 08 01 14:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-26310 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26310   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-26310 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26310   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-26309 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26309   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-26309 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26309   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-26308 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26308   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-26308 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-26308   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:08
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-2370 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2370   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2370 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2370   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2369 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2369   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2369 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2369   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: CVE-2022-2328 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2328   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2328 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2328   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-2325 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2325   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2325 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2325   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2317 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2317   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2317 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2317   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: CVE-2022-2305 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2305   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2305 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2305   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: CVE-2022-2278 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2278   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2278 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2278   
Published: 2022 08 01 13:15:11
Received: 2022 08 01 14:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2273 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2273   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2273 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2273   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:05
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: CVE-2022-2260 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2260   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2260 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2260   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-2245 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2245   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2245 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2245   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2241 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2241   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2241 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2241   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: CVE-2022-2215 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2215   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2215 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2215   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-2184 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2184   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2184 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2184   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2181 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2181   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2181 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2181   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: CVE-2022-2171 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2171   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2171 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2171   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-2170 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2170   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-2170 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2170   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:04
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1950 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1950   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1950 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1950   
Published: 2022 08 01 13:15:10
Received: 2022 08 01 14:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: CVE-2022-1906 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1906   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1906 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1906   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:03
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-1600 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1600   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1600 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1600   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1585 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1585   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1585 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1585   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-1561 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1561   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1561 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1561   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2022-1324 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1324   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1324 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1324   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-0598 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0598   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-0598 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0598   
Published: 2022 08 01 13:15:09
Received: 2022 08 01 14:23:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: BlackCat ransomware claims attack on European gas pipeline - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-european-gas-pipeline/   
Published: 2022 08 01 14:20:27
Received: 2022 08 01 14:22:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: BlackCat ransomware claims attack on European gas pipeline - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-european-gas-pipeline/   
Published: 2022 08 01 14:20:27
Received: 2022 08 01 14:22:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The new face of corporate espionage and what can be done about it - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98087-the-new-face-of-corporate-espionage-and-what-can-be-done-about-it   
Published: 2022 08 01 14:00:00
Received: 2022 08 01 14:22:09
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: The new face of corporate espionage and what can be done about it - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98087-the-new-face-of-corporate-espionage-and-what-can-be-done-about-it   
Published: 2022 08 01 14:00:00
Received: 2022 08 01 14:22:09
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Deals: Apple TV 4K Available for $119.99 on Amazon ($59 Off) - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/01/deals-apple-tv-4k-119-99/   
Published: 2022 08 01 13:29:42
Received: 2022 08 01 14:11:57
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Deals: Apple TV 4K Available for $119.99 on Amazon ($59 Off) - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/01/deals-apple-tv-4k-119-99/   
Published: 2022 08 01 13:29:42
Received: 2022 08 01 14:11:57
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: For Big Tech, Neutrality Is Not an Option — and Never Really Was - published over 2 years ago.
Content:
https://www.darkreading.com/operations/for-big-tech-neutrality-is-not-an-option-and-never-really-was   
Published: 2022 08 01 14:00:00
Received: 2022 08 01 14:11:28
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: For Big Tech, Neutrality Is Not an Option — and Never Really Was - published over 2 years ago.
Content:
https://www.darkreading.com/operations/for-big-tech-neutrality-is-not-an-option-and-never-really-was   
Published: 2022 08 01 14:00:00
Received: 2022 08 01 14:11:28
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: SilentHound - Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc. - published over 2 years ago.
Content:
http://www.kitploit.com/2022/08/silenthound-quietly-enumerate-active.html   
Published: 2022 08 01 12:30:00
Received: 2022 08 01 14:11:08
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: SilentHound - Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc. - published over 2 years ago.
Content:
http://www.kitploit.com/2022/08/silenthound-quietly-enumerate-active.html   
Published: 2022 08 01 12:30:00
Received: 2022 08 01 14:11:08
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Securing Your Move to the Hybrid Cloud - published over 2 years ago.
Content:
https://threatpost.com/secure-move-cloud/180335/   
Published: 2022 08 01 13:29:56
Received: 2022 08 01 13:41:59
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Securing Your Move to the Hybrid Cloud - published over 2 years ago.
Content:
https://threatpost.com/secure-move-cloud/180335/   
Published: 2022 08 01 13:29:56
Received: 2022 08 01 13:41:59
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Securing the perimeter in manufacturing and distribution - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98083-securing-the-perimeter-in-manufacturing-and-distribution   
Published: 2022 08 01 04:00:00
Received: 2022 08 01 13:22:28
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Securing the perimeter in manufacturing and distribution - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98083-securing-the-perimeter-in-manufacturing-and-distribution   
Published: 2022 08 01 04:00:00
Received: 2022 08 01 13:22:28
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Healthcare organizations must prepare for looming cybersecurity legislation - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98057-healthcare-organizations-must-prepare-for-looming-cybersecurity-legislation   
Published: 2022 08 01 13:00:00
Received: 2022 08 01 13:22:28
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Healthcare organizations must prepare for looming cybersecurity legislation - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98057-healthcare-organizations-must-prepare-for-looming-cybersecurity-legislation   
Published: 2022 08 01 13:00:00
Received: 2022 08 01 13:22:28
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: A closer look at lockdown door safety tools - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98058-a-closer-look-at-lockdown-door-safety-tools   
Published: 2022 08 01 13:00:00
Received: 2022 08 01 13:22:28
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: A closer look at lockdown door safety tools - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98058-a-closer-look-at-lockdown-door-safety-tools   
Published: 2022 08 01 13:00:00
Received: 2022 08 01 13:22:28
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Healthcare organizations must prepare for looming cybersecurity legislation - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98057-healthcare-organizations-must-prepare-for-looming-cybersecurity-legislation   
Published: 2022 08 01 13:00:00
Received: 2022 08 01 13:21:58
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Healthcare organizations must prepare for looming cybersecurity legislation - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/98057-healthcare-organizations-must-prepare-for-looming-cybersecurity-legislation   
Published: 2022 08 01 13:00:00
Received: 2022 08 01 13:21:58
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: You Need a Password Manager. Here Are the Best Ones - published over 2 years ago.
Content:
https://www.wired.com/story/best-password-managers/   
Published: 2022 08 01 13:00:00
Received: 2022 08 01 13:21:43
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: You Need a Password Manager. Here Are the Best Ones - published over 2 years ago.
Content:
https://www.wired.com/story/best-password-managers/   
Published: 2022 08 01 13:00:00
Received: 2022 08 01 13:21:43
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: iPhone 14 Still to Boast Performance Improvement Despite Sticking With A15 Chip - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/01/iphone-14-still-to-boast-performance-improvement/   
Published: 2022 08 01 12:52:36
Received: 2022 08 01 13:12:19
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPhone 14 Still to Boast Performance Improvement Despite Sticking With A15 Chip - published over 2 years ago.
Content:
https://www.macrumors.com/2022/08/01/iphone-14-still-to-boast-performance-improvement/   
Published: 2022 08 01 12:52:36
Received: 2022 08 01 13:12:19
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Channel 16- Maritime Security News - Dryad Global - published over 2 years ago.
Content: Vulnerability Assessment; Maritime Cyber Security; Security Audits; Expert Witness Report. Resource. High Risk Countries.
https://channel16.dryadglobal.com/archive/2022/08   
Published: 2022 08 01 08:44:54
Received: 2022 08 01 13:01:40
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Channel 16- Maritime Security News - Dryad Global - published over 2 years ago.
Content: Vulnerability Assessment; Maritime Cyber Security; Security Audits; Expert Witness Report. Resource. High Risk Countries.
https://channel16.dryadglobal.com/archive/2022/08   
Published: 2022 08 01 08:44:54
Received: 2022 08 01 13:01:40
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Financial sector groups raise concerns over 'systemically important entities' proposal in ... - published over 2 years ago.
Content: Two large financial associations are asking key Senate committee leaders to oppose inclusion of a Cyberspace Solarium Commission recommendation ...
https://insidecybersecurity.com/daily-news/financial-sector-groups-raise-concerns-over-%E2%80%98systemically-important-entities%E2%80%99-proposal   
Published: 2022 08 01 10:09:06
Received: 2022 08 01 13:01:39
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Financial sector groups raise concerns over 'systemically important entities' proposal in ... - published over 2 years ago.
Content: Two large financial associations are asking key Senate committee leaders to oppose inclusion of a Cyberspace Solarium Commission recommendation ...
https://insidecybersecurity.com/daily-news/financial-sector-groups-raise-concerns-over-%E2%80%98systemically-important-entities%E2%80%99-proposal   
Published: 2022 08 01 10:09:06
Received: 2022 08 01 13:01:39
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Half of Companies Don't Have a Security Policy for Open Source Software - CISO Series - published over 2 years ago.
Content: Cyber Security Headlines · Capture the CISO · Super Cyber Friday · CISO Series Podcast · Defense in Depth · Participate · Sponsor.
https://cisoseries.com/half-of-companies-dont-have-a-security-policy-for-open-source-software/   
Published: 2022 08 01 10:14:13
Received: 2022 08 01 13:01:39
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Half of Companies Don't Have a Security Policy for Open Source Software - CISO Series - published over 2 years ago.
Content: Cyber Security Headlines · Capture the CISO · Super Cyber Friday · CISO Series Podcast · Defense in Depth · Participate · Sponsor.
https://cisoseries.com/half-of-companies-dont-have-a-security-policy-for-open-source-software/   
Published: 2022 08 01 10:14:13
Received: 2022 08 01 13:01:39
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber Security Insurance Market May See a Big Move : Major Giants AXA, Beazley, Allianz - published over 2 years ago.
Content: New Jersey , NJ -- (SBWIRE) -- 08/01/2022 -- 2022-2030 Report on Global Cyber Security Insurance Market by Player, Region, Type, Application and ...
https://insurancenewsnet.com/oarticle/cyber-security-insurance-market-may-see-a-big-move-major-giants-axa-beazley-allianz-31   
Published: 2022 08 01 11:17:57
Received: 2022 08 01 13:01:39
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber Security Insurance Market May See a Big Move : Major Giants AXA, Beazley, Allianz - published over 2 years ago.
Content: New Jersey , NJ -- (SBWIRE) -- 08/01/2022 -- 2022-2030 Report on Global Cyber Security Insurance Market by Player, Region, Type, Application and ...
https://insurancenewsnet.com/oarticle/cyber-security-insurance-market-may-see-a-big-move-major-giants-axa-beazley-allianz-31   
Published: 2022 08 01 11:17:57
Received: 2022 08 01 13:01:39
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: A federal agency educates Quad Citians on cyber security protection - FOX5 Vegas - published over 2 years ago.
Content: A federal agency educates Quad Citians on cyber security protection ... Experts say adding “Multifactor Authentication” can make Americans 99% less ...
https://www.fox5vegas.com/video/2022/08/01/federal-agency-educates-quad-citians-cyber-security-protection/   
Published: 2022 08 01 12:07:41
Received: 2022 08 01 13:01:38
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: A federal agency educates Quad Citians on cyber security protection - FOX5 Vegas - published over 2 years ago.
Content: A federal agency educates Quad Citians on cyber security protection ... Experts say adding “Multifactor Authentication” can make Americans 99% less ...
https://www.fox5vegas.com/video/2022/08/01/federal-agency-educates-quad-citians-cyber-security-protection/   
Published: 2022 08 01 12:07:41
Received: 2022 08 01 13:01:38
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary

All Articles

Ordered by Date Received : Year: "2022" Month: "08" Day: "01"
Page: << < 4 (of 8) > >>

Total Articles in this collection: 434


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor