All Articles

Ordered by Date Received : Year: "2022" Month: "03" Day: "24"
Page: << < 2 (of 7) > >>

Total Articles in this collection: 356

Navigation Help at the bottom of the page
Article: Distroless Builds Are Now SLSA 2 - published about 3 years ago.
Content: Posted by Priya Wadhwa and Appu Goundan, Google Open Source Security TeamA few months ago we announced that we started signing all distroless images with cosign, which allows users to verify that they have the correct image before starting the build process. Signing our images was our first step towards fully securing the distroless supply chain. Since then,...
http://security.googleblog.com/2021/09/distroless-builds-are-now-slsa-2.html   
Published: 2021 09 22 16:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Distroless Builds Are Now SLSA 2 - published about 3 years ago.
Content: Posted by Priya Wadhwa and Appu Goundan, Google Open Source Security TeamA few months ago we announced that we started signing all distroless images with cosign, which allows users to verify that they have the correct image before starting the build process. Signing our images was our first step towards fully securing the distroless supply chain. Since then,...
http://security.googleblog.com/2021/09/distroless-builds-are-now-slsa-2.html   
Published: 2021 09 22 16:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Announcing New Patch Reward Program for Tsunami Security Scanner - published about 3 years ago.
Content: Posted by Guoli Ma, Sebastian Lekies &amp; Claudio Criscione, Google Vulnerability Management TeamOne year ago, we published the Tsunami security scanner with the goal of detecting high severity, actively exploited vulnerabilities with high confidence. In the last several months, the Tsunami scanner team has been working closely with our vulnerability reward...
http://security.googleblog.com/2021/09/announcing-new-patch-reward-program-for.html   
Published: 2021 09 28 13:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Announcing New Patch Reward Program for Tsunami Security Scanner - published about 3 years ago.
Content: Posted by Guoli Ma, Sebastian Lekies &amp; Claudio Criscione, Google Vulnerability Management TeamOne year ago, we published the Tsunami security scanner with the goal of detecting high severity, actively exploited vulnerabilities with high confidence. In the last several months, the Tsunami scanner team has been working closely with our vulnerability reward...
http://security.googleblog.com/2021/09/announcing-new-patch-reward-program-for.html   
Published: 2021 09 28 13:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Introducing the Secure Open Source Pilot Program - published about 3 years ago.
Content: Posted by Meder Kydyraliev and Kim Lewandowski, Google Open Source Security TeamOver the past year we have made a number of investments to strengthen the security of critical open source projects, and recently announced our $10 billion commitment to cybersecurity defense including $100 million to support third-party foundations that manage open source securi...
http://security.googleblog.com/2021/10/introducing-secure-open-source-pilot.html   
Published: 2021 10 01 14:22:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Introducing the Secure Open Source Pilot Program - published about 3 years ago.
Content: Posted by Meder Kydyraliev and Kim Lewandowski, Google Open Source Security TeamOver the past year we have made a number of investments to strengthen the security of critical open source projects, and recently announced our $10 billion commitment to cybersecurity defense including $100 million to support third-party foundations that manage open source securi...
http://security.googleblog.com/2021/10/introducing-secure-open-source-pilot.html   
Published: 2021 10 01 14:22:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Google Protects Your Accounts – Even When You No Longer Use Them - published about 3 years ago.
Content: Posted by Sam Heft-Luthy, Product Manager, Privacy &amp; Data Protection Office What happens to our digital accounts when we stop using them? It’s a question we should all ask ourselves, because when we are no longer keeping tabs on what’s happening with old accounts, they can become targets for cybercrime.In fact, quite a few recent high-profile breaches ta...
http://security.googleblog.com/2021/10/google-protects-your-accounts-even-when.html   
Published: 2021 10 05 13:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Google Protects Your Accounts – Even When You No Longer Use Them - published about 3 years ago.
Content: Posted by Sam Heft-Luthy, Product Manager, Privacy &amp; Data Protection Office What happens to our digital accounts when we stop using them? It’s a question we should all ask ourselves, because when we are no longer keeping tabs on what’s happening with old accounts, they can become targets for cybercrime.In fact, quite a few recent high-profile breaches ta...
http://security.googleblog.com/2021/10/google-protects-your-accounts-even-when.html   
Published: 2021 10 05 13:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Launching a collaborative minimum security baseline - published about 3 years ago.
Content: Posted by Royal Hansen, Vice President, Security According to an Opus and Ponemon Institute study, 59% of companies have experienced a data breach caused by one of their vendors or third parties. Outsourcing operations to third-party vendors has become a popular business strategy as it allows organizations to save money and increase operational efficiency. W...
http://security.googleblog.com/2021/10/launching-collaborative-minimum.html   
Published: 2021 10 27 14:47:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Launching a collaborative minimum security baseline - published about 3 years ago.
Content: Posted by Royal Hansen, Vice President, Security According to an Opus and Ponemon Institute study, 59% of companies have experienced a data breach caused by one of their vendors or third parties. Outsourcing operations to third-party vendors has become a popular business strategy as it allows organizations to save money and increase operational efficiency. W...
http://security.googleblog.com/2021/10/launching-collaborative-minimum.html   
Published: 2021 10 27 14:47:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Pixel 6: Setting a new standard for mobile security - published about 3 years ago.
Content: Posted by Dave Kleidermacher, Jesse Seed, Brandon Barbello, and Stephan Somogyi, Android, Pixel &amp; Tensor security teams With Pixel 6 and Pixel 6 Pro, we’re launching our most secure Pixel phone yet, with 5 years of security updates and the most layers of hardware security. These new Pixel smartphones take a layered security approach, with innovations spa...
http://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html   
Published: 2021 10 27 17:01:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Pixel 6: Setting a new standard for mobile security - published about 3 years ago.
Content: Posted by Dave Kleidermacher, Jesse Seed, Brandon Barbello, and Stephan Somogyi, Android, Pixel &amp; Tensor security teams With Pixel 6 and Pixel 6 Pro, we’re launching our most secure Pixel phone yet, with 5 years of security updates and the most layers of hardware security. These new Pixel smartphones take a layered security approach, with innovations spa...
http://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html   
Published: 2021 10 27 17:01:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Protecting your device information with Private Set Membership - published about 3 years ago.
Content: Posted by Kevin Yeo and Sarvar Patel, Private Computing Team At Google, keeping you safe online is our top priority, so we continuously build the most advanced privacy-preserving technologies into our products. Over the past few years, we've utilized innovations in cryptographic research to keep your personal information private by design and secure by defau...
http://security.googleblog.com/2021/10/protecting-your-device-information-with.html   
Published: 2021 10 28 17:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Protecting your device information with Private Set Membership - published about 3 years ago.
Content: Posted by Kevin Yeo and Sarvar Patel, Private Computing Team At Google, keeping you safe online is our top priority, so we continuously build the most advanced privacy-preserving technologies into our products. Over the past few years, we've utilized innovations in cryptographic research to keep your personal information private by design and secure by defau...
http://security.googleblog.com/2021/10/protecting-your-device-information-with.html   
Published: 2021 10 28 17:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trick & Treat! 🎃 Paying Leets and Sweets for Linux Kernel privescs and k8s escapes - published about 3 years ago.
Content: Posted by Eduardo Vela, Google Bug Hunters Team Starting today and for the next 3 months (until January 31 2022), we will pay 31,337 USD to security researchers that exploit privilege escalation in our lab environment with a patched vulnerability, and 50,337 USD to those that use a previously unpatched vulnerability, or a new exploit technique.We are constan...
http://security.googleblog.com/2021/11/trick-treat-paying-leets-and-sweets-for.html   
Published: 2021 11 01 16:30:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trick & Treat! 🎃 Paying Leets and Sweets for Linux Kernel privescs and k8s escapes - published about 3 years ago.
Content: Posted by Eduardo Vela, Google Bug Hunters Team Starting today and for the next 3 months (until January 31 2022), we will pay 31,337 USD to security researchers that exploit privilege escalation in our lab environment with a patched vulnerability, and 50,337 USD to those that use a previously unpatched vulnerability, or a new exploit technique.We are constan...
http://security.googleblog.com/2021/11/trick-treat-paying-leets-and-sweets-for.html   
Published: 2021 11 01 16:30:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: ClusterFuzzLite: Continuous fuzzing for all - published about 3 years ago.
Content: Posted by Jonathan Metzman, Google Open Source Security TeamIn recent years, continuous fuzzing has become an essential part of the software development lifecycle. By feeding unexpected or random data into a program, fuzzing catches bugs that would otherwise slip through the most thorough manual checks and provides coverage that would take staggering human e...
http://security.googleblog.com/2021/11/clusterfuzzlite-continuous-fuzzing-for.html   
Published: 2021 11 11 12:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: ClusterFuzzLite: Continuous fuzzing for all - published about 3 years ago.
Content: Posted by Jonathan Metzman, Google Open Source Security TeamIn recent years, continuous fuzzing has become an essential part of the software development lifecycle. By feeding unexpected or random data into a program, fuzzing catches bugs that would otherwise slip through the most thorough manual checks and provides coverage that would take staggering human e...
http://security.googleblog.com/2021/11/clusterfuzzlite-continuous-fuzzing-for.html   
Published: 2021 11 11 12:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Exploring Container Security: A Storage Vulnerability Deep Dive - published almost 3 years ago.
Content: Posted by Fabricio Voznika and Mauricio Poppe, Google Cloud Kubernetes Security is constantly evolving - keeping pace with enhanced functionality, usability and flexibility while also balancing the security needs of a wide and diverse set of use-cases.Recently, the GKE Security team discovered a high severity vulnerability that allowed workloads to have acce...
http://security.googleblog.com/2021/12/exploring-container-security-storage.html   
Published: 2021 12 02 20:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Exploring Container Security: A Storage Vulnerability Deep Dive - published almost 3 years ago.
Content: Posted by Fabricio Voznika and Mauricio Poppe, Google Cloud Kubernetes Security is constantly evolving - keeping pace with enhanced functionality, usability and flexibility while also balancing the security needs of a wide and diverse set of use-cases.Recently, the GKE Security team discovered a high severity vulnerability that allowed workloads to have acce...
http://security.googleblog.com/2021/12/exploring-container-security-storage.html   
Published: 2021 12 02 20:00:00
Received: 2022 03 24 22:45:49
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Empowering the next generation of Android Application Security Researchers - published almost 3 years ago.
Content: Posted by Jon Bottarini, Security Program Manager &amp; Lena Katib, Strategic Partnerships ManagerThe external security researcher community plays an integral role in making the Google Play ecosystem safe and secure. Through this partnership with the community, Google has been able to collaborate with third-party developers to fix thousands of security issue...
http://security.googleblog.com/2021/12/empowering-next-generation-of-android.html   
Published: 2021 12 14 18:00:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Empowering the next generation of Android Application Security Researchers - published almost 3 years ago.
Content: Posted by Jon Bottarini, Security Program Manager &amp; Lena Katib, Strategic Partnerships ManagerThe external security researcher community plays an integral role in making the Google Play ecosystem safe and secure. Through this partnership with the community, Google has been able to collaborate with third-party developers to fix thousands of security issue...
http://security.googleblog.com/2021/12/empowering-next-generation-of-android.html   
Published: 2021 12 14 18:00:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Improving OSS-Fuzz and Jazzer to catch Log4Shell - published almost 3 years ago.
Content: Posted by Jonathan Metzman, Google Open Source Security TeamThe discovery of the Log4Shell vulnerability has set the internet on fire. Similar to shellshock and heartbleed, Log4Shell is just the latest catastrophic vulnerability in software that runs the internet. Our mission as the Google Open Source Security Team is to secure the open source libraries the ...
http://security.googleblog.com/2021/12/improving-oss-fuzz-and-jazzer-to-catch.html   
Published: 2021 12 16 22:04:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Improving OSS-Fuzz and Jazzer to catch Log4Shell - published almost 3 years ago.
Content: Posted by Jonathan Metzman, Google Open Source Security TeamThe discovery of the Log4Shell vulnerability has set the internet on fire. Similar to shellshock and heartbleed, Log4Shell is just the latest catastrophic vulnerability in software that runs the internet. Our mission as the Google Open Source Security Team is to secure the open source libraries the ...
http://security.googleblog.com/2021/12/improving-oss-fuzz-and-jazzer-to-catch.html   
Published: 2021 12 16 22:04:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Understanding the Impact of Apache Log4j Vulnerability - published almost 3 years ago.
Content: Posted by James Wetter and Nicky Ringland, Open Source Insights Team Editors Note:The below numbers were calculated based on both log4j-core and log4j-api, as both were listed on the CVE. Since then, the CVE has been updated with the clarification that only log4j-core is affected.The ecosystem impact numbers for just log4j-core, as of 19th December are over ...
http://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html   
Published: 2021 12 17 17:25:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Understanding the Impact of Apache Log4j Vulnerability - published almost 3 years ago.
Content: Posted by James Wetter and Nicky Ringland, Open Source Insights Team Editors Note:The below numbers were calculated based on both log4j-core and log4j-api, as both were listed on the CVE. Since then, the CVE has been updated with the clarification that only log4j-core is affected.The ecosystem impact numbers for just log4j-core, as of 19th December are over ...
http://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html   
Published: 2021 12 17 17:25:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Apache Log4j Vulnerability - published almost 3 years ago.
Content: Like many other companies, we’re closely following the multiple CVEs regarding Apache Log4j 2. Our security teams are investigating any potential impact on Google products and services and are focused on protecting our users and customers.We encourage anyone who manages environments containing Log4j 2 to update to the latest version.Based on findings in our ...
http://security.googleblog.com/2021/12/apache-log4j-vulnerability.html   
Published: 2021 12 18 02:08:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Apache Log4j Vulnerability - published almost 3 years ago.
Content: Like many other companies, we’re closely following the multiple CVEs regarding Apache Log4j 2. Our security teams are investigating any potential impact on Google products and services and are focused on protecting our users and customers.We encourage anyone who manages environments containing Log4j 2 to update to the latest version.Based on findings in our ...
http://security.googleblog.com/2021/12/apache-log4j-vulnerability.html   
Published: 2021 12 18 02:08:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Reducing Security Risks in Open Source Software at Scale: Scorecards Launches V4 - published almost 3 years ago.
Content: Posted by Laurent Simon and Azeem Shaikh, Google Open Source Security Team (GOSST) Since our July announcement of Scorecards V2, the Scorecards project—an automated security tool to flag risky supply chain practices in open source projects—has grown steadily to over 40 unique contributors and 18 implemented security checks. Today we are proud to announce the...
http://security.googleblog.com/2022/01/reducing-security-risks-in-open-source.html   
Published: 2022 01 19 15:00:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Reducing Security Risks in Open Source Software at Scale: Scorecards Launches V4 - published almost 3 years ago.
Content: Posted by Laurent Simon and Azeem Shaikh, Google Open Source Security Team (GOSST) Since our July announcement of Scorecards V2, the Scorecards project—an automated security tool to flag risky supply chain practices in open source projects—has grown steadily to over 40 unique contributors and 18 implemented security checks. Today we are proud to announce the...
http://security.googleblog.com/2022/01/reducing-security-risks-in-open-source.html   
Published: 2022 01 19 15:00:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Vulnerability Reward Program: 2021 Year in Review - published almost 3 years ago.
Content: Posted by Sarah Jacobus, Vulnerability Rewards Team Last year was another record setter for our Vulnerability Reward Programs (VRPs). Throughout 2021, we partnered with the security researcher community to identify and fix thousands of  vulnerabilities – helping keep our users and the internet safe. Thanks to these incredible researchers, Vulnerability Rewar...
http://security.googleblog.com/2022/02/vulnerability-reward-program-2021-year.html   
Published: 2022 02 10 17:00:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Vulnerability Reward Program: 2021 Year in Review - published almost 3 years ago.
Content: Posted by Sarah Jacobus, Vulnerability Rewards Team Last year was another record setter for our Vulnerability Reward Programs (VRPs). Throughout 2021, we partnered with the security researcher community to identify and fix thousands of  vulnerabilities – helping keep our users and the internet safe. Thanks to these incredible researchers, Vulnerability Rewar...
http://security.googleblog.com/2022/02/vulnerability-reward-program-2021-year.html   
Published: 2022 02 10 17:00:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: 🌹 Roses are red, Violets are blue 💙 Giving leets 🧑‍💻 more sweets 🍭 All of 2022! - published almost 3 years ago.
Content: Posted by Eduardo Vela, Vulnerability Matchmaker Until December 31 2022 we will pay 20,000 to 91,337 USD for exploits of vulnerabilities in the Linux Kernel, Kubernetes, GKE or kCTF that are exploitable on our test lab.We launched an expansion of kCTF VRP on November 1, 2021 in which we paid 31,337 to 50,337 USD to those that are able to compromise our kCTF ...
http://security.googleblog.com/2022/02/roses-are-red-violets-are-blue-giving.html   
Published: 2022 02 14 17:07:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: 🌹 Roses are red, Violets are blue 💙 Giving leets 🧑‍💻 more sweets 🍭 All of 2022! - published almost 3 years ago.
Content: Posted by Eduardo Vela, Vulnerability Matchmaker Until December 31 2022 we will pay 20,000 to 91,337 USD for exploits of vulnerabilities in the Linux Kernel, Kubernetes, GKE or kCTF that are exploitable on our test lab.We launched an expansion of kCTF VRP on November 1, 2021 in which we paid 31,337 to 50,337 USD to those that are able to compromise our kCTF ...
http://security.googleblog.com/2022/02/roses-are-red-violets-are-blue-giving.html   
Published: 2022 02 14 17:07:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Mitigating kernel risks on 32-bit ARM - published over 2 years ago.
Content: Posted by Ard Biesheuvel, Google Open Source Security Team Linux kernel support for the 32-bit ARM architecture was contributed in the late 90s, when there was little corporate involvement in Linux development, and most contributors were students or hobbyists, tinkering with development boards, often without much in the way of documentation.Now 20+ years lat...
http://security.googleblog.com/2022/02/mitigating-kernel-risks-on-32-bit-arm.html   
Published: 2022 02 23 17:00:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Mitigating kernel risks on 32-bit ARM - published over 2 years ago.
Content: Posted by Ard Biesheuvel, Google Open Source Security Team Linux kernel support for the 32-bit ARM architecture was contributed in the late 90s, when there was little corporate involvement in Linux development, and most contributors were students or hobbyists, tinkering with development boards, often without much in the way of documentation.Now 20+ years lat...
http://security.googleblog.com/2022/02/mitigating-kernel-risks-on-32-bit-arm.html   
Published: 2022 02 23 17:00:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: What's up with in-the-wild exploits? Plus, what we're doing about it. - published over 2 years ago.
Content: Posted by Adrian Taylor, Chrome Security TeamIf you are a regular reader of our Chrome release blog, you may have noticed that phrases like 'exploit for CVE-1234-567 exists in the wild' have been appearing more often recently. In this post we'll explore why there seems to be such an increase in exploits, and clarify some misconceptions in the process. We'll ...
http://security.googleblog.com/2022/03/whats-up-with-in-wild-exploits-plus.html   
Published: 2022 03 10 18:33:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: What's up with in-the-wild exploits? Plus, what we're doing about it. - published over 2 years ago.
Content: Posted by Adrian Taylor, Chrome Security TeamIf you are a regular reader of our Chrome release blog, you may have noticed that phrases like 'exploit for CVE-1234-567 exists in the wild' have been appearing more often recently. In this post we'll explore why there seems to be such an increase in exploits, and clarify some misconceptions in the process. We'll ...
http://security.googleblog.com/2022/03/whats-up-with-in-wild-exploits-plus.html   
Published: 2022 03 10 18:33:00
Received: 2022 03 24 22:45:48
Feed: Google Online Security Blog
Source: Google Online Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Physician Sentenced to Prison for Health Care Fraud Scheme - published over 2 years ago.
Content:
https://www.databreaches.net/physician-sentenced-to-prison-for-health-care-fraud-scheme/   
Published: 2022 03 24 22:20:16
Received: 2022 03 24 22:30:25
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Physician Sentenced to Prison for Health Care Fraud Scheme - published over 2 years ago.
Content:
https://www.databreaches.net/physician-sentenced-to-prison-for-health-care-fraud-scheme/   
Published: 2022 03 24 22:20:16
Received: 2022 03 24 22:30:25
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: British cops arrest seven in Lapsus$ crime gang probe - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/03/24/police_lapsus_arrests/   
Published: 2022 03 24 22:13:19
Received: 2022 03 24 22:28:29
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: British cops arrest seven in Lapsus$ crime gang probe - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/03/24/police_lapsus_arrests/   
Published: 2022 03 24 22:13:19
Received: 2022 03 24 22:28:29
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: CVE-2022-25571 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25571   
Published: 2022 03 24 21:15:13
Received: 2022 03 24 22:22:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-25571 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25571   
Published: 2022 03 24 21:15:13
Received: 2022 03 24 22:22:56
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-24782 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24782   
Published: 2022 03 24 21:15:13
Received: 2022 03 24 22:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-24782 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24782   
Published: 2022 03 24 21:15:13
Received: 2022 03 24 22:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-24781 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24781   
Published: 2022 03 24 21:15:13
Received: 2022 03 24 22:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-24781 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24781   
Published: 2022 03 24 21:15:13
Received: 2022 03 24 22:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-24776 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24776   
Published: 2022 03 24 20:15:09
Received: 2022 03 24 22:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-24776 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24776   
Published: 2022 03 24 20:15:09
Received: 2022 03 24 22:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-24769 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24769   
Published: 2022 03 24 20:15:09
Received: 2022 03 24 22:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-24769 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24769   
Published: 2022 03 24 20:15:09
Received: 2022 03 24 22:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: British cops arrest seven in Lapsus$ crime gang probe - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/03/24/police_lapsus_arrests/   
Published: 2022 03 24 22:13:19
Received: 2022 03 24 22:21:35
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: British cops arrest seven in Lapsus$ crime gang probe - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/03/24/police_lapsus_arrests/   
Published: 2022 03 24 22:13:19
Received: 2022 03 24 22:21:35
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Tiktok-Scraper - TikTok Scraper. Download Video Posts, Collect User/Trend/Hashtag/Music Feed Metadata, Sign URL And Etc - published over 2 years ago.
Content:
http://www.kitploit.com/2022/03/tiktok-scraper-tiktok-scraper-download.html   
Published: 2022 03 24 22:04:28
Received: 2022 03 24 22:09:33
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Tiktok-Scraper - TikTok Scraper. Download Video Posts, Collect User/Trend/Hashtag/Music Feed Metadata, Sign URL And Etc - published over 2 years ago.
Content:
http://www.kitploit.com/2022/03/tiktok-scraper-tiktok-scraper-download.html   
Published: 2022 03 24 22:04:28
Received: 2022 03 24 22:09:33
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: State-Sponsored Russian Cyber Actors Targeted Energy Sector from 2011 to 2018 - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/03/24/state-sponsored-russian-cyber-actors-targeted-energy-sector-2011   
Published: 2022 03 24 10:49:52
Received: 2022 03 24 22:01:55
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: State-Sponsored Russian Cyber Actors Targeted Energy Sector from 2011 to 2018 - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/03/24/state-sponsored-russian-cyber-actors-targeted-energy-sector-2011   
Published: 2022 03 24 10:49:52
Received: 2022 03 24 22:01:55
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa22-083a   
Published: 2022 03 24 14:00:00
Received: 2022 03 24 22:01:55
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa22-083a   
Published: 2022 03 24 14:00:00
Received: 2022 03 24 22:01:55
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: AA22-083A: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa22-083a   
Published: 2022 03 24 14:00:00
Received: 2022 03 24 22:01:53
Feed: CISA Alerts
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Alerts
Topic: Cyber Security
Article: AA22-083A: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/alerts/aa22-083a   
Published: 2022 03 24 14:00:00
Received: 2022 03 24 22:01:53
Feed: CISA Alerts
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Alerts
Topic: Cyber Security
Article: Western Digital My Cloud OS update fixes critical vulnerability - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/western-digital-my-cloud-os-update-fixes-critical-vulnerability/   
Published: 2022 03 24 21:47:32
Received: 2022 03 24 22:01:52
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Western Digital My Cloud OS update fixes critical vulnerability - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/western-digital-my-cloud-os-update-fixes-critical-vulnerability/   
Published: 2022 03 24 21:47:32
Received: 2022 03 24 22:01:52
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: US charges 4 Russian govt employees with critical infrastructure hacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/us-charges-4-russian-govt-employees-with-critical-infrastructure-hacks/   
Published: 2022 03 24 21:57:21
Received: 2022 03 24 22:01:52
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: US charges 4 Russian govt employees with critical infrastructure hacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/us-charges-4-russian-govt-employees-with-critical-infrastructure-hacks/   
Published: 2022 03 24 21:57:21
Received: 2022 03 24 22:01:52
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Microsoft help files repurposed to contain Vidar malware in new campaign - published over 2 years ago.
Content:
https://www.csoonline.com/article/3654849/microsoft-help-files-repurposed-to-contain-vidar-malware-in-new-campaign.html#tk.rss_all   
Published: 2022 03 24 18:00:00
Received: 2022 03 24 21:50:25
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft help files repurposed to contain Vidar malware in new campaign - published over 2 years ago.
Content:
https://www.csoonline.com/article/3654849/microsoft-help-files-repurposed-to-contain-vidar-malware-in-new-campaign.html#tk.rss_all   
Published: 2022 03 24 18:00:00
Received: 2022 03 24 21:50:25
Feed: CSO Online - All
Source: CSO Online
Category: Cyber Security
Topic: Cyber Security
Article: State-Sponsored Russian Cyber Actors Targeted Energy Sector from 2011 to 2018 - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/03/24/state-sponsored-russian-cyber-actors-targeted-energy-sector-2011   
Published: 2022 03 24 10:49:52
Received: 2022 03 24 21:42:04
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: State-Sponsored Russian Cyber Actors Targeted Energy Sector from 2011 to 2018 - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/03/24/state-sponsored-russian-cyber-actors-targeted-energy-sector-2011   
Published: 2022 03 24 10:49:52
Received: 2022 03 24 21:42:04
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: UK Cops Collar 7 Suspected Lapsus$ Gang Members - published over 2 years ago.
Content:
https://threatpost.com/uk-cops-collar-7-suspected-lapsus-gang-members/179098/   
Published: 2022 03 24 21:23:30
Received: 2022 03 24 21:41:57
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: UK Cops Collar 7 Suspected Lapsus$ Gang Members - published over 2 years ago.
Content:
https://threatpost.com/uk-cops-collar-7-suspected-lapsus-gang-members/179098/   
Published: 2022 03 24 21:23:30
Received: 2022 03 24 21:41:57
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide - published over 2 years ago.
Content:
https://www.databreaches.net/four-russian-government-employees-charged-in-two-historical-hacking-campaigns-targeting-critical-infrastructure-worldwide/   
Published: 2022 03 24 21:26:31
Received: 2022 03 24 21:30:05
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide - published over 2 years ago.
Content:
https://www.databreaches.net/four-russian-government-employees-charged-in-two-historical-hacking-campaigns-targeting-critical-infrastructure-worldwide/   
Published: 2022 03 24 21:26:31
Received: 2022 03 24 21:30:05
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple's iMessage Service Experiencing Issues [Update: Resolved] - published over 2 years ago.
Content:
https://www.macrumors.com/2022/03/24/apple-imessage-service-experiencing-issues/   
Published: 2022 03 24 20:49:23
Received: 2022 03 24 21:29:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple's iMessage Service Experiencing Issues [Update: Resolved] - published over 2 years ago.
Content:
https://www.macrumors.com/2022/03/24/apple-imessage-service-experiencing-issues/   
Published: 2022 03 24 20:49:23
Received: 2022 03 24 21:29:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Ransomware Payments, Demands Rose Dramatically in 2021 - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/ransomware-payments-demands-rose-dramatically-in-2021   
Published: 2022 03 24 21:15:00
Received: 2022 03 24 21:29:41
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Ransomware Payments, Demands Rose Dramatically in 2021 - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/ransomware-payments-demands-rose-dramatically-in-2021   
Published: 2022 03 24 21:15:00
Received: 2022 03 24 21:29:41
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Apple's iMessage Service Experiencing Issues - published over 2 years ago.
Content:
https://www.macrumors.com/2022/03/24/apple-imessage-service-experiencing-issues/   
Published: 2022 03 24 20:49:23
Received: 2022 03 24 21:10:47
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple's iMessage Service Experiencing Issues - published over 2 years ago.
Content:
https://www.macrumors.com/2022/03/24/apple-imessage-service-experiencing-issues/   
Published: 2022 03 24 20:49:23
Received: 2022 03 24 21:10:47
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: The Kids Online Safety Act Is a Heavy-Handed Plan to Force Platforms to Spy on Young People - published over 2 years ago.
Content:
https://www.eff.org/deeplinks/2022/03/kids-online-safety-act-heavy-handed-plan-force-platforms-spy-young-people   
Published: 2022 03 24 18:59:18
Received: 2022 03 24 21:10:11
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: The Kids Online Safety Act Is a Heavy-Handed Plan to Force Platforms to Spy on Young People - published over 2 years ago.
Content:
https://www.eff.org/deeplinks/2022/03/kids-online-safety-act-heavy-handed-plan-force-platforms-spy-young-people   
Published: 2022 03 24 18:59:18
Received: 2022 03 24 21:10:11
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Pandemic Leaves Firms Scrambling for Cybersecurity Specialists - published over 2 years ago.
Content:
https://www.darkreading.com/remote-workforce/pandemic-leaves-firms-scrambling-for-cybersecurity-specialists   
Published: 2022 03 24 20:06:03
Received: 2022 03 24 20:49:43
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Pandemic Leaves Firms Scrambling for Cybersecurity Specialists - published over 2 years ago.
Content:
https://www.darkreading.com/remote-workforce/pandemic-leaves-firms-scrambling-for-cybersecurity-specialists   
Published: 2022 03 24 20:06:03
Received: 2022 03 24 20:49:43
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Lapsus$ suspects arrested for Microsoft, Nvidia, Okta hacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/lapsus-suspects-arrested-for-microsoft-nvidia-okta-hacks/   
Published: 2022 03 24 20:25:21
Received: 2022 03 24 20:41:53
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Lapsus$ suspects arrested for Microsoft, Nvidia, Okta hacks - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/lapsus-suspects-arrested-for-microsoft-nvidia-okta-hacks/   
Published: 2022 03 24 20:25:21
Received: 2022 03 24 20:41:53
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Microsoft Azure Developers Awash in PII-Stealing npm Packages - published over 2 years ago.
Content:
https://threatpost.com/microsoft-azure-developers-pii-stealing-npm-packages/179096/   
Published: 2022 03 24 20:21:02
Received: 2022 03 24 20:41:47
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Article: Microsoft Azure Developers Awash in PII-Stealing npm Packages - published over 2 years ago.
Content:
https://threatpost.com/microsoft-azure-developers-pii-stealing-npm-packages/179096/   
Published: 2022 03 24 20:21:02
Received: 2022 03 24 20:41:47
Feed: Threatpost – Web Security
Source: Threatpost
Category: News
Topic: Web Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2022-22374 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22374   
Published: 2022 03 24 18:15:08
Received: 2022 03 24 20:22:48
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-22374 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22374   
Published: 2022 03 24 18:15:08
Received: 2022 03 24 20:22:48
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: CVE-2021-43666 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43666   
Published: 2022 03 24 18:15:08
Received: 2022 03 24 20:22:44
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-43666 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43666   
Published: 2022 03 24 18:15:08
Received: 2022 03 24 20:22:44
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: CVE-2021-43085 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43085   
Published: 2022 03 24 18:15:08
Received: 2022 03 24 20:22:43
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-43085 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43085   
Published: 2022 03 24 18:15:08
Received: 2022 03 24 20:22:43
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-43084 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43084   
Published: 2022 03 24 18:15:07
Received: 2022 03 24 20:22:43
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2021-43084 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43084   
Published: 2022 03 24 18:15:07
Received: 2022 03 24 20:22:43
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Microsoft Azure Developers Awash in PII-Stealing npm Packages - published over 2 years ago.
Content:
https://threatpost.com/microsoft-azure-developers-pii-stealing-npm-packages/179096/   
Published: 2022 03 24 20:21:02
Received: 2022 03 24 20:21:53
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Microsoft Azure Developers Awash in PII-Stealing npm Packages - published over 2 years ago.
Content:
https://threatpost.com/microsoft-azure-developers-pii-stealing-npm-packages/179096/   
Published: 2022 03 24 20:21:02
Received: 2022 03 24 20:21:53
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Malicious Microsoft Excel add-ins used to deliver RAT malware - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/malicious-microsoft-excel-add-ins-used-to-deliver-rat-malware/   
Published: 2022 03 24 19:56:29
Received: 2022 03 24 20:01:57
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Malicious Microsoft Excel add-ins used to deliver RAT malware - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/malicious-microsoft-excel-add-ins-used-to-deliver-rat-malware/   
Published: 2022 03 24 19:56:29
Received: 2022 03 24 20:01:57
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Just-Released Dark Souls Game, Elden Ring, Includes Killer Bug - published over 2 years ago.
Content:
https://threatpost.com/dark-souls-game-elden-ring-killer-bug/179090/   
Published: 2022 03 24 19:23:12
Received: 2022 03 24 19:41:53
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Article: Just-Released Dark Souls Game, Elden Ring, Includes Killer Bug - published over 2 years ago.
Content:
https://threatpost.com/dark-souls-game-elden-ring-killer-bug/179090/   
Published: 2022 03 24 19:23:12
Received: 2022 03 24 19:41:53
Feed: Threatpost – All Feeds
Source: Threatpost
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: HP finance manager went on $5m personal spending spree with company card - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/03/24/hp_finance_manager_expense_fraud/   
Published: 2022 03 24 19:11:40
Received: 2022 03 24 19:28:55
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: HP finance manager went on $5m personal spending spree with company card - published over 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2022/03/24/hp_finance_manager_expense_fraud/   
Published: 2022 03 24 19:11:40
Received: 2022 03 24 19:28:55
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check

All Articles

Ordered by Date Received : Year: "2022" Month: "03" Day: "24"
Page: << < 2 (of 7) > >>

Total Articles in this collection: 356


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor