Article: Distroless Builds Are Now SLSA 2 - published about 3 years ago. Content: Posted by Priya Wadhwa and Appu Goundan, Google Open Source Security TeamA few months ago we announced that we started signing all distroless images with cosign, which allows users to verify that they have the correct image before starting the build process. Signing our images was our first step towards fully securing the distroless supply chain. Since then,... http://security.googleblog.com/2021/09/distroless-builds-are-now-slsa-2.html Published: 2021 09 22 16:00:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Announcing New Patch Reward Program for Tsunami Security Scanner - published about 3 years ago. Content: Posted by Guoli Ma, Sebastian Lekies & Claudio Criscione, Google Vulnerability Management TeamOne year ago, we published the Tsunami security scanner with the goal of detecting high severity, actively exploited vulnerabilities with high confidence. In the last several months, the Tsunami scanner team has been working closely with our vulnerability reward... http://security.googleblog.com/2021/09/announcing-new-patch-reward-program-for.html Published: 2021 09 28 13:00:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Introducing the Secure Open Source Pilot Program - published about 3 years ago. Content: Posted by Meder Kydyraliev and Kim Lewandowski, Google Open Source Security TeamOver the past year we have made a number of investments to strengthen the security of critical open source projects, and recently announced our $10 billion commitment to cybersecurity defense including $100 million to support third-party foundations that manage open source securi... http://security.googleblog.com/2021/10/introducing-secure-open-source-pilot.html Published: 2021 10 01 14:22:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Google Protects Your Accounts – Even When You No Longer Use Them - published about 3 years ago. Content: Posted by Sam Heft-Luthy, Product Manager, Privacy & Data Protection Office What happens to our digital accounts when we stop using them? It’s a question we should all ask ourselves, because when we are no longer keeping tabs on what’s happening with old accounts, they can become targets for cybercrime.In fact, quite a few recent high-profile breaches ta... http://security.googleblog.com/2021/10/google-protects-your-accounts-even-when.html Published: 2021 10 05 13:00:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Launching a collaborative minimum security baseline - published about 3 years ago. Content: Posted by Royal Hansen, Vice President, Security According to an Opus and Ponemon Institute study, 59% of companies have experienced a data breach caused by one of their vendors or third parties. Outsourcing operations to third-party vendors has become a popular business strategy as it allows organizations to save money and increase operational efficiency. W... http://security.googleblog.com/2021/10/launching-collaborative-minimum.html Published: 2021 10 27 14:47:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Pixel 6: Setting a new standard for mobile security - published about 3 years ago. Content: Posted by Dave Kleidermacher, Jesse Seed, Brandon Barbello, and Stephan Somogyi, Android, Pixel & Tensor security teams With Pixel 6 and Pixel 6 Pro, we’re launching our most secure Pixel phone yet, with 5 years of security updates and the most layers of hardware security. These new Pixel smartphones take a layered security approach, with innovations spa... http://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html Published: 2021 10 27 17:01:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Protecting your device information with Private Set Membership - published about 3 years ago. Content: Posted by Kevin Yeo and Sarvar Patel, Private Computing Team At Google, keeping you safe online is our top priority, so we continuously build the most advanced privacy-preserving technologies into our products. Over the past few years, we've utilized innovations in cryptographic research to keep your personal information private by design and secure by defau... http://security.googleblog.com/2021/10/protecting-your-device-information-with.html Published: 2021 10 28 17:00:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Trick & Treat! 🎃 Paying Leets and Sweets for Linux Kernel privescs and k8s escapes - published about 3 years ago. Content: Posted by Eduardo Vela, Google Bug Hunters Team Starting today and for the next 3 months (until January 31 2022), we will pay 31,337 USD to security researchers that exploit privilege escalation in our lab environment with a patched vulnerability, and 50,337 USD to those that use a previously unpatched vulnerability, or a new exploit technique.We are constan... http://security.googleblog.com/2021/11/trick-treat-paying-leets-and-sweets-for.html Published: 2021 11 01 16:30:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: ClusterFuzzLite: Continuous fuzzing for all - published about 3 years ago. Content: Posted by Jonathan Metzman, Google Open Source Security TeamIn recent years, continuous fuzzing has become an essential part of the software development lifecycle. By feeding unexpected or random data into a program, fuzzing catches bugs that would otherwise slip through the most thorough manual checks and provides coverage that would take staggering human e... http://security.googleblog.com/2021/11/clusterfuzzlite-continuous-fuzzing-for.html Published: 2021 11 11 12:00:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Exploring Container Security: A Storage Vulnerability Deep Dive - published almost 3 years ago. Content: Posted by Fabricio Voznika and Mauricio Poppe, Google Cloud Kubernetes Security is constantly evolving - keeping pace with enhanced functionality, usability and flexibility while also balancing the security needs of a wide and diverse set of use-cases.Recently, the GKE Security team discovered a high severity vulnerability that allowed workloads to have acce... http://security.googleblog.com/2021/12/exploring-container-security-storage.html Published: 2021 12 02 20:00:00 Received: 2022 03 24 22:45:49 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Empowering the next generation of Android Application Security Researchers - published almost 3 years ago. Content: Posted by Jon Bottarini, Security Program Manager & Lena Katib, Strategic Partnerships ManagerThe external security researcher community plays an integral role in making the Google Play ecosystem safe and secure. Through this partnership with the community, Google has been able to collaborate with third-party developers to fix thousands of security issue... http://security.googleblog.com/2021/12/empowering-next-generation-of-android.html Published: 2021 12 14 18:00:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Improving OSS-Fuzz and Jazzer to catch Log4Shell - published almost 3 years ago. Content: Posted by Jonathan Metzman, Google Open Source Security TeamThe discovery of the Log4Shell vulnerability has set the internet on fire. Similar to shellshock and heartbleed, Log4Shell is just the latest catastrophic vulnerability in software that runs the internet. Our mission as the Google Open Source Security Team is to secure the open source libraries the ... http://security.googleblog.com/2021/12/improving-oss-fuzz-and-jazzer-to-catch.html Published: 2021 12 16 22:04:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Understanding the Impact of Apache Log4j Vulnerability - published almost 3 years ago. Content: Posted by James Wetter and Nicky Ringland, Open Source Insights Team Editors Note:The below numbers were calculated based on both log4j-core and log4j-api, as both were listed on the CVE. Since then, the CVE has been updated with the clarification that only log4j-core is affected.The ecosystem impact numbers for just log4j-core, as of 19th December are over ... http://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html Published: 2021 12 17 17:25:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Apache Log4j Vulnerability - published almost 3 years ago. Content: Like many other companies, we’re closely following the multiple CVEs regarding Apache Log4j 2. Our security teams are investigating any potential impact on Google products and services and are focused on protecting our users and customers.We encourage anyone who manages environments containing Log4j 2 to update to the latest version.Based on findings in our ... http://security.googleblog.com/2021/12/apache-log4j-vulnerability.html Published: 2021 12 18 02:08:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Reducing Security Risks in Open Source Software at Scale: Scorecards Launches V4 - published almost 3 years ago. Content: Posted by Laurent Simon and Azeem Shaikh, Google Open Source Security Team (GOSST) Since our July announcement of Scorecards V2, the Scorecards project—an automated security tool to flag risky supply chain practices in open source projects—has grown steadily to over 40 unique contributors and 18 implemented security checks. Today we are proud to announce the... http://security.googleblog.com/2022/01/reducing-security-risks-in-open-source.html Published: 2022 01 19 15:00:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Vulnerability Reward Program: 2021 Year in Review - published almost 3 years ago. Content: Posted by Sarah Jacobus, Vulnerability Rewards Team Last year was another record setter for our Vulnerability Reward Programs (VRPs). Throughout 2021, we partnered with the security researcher community to identify and fix thousands of vulnerabilities – helping keep our users and the internet safe. Thanks to these incredible researchers, Vulnerability Rewar... http://security.googleblog.com/2022/02/vulnerability-reward-program-2021-year.html Published: 2022 02 10 17:00:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
Article: 🌹 Roses are red, Violets are blue 💙 Giving leets 🧑💻 more sweets 🍭 All of 2022! - published almost 3 years ago. Content: Posted by Eduardo Vela, Vulnerability Matchmaker Until December 31 2022 we will pay 20,000 to 91,337 USD for exploits of vulnerabilities in the Linux Kernel, Kubernetes, GKE or kCTF that are exploitable on our test lab.We launched an expansion of kCTF VRP on November 1, 2021 in which we paid 31,337 to 50,337 USD to those that are able to compromise our kCTF ... http://security.googleblog.com/2022/02/roses-are-red-violets-are-blue-giving.html Published: 2022 02 14 17:07:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Mitigating kernel risks on 32-bit ARM - published over 2 years ago. Content: Posted by Ard Biesheuvel, Google Open Source Security Team Linux kernel support for the 32-bit ARM architecture was contributed in the late 90s, when there was little corporate involvement in Linux development, and most contributors were students or hobbyists, tinkering with development boards, often without much in the way of documentation.Now 20+ years lat... http://security.googleblog.com/2022/02/mitigating-kernel-risks-on-32-bit-arm.html Published: 2022 02 23 17:00:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: What's up with in-the-wild exploits? Plus, what we're doing about it. - published over 2 years ago. Content: Posted by Adrian Taylor, Chrome Security TeamIf you are a regular reader of our Chrome release blog, you may have noticed that phrases like 'exploit for CVE-1234-567 exists in the wild' have been appearing more often recently. In this post we'll explore why there seems to be such an increase in exploits, and clarify some misconceptions in the process. We'll ... http://security.googleblog.com/2022/03/whats-up-with-in-wild-exploits-plus.html Published: 2022 03 10 18:33:00 Received: 2022 03 24 22:45:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Physician Sentenced to Prison for Health Care Fraud Scheme - published over 2 years ago. Content: https://www.databreaches.net/physician-sentenced-to-prison-for-health-care-fraud-scheme/ Published: 2022 03 24 22:20:16 Received: 2022 03 24 22:30:25 Feed: DataBreaches.net Source: DataBreaches.net Category: Data Breaches Topic: Data Breaches |
|
Article: British cops arrest seven in Lapsus$ crime gang probe - published over 2 years ago. Content: https://go.theregister.com/feed/www.theregister.com/2022/03/24/police_lapsus_arrests/ Published: 2022 03 24 22:13:19 Received: 2022 03 24 22:28:29 Feed: The Register - Security Source: The Register - Security Category: Cyber Security Topic: Cyber Security |
|
Article: CVE-2022-25571 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25571 Published: 2022 03 24 21:15:13 Received: 2022 03 24 22:22:56 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2022-24782 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24782 Published: 2022 03 24 21:15:13 Received: 2022 03 24 22:22:55 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2022-24781 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24781 Published: 2022 03 24 21:15:13 Received: 2022 03 24 22:22:55 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2022-24776 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24776 Published: 2022 03 24 20:15:09 Received: 2022 03 24 22:22:55 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2022-24769 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24769 Published: 2022 03 24 20:15:09 Received: 2022 03 24 22:22:55 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: British cops arrest seven in Lapsus$ crime gang probe - published over 2 years ago. Content: https://go.theregister.com/feed/www.theregister.com/2022/03/24/police_lapsus_arrests/ Published: 2022 03 24 22:13:19 Received: 2022 03 24 22:21:35 Feed: The Register - Security Source: The Register Category: News Topic: Cyber Security |
|
Article: Tiktok-Scraper - TikTok Scraper. Download Video Posts, Collect User/Trend/Hashtag/Music Feed Metadata, Sign URL And Etc - published over 2 years ago. Content: http://www.kitploit.com/2022/03/tiktok-scraper-tiktok-scraper-download.html Published: 2022 03 24 22:04:28 Received: 2022 03 24 22:09:33 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: State-Sponsored Russian Cyber Actors Targeted Energy Sector from 2011 to 2018 - published over 2 years ago. Content: https://us-cert.cisa.gov/ncas/current-activity/2022/03/24/state-sponsored-russian-cyber-actors-targeted-energy-sector-2011 Published: 2022 03 24 10:49:52 Received: 2022 03 24 22:01:55 Feed: CISA All NCAS Products Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: All Topic: Cyber Security |
|
Article: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector - published over 2 years ago. Content: https://us-cert.cisa.gov/ncas/alerts/aa22-083a Published: 2022 03 24 14:00:00 Received: 2022 03 24 22:01:55 Feed: CISA All NCAS Products Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: All Topic: Cyber Security |
|
Article: AA22-083A: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector - published over 2 years ago. Content: https://us-cert.cisa.gov/ncas/alerts/aa22-083a Published: 2022 03 24 14:00:00 Received: 2022 03 24 22:01:53 Feed: CISA Alerts Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Alerts Topic: Cyber Security |
Article: Western Digital My Cloud OS update fixes critical vulnerability - published over 2 years ago. Content: https://www.bleepingcomputer.com/news/security/western-digital-my-cloud-os-update-fixes-critical-vulnerability/ Published: 2022 03 24 21:47:32 Received: 2022 03 24 22:01:52 Feed: Bleeping Computer - All News Feeds Source: Bleeping Computer Category: News Topic: Cyber Security |
|
Article: US charges 4 Russian govt employees with critical infrastructure hacks - published over 2 years ago. Content: https://www.bleepingcomputer.com/news/security/us-charges-4-russian-govt-employees-with-critical-infrastructure-hacks/ Published: 2022 03 24 21:57:21 Received: 2022 03 24 22:01:52 Feed: Bleeping Computer - All News Feeds Source: Bleeping Computer Category: News Topic: Cyber Security |
|
Article: Microsoft help files repurposed to contain Vidar malware in new campaign - published over 2 years ago. Content: https://www.csoonline.com/article/3654849/microsoft-help-files-repurposed-to-contain-vidar-malware-in-new-campaign.html#tk.rss_all Published: 2022 03 24 18:00:00 Received: 2022 03 24 21:50:25 Feed: CSO Online - All Source: CSO Online Category: Cyber Security Topic: Cyber Security |
Article: State-Sponsored Russian Cyber Actors Targeted Energy Sector from 2011 to 2018 - published over 2 years ago. Content: https://us-cert.cisa.gov/ncas/current-activity/2022/03/24/state-sponsored-russian-cyber-actors-targeted-energy-sector-2011 Published: 2022 03 24 10:49:52 Received: 2022 03 24 21:42:04 Feed: CISA Current Activity Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: News Topic: Cyber Security |
|
Article: UK Cops Collar 7 Suspected Lapsus$ Gang Members - published over 2 years ago. Content: https://threatpost.com/uk-cops-collar-7-suspected-lapsus-gang-members/179098/ Published: 2022 03 24 21:23:30 Received: 2022 03 24 21:41:57 Feed: Threatpost – All Feeds Source: Threatpost Category: News Topic: Cyber Security |
|
Article: Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide - published over 2 years ago. Content: https://www.databreaches.net/four-russian-government-employees-charged-in-two-historical-hacking-campaigns-targeting-critical-infrastructure-worldwide/ Published: 2022 03 24 21:26:31 Received: 2022 03 24 21:30:05 Feed: DataBreaches.net Source: DataBreaches.net Category: Data Breaches Topic: Data Breaches |
|
Article: Apple's iMessage Service Experiencing Issues [Update: Resolved] - published over 2 years ago. Content: https://www.macrumors.com/2022/03/24/apple-imessage-service-experiencing-issues/ Published: 2022 03 24 20:49:23 Received: 2022 03 24 21:29:49 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
|
Article: Ransomware Payments, Demands Rose Dramatically in 2021 - published over 2 years ago. Content: https://www.darkreading.com/attacks-breaches/ransomware-payments-demands-rose-dramatically-in-2021 Published: 2022 03 24 21:15:00 Received: 2022 03 24 21:29:41 Feed: Dark Reading: Source: Dark Reading Category: News Topic: Cyber Security |
Article: Apple's iMessage Service Experiencing Issues - published over 2 years ago. Content: https://www.macrumors.com/2022/03/24/apple-imessage-service-experiencing-issues/ Published: 2022 03 24 20:49:23 Received: 2022 03 24 21:10:47 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
|
Article: The Kids Online Safety Act Is a Heavy-Handed Plan to Force Platforms to Spy on Young People - published over 2 years ago. Content: https://www.eff.org/deeplinks/2022/03/kids-online-safety-act-heavy-handed-plan-force-platforms-spy-young-people Published: 2022 03 24 18:59:18 Received: 2022 03 24 21:10:11 Feed: Deeplinks Source: Deeplinks Category: Cyber Security Topic: Cyber Security |
|
Article: Pandemic Leaves Firms Scrambling for Cybersecurity Specialists - published over 2 years ago. Content: https://www.darkreading.com/remote-workforce/pandemic-leaves-firms-scrambling-for-cybersecurity-specialists Published: 2022 03 24 20:06:03 Received: 2022 03 24 20:49:43 Feed: Dark Reading: Source: Dark Reading Category: News Topic: Cyber Security |
Article: Lapsus$ suspects arrested for Microsoft, Nvidia, Okta hacks - published over 2 years ago. Content: https://www.bleepingcomputer.com/news/security/lapsus-suspects-arrested-for-microsoft-nvidia-okta-hacks/ Published: 2022 03 24 20:25:21 Received: 2022 03 24 20:41:53 Feed: Bleeping Computer - All News Feeds Source: Bleeping Computer Category: News Topic: Cyber Security |
|
Article: Microsoft Azure Developers Awash in PII-Stealing npm Packages - published over 2 years ago. Content: https://threatpost.com/microsoft-azure-developers-pii-stealing-npm-packages/179096/ Published: 2022 03 24 20:21:02 Received: 2022 03 24 20:41:47 Feed: Threatpost – Web Security Source: Threatpost Category: News Topic: Web Security |
|
Article: CVE-2022-22374 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22374 Published: 2022 03 24 18:15:08 Received: 2022 03 24 20:22:48 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-43666 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43666 Published: 2022 03 24 18:15:08 Received: 2022 03 24 20:22:44 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-43085 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43085 Published: 2022 03 24 18:15:08 Received: 2022 03 24 20:22:43 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-43084 - published over 2 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43084 Published: 2022 03 24 18:15:07 Received: 2022 03 24 20:22:43 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: Microsoft Azure Developers Awash in PII-Stealing npm Packages - published over 2 years ago. Content: https://threatpost.com/microsoft-azure-developers-pii-stealing-npm-packages/179096/ Published: 2022 03 24 20:21:02 Received: 2022 03 24 20:21:53 Feed: Threatpost – All Feeds Source: Threatpost Category: News Topic: Cyber Security |
|
Article: Malicious Microsoft Excel add-ins used to deliver RAT malware - published over 2 years ago. Content: https://www.bleepingcomputer.com/news/security/malicious-microsoft-excel-add-ins-used-to-deliver-rat-malware/ Published: 2022 03 24 19:56:29 Received: 2022 03 24 20:01:57 Feed: Bleeping Computer - All News Feeds Source: Bleeping Computer Category: News Topic: Cyber Security |
Article: Just-Released Dark Souls Game, Elden Ring, Includes Killer Bug - published over 2 years ago. Content: https://threatpost.com/dark-souls-game-elden-ring-killer-bug/179090/ Published: 2022 03 24 19:23:12 Received: 2022 03 24 19:41:53 Feed: Threatpost – All Feeds Source: Threatpost Category: News Topic: Cyber Security |
|
Article: HP finance manager went on $5m personal spending spree with company card - published over 2 years ago. Content: https://go.theregister.com/feed/www.theregister.com/2022/03/24/hp_finance_manager_expense_fraud/ Published: 2022 03 24 19:11:40 Received: 2022 03 24 19:28:55 Feed: The Register - Security Source: The Register - Security Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor