All Articles

Ordered by Date Received : Year: "2023" Month: "01" Day: "19"
Page: << < 2 (of 6) > >>

Total Articles in this collection: 311

Navigation Help at the bottom of the page
Article: Digital Rights Updates with EFFector 35.1 - published almost 2 years ago.
Content:
https://www.eff.org/deeplinks/2023/01/digital-rights-updates-effector-351   
Published: 2023 01 17 21:48:41
Received: 2023 01 19 19:44:03
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Digital Rights Updates with EFFector 35.1 - published almost 2 years ago.
Content:
https://www.eff.org/deeplinks/2023/01/digital-rights-updates-effector-351   
Published: 2023 01 17 21:48:41
Received: 2023 01 19 19:44:03
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published almost 4 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/   
Published: 2021 02 08 16:22:11
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published almost 4 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/   
Published: 2021 02 08 16:22:11
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/   
Published: 2021 04 16 21:30:24
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/   
Published: 2021 04 16 21:30:24
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/   
Published: 2021 05 19 22:04:11
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/   
Published: 2021 05 19 22:04:11
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: How To Drive Value with Security Data - published over 3 years ago.
Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co...
https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/   
Published: 2021 06 03 16:55:18
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data - published over 3 years ago.
Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co...
https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/   
Published: 2021 06 03 16:55:18
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/   
Published: 2021 06 08 16:05:55
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/   
Published: 2021 06 08 16:05:55
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data – The Full Talk - published over 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/   
Published: 2021 06 12 20:00:24
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data – The Full Talk - published over 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/   
Published: 2021 06 12 20:00:24
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: *NIX Command Line Foo - published almost 2 years ago.
Content: Well, not one of my normal blog posts, but I hope some of you geeks out there will find this useful anyways. I will definitely use this post as a reference frequently. I have been using various flavors of UNIX and their command lines from ksh to bash and zsh for over 25 years and there is always something new to learn to make me faster at the jobs I am do...
https://raffy.ch/blog/2022/11/27/nix-command-line-foo/   
Published: 2022 11 27 17:28:05
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: *NIX Command Line Foo - published almost 2 years ago.
Content: Well, not one of my normal blog posts, but I hope some of you geeks out there will find this useful anyways. I will definitely use this post as a reference frequently. I have been using various flavors of UNIX and their command lines from ksh to bash and zsh for over 25 years and there is always something new to learn to make me faster at the jobs I am do...
https://raffy.ch/blog/2022/11/27/nix-command-line-foo/   
Published: 2022 11 27 17:28:05
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Ransomware gang steals data from KFC, Taco Bell, and Pizza Hut brand owner - published almost 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/ransomware-gang-steals-data-from-kfc-taco-bell-and-pizza-hut-brand-owner/   
Published: 2023 01 19 19:21:11
Received: 2023 01 19 19:24:17
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Ransomware gang steals data from KFC, Taco Bell, and Pizza Hut brand owner - published almost 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/ransomware-gang-steals-data-from-kfc-taco-bell-and-pizza-hut-brand-owner/   
Published: 2023 01 19 19:21:11
Received: 2023 01 19 19:24:17
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Have You Tried Turning It Off and On Again: Rethinking Tech Regulation and Creative Labor - published almost 2 years ago.
Content:
https://www.eff.org/deeplinks/2023/01/have-you-tried-turning-it-and-again-rethinking-tech-regulation-and-creative-labor   
Published: 2023 01 19 19:16:45
Received: 2023 01 19 19:23:57
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Have You Tried Turning It Off and On Again: Rethinking Tech Regulation and Creative Labor - published almost 2 years ago.
Content:
https://www.eff.org/deeplinks/2023/01/have-you-tried-turning-it-and-again-rethinking-tech-regulation-and-creative-labor   
Published: 2023 01 19 19:16:45
Received: 2023 01 19 19:23:57
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Aerleon a vendor agnostic firewall management system - published almost 2 years ago.
Content: submitted by /u/ankenyr [link] [comments]
https://www.reddit.com/r/netsec/comments/10g9qss/aerleon_a_vendor_agnostic_firewall_management/   
Published: 2023 01 19 18:49:43
Received: 2023 01 19 19:22:33
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Aerleon a vendor agnostic firewall management system - published almost 2 years ago.
Content: submitted by /u/ankenyr [link] [comments]
https://www.reddit.com/r/netsec/comments/10g9qss/aerleon_a_vendor_agnostic_firewall_management/   
Published: 2023 01 19 18:49:43
Received: 2023 01 19 19:22:33
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: CVE-2023-0406 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0406   
Published: 2023 01 19 18:15:15
Received: 2023 01 19 19:15:12
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0406 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0406   
Published: 2023 01 19 18:15:15
Received: 2023 01 19 19:15:12
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47745 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47745   
Published: 2023 01 19 18:15:15
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47745 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47745   
Published: 2023 01 19 18:15:15
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CVE-2022-47740 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47740   
Published: 2023 01 19 18:15:14
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47740 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47740   
Published: 2023 01 19 18:15:14
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: CVE-2022-47197 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47197   
Published: 2023 01 19 18:15:14
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47197 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47197   
Published: 2023 01 19 18:15:14
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47196 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47196   
Published: 2023 01 19 18:15:14
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47196 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47196   
Published: 2023 01 19 18:15:14
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-47195 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47195   
Published: 2023 01 19 18:15:14
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47195 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47195   
Published: 2023 01 19 18:15:14
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-47194 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47194   
Published: 2023 01 19 18:15:13
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47194 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47194   
Published: 2023 01 19 18:15:13
Received: 2023 01 19 19:15:06
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-40697 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40697   
Published: 2023 01 19 17:15:12
Received: 2023 01 19 19:14:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-40697 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40697   
Published: 2023 01 19 17:15:12
Received: 2023 01 19 19:14:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-39167 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39167   
Published: 2023 01 19 17:15:11
Received: 2023 01 19 19:14:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-39167 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39167   
Published: 2023 01 19 17:15:11
Received: 2023 01 19 19:14:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: CVE-2022-1676 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1676   
Published: 2023 01 19 17:15:11
Received: 2023 01 19 19:14:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-1676 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1676   
Published: 2023 01 19 17:15:11
Received: 2023 01 19 19:14:50
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-25714 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25714   
Published: 2023 01 19 18:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-25714 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25714   
Published: 2023 01 19 18:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2020-25679 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25679   
Published: 2023 01 19 18:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-25679 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25679   
Published: 2023 01 19 18:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2020-1715 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1715   
Published: 2023 01 19 18:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-1715 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1715   
Published: 2023 01 19 18:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-1713 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1713   
Published: 2023 01 19 17:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-1713 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1713   
Published: 2023 01 19 17:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2020-10765 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10765   
Published: 2023 01 19 18:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-10765 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10765   
Published: 2023 01 19 18:15:11
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CVE-2020-10764 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10764   
Published: 2023 01 19 18:15:10
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-10764 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10764   
Published: 2023 01 19 18:15:10
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-10694 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10694   
Published: 2023 01 19 18:15:10
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-10694 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10694   
Published: 2023 01 19 18:15:10
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2020-10692 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10692   
Published: 2023 01 19 18:15:10
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2020-10692 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10692   
Published: 2023 01 19 18:15:10
Received: 2023 01 19 19:14:47
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Shift Identity Left: Preventing Identity-Based Breaches - published almost 2 years ago.
Content:
https://www.darkreading.com/cloud/shift-identity-left-preventing-identity-based-breaches   
Published: 2023 01 19 18:35:00
Received: 2023 01 19 19:04:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Shift Identity Left: Preventing Identity-Based Breaches - published almost 2 years ago.
Content:
https://www.darkreading.com/cloud/shift-identity-left-preventing-identity-based-breaches   
Published: 2023 01 19 18:35:00
Received: 2023 01 19 19:04:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Roaming Mantis Uses DNS Changers to Target Users via Compromised Public Routers - published almost 2 years ago.
Content:
https://www.darkreading.com/remote-workforce/roaming-mantis-uses-dns-changers-to-target-users-via-compromised-public-routers   
Published: 2023 01 19 18:54:00
Received: 2023 01 19 19:04:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Roaming Mantis Uses DNS Changers to Target Users via Compromised Public Routers - published almost 2 years ago.
Content:
https://www.darkreading.com/remote-workforce/roaming-mantis-uses-dns-changers-to-target-users-via-compromised-public-routers   
Published: 2023 01 19 18:54:00
Received: 2023 01 19 19:04:24
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: 7 factors influencing global enterprise risk & resilience in 2023 - published almost 2 years ago.
Content:
https://www.securitymagazine.com/articles/98806-7-factors-influencing-global-enterprise-risk-and-resilience-in-2023   
Published: 2023 01 19 05:00:00
Received: 2023 01 19 19:03:43
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: 7 factors influencing global enterprise risk & resilience in 2023 - published almost 2 years ago.
Content:
https://www.securitymagazine.com/articles/98806-7-factors-influencing-global-enterprise-risk-and-resilience-in-2023   
Published: 2023 01 19 05:00:00
Received: 2023 01 19 19:03:43
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Why you don’t have to fix every vulnerability - published almost 2 years ago.
Content:
https://www.csoonline.com/article/3686089/why-you-don-t-have-to-fix-every-vulnerability.html#tk.rss_all   
Published: 2023 01 19 15:37:00
Received: 2023 01 19 18:44:58
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Why you don’t have to fix every vulnerability - published almost 2 years ago.
Content:
https://www.csoonline.com/article/3686089/why-you-don-t-have-to-fix-every-vulnerability.html#tk.rss_all   
Published: 2023 01 19 15:37:00
Received: 2023 01 19 18:44:58
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft starts testing Notepad tabs in Windows 11 - published almost 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-starts-testing-notepad-tabs-in-windows-11/   
Published: 2023 01 19 18:35:25
Received: 2023 01 19 18:43:36
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Microsoft starts testing Notepad tabs in Windows 11 - published almost 2 years ago.
Content:
https://www.bleepingcomputer.com/news/microsoft/microsoft-starts-testing-notepad-tabs-in-windows-11/   
Published: 2023 01 19 18:35:25
Received: 2023 01 19 18:43:36
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Roaming Mantis’ Android malware adds DNS changer to hack WiFi routers - published almost 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/roaming-mantis-android-malware-adds-dns-changer-to-hack-wifi-routers/   
Published: 2023 01 19 17:55:02
Received: 2023 01 19 18:03:39
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Roaming Mantis’ Android malware adds DNS changer to hack WiFi routers - published almost 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/roaming-mantis-android-malware-adds-dns-changer-to-hack-wifi-routers/   
Published: 2023 01 19 17:55:02
Received: 2023 01 19 18:03:39
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Name That Toon: Poker Hand - published almost 2 years ago.
Content:
https://www.darkreading.com/application-security/name-that-toon-poker-hand   
Published: 2023 01 19 18:00:00
Received: 2023 01 19 18:03:38
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Name That Toon: Poker Hand - published almost 2 years ago.
Content:
https://www.darkreading.com/application-security/name-that-toon-poker-hand   
Published: 2023 01 19 18:00:00
Received: 2023 01 19 18:03:38
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: New Remcos RATversion uses direct syscalls to evade detection. - published almost 2 years ago.
Content: submitted by /u/woja111 [link] [comments]...
https://www.reddit.com/r/netsec/comments/10g7cts/new_remcos_ratversion_uses_direct_syscalls_to/   
Published: 2023 01 19 17:19:39
Received: 2023 01 19 17:41:52
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: New Remcos RATversion uses direct syscalls to evade detection. - published almost 2 years ago.
Content: submitted by /u/woja111 [link] [comments]...
https://www.reddit.com/r/netsec/comments/10g7cts/new_remcos_ratversion_uses_direct_syscalls_to/   
Published: 2023 01 19 17:19:39
Received: 2023 01 19 17:41:52
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple Announcements Recap: New MacBook Pro, Mac Mini, HomePod, and More - published almost 2 years ago.
Content:
https://www.macrumors.com/2023/01/19/new-macs-and-homepod-recap/   
Published: 2023 01 19 17:07:45
Received: 2023 01 19 17:24:53
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Announcements Recap: New MacBook Pro, Mac Mini, HomePod, and More - published almost 2 years ago.
Content:
https://www.macrumors.com/2023/01/19/new-macs-and-homepod-recap/   
Published: 2023 01 19 17:07:45
Received: 2023 01 19 17:24:53
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: As Social Engineering Tactics Change, So Must Your Security Training - published almost 2 years ago.
Content:
https://www.darkreading.com/zscaler/as-social-engineering-tactics-change-so-must-your-security-training-   
Published: 2023 01 19 08:00:00
Received: 2023 01 19 17:24:26
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: As Social Engineering Tactics Change, So Must Your Security Training - published almost 2 years ago.
Content:
https://www.darkreading.com/zscaler/as-social-engineering-tactics-change-so-must-your-security-training-   
Published: 2023 01 19 08:00:00
Received: 2023 01 19 17:24:26
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: CISA Releases One Industrial Control Systems Advisory - published almost 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2023/01/19/cisa-releases-one-industrial-control-systems-advisory   
Published: 2023 01 19 15:00:01
Received: 2023 01 19 17:23:45
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: CISA Releases One Industrial Control Systems Advisory - published almost 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2023/01/19/cisa-releases-one-industrial-control-systems-advisory   
Published: 2023 01 19 15:00:01
Received: 2023 01 19 17:23:45
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Exploit released for critical ManageEngine RCE bug, patch now - published almost 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/exploit-released-for-critical-manageengine-rce-bug-patch-now/   
Published: 2023 01 19 17:07:48
Received: 2023 01 19 17:23:35
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Exploit released for critical ManageEngine RCE bug, patch now - published almost 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/exploit-released-for-critical-manageengine-rce-bug-patch-now/   
Published: 2023 01 19 17:07:48
Received: 2023 01 19 17:23:35
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Open Data and the AI Black Box - published almost 2 years ago.
Content:
https://www.eff.org/deeplinks/2023/01/open-data-and-ai-black-box   
Published: 2023 01 19 00:32:18
Received: 2023 01 19 17:23:35
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Open Data and the AI Black Box - published almost 2 years ago.
Content:
https://www.eff.org/deeplinks/2023/01/open-data-and-ai-black-box   
Published: 2023 01 19 00:32:18
Received: 2023 01 19 17:23:35
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: CVE-2023-0404 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0404   
Published: 2023 01 19 15:15:14
Received: 2023 01 19 17:15:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0404 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0404   
Published: 2023 01 19 15:15:14
Received: 2023 01 19 17:15:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: CVE-2023-0403 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0403   
Published: 2023 01 19 15:15:14
Received: 2023 01 19 17:15:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0403 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0403   
Published: 2023 01 19 15:15:14
Received: 2023 01 19 17:15:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-0402 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0402   
Published: 2023 01 19 15:15:13
Received: 2023 01 19 17:15:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0402 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0402   
Published: 2023 01 19 15:15:13
Received: 2023 01 19 17:15:07
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47105 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47105   
Published: 2023 01 19 16:15:11
Received: 2023 01 19 17:15:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-47105 - published almost 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47105   
Published: 2023 01 19 16:15:11
Received: 2023 01 19 17:15:01
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: HomePod 16.3 Beta: How to Set Up Temperature and Humidity Automations - published almost 2 years ago.
Content:
https://www.macrumors.com/how-to/set-up-temperature-humidity-automations-homepod/   
Published: 2023 01 19 16:44:22
Received: 2023 01 19 17:04:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: HomePod 16.3 Beta: How to Set Up Temperature and Humidity Automations - published almost 2 years ago.
Content:
https://www.macrumors.com/how-to/set-up-temperature-humidity-automations-homepod/   
Published: 2023 01 19 16:44:22
Received: 2023 01 19 17:04:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: CISA Releases One Industrial Control Systems Advisory - published almost 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2023/01/19/cisa-releases-one-industrial-control-systems-advisory   
Published: 2023 01 19 15:00:01
Received: 2023 01 19 17:03:56
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: CISA Releases One Industrial Control Systems Advisory - published almost 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2023/01/19/cisa-releases-one-industrial-control-systems-advisory   
Published: 2023 01 19 15:00:01
Received: 2023 01 19 17:03:56
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: University of Texas latest US school to ban TikTok - published almost 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2023/01/19/texas_university_bans_tiktok/   
Published: 2023 01 19 16:15:07
Received: 2023 01 19 17:03:00
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: University of Texas latest US school to ban TikTok - published almost 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2023/01/19/texas_university_bans_tiktok/   
Published: 2023 01 19 16:15:07
Received: 2023 01 19 17:03:00
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: IT email templates: Security alerts - published almost 2 years ago.
Content:
https://www.techrepublic.com/resource-library/whitepapers/it-email-templates-security-alerts/   
Published: 2023 01 18 11:00:00
Received: 2023 01 19 17:02:59
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: IT email templates: Security alerts - published almost 2 years ago.
Content:
https://www.techrepublic.com/resource-library/whitepapers/it-email-templates-security-alerts/   
Published: 2023 01 18 11:00:00
Received: 2023 01 19 17:02:59
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: As a cybersecurity blade, ChatGPT can cut both ways - published almost 2 years ago.
Content:
https://www.techrepublic.com/article/cybersecurity-blade-chatgpt-can-cut-both-ways/   
Published: 2023 01 19 16:57:02
Received: 2023 01 19 17:02:58
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: As a cybersecurity blade, ChatGPT can cut both ways - published almost 2 years ago.
Content:
https://www.techrepublic.com/article/cybersecurity-blade-chatgpt-can-cut-both-ways/   
Published: 2023 01 19 16:57:02
Received: 2023 01 19 17:02:58
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: University of Texas latest US school to ban TikTok - published almost 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2023/01/19/texas_university_bans_tiktok/   
Published: 2023 01 19 16:15:07
Received: 2023 01 19 17:02:36
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: University of Texas latest US school to ban TikTok - published almost 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2023/01/19/texas_university_bans_tiktok/   
Published: 2023 01 19 16:15:07
Received: 2023 01 19 17:02:36
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text] - published almost 2 years ago.
Content:
https://nakedsecurity.sophos.com/2023/01/19/s3-ep118-guess-your-password-no-need-if-its-stolen-already-audio-text/   
Published: 2023 01 19 15:53:23
Received: 2023 01 19 16:59:57
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Article: S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text] - published almost 2 years ago.
Content:
https://nakedsecurity.sophos.com/2023/01/19/s3-ep118-guess-your-password-no-need-if-its-stolen-already-audio-text/   
Published: 2023 01 19 15:53:23
Received: 2023 01 19 16:59:57
Feed: Naked Security - Sophos
Source: Naked Security - Sophos
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: LockBit ransomware – what you need to know - published almost 2 years ago.
Content:
https://www.tripwire.com/state-of-security/lockbit-ransomware-what-you-need-know   
Published: 2023 01 19 16:41:07
Received: 2023 01 19 16:59:47
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: LockBit ransomware – what you need to know - published almost 2 years ago.
Content:
https://www.tripwire.com/state-of-security/lockbit-ransomware-what-you-need-know   
Published: 2023 01 19 16:41:07
Received: 2023 01 19 16:59:47
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: Cyber-crime victims ‘refusing ransom demands’ - published almost 2 years ago.
Content: Victims of cyber-crime are refusing to pay ransom demands – hitting the hackers in the pocket, claims the BBC. A report claims so-called ransomware gangs have had a 40% drop in earnings. The BBC reports cryptocurrency experts at Chainalysis say criminals extorted at least $457m (£370m) from victims in 2022 – $311m less than the year before. However...
https://securityjournaluk.com/cyber-crime-victims-refusing-ransom-demands/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-crime-victims-refusing-ransom-demands   
Published: 2023 01 19 16:44:49
Received: 2023 01 19 16:45:30
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Article: Cyber-crime victims ‘refusing ransom demands’ - published almost 2 years ago.
Content: Victims of cyber-crime are refusing to pay ransom demands – hitting the hackers in the pocket, claims the BBC. A report claims so-called ransomware gangs have had a 40% drop in earnings. The BBC reports cryptocurrency experts at Chainalysis say criminals extorted at least $457m (£370m) from victims in 2022 – $311m less than the year before. However...
https://securityjournaluk.com/cyber-crime-victims-refusing-ransom-demands/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-crime-victims-refusing-ransom-demands   
Published: 2023 01 19 16:44:49
Received: 2023 01 19 16:45:30
Feed: Security Journal UK
Source: Security Journal UK
Category: Security
Topic: Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: The Media Industry Is the Most Vulnerable to Cyber Attacks, Report Shows - published almost 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/the-media-industry-is-the-most-vulnerable-to-cyber-attacks-report-shows   
Published: 2023 01 19 16:36:00
Received: 2023 01 19 16:44:02
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: The Media Industry Is the Most Vulnerable to Cyber Attacks, Report Shows - published almost 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/the-media-industry-is-the-most-vulnerable-to-cyber-attacks-report-shows   
Published: 2023 01 19 16:36:00
Received: 2023 01 19 16:44:02
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: New Microsoft Azure Vulnerability Uncovered — EmojiDeploy for RCE Attacks - published almost 2 years ago.
Content:
https://thehackernews.com/2023/01/new-microsoft-azure-vulnerability.html   
Published: 2023 01 19 14:20:00
Received: 2023 01 19 16:42:53
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: New Microsoft Azure Vulnerability Uncovered — EmojiDeploy for RCE Attacks - published almost 2 years ago.
Content:
https://thehackernews.com/2023/01/new-microsoft-azure-vulnerability.html   
Published: 2023 01 19 14:20:00
Received: 2023 01 19 16:42:53
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Mailchimp slips up again, suffers security breach after falling on social engineering banana skin - published almost 2 years ago.
Content:
https://grahamcluley.com/mailchimp-slips-up-again-suffers-security-breach-after-falling-on-social-engineering-banana-skin/   
Published: 2023 01 19 16:24:44
Received: 2023 01 19 16:39:59
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: Mailchimp slips up again, suffers security breach after falling on social engineering banana skin - published almost 2 years ago.
Content:
https://grahamcluley.com/mailchimp-slips-up-again-suffers-security-breach-after-falling-on-social-engineering-banana-skin/   
Published: 2023 01 19 16:24:44
Received: 2023 01 19 16:39:59
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Wireshark Analyzer 4.0.3 - published almost 2 years ago.
Content:
https://packetstormsecurity.com/files/170601/wireshark-4.0.3.tar.xz   
Published: 2023 01 19 16:04:31
Received: 2023 01 19 16:24:24
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Article: Wireshark Analyzer 4.0.3 - published almost 2 years ago.
Content:
https://packetstormsecurity.com/files/170601/wireshark-4.0.3.tar.xz   
Published: 2023 01 19 16:04:31
Received: 2023 01 19 16:24:24
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling

All Articles

Ordered by Date Received : Year: "2023" Month: "01" Day: "19"
Page: << < 2 (of 6) > >>

Total Articles in this collection: 311


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor