All Articles

Ordered by Date Received : Year: "2024" Month: "03" Day: "13"
Page: << < 2 (of 7) > >>

Total Articles in this collection: 376

Navigation Help at the bottom of the page
Article: APPLE-SA-03-07-2024-4 macOS Monterey 12.7.4 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/23   
Published: 2024 03 13 19:54:22
Received: 2024 03 13 20:56:15
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-03-07-2024-4 macOS Monterey 12.7.4 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/23   
Published: 2024 03 13 19:54:22
Received: 2024 03 13 20:56:15
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Learn to control your money and develop dynamic leaders with these free eBooks - published 8 months ago.
Content: This edition delves into the latest concepts of BaseOps, FinOps, and DevSecOps, including the use of the DevSecOps Maturity Model. You'll learn ...
https://9to5toys.com/2024/03/13/learn-to-control-your-money-and-develop-dynamic-leaders-with-these-free-ebooks/   
Published: 2024 03 13 19:18:32
Received: 2024 03 13 20:46:48
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Learn to control your money and develop dynamic leaders with these free eBooks - published 8 months ago.
Content: This edition delves into the latest concepts of BaseOps, FinOps, and DevSecOps, including the use of the DevSecOps Maturity Model. You'll learn ...
https://9to5toys.com/2024/03/13/learn-to-control-your-money-and-develop-dynamic-leaders-with-these-free-ebooks/   
Published: 2024 03 13 19:18:32
Received: 2024 03 13 20:46:48
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Nozomi Networks Raises $100M As Investors Eye Industrial Cybersecurity Once Again - published 8 months ago.
Content: Every couple of years, industrial cybersecurity makes a comeback with investors — and it looks like it's that time again now.
https://news.crunchbase.com/cybersecurity/nozomi-networks-funding-industrial-cybersecurity-ot-security/   
Published: 2024 03 13 19:17:30
Received: 2024 03 13 20:43:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Nozomi Networks Raises $100M As Investors Eye Industrial Cybersecurity Once Again - published 8 months ago.
Content: Every couple of years, industrial cybersecurity makes a comeback with investors — and it looks like it's that time again now.
https://news.crunchbase.com/cybersecurity/nozomi-networks-funding-industrial-cybersecurity-ot-security/   
Published: 2024 03 13 19:17:30
Received: 2024 03 13 20:43:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub - CISA - published 8 months ago.
Content: Looking for cybersecurity resources for your Emergency Communications Center (ECC) but do not know where to start? Overwhelmed with resources and ...
https://www.cisa.gov/news-events/news/safecom-and-ncswic-develop-911-cybersecurity-resource-hub   
Published: 2024 03 13 19:38:14
Received: 2024 03 13 20:43:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub - CISA - published 8 months ago.
Content: Looking for cybersecurity resources for your Emergency Communications Center (ECC) but do not know where to start? Overwhelmed with resources and ...
https://www.cisa.gov/news-events/news/safecom-and-ncswic-develop-911-cybersecurity-resource-hub   
Published: 2024 03 13 19:38:14
Received: 2024 03 13 20:43:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: APPLE-SA-03-05-2024-2 iOS 16.7.6 and iPadOS 16.7.6 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/19   
Published: 2024 03 13 19:54:16
Received: 2024 03 13 20:35:53
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-03-05-2024-2 iOS 16.7.6 and iPadOS 16.7.6 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/19   
Published: 2024 03 13 19:54:16
Received: 2024 03 13 20:35:53
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: APPLE-SA-03-07-2024-1 Safari 17.4 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/20   
Published: 2024 03 13 19:54:17
Received: 2024 03 13 20:35:53
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-03-07-2024-1 Safari 17.4 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/20   
Published: 2024 03 13 19:54:17
Received: 2024 03 13 20:35:53
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: APPLE-SA-03-07-2024-2 macOS Sonoma 14.4 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/21   
Published: 2024 03 13 19:54:19
Received: 2024 03 13 20:35:53
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-03-07-2024-2 macOS Sonoma 14.4 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/21   
Published: 2024 03 13 19:54:19
Received: 2024 03 13 20:35:53
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Epic Games Accuses Apple of Charging 'Unjustified Fees' for Required Non-App Store Purchase Link - published 8 months ago.
Content:
https://www.macrumors.com/2024/03/13/epic-games-apple-unjustified-fees/   
Published: 2024 03 13 20:14:39
Received: 2024 03 13 20:25:52
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Epic Games Accuses Apple of Charging 'Unjustified Fees' for Required Non-App Store Purchase Link - published 8 months ago.
Content:
https://www.macrumors.com/2024/03/13/epic-games-apple-unjustified-fees/   
Published: 2024 03 13 20:14:39
Received: 2024 03 13 20:25:52
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: US govt probes if ransomware gang stole Change Healthcare data - published 8 months ago.
Content:
https://www.bleepingcomputer.com/news/security/us-govt-probes-if-ransomware-gang-stole-change-healthcare-data/   
Published: 2024 03 13 20:16:32
Received: 2024 03 13 20:24:55
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: US govt probes if ransomware gang stole Change Healthcare data - published 8 months ago.
Content:
https://www.bleepingcomputer.com/news/security/us-govt-probes-if-ransomware-gang-stole-change-healthcare-data/   
Published: 2024 03 13 20:16:32
Received: 2024 03 13 20:24:55
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: [Full Disclosure] CVE-2024-25228: Unpatched Command Injection in Vinchin Backup & Recovery Versions 7.2 and Earlier - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/15   
Published: 2024 03 13 19:50:56
Received: 2024 03 13 20:16:05
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: [Full Disclosure] CVE-2024-25228: Unpatched Command Injection in Vinchin Backup & Recovery Versions 7.2 and Earlier - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/15   
Published: 2024 03 13 19:50:56
Received: 2024 03 13 20:16:05
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: StimulusReflex CVE-2024-28121 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/16   
Published: 2024 03 13 19:53:33
Received: 2024 03 13 20:16:05
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: StimulusReflex CVE-2024-28121 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/16   
Published: 2024 03 13 19:53:33
Received: 2024 03 13 20:16:05
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Backdoor.Win32.Beastdoor.oq / Unauthenticated Remote Command Execution - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/17   
Published: 2024 03 13 19:53:44
Received: 2024 03 13 20:16:05
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Backdoor.Win32.Beastdoor.oq / Unauthenticated Remote Command Execution - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/17   
Published: 2024 03 13 19:53:44
Received: 2024 03 13 20:16:05
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: APPLE-SA-03-05-2024-1 iOS 17.4 and iPadOS 17.4 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/18   
Published: 2024 03 13 19:54:14
Received: 2024 03 13 20:16:05
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-03-05-2024-1 iOS 17.4 and iPadOS 17.4 - published 8 months ago.
Content:
https://seclists.org/fulldisclosure/2024/Mar/18   
Published: 2024 03 13 19:54:14
Received: 2024 03 13 20:16:05
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: CISA finalizes guidance on identity solutions for hybrid cloud environments - published 8 months ago.
Content: The Cybersecurity and Infrastructure Security Agency has finalized guidance on federal agency implementation of identity and access management ...
https://insidecybersecurity.com/daily-news/cisa-finalizes-guidance-identity-solutions-hybrid-cloud-environments   
Published: 2024 03 13 16:17:15
Received: 2024 03 13 20:03:23
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: CISA finalizes guidance on identity solutions for hybrid cloud environments - published 8 months ago.
Content: The Cybersecurity and Infrastructure Security Agency has finalized guidance on federal agency implementation of identity and access management ...
https://insidecybersecurity.com/daily-news/cisa-finalizes-guidance-identity-solutions-hybrid-cloud-environments   
Published: 2024 03 13 16:17:15
Received: 2024 03 13 20:03:23
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Penn Highlands hosting free cyber security informative event - WTAJ - published 8 months ago.
Content: Penn Highlands hosting free cyber security informative event ... JOHNSTOWN, Pa. (WTAJ) — Pennsylvania Highlands Community College is holding a ...
https://www.wtaj.com/news/local-news/penn-highlands-hosting-free-cyber-security-informative-event/   
Published: 2024 03 13 18:18:13
Received: 2024 03 13 20:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Penn Highlands hosting free cyber security informative event - WTAJ - published 8 months ago.
Content: Penn Highlands hosting free cyber security informative event ... JOHNSTOWN, Pa. (WTAJ) — Pennsylvania Highlands Community College is holding a ...
https://www.wtaj.com/news/local-news/penn-highlands-hosting-free-cyber-security-informative-event/   
Published: 2024 03 13 18:18:13
Received: 2024 03 13 20:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Deloitte Graduate Academy – Cyber Security Programme 2024 for young Nigerian ... - published 8 months ago.
Content: Application Deadline: 15 March 2024. Applications are now open for the 2024 Deloitte Graduate Academy – Cyber Security Programme.
https://www.opportunitiesforafricans.com/deloitte-graduate-academy-cyber-security-programme-2024-for-young-nigerian-graduates/   
Published: 2024 03 13 19:10:57
Received: 2024 03 13 20:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Deloitte Graduate Academy – Cyber Security Programme 2024 for young Nigerian ... - published 8 months ago.
Content: Application Deadline: 15 March 2024. Applications are now open for the 2024 Deloitte Graduate Academy – Cyber Security Programme.
https://www.opportunitiesforafricans.com/deloitte-graduate-academy-cyber-security-programme-2024-for-young-nigerian-graduates/   
Published: 2024 03 13 19:10:57
Received: 2024 03 13 20:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Barrie clinics partially crippled by 'cyber-security incident' - Bradford Today - published 8 months ago.
Content: ... cyber-security incident' involving their computer network. Pictured is one of their clinics at Big Bay Point Road and Prince William Way in the ...
https://www.bradfordtoday.ca/police-beat/barrie-clinics-partially-crippled-by-cyber-security-incident-8438931   
Published: 2024 03 13 19:22:28
Received: 2024 03 13 20:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Barrie clinics partially crippled by 'cyber-security incident' - Bradford Today - published 8 months ago.
Content: ... cyber-security incident' involving their computer network. Pictured is one of their clinics at Big Bay Point Road and Prince William Way in the ...
https://www.bradfordtoday.ca/police-beat/barrie-clinics-partially-crippled-by-cyber-security-incident-8438931   
Published: 2024 03 13 19:22:28
Received: 2024 03 13 20:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DevSecOps Senior Network Engineer Jobs in Colorado Springs, CO - published 8 months ago.
Content: DevSecOps Senior Network Engineer Jobs in Colorado Springs, CO · Current Search Criteria · Sorted by Relevance.
https://jacobs.jobs/devsecops-senior-network-engineer/jobs-in/colorado-springs/colorado/usa/jobs/   
Published: 2024 03 13 16:29:44
Received: 2024 03 13 19:46:07
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Senior Network Engineer Jobs in Colorado Springs, CO - published 8 months ago.
Content: DevSecOps Senior Network Engineer Jobs in Colorado Springs, CO · Current Search Criteria · Sorted by Relevance.
https://jacobs.jobs/devsecops-senior-network-engineer/jobs-in/colorado-springs/colorado/usa/jobs/   
Published: 2024 03 13 16:29:44
Received: 2024 03 13 19:46:07
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Sécurité du code : au-delà du Shift Left - Solutions-Numeriques - published 8 months ago.
Content: Pourtant, tout l'édifice DevSecOps ne peut reposer uniquement sur les épaules du développeur. Par Alain Clapaud. Ce fut certainement l'une des ...
https://www.solutions-numeriques.com/dossiers/securite-du-code-au-dela-du-shift-left/   
Published: 2024 03 13 16:50:58
Received: 2024 03 13 19:46:07
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Sécurité du code : au-delà du Shift Left - Solutions-Numeriques - published 8 months ago.
Content: Pourtant, tout l'édifice DevSecOps ne peut reposer uniquement sur les épaules du développeur. Par Alain Clapaud. Ce fut certainement l'une des ...
https://www.solutions-numeriques.com/dossiers/securite-du-code-au-dela-du-shift-left/   
Published: 2024 03 13 16:50:58
Received: 2024 03 13 19:46:07
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: GitLab on LinkedIn: As AI becomes standard, watch for these 4 DevSecOps trends - published 8 months ago.
Content: To effectively harness #AI to drive innovation, organizations must align with global trends shaping AI's role in software development.
https://www.linkedin.com/posts/gitlab-com_as-ai-becomes-standard-watch-for-these-4-activity-7173724529175769088-ik7v   
Published: 2024 03 13 17:57:22
Received: 2024 03 13 19:46:07
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: GitLab on LinkedIn: As AI becomes standard, watch for these 4 DevSecOps trends - published 8 months ago.
Content: To effectively harness #AI to drive innovation, organizations must align with global trends shaping AI's role in software development.
https://www.linkedin.com/posts/gitlab-com_as-ai-becomes-standard-watch-for-these-4-activity-7173724529175769088-ik7v   
Published: 2024 03 13 17:57:22
Received: 2024 03 13 19:46:07
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DDoS attacks reach critical levels in 14 seconds - published 8 months ago.
Content:
https://www.securitymagazine.com/articles/100513-ddos-attacks-reach-critical-levels-in-14-seconds   
Published: 2024 03 13 19:31:43
Received: 2024 03 13 19:44:47
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: DDoS attacks reach critical levels in 14 seconds - published 8 months ago.
Content:
https://www.securitymagazine.com/articles/100513-ddos-attacks-reach-critical-levels-in-14-seconds   
Published: 2024 03 13 19:31:43
Received: 2024 03 13 19:44:47
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Discovering Deserialization Gadget Chains in Rubyland - Include Security Research Blog - published 8 months ago.
Content: submitted by /u/907jessejones [link] [comments]...
https://www.reddit.com/r/netsec/comments/1be00wy/discovering_deserialization_gadget_chains_in/   
Published: 2024 03 13 19:15:13
Received: 2024 03 13 19:23:10
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Discovering Deserialization Gadget Chains in Rubyland - Include Security Research Blog - published 8 months ago.
Content: submitted by /u/907jessejones [link] [comments]...
https://www.reddit.com/r/netsec/comments/1be00wy/discovering_deserialization_gadget_chains_in/   
Published: 2024 03 13 19:15:13
Received: 2024 03 13 19:23:10
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Applied Cybersecurity & Internet Governance - published 8 months ago.
Content: Applied Cybersecurity and Internet Governance, peer-reviewed, open access journal.
https://www.acigjournal.com/   
Published: 2024 03 13 16:57:32
Received: 2024 03 13 19:23:03
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Applied Cybersecurity & Internet Governance - published 8 months ago.
Content: Applied Cybersecurity and Internet Governance, peer-reviewed, open access journal.
https://www.acigjournal.com/   
Published: 2024 03 13 16:57:32
Received: 2024 03 13 19:23:03
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Fortinet warns of critical RCE bug in endpoint management software - published 8 months ago.
Content:
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-rce-bug-in-endpoint-management-software/   
Published: 2024 03 13 18:48:11
Received: 2024 03 13 19:04:41
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Fortinet warns of critical RCE bug in endpoint management software - published 8 months ago.
Content:
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-rce-bug-in-endpoint-management-software/   
Published: 2024 03 13 18:48:11
Received: 2024 03 13 19:04:41
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: White House adds teeth to secure software development requirements | Cybersecurity Dive - published 8 months ago.
Content: CISA and OMB released an attestation form to ensure compliance with secure development practices. ... Computer language script and coding on screen.
https://www.cybersecuritydive.com/news/biden-administration-secure-software/710152/   
Published: 2024 03 13 15:57:47
Received: 2024 03 13 19:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: White House adds teeth to secure software development requirements | Cybersecurity Dive - published 8 months ago.
Content: CISA and OMB released an attestation form to ensure compliance with secure development practices. ... Computer language script and coding on screen.
https://www.cybersecuritydive.com/news/biden-administration-secure-software/710152/   
Published: 2024 03 13 15:57:47
Received: 2024 03 13 19:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Area medical clinics partially crippled by 'cyber-security incident' - Orillia News - published 8 months ago.
Content: ... cyber-security incident” involving their computer network. Pictured is one of their clinics at Big Bay Point Road and Prince William Way in the ...
https://www.orilliamatters.com/police-beat/area-medical-clinics-partially-crippled-by-cyber-security-incident-8438750   
Published: 2024 03 13 17:25:51
Received: 2024 03 13 19:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Area medical clinics partially crippled by 'cyber-security incident' - Orillia News - published 8 months ago.
Content: ... cyber-security incident” involving their computer network. Pictured is one of their clinics at Big Bay Point Road and Prince William Way in the ...
https://www.orilliamatters.com/police-beat/area-medical-clinics-partially-crippled-by-cyber-security-incident-8438750   
Published: 2024 03 13 17:25:51
Received: 2024 03 13 19:03:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: FluidOne and its Cyber Security Associates Division (CSA) Acquire SureCloud ... - Business Wire - published 8 months ago.
Content: FluidOne, the market-leading provider of Connected Cloud Solutions, announced today that its cyber division Cyber Security Associates (CSA) has ...
https://www.businesswire.com/news/home/20240313036120/en/Securing-the-Future-Together-FluidOne-and-its-Cyber-Security-Associates-Division-CSA-Acquire-SureCloud-Cyber-Services-to-Bolster-Their-Expertise-Aimed-at-Keeping-Customers-Safe.   
Published: 2024 03 13 17:31:08
Received: 2024 03 13 19:03:21
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: FluidOne and its Cyber Security Associates Division (CSA) Acquire SureCloud ... - Business Wire - published 8 months ago.
Content: FluidOne, the market-leading provider of Connected Cloud Solutions, announced today that its cyber division Cyber Security Associates (CSA) has ...
https://www.businesswire.com/news/home/20240313036120/en/Securing-the-Future-Together-FluidOne-and-its-Cyber-Security-Associates-Division-CSA-Acquire-SureCloud-Cyber-Services-to-Bolster-Their-Expertise-Aimed-at-Keeping-Customers-Safe.   
Published: 2024 03 13 17:31:08
Received: 2024 03 13 19:03:21
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber Startup Wiz to Buy Gem Security For $350 Million - Bloomberg - published 8 months ago.
Content: In recent months, Palo Alto Networks Inc. snapped up startups Dig Security and Talon Cyber Security for an estimated combined $1 billion, while ...
https://www.bloomberg.com/news/articles/2024-03-13/cyber-startup-wiz-to-buy-gem-security-for-350-million   
Published: 2024 03 13 18:02:06
Received: 2024 03 13 19:03:21
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber Startup Wiz to Buy Gem Security For $350 Million - Bloomberg - published 8 months ago.
Content: In recent months, Palo Alto Networks Inc. snapped up startups Dig Security and Talon Cyber Security for an estimated combined $1 billion, while ...
https://www.bloomberg.com/news/articles/2024-03-13/cyber-startup-wiz-to-buy-gem-security-for-350-million   
Published: 2024 03 13 18:02:06
Received: 2024 03 13 19:03:21
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: DevOps at Nationalgrid ESO - the Balancing Mechanism revolution - Computing UK - published 8 months ago.
Content: Sam Rowell is product owner - Open Balancing Platform - Platform &amp; DevSecOps at IBM. Sam is a DevOps Evangelist with 8 years' experience of DevOps ...
https://www.computing.co.uk/sponsored/4185087/devops-nationalgrid-eso-balancing-mechanism-revolution   
Published: 2024 03 13 15:44:47
Received: 2024 03 13 18:46:25
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevOps at Nationalgrid ESO - the Balancing Mechanism revolution - Computing UK - published 8 months ago.
Content: Sam Rowell is product owner - Open Balancing Platform - Platform &amp; DevSecOps at IBM. Sam is a DevOps Evangelist with 8 years' experience of DevOps ...
https://www.computing.co.uk/sponsored/4185087/devops-nationalgrid-eso-balancing-mechanism-revolution   
Published: 2024 03 13 15:44:47
Received: 2024 03 13 18:46:25
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Вебинар “Управление метриками информационной безопасности” - cisoclub - published 8 months ago.
Content: Вебинар “Сила трёх: DevSecOps. Комплексная защита приложений от разработки до продакшена”. 13.03.2024. UserGate ТехТур ...
https://cisoclub.ru/vebinar-upravlenie-metrikami-informacionnoj-bezopasnosti/   
Published: 2024 03 13 16:41:05
Received: 2024 03 13 18:46:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Вебинар “Управление метриками информационной безопасности” - cisoclub - published 8 months ago.
Content: Вебинар “Сила трёх: DevSecOps. Комплексная защита приложений от разработки до продакшена”. 13.03.2024. UserGate ТехТур ...
https://cisoclub.ru/vebinar-upravlenie-metrikami-informacionnoj-bezopasnosti/   
Published: 2024 03 13 16:41:05
Received: 2024 03 13 18:46:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Codezero: Enterprise Microservices Development Company Raises $3.5 Million - Pulse 2.0 - published 8 months ago.
Content: This move is also strategic for the company's impact on enterprise DevOps and DevSecOps organizations, cloud-service providers, and cloud migration ...
https://pulse2.com/codezero-3-5-million-funding/   
Published: 2024 03 13 18:09:16
Received: 2024 03 13 18:46:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Codezero: Enterprise Microservices Development Company Raises $3.5 Million - Pulse 2.0 - published 8 months ago.
Content: This move is also strategic for the company's impact on enterprise DevOps and DevSecOps organizations, cloud-service providers, and cloud migration ...
https://pulse2.com/codezero-3-5-million-funding/   
Published: 2024 03 13 18:09:16
Received: 2024 03 13 18:46:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Meta Adds Messaging Interoperability For Whatsapp, Messenger - published 8 months ago.
Content:
https://www.silicon.co.uk/mobility/mobile-apps/meta-adds-messaging-interoperability-for-whatsapp-messenger-554502   
Published: 2024 03 13 18:26:51
Received: 2024 03 13 18:44:10
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Meta Adds Messaging Interoperability For Whatsapp, Messenger - published 8 months ago.
Content:
https://www.silicon.co.uk/mobility/mobile-apps/meta-adds-messaging-interoperability-for-whatsapp-messenger-554502   
Published: 2024 03 13 18:26:51
Received: 2024 03 13 18:44:10
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Join us for EFF's 8th Annual Tech Trivia Night! - published 8 months ago.
Content:
https://www.eff.org/deeplinks/2024/03/join-us-effs-8th-annual-tech-trivia-night   
Published: 2024 03 08 20:56:04
Received: 2024 03 13 18:43:54
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Join us for EFF's 8th Annual Tech Trivia Night! - published 8 months ago.
Content:
https://www.eff.org/deeplinks/2024/03/join-us-effs-8th-annual-tech-trivia-night   
Published: 2024 03 08 20:56:04
Received: 2024 03 13 18:43:54
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Protect Yourself from Election Misinformation - published 8 months ago.
Content:
https://www.eff.org/deeplinks/2024/03/protect-yourself-election-misinformation   
Published: 2024 03 13 18:22:26
Received: 2024 03 13 18:43:51
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Protect Yourself from Election Misinformation - published 8 months ago.
Content:
https://www.eff.org/deeplinks/2024/03/protect-yourself-election-misinformation   
Published: 2024 03 13 18:22:26
Received: 2024 03 13 18:43:51
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Three quarters of cybersecurity breaches are down to human error - Workplace Insight - published 8 months ago.
Content: A new poll from Mimecast claims that 74 percent of all cybersecurity breaches in the workplace are caused by human factors.
https://workplaceinsight.net/three-quarters-of-cybersecurity-breaches-are-down-to-human-error/   
Published: 2024 03 13 14:35:28
Received: 2024 03 13 18:43:16
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Three quarters of cybersecurity breaches are down to human error - Workplace Insight - published 8 months ago.
Content: A new poll from Mimecast claims that 74 percent of all cybersecurity breaches in the workplace are caused by human factors.
https://workplaceinsight.net/three-quarters-of-cybersecurity-breaches-are-down-to-human-error/   
Published: 2024 03 13 14:35:28
Received: 2024 03 13 18:43:16
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Heimdal® Celebrates 10 Years of Cybersecurity Excellence - PR Newswire UK - published 8 months ago.
Content: PRNewswire/ -- Heimdal®, a leader in innovative cybersecurity solutions, is proud to announce the celebration of its 10-year anniversary.
https://www.prnewswire.co.uk/news-releases/heimdal-celebrates-10-years-of-cybersecurity-excellence-302087934.html   
Published: 2024 03 13 16:17:25
Received: 2024 03 13 18:43:12
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Heimdal® Celebrates 10 Years of Cybersecurity Excellence - PR Newswire UK - published 8 months ago.
Content: PRNewswire/ -- Heimdal®, a leader in innovative cybersecurity solutions, is proud to announce the celebration of its 10-year anniversary.
https://www.prnewswire.co.uk/news-releases/heimdal-celebrates-10-years-of-cybersecurity-excellence-302087934.html   
Published: 2024 03 13 16:17:25
Received: 2024 03 13 18:43:12
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: HHS opens probe into UnitedHealth's cybersecurity as hack fallout continues - published 8 months ago.
Content: The Biden administration is opening an investigation into UnitedHealth Group following a cyberattack on a subsidiary that has crippled health-care ...
https://www.washingtonpost.com/health/2024/03/13/patient-data-breach-hhs-probe-unitedhealth-change-healthcare/   
Published: 2024 03 13 17:14:43
Received: 2024 03 13 18:43:12
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: HHS opens probe into UnitedHealth's cybersecurity as hack fallout continues - published 8 months ago.
Content: The Biden administration is opening an investigation into UnitedHealth Group following a cyberattack on a subsidiary that has crippled health-care ...
https://www.washingtonpost.com/health/2024/03/13/patient-data-breach-hhs-probe-unitedhealth-change-healthcare/   
Published: 2024 03 13 17:14:43
Received: 2024 03 13 18:43:12
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: M3 MacBook Air Teardown Shows Apple Fixed Base Model's Biggest Flaw - published 8 months ago.
Content:
https://www.macrumors.com/2024/03/13/m3-macbook-air-ifixit-teardown/   
Published: 2024 03 13 18:11:51
Received: 2024 03 13 18:25:29
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: M3 MacBook Air Teardown Shows Apple Fixed Base Model's Biggest Flaw - published 8 months ago.
Content:
https://www.macrumors.com/2024/03/13/m3-macbook-air-ifixit-teardown/   
Published: 2024 03 13 18:11:51
Received: 2024 03 13 18:25:29
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: PixPirate Android malware uses new tactic to hide on phones - published 8 months ago.
Content:
https://www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/   
Published: 2024 03 13 18:13:05
Received: 2024 03 13 18:24:45
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: PixPirate Android malware uses new tactic to hide on phones - published 8 months ago.
Content:
https://www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/   
Published: 2024 03 13 18:13:05
Received: 2024 03 13 18:24:45
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Poking holes in Google tech bagged bug hunters $10M - published 8 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/03/13/google_2023_bug_bounties/   
Published: 2024 03 13 18:00:14
Received: 2024 03 13 18:23:36
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Poking holes in Google tech bagged bug hunters $10M - published 8 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/03/13/google_2023_bug_bounties/   
Published: 2024 03 13 18:00:14
Received: 2024 03 13 18:23:36
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Infosys hiring DevSecOps - EQS Consultant Job in Calgary | Glassdoor - published 8 months ago.
Content: Infosys is seeking a DevSecOps Consultant. This position will interface with key stakeholders and apply technical profic.
https://www.glassdoor.ca/job-listing/devsecops-eqs-consultant-infosys-JV_IC2275123_KO0,24_KE25,32.htm?jl=1009157378588   
Published: 2024 03 13 13:21:03
Received: 2024 03 13 18:06:03
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Infosys hiring DevSecOps - EQS Consultant Job in Calgary | Glassdoor - published 8 months ago.
Content: Infosys is seeking a DevSecOps Consultant. This position will interface with key stakeholders and apply technical profic.
https://www.glassdoor.ca/job-listing/devsecops-eqs-consultant-infosys-JV_IC2275123_KO0,24_KE25,32.htm?jl=1009157378588   
Published: 2024 03 13 13:21:03
Received: 2024 03 13 18:06:03
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DevSecOps Engineer - Concept Plus Careers - Jobvite - published 8 months ago.
Content: Description. Configuration Manager. Participate on a Scrum Team that is modernizing a legacy application. Provision and maintain DevSecOps ...
https://jobs.jobvite.com/conceptplusllc/job/o8z4rfwW   
Published: 2024 03 13 15:34:36
Received: 2024 03 13 18:06:02
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer - Concept Plus Careers - Jobvite - published 8 months ago.
Content: Description. Configuration Manager. Participate on a Scrum Team that is modernizing a legacy application. Provision and maintain DevSecOps ...
https://jobs.jobvite.com/conceptplusllc/job/o8z4rfwW   
Published: 2024 03 13 15:34:36
Received: 2024 03 13 18:06:02
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: The ‘Emergency Powers’ Risk of a Second Trump Presidency - published 8 months ago.
Content:
https://www.wired.com/story/donald-trump-emergency-powers/   
Published: 2024 03 13 17:42:05
Received: 2024 03 13 18:03:23
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: The ‘Emergency Powers’ Risk of a Second Trump Presidency - published 8 months ago.
Content:
https://www.wired.com/story/donald-trump-emergency-powers/   
Published: 2024 03 13 17:42:05
Received: 2024 03 13 18:03:23
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: British Library shares lessons from cyber attack - UKAuthority - published 8 months ago.
Content: ... cyber security in the technology rebuild and processes, and a shift away from on-site to cloud based systems. Lingering disruption. According to ...
https://www.ukauthority.com/articles/british-library-shares-lessons-from-cyber-attack/   
Published: 2024 03 13 12:16:45
Received: 2024 03 13 18:03:21
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: British Library shares lessons from cyber attack - UKAuthority - published 8 months ago.
Content: ... cyber security in the technology rebuild and processes, and a shift away from on-site to cloud based systems. Lingering disruption. According to ...
https://www.ukauthority.com/articles/british-library-shares-lessons-from-cyber-attack/   
Published: 2024 03 13 12:16:45
Received: 2024 03 13 18:03:21
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Poking holes in Google tech bagged bug hunters $10M - published 8 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/03/13/google_2023_bug_bounties/   
Published: 2024 03 13 18:00:14
Received: 2024 03 13 18:03:09
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Poking holes in Google tech bagged bug hunters $10M - published 8 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/03/13/google_2023_bug_bounties/   
Published: 2024 03 13 18:00:14
Received: 2024 03 13 18:03:09
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Leak of Acer Philippines employee database appears on hacking forum - published 8 months ago.
Content:
https://www.bitdefender.com/blog/hotforsecurity/leak-of-acer-philippines-employee-database-appears-on-hacking-forum/   
Published: 2024 03 13 17:38:22
Received: 2024 03 13 18:00:35
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: Leak of Acer Philippines employee database appears on hacking forum - published 8 months ago.
Content:
https://www.bitdefender.com/blog/hotforsecurity/leak-of-acer-philippines-employee-database-appears-on-hacking-forum/   
Published: 2024 03 13 17:38:22
Received: 2024 03 13 18:00:35
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: ShellShock payload sample Linux.Bashlet - published about 10 years ago.
Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here: MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun... Download Download. Email me if you need the password File Information File: fu4k_2485040231A35B7A465361FAF92A512D Size:...
https://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html   
Published: 2014 10 02 12:12:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: ShellShock payload sample Linux.Bashlet - published about 10 years ago.
Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here: MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun... Download Download. Email me if you need the password File Information File: fu4k_2485040231A35B7A465361FAF92A512D Size:...
https://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html   
Published: 2014 10 02 12:12:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published almost 10 years ago.
Content: PART II Wirelurker for Windows (WinLurker) Research: Palo Alto Claud Xiao: Wirelurker for Windows Sample credit: Claud Xiao PART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetector Sample credit: Clau...
https://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html   
Published: 2014 11 07 01:57:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published almost 10 years ago.
Content: PART II Wirelurker for Windows (WinLurker) Research: Palo Alto Claud Xiao: Wirelurker for Windows Sample credit: Claud Xiao PART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetector Sample credit: Clau...
https://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html   
Published: 2014 11 07 01:57:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: OnionDuke samples - published almost 10 years ago.
Content: Research:  F-Secure: OnionDuke: APT Attacks Via the Tor Network Download Download. Email me if you need the password (new link) File attributes Size: 219136 MD5:  28F96A57FA5FF663926E9BAD51A1D0CB Size: 126464 MD5:  C8EB6040FD02D77660D19057A38FF769 Size: 316928 MD5:  D1CE79089578DA2D41F1AD901F7B1014 Vir...
https://contagiodump.blogspot.com/2014/11/onionduke-samples.html   
Published: 2014 11 16 03:58:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: OnionDuke samples - published almost 10 years ago.
Content: Research:  F-Secure: OnionDuke: APT Attacks Via the Tor Network Download Download. Email me if you need the password (new link) File attributes Size: 219136 MD5:  28F96A57FA5FF663926E9BAD51A1D0CB Size: 126464 MD5:  C8EB6040FD02D77660D19057A38FF769 Size: 316928 MD5:  D1CE79089578DA2D41F1AD901F7B1014 Vir...
https://contagiodump.blogspot.com/2014/11/onionduke-samples.html   
Published: 2014 11 16 03:58:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: AlienSpy Java RAT samples and traffic information - published almost 10 years ago.
Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014. It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and ...
https://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html   
Published: 2014 11 17 21:16:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: AlienSpy Java RAT samples and traffic information - published almost 10 years ago.
Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014. It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and ...
https://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html   
Published: 2014 11 17 21:16:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Video archives of security conferences and workshops - published almost 10 years ago.
Content: Just some links for your enjoyment List of security conferences in 2014 Video archives: AIDE (Appalachian Institute of Digital Evidence) 2013 2012 2011 Blackhat 2012 or 2012 torrent Botconf 2013 Bsides BSides DC 2014 BSides Chicago 2014 BSides Nashville 2014 BSides Augusta 2014 BSides Huntsville 2014 BSides Las Vegas 2014 BSidesDE 2013 BSid...
https://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html   
Published: 2015 01 05 04:11:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Video archives of security conferences and workshops - published almost 10 years ago.
Content: Just some links for your enjoyment List of security conferences in 2014 Video archives: AIDE (Appalachian Institute of Digital Evidence) 2013 2012 2011 Blackhat 2012 or 2012 torrent Botconf 2013 Bsides BSides DC 2014 BSides Chicago 2014 BSides Nashville 2014 BSides Augusta 2014 BSides Huntsville 2014 BSides Las Vegas 2014 BSidesDE 2013 BSid...
https://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html   
Published: 2015 01 05 04:11:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ask and you shall receive - published over 9 years ago.
Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it. Yes, I often obtain samples from various sources for my own research.  I am sometimes too lazy/busy to post them but don't mind sharing. If you are looking for a particular sample, feel free to ask. I might have it. Send MD5 (several or few s...
https://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html   
Published: 2015 03 09 01:08:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ask and you shall receive - published over 9 years ago.
Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it. Yes, I often obtain samples from various sources for my own research.  I am sometimes too lazy/busy to post them but don't mind sharing. If you are looking for a particular sample, feel free to ask. I might have it. Send MD5 (several or few s...
https://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html   
Published: 2015 03 09 01:08:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: An Overview of Exploit Packs (Update 25) May 2015 - published over 9 years ago.
Content: Update May 12, 2015 Added CVE-2015-0359 and updates for CVE-2015-0336  Exploit kit table 2014- 2015 (Sortable HTML table) Reference table : Exploit References 2014-2015 Update March 20, 2015 Added CVE-2015-0336 ------------------------ Update February 19, 2015 Added Hanjuan Exploit kit and CVE-2015-3013 for Angler  Update...
https://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html   
Published: 2015 05 12 04:30:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: An Overview of Exploit Packs (Update 25) May 2015 - published over 9 years ago.
Content: Update May 12, 2015 Added CVE-2015-0359 and updates for CVE-2015-0336  Exploit kit table 2014- 2015 (Sortable HTML table) Reference table : Exploit References 2014-2015 Update March 20, 2015 Added CVE-2015-0336 ------------------------ Update February 19, 2015 Added Hanjuan Exploit kit and CVE-2015-3013 for Angler  Update...
https://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html   
Published: 2015 05 12 04:30:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Potao Express samples - published about 9 years ago.
Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/ http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdf TL; DR 2011- July 2015 Aka  Sapotao and node69 Group - Sandworm / Quedagh APT Vectors - USB, exe as doc, xls Victims - RU, BY, AM, GE  Victims - MMM group, UA gov truecryptrussia.ru has be...
https://contagiodump.blogspot.com/2015/08/potao-express-samples.html   
Published: 2015 08 12 12:24:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Potao Express samples - published about 9 years ago.
Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/ http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdf TL; DR 2011- July 2015 Aka  Sapotao and node69 Group - Sandworm / Quedagh APT Vectors - USB, exe as doc, xls Victims - RU, BY, AM, GE  Victims - MMM group, UA gov truecryptrussia.ru has be...
https://contagiodump.blogspot.com/2015/08/potao-express-samples.html   
Published: 2015 08 12 12:24:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Files download information - published over 8 years ago.
Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account. It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with ...
https://contagiodump.blogspot.com/2016/02/files-download-information.html   
Published: 2016 02 23 20:48:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Files download information - published over 8 years ago.
Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account. It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with ...
https://contagiodump.blogspot.com/2016/02/files-download-information.html   
Published: 2016 02 23 20:48:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Ransomware.OSX.KeRanger samples - published over 8 years ago.
Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud Xiao Sample credit: Claud Xiao File information d1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1  1d6297e2427f1d00a5b355d6d50809cb  Transmission-2.90.dmg e3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574  56b1d956112b0b7...
https://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html   
Published: 2016 03 06 23:39:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ransomware.OSX.KeRanger samples - published over 8 years ago.
Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud Xiao Sample credit: Claud Xiao File information d1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1  1d6297e2427f1d00a5b355d6d50809cb  Transmission-2.90.dmg e3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574  56b1d956112b0b7...
https://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html   
Published: 2016 03 06 23:39:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: "i am lady" Linux.Lady trojan samples - published about 8 years ago.
Content: Bitcoin mining malware for Linux servers - samples Research: Dr. Web. Linux.Lady Sample Credit:  Tim Strazzere MD5 list: 0DE8BCA756744F7F2BDB732E3267C3F4 55952F4F41A184503C467141B6171BA7 86AC68E5B09D1C4B157193BB6CB34007 E2CACA9626ED93C3D137FDF494FDAE7C E9423E072AD5A31A80A31FC1F525D614 Download. Email me if you need the password. ...
https://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html   
Published: 2016 08 17 04:06:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: "i am lady" Linux.Lady trojan samples - published about 8 years ago.
Content: Bitcoin mining malware for Linux servers - samples Research: Dr. Web. Linux.Lady Sample Credit:  Tim Strazzere MD5 list: 0DE8BCA756744F7F2BDB732E3267C3F4 55952F4F41A184503C467141B6171BA7 86AC68E5B09D1C4B157193BB6CB34007 E2CACA9626ED93C3D137FDF494FDAE7C E9423E072AD5A31A80A31FC1F525D614 Download. Email me if you need the password. ...
https://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html   
Published: 2016 08 17 04:06:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux.Agent malware sample - data stealer - published about 8 years ago.
Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight? Sample credit: Tim Strazzere List of files 9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malware d507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malware fddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-pretty ec5d4f90c912...
https://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html   
Published: 2016 08 24 04:18:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux.Agent malware sample - data stealer - published about 8 years ago.
Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight? Sample credit: Tim Strazzere List of files 9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malware d507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malware fddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-pretty ec5d4f90c912...
https://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html   
Published: 2016 08 24 04:18:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published over 7 years ago.
Content:  This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda. The post c...
https://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html   
Published: 2017 02 21 02:23:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published over 7 years ago.
Content:  This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda. The post c...
https://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html   
Published: 2017 02 21 02:23:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: DeepEnd Research: Analysis of Trump's secret server story - published over 7 years ago.
Content:  We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research) Analysis of Trump's secret server story... ...
https://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html   
Published: 2017 03 20 04:28:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DeepEnd Research: Analysis of Trump's secret server story - published over 7 years ago.
Content:  We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research) Analysis of Trump's secret server story... ...
https://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html   
Published: 2017 03 20 04:28:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part II. APT29 Russian APT including Fancy Bear - published over 7 years ago.
Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src.  Mitre ATT&amp;CK) Please see the first post here: Russian ...
https://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html   
Published: 2017 03 31 06:02:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part II. APT29 Russian APT including Fancy Bear - published over 7 years ago.
Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src.  Mitre ATT&amp;CK) Please see the first post here: Russian ...
https://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html   
Published: 2017 03 31 06:02:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: DDE Command Execution malware samples - published about 7 years ago.
Content: Here are a few samples related to the recent DDE Command execution DDE Macro-less Command Execution Vulnerability Download. Email me if you need the password  (updated sample pack)Links updated: Jan 20, 2023 References Reading:10/18/2017 InQuest/yara-rules 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inq...
https://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html   
Published: 2017 10 18 06:24:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DDE Command Execution malware samples - published about 7 years ago.
Content: Here are a few samples related to the recent DDE Command execution DDE Macro-less Command Execution Vulnerability Download. Email me if you need the password  (updated sample pack)Links updated: Jan 20, 2023 References Reading:10/18/2017 InQuest/yara-rules 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inq...
https://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html   
Published: 2017 10 18 06:24:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published over 6 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Research: Trend Micro There are two packages one is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package) Download Email me if you need the password     Links updated: Jan 19, 2023 File information Part one (full package) #File Name...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html   
Published: 2018 03 20 13:23:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published over 6 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Research: Trend Micro There are two packages one is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package) Download Email me if you need the password     Links updated: Jan 19, 2023 File information Part one (full package) #File Name...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html   
Published: 2018 03 20 13:23:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: HiddenWasp Linux malware backdoor samples - published over 5 years ago.
Content: Intezer HiddenWasp Malware Stings Targeted Linux Systems Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress) Links updated: Jan 19, 2023 File informatio 8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b 8f1c51c4963c0bad6cf04444feb411d7  shell f321685342fa373c33eb9479176a086a1c56c90a1826a...
https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html   
Published: 2019 06 04 04:31:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: HiddenWasp Linux malware backdoor samples - published over 5 years ago.
Content: Intezer HiddenWasp Malware Stings Targeted Linux Systems Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress) Links updated: Jan 19, 2023 File informatio 8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b 8f1c51c4963c0bad6cf04444feb411d7  shell f321685342fa373c33eb9479176a086a1c56c90a1826a...
https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html   
Published: 2019 06 04 04:31:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: Linux/AirDropBot samples - published about 5 years ago.
Content: Malware Must Die:  MMD-0064-2019 - Linux/AirDropBot Mirai variant targeting Linksys E-series - Remote Code Execution tmUnblock.cgi  Download. Email me if you need the password (see in my profile)  Malware Inventory (work in progress)Links updated: Jan 19, 2023 Hashes MD5 SHA256 SHA1 85a8aad8d938c44c3f3f51089a60ec16 1a75...
https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html   
Published: 2019 10 06 20:37:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux/AirDropBot samples - published about 5 years ago.
Content: Malware Must Die:  MMD-0064-2019 - Linux/AirDropBot Mirai variant targeting Linksys E-series - Remote Code Execution tmUnblock.cgi  Download. Email me if you need the password (see in my profile)  Malware Inventory (work in progress)Links updated: Jan 19, 2023 Hashes MD5 SHA256 SHA1 85a8aad8d938c44c3f3f51089a60ec16 1a75...
https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html   
Published: 2019 10 06 20:37:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published about 5 years ago.
Content: Amnesia / Radiation botnet samples  Remote Code Execution in CCTV DVR (kerneronsec.com - 2016) 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet 2016-08-11 CyberX Radiation IoT Cybersecurity campaign Download. Email me if you need the password (see in my profile)  Malware Inventory (work in progress) Links updated: Jan ...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html   
Published: 2019 10 06 21:16:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published about 5 years ago.
Content: Amnesia / Radiation botnet samples  Remote Code Execution in CCTV DVR (kerneronsec.com - 2016) 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet 2016-08-11 CyberX Radiation IoT Cybersecurity campaign Download. Email me if you need the password (see in my profile)  Malware Inventory (work in progress) Links updated: Jan ...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html   
Published: 2019 10 06 21:16:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published about 5 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram  “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own. It is written using Autoit scripts and then compiled into a Windows executable. It uses Telegram to exfiltrate stolen information.Downl...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html   
Published: 2019 10 07 03:48:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published about 5 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram  “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own. It is written using Autoit scripts and then compiled into a Windows executable. It uses Telegram to exfiltrate stolen information.Downl...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html   
Published: 2019 10 07 03:48:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: APT Calypso RAT, Flying Dutchman Samples - published almost 5 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.   Download. Email me if you need the passw...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html   
Published: 2019 12 02 04:46:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published almost 5 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.   Download. Email me if you need the passw...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html   
Published: 2019 12 02 04:46:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: KPOT info stealer samples - published over 4 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)Download 1  (from Didier Stevens' post)Download 2  (Proofpoint)Malware Inventory (work in progress)Links updated: Jan 19, 2023 References ...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html   
Published: 2020 04 19 15:27:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: KPOT info stealer samples - published over 4 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)Download 1  (from Didier Stevens' post)Download 2  (Proofpoint)Malware Inventory (work in progress)Links updated: Jan 19, 2023 References ...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html   
Published: 2020 04 19 15:27:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published almost 4 years ago.
Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorThe Resurgence of Russian Threat Actor, NOBELIUMDownload (627.7 MB). Email me if you need the password (see in my profile)           Malware Inventory (work in progress)ReferenceI am sure you all saw the news. Links update...
https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html   
Published: 2020 12 14 14:47:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published almost 4 years ago.
Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorThe Resurgence of Russian Threat Actor, NOBELIUMDownload (627.7 MB). Email me if you need the password (see in my profile)           Malware Inventory (work in progress)ReferenceI am sure you all saw the news. Links update...
https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html   
Published: 2020 12 14 14:47:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Malware Arsenal used by Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) in attacks targeting Ukraine (samples) - published over 1 year ago.
Content:  2023-02-18Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) is an Advanced Persistent Threat (APT) group believed to be based in Russia. Their primary targets have been diplomatic and government entities in Europe, particularly Ukraine, and the United States. They have also targeted ...
https://contagiodump.blogspot.com/2023/02/malware-arsenal-used-by-ember-bear-aka.html   
Published: 2023 02 18 07:59:00
Received: 2024 03 13 18:00:16
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Malware Arsenal used by Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) in attacks targeting Ukraine (samples) - published over 1 year ago.
Content:  2023-02-18Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) is an Advanced Persistent Threat (APT) group believed to be based in Russia. Their primary targets have been diplomatic and government entities in Europe, particularly Ukraine, and the United States. They have also targeted ...
https://contagiodump.blogspot.com/2023/02/malware-arsenal-used-by-ember-bear-aka.html   
Published: 2023 02 18 07:59:00
Received: 2024 03 13 18:00:16
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Application Security Testing Solution Market 2024 Growth Drivers and Future Outlook 2031 - published 8 months ago.
Content: Factors such as the rise of cyber attacks, regulatory requirements, and the adoption of DevSecOps practices drive market growth. Infinity Business ...
https://www.whatech.com/og/markets-research/industrial/790477-application-security-testing-solution-market-2024-growth-drivers-and-future-outlook-2031   
Published: 2024 03 13 15:49:58
Received: 2024 03 13 17:46:06
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Application Security Testing Solution Market 2024 Growth Drivers and Future Outlook 2031 - published 8 months ago.
Content: Factors such as the rise of cyber attacks, regulatory requirements, and the adoption of DevSecOps practices drive market growth. Infinity Business ...
https://www.whatech.com/og/markets-research/industrial/790477-application-security-testing-solution-market-2024-growth-drivers-and-future-outlook-2031   
Published: 2024 03 13 15:49:58
Received: 2024 03 13 17:46:06
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Google Splashes the Cash in Bug Bounty Bonanza: $59 Million to Date - Security Boulevard - published 8 months ago.
Content: ... DevSecOps Editorial Calendar Endpoint ... Application Security AppSec Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps DevSecOps ...
https://securityboulevard.com/2024/03/google-bug-bounty-vrp-richixbw/   
Published: 2024 03 13 16:57:22
Received: 2024 03 13 17:46:06
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Google Splashes the Cash in Bug Bounty Bonanza: $59 Million to Date - Security Boulevard - published 8 months ago.
Content: ... DevSecOps Editorial Calendar Endpoint ... Application Security AppSec Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps DevSecOps ...
https://securityboulevard.com/2024/03/google-bug-bounty-vrp-richixbw/   
Published: 2024 03 13 16:57:22
Received: 2024 03 13 17:46:06
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: AI innovation at Supercloud 6: Insights from industry leaders - SiliconANGLE - published 8 months ago.
Content: Exploring AI innovation and the ecosystem. With topics ranging from platform engineering to DevSecOps and machine learning, the discussion underscored ...
https://siliconangle.com/2024/03/13/unraveling-complexities-ai-innovation-closing-remarks-supercloud6/   
Published: 2024 03 13 17:03:08
Received: 2024 03 13 17:46:06
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: AI innovation at Supercloud 6: Insights from industry leaders - SiliconANGLE - published 8 months ago.
Content: Exploring AI innovation and the ecosystem. With topics ranging from platform engineering to DevSecOps and machine learning, the discussion underscored ...
https://siliconangle.com/2024/03/13/unraveling-complexities-ai-innovation-closing-remarks-supercloud6/   
Published: 2024 03 13 17:03:08
Received: 2024 03 13 17:46:06
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: SAS CTF 2024 Quals
Content:
https://ctftime.org/event/2299   
Published: :
Received: 2024 03 13 17:43:50
Feed: CTFtime.org: upcoming CTF events
Source: CTFtime.org
Category: Events
Topic: Cyber Security
Article: SAS CTF 2024 Quals
Content:
https://ctftime.org/event/2299   
Published: :
Received: 2024 03 13 17:43:50
Feed: CTFtime.org: upcoming CTF events
Source: CTFtime.org
Category: Events
Topic: Cyber Security

All Articles

Ordered by Date Received : Year: "2024" Month: "03" Day: "13"
Page: << < 2 (of 7) > >>

Total Articles in this collection: 376


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor