All Articles

Ordered by Date Received : Year: "2024"
Page: << < 775 (of 1,537) > >>

Total Articles in this collection: 76,850

Navigation Help at the bottom of the page
Article: Healthcare Cyber Security Market Analysis 2024 - Yahoo Finance - published 5 months ago.
Content: The global healthcare cyber security market size is expected to reach USD 56.3 billion by 2030 and is expected to expand at a CAGR of 18.5% over the ...
https://finance.yahoo.com/news/healthcare-cyber-security-market-analysis-133700332.html   
Published: 2024 05 16 13:42:54
Received: 2024 05 16 14:22:26
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Healthcare Cyber Security Market Analysis 2024 - Yahoo Finance - published 5 months ago.
Content: The global healthcare cyber security market size is expected to reach USD 56.3 billion by 2030 and is expected to expand at a CAGR of 18.5% over the ...
https://finance.yahoo.com/news/healthcare-cyber-security-market-analysis-133700332.html   
Published: 2024 05 16 13:42:54
Received: 2024 05 16 14:22:26
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: SIPPTS 4.0 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178594/sippts-4.0.tar.gz   
Published: 2024 05 16 13:56:37
Received: 2024 05 16 14:18:39
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Article: SIPPTS 4.0 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178594/sippts-4.0.tar.gz   
Published: 2024 05 16 13:56:37
Received: 2024 05 16 14:18:39
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Packet Fence 13.2.0 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178595/packetfence-13.2.0.tar.gz   
Published: 2024 05 16 14:03:55
Received: 2024 05 16 14:18:39
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Article: Packet Fence 13.2.0 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178595/packetfence-13.2.0.tar.gz   
Published: 2024 05 16 14:03:55
Received: 2024 05 16 14:18:39
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Wireshark Analyzer 4.2.5 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178596/wireshark-4.2.5.tar.xz   
Published: 2024 05 16 14:07:07
Received: 2024 05 16 14:18:39
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Article: Wireshark Analyzer 4.2.5 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178596/wireshark-4.2.5.tar.xz   
Published: 2024 05 16 14:07:07
Received: 2024 05 16 14:18:39
Feed: Security Tool Files ≈ Packet Storm
Source: Security Tool Files ≈ Packet Storm
Category: News
Topic: Security Tooling
Article: Red Hat Security Advisory 2024-2773-03 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178585/RHSA-2024-2773-03.txt   
Published: 2024 05 16 13:29:50
Received: 2024 05 16 14:18:37
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2024-2773-03 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178585/RHSA-2024-2773-03.txt   
Published: 2024 05 16 13:29:50
Received: 2024 05 16 14:18:37
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Red Hat Security Advisory 2024-2776-03 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178586/RHSA-2024-2776-03.txt   
Published: 2024 05 16 13:30:00
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2024-2776-03 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178586/RHSA-2024-2776-03.txt   
Published: 2024 05 16 13:30:00
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Red Hat Security Advisory 2024-2853-03 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178587/RHSA-2024-2853-03.txt   
Published: 2024 05 16 13:30:31
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2024-2853-03 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178587/RHSA-2024-2853-03.txt   
Published: 2024 05 16 13:30:31
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2024-2852-03 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178588/RHSA-2024-2852-03.txt   
Published: 2024 05 16 13:32:52
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Red Hat Security Advisory 2024-2852-03 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178588/RHSA-2024-2852-03.txt   
Published: 2024 05 16 13:32:52
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Ubuntu Security Notice USN-6766-2 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178589/USN-6766-2.txt   
Published: 2024 05 16 13:33:26
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Ubuntu Security Notice USN-6766-2 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178589/USN-6766-2.txt   
Published: 2024 05 16 13:33:26
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Debian Security Advisory 5690-1 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178590/dsa-5690-1.txt   
Published: 2024 05 16 13:44:49
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Debian Security Advisory 5690-1 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178590/dsa-5690-1.txt   
Published: 2024 05 16 13:44:49
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Debian Security Advisory 5689-1 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178591/dsa-5689-1.txt   
Published: 2024 05 16 13:44:57
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Debian Security Advisory 5689-1 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178591/dsa-5689-1.txt   
Published: 2024 05 16 13:44:57
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Debian Security Advisory 5691-1 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178592/dsa-5691-1.txt   
Published: 2024 05 16 13:45:03
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Debian Security Advisory 5691-1 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178592/dsa-5691-1.txt   
Published: 2024 05 16 13:45:03
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Debian Security Advisory 5692-1 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178593/dsa-5692-1.txt   
Published: 2024 05 16 13:45:11
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Debian Security Advisory 5692-1 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178593/dsa-5692-1.txt   
Published: 2024 05 16 13:45:11
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: SIPPTS 4.0 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178594/sippts-4.0.tar.gz   
Published: 2024 05 16 13:56:37
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: SIPPTS 4.0 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178594/sippts-4.0.tar.gz   
Published: 2024 05 16 13:56:37
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Packet Fence 13.2.0 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178595/packetfence-13.2.0.tar.gz   
Published: 2024 05 16 14:03:55
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Packet Fence 13.2.0 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178595/packetfence-13.2.0.tar.gz   
Published: 2024 05 16 14:03:55
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Wireshark Analyzer 4.2.5 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178596/wireshark-4.2.5.tar.xz   
Published: 2024 05 16 14:07:07
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Wireshark Analyzer 4.2.5 - published 5 months ago.
Content:
https://packetstormsecurity.com/files/178596/wireshark-4.2.5.tar.xz   
Published: 2024 05 16 14:07:07
Received: 2024 05 16 14:18:36
Feed: Files ≈ Packet Storm
Source: Files ≈ Packet Storm
Category: News
Topic: Hacking
Article: Immutable Backups: Enhancing Data Resilience Through 5 Key Strategies - published 5 months ago.
Content:
https://latesthackingnews.com/2024/05/16/immutable-backups-enhancing-data-resilience-through-5-key-strategies/   
Published: 2024 05 16 12:38:33
Received: 2024 05 16 14:17:19
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Article: Immutable Backups: Enhancing Data Resilience Through 5 Key Strategies - published 5 months ago.
Content:
https://latesthackingnews.com/2024/05/16/immutable-backups-enhancing-data-resilience-through-5-key-strategies/   
Published: 2024 05 16 12:38:33
Received: 2024 05 16 14:17:19
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign - published 5 months ago.
Content:
https://thehackernews.com/2024/05/north-korean-hackers-exploit-facebook.html   
Published: 2024 05 16 13:48:00
Received: 2024 05 16 14:16:46
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign - published 5 months ago.
Content:
https://thehackernews.com/2024/05/north-korean-hackers-exploit-facebook.html   
Published: 2024 05 16 13:48:00
Received: 2024 05 16 14:16:46
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cisco’s Splunk Acquisition Should Help Security Pros See Threats Sooner in Australia and New Zealand - published 5 months ago.
Content:
https://www.techrepublic.com/article/cisco-splunk-acquisition-australia/   
Published: 2024 05 16 13:23:15
Received: 2024 05 16 13:58:37
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Cisco’s Splunk Acquisition Should Help Security Pros See Threats Sooner in Australia and New Zealand - published 5 months ago.
Content:
https://www.techrepublic.com/article/cisco-splunk-acquisition-australia/   
Published: 2024 05 16 13:23:15
Received: 2024 05 16 13:58:37
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Kimsuky hackers deploy new Linux backdoor via trojanized installers - published 5 months ago.
Content:
https://www.bleepingcomputer.com/news/security/kimsuky-hackers-deploy-new-linux-backdoor-via-trojanized-installers/   
Published: 2024 05 16 13:28:37
Received: 2024 05 16 13:43:56
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Kimsuky hackers deploy new Linux backdoor via trojanized installers - published 5 months ago.
Content:
https://www.bleepingcomputer.com/news/security/kimsuky-hackers-deploy-new-linux-backdoor-via-trojanized-installers/   
Published: 2024 05 16 13:28:37
Received: 2024 05 16 13:43:56
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Crook brags about US Army and $75B defense biz pwnage - published 5 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/05/15/us_army_contractor_data_loss/   
Published: 2024 05 15 22:30:13
Received: 2024 05 16 13:42:46
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Crook brags about US Army and $75B defense biz pwnage - published 5 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/05/15/us_army_contractor_data_loss/   
Published: 2024 05 15 22:30:13
Received: 2024 05 16 13:42:46
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: UK government launches AI cybersecurity codes of practice - Tech Monitor - published 5 months ago.
Content: The guidelines aim to bolster AI cybersecurity and establish a global standard for protecting models against threat actors.
https://techmonitor.ai/technology/cybersecurity/uk-ai-cybersecurity-codes   
Published: 2024 05 16 03:30:11
Received: 2024 05 16 13:42:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: UK government launches AI cybersecurity codes of practice - Tech Monitor - published 5 months ago.
Content: The guidelines aim to bolster AI cybersecurity and establish a global standard for protecting models against threat actors.
https://techmonitor.ai/technology/cybersecurity/uk-ai-cybersecurity-codes   
Published: 2024 05 16 03:30:11
Received: 2024 05 16 13:42:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity strategies prompt wider fleet move to specialist software, reports FleetCheck - published 5 months ago.
Content: Cybersecurity strategies are leading more businesses move to specialist fleet software to protect sensitive data, FleetCheck has reported.
https://fleetworld.co.uk/cybersecurity-strategies-prompt-wider-fleet-move-to-specialist-software-reports-fleetcheck/   
Published: 2024 05 16 08:38:49
Received: 2024 05 16 13:42:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity strategies prompt wider fleet move to specialist software, reports FleetCheck - published 5 months ago.
Content: Cybersecurity strategies are leading more businesses move to specialist fleet software to protect sensitive data, FleetCheck has reported.
https://fleetworld.co.uk/cybersecurity-strategies-prompt-wider-fleet-move-to-specialist-software-reports-fleetcheck/   
Published: 2024 05 16 08:38:49
Received: 2024 05 16 13:42:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Is Cybersecurity the key to customer loyalty for banks? - IBS Intelligence - published 5 months ago.
Content: The cost of cybersecurity failures. Data breaches lead to financial losses and reputational damage. · Changing consumer expectations. As open banking ...
https://ibsintelligence.com/blogs/is-cybersecurity-the-key-to-customer-loyalty-for-banks/   
Published: 2024 05 16 11:45:30
Received: 2024 05 16 13:42:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Is Cybersecurity the key to customer loyalty for banks? - IBS Intelligence - published 5 months ago.
Content: The cost of cybersecurity failures. Data breaches lead to financial losses and reputational damage. · Changing consumer expectations. As open banking ...
https://ibsintelligence.com/blogs/is-cybersecurity-the-key-to-customer-loyalty-for-banks/   
Published: 2024 05 16 11:45:30
Received: 2024 05 16 13:42:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Cybersecurity Insurer Provides MDR for MSPs - ChannelE2E - published 5 months ago.
Content: For instance, cybersecurity insurance giant Coalition offers a platform called Coalition Control. It's essentially a vulnerability scanning and ...
https://www.channele2e.com/news/cybersecurity-insurer-provides-mdr-for-msps   
Published: 2024 05 16 12:35:02
Received: 2024 05 16 13:42:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity Insurer Provides MDR for MSPs - ChannelE2E - published 5 months ago.
Content: For instance, cybersecurity insurance giant Coalition offers a platform called Coalition Control. It's essentially a vulnerability scanning and ...
https://www.channele2e.com/news/cybersecurity-insurer-provides-mdr-for-msps   
Published: 2024 05 16 12:35:02
Received: 2024 05 16 13:42:37
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Crook brags about US Army and $75B defense biz pwnage - published 5 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/05/15/us_army_contractor_data_loss/   
Published: 2024 05 15 22:30:13
Received: 2024 05 16 13:38:08
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Crook brags about US Army and $75B defense biz pwnage - published 5 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/05/15/us_army_contractor_data_loss/   
Published: 2024 05 15 22:30:13
Received: 2024 05 16 13:38:08
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Apple Discontinues 'iOS Developer University Program' for Students - published 5 months ago.
Content:
https://www.macrumors.com/2024/05/16/apple-ends-ios-developer-university-program/   
Published: 2024 05 16 13:00:53
Received: 2024 05 16 13:21:02
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Discontinues 'iOS Developer University Program' for Students - published 5 months ago.
Content:
https://www.macrumors.com/2024/05/16/apple-ends-ios-developer-university-program/   
Published: 2024 05 16 13:00:53
Received: 2024 05 16 13:21:02
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Invoke-SessionHunter - Retrieve And Display Information About Active User Sessions On Remote Computers (No Admin Privileges Required) - published 5 months ago.
Content:
http://www.kitploit.com/2024/05/invoke-sessionhunter-retrieve-and.html   
Published: 2024 05 16 12:30:00
Received: 2024 05 16 13:19:55
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Invoke-SessionHunter - Retrieve And Display Information About Active User Sessions On Remote Computers (No Admin Privileges Required) - published 5 months ago.
Content:
http://www.kitploit.com/2024/05/invoke-sessionhunter-retrieve-and.html   
Published: 2024 05 16 12:30:00
Received: 2024 05 16 13:19:55
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: M4 iPad Pro Bend Tests: Durability Equal to M2 Model Despite Thinness - published 5 months ago.
Content:
https://www.macrumors.com/2024/05/16/m4-ipad-pro-bend-tests-durability/   
Published: 2024 05 16 12:50:14
Received: 2024 05 16 13:01:06
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: M4 iPad Pro Bend Tests: Durability Equal to M2 Model Despite Thinness - published 5 months ago.
Content:
https://www.macrumors.com/2024/05/16/m4-ipad-pro-bend-tests-durability/   
Published: 2024 05 16 12:50:14
Received: 2024 05 16 13:01:06
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CBA enhances cybersecurity accountability in financial sector - AzerNews - published 5 months ago.
Content: "In this framework, the Central Bank of Azerbaijan plans to do a lot of things in accordance with the cyber security strategy in the financial sector.
https://www.azernews.az/business/226113.html   
Published: 2024 05 16 07:31:55
Received: 2024 05 16 12:43:48
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: CBA enhances cybersecurity accountability in financial sector - AzerNews - published 5 months ago.
Content: "In this framework, the Central Bank of Azerbaijan plans to do a lot of things in accordance with the cyber security strategy in the financial sector.
https://www.azernews.az/business/226113.html   
Published: 2024 05 16 07:31:55
Received: 2024 05 16 12:43:48
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Thoma Bravo's LogRhythm merges with Exabeam in more cybersecurity consolidation - published 5 months ago.
Content: ... cybersecurity company backed by the likes of Cisco and Lightspeed Venture Partners. SIEM is the business of using real-time data gleaned from ...
https://techcrunch.com/2024/05/16/thoma-bravos-logrhythm-merges-with-exabeam-in-more-cybersecurity-consolidation/   
Published: 2024 05 16 11:31:28
Received: 2024 05 16 12:43:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Thoma Bravo's LogRhythm merges with Exabeam in more cybersecurity consolidation - published 5 months ago.
Content: ... cybersecurity company backed by the likes of Cisco and Lightspeed Venture Partners. SIEM is the business of using real-time data gleaned from ...
https://techcrunch.com/2024/05/16/thoma-bravos-logrhythm-merges-with-exabeam-in-more-cybersecurity-consolidation/   
Published: 2024 05 16 11:31:28
Received: 2024 05 16 12:43:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002) - published 5 months ago.
Content:
https://www.helpnetsecurity.com/2024/05/16/git-cve-2024-32002/   
Published: 2024 05 16 11:14:57
Received: 2024 05 16 12:39:19
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002) - published 5 months ago.
Content:
https://www.helpnetsecurity.com/2024/05/16/git-cve-2024-32002/   
Published: 2024 05 16 11:14:57
Received: 2024 05 16 12:39:19
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Why yq&#x3f; Adventures in XML, (Thu, May 16th) - published 5 months ago.
Content: I was recently asked to &lt;ahem&gt; "recover" a RADIUS key from a Microsoft NPS server.  No problem I think, just export the config and it's all there in clear text right?
https://isc.sans.edu/diary/rss/30930   
Published: 2024 05 16 12:04:52
Received: 2024 05 16 12:16:44
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: Why yq&#x3f; Adventures in XML, (Thu, May 16th) - published 5 months ago.
Content: I was recently asked to &lt;ahem&gt; "recover" a RADIUS key from a Microsoft NPS server.  No problem I think, just export the config and it's all there in clear text right?
https://isc.sans.edu/diary/rss/30930   
Published: 2024 05 16 12:04:52
Received: 2024 05 16 12:16:44
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Post Millennial hack leaked data impacting 26 million people - published 5 months ago.
Content:
https://databreaches.net/post-millennial-hack-leaked-data-impacting-26-million-people/   
Published: 2024 05 11 21:57:32
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Post Millennial hack leaked data impacting 26 million people - published 5 months ago.
Content:
https://databreaches.net/post-millennial-hack-leaked-data-impacting-26-million-people/   
Published: 2024 05 11 21:57:32
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Ohio lottery data breach impacted over 538,000 individuals - published 5 months ago.
Content:
https://databreaches.net/ohio-lottery-data-breach-impacted-over-538000-individuals/   
Published: 2024 05 11 21:58:16
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Ohio lottery data breach impacted over 538,000 individuals - published 5 months ago.
Content:
https://databreaches.net/ohio-lottery-data-breach-impacted-over-538000-individuals/   
Published: 2024 05 11 21:58:16
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cyberattack on Ascension Diverts Ambulances, Takes EHRs Offline - published 5 months ago.
Content:
https://databreaches.net/cyberattack-on-ascension-diverts-ambulances-takes-ehrs-offline/   
Published: 2024 05 11 21:58:37
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Cyberattack on Ascension Diverts Ambulances, Takes EHRs Offline - published 5 months ago.
Content:
https://databreaches.net/cyberattack-on-ascension-diverts-ambulances-takes-ehrs-offline/   
Published: 2024 05 11 21:58:37
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CISA Advisory: #StopRansomware: Black Basta - published 5 months ago.
Content:
https://databreaches.net/cisa-advisory-stopransomware-black-basta/   
Published: 2024 05 12 12:02:21
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: CISA Advisory: #StopRansomware: Black Basta - published 5 months ago.
Content:
https://databreaches.net/cisa-advisory-stopransomware-black-basta/   
Published: 2024 05 12 12:02:21
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: ‘Got that boomer!’: How cybercriminals steal one-time passcodes for SIM swap attacks and raiding bank accounts - published 5 months ago.
Content:
https://databreaches.net/got-that-boomer-how-cybercriminals-steal-one-time-passcodes-for-sim-swap-attacks-and-raiding-bank-accounts/   
Published: 2024 05 14 11:15:53
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: ‘Got that boomer!’: How cybercriminals steal one-time passcodes for SIM swap attacks and raiding bank accounts - published 5 months ago.
Content:
https://databreaches.net/got-that-boomer-how-cybercriminals-steal-one-time-passcodes-for-sim-swap-attacks-and-raiding-bank-accounts/   
Published: 2024 05 14 11:15:53
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Telemarketing: the Privacy Guarantor sanctions Enel Energia. The company had not protected its databases from access by abusive brokers - published 5 months ago.
Content:
https://databreaches.net/telemarketing-the-privacy-guarantor-sanctions-enel-energia-the-company-had-not-protected-its-databases-from-access-by-abusive-brokers/   
Published: 2024 05 14 11:16:07
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Telemarketing: the Privacy Guarantor sanctions Enel Energia. The company had not protected its databases from access by abusive brokers - published 5 months ago.
Content:
https://databreaches.net/telemarketing-the-privacy-guarantor-sanctions-enel-energia-the-company-had-not-protected-its-databases-from-access-by-abusive-brokers/   
Published: 2024 05 14 11:16:07
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Singapore Cybersecurity Update Puts Cloud Providers on Notice - published 5 months ago.
Content:
https://databreaches.net/singapore-cybersecurity-update-puts-cloud-providers-on-notice/   
Published: 2024 05 15 11:05:54
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Singapore Cybersecurity Update Puts Cloud Providers on Notice - published 5 months ago.
Content:
https://databreaches.net/singapore-cybersecurity-update-puts-cloud-providers-on-notice/   
Published: 2024 05 15 11:05:54
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Farley v Equiniti: an uphill battle for data breach claims - published 5 months ago.
Content:
https://databreaches.net/farley-v-equiniti-an-uphill-battle-for-data-breach-claims/   
Published: 2024 05 15 11:06:17
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Farley v Equiniti: an uphill battle for data breach claims - published 5 months ago.
Content:
https://databreaches.net/farley-v-equiniti-an-uphill-battle-for-data-breach-claims/   
Published: 2024 05 15 11:06:17
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: BreachForums seized by FBI and law enforcement partners; administrator arrested (3) - published 5 months ago.
Content:
https://databreaches.net/breachforums-seized-by-fbi-and-law-enforcement-partners/   
Published: 2024 05 15 19:02:22
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: BreachForums seized by FBI and law enforcement partners; administrator arrested (3) - published 5 months ago.
Content:
https://databreaches.net/breachforums-seized-by-fbi-and-law-enforcement-partners/   
Published: 2024 05 15 19:02:22
Received: 2024 05 16 12:07:24
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Au: Electronic prescription provider MediSecure victim of ‘large-scale’ data breach, ‘personal and health information’ at risk - published 5 months ago.
Content:
https://databreaches.net/au-electronic-prescription-provider-medisecure-victim-of-large-scale-data-breach-personal-and-health-information-at-risk/   
Published: 2024 05 16 11:03:43
Received: 2024 05 16 12:07:23
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Au: Electronic prescription provider MediSecure victim of ‘large-scale’ data breach, ‘personal and health information’ at risk - published 5 months ago.
Content:
https://databreaches.net/au-electronic-prescription-provider-medisecure-victim-of-large-scale-data-breach-personal-and-health-information-at-risk/   
Published: 2024 05 16 11:03:43
Received: 2024 05 16 12:07:23
Feed: DataBreaches.net
Source: DataBreaches.net
Category: Data Breaches
Topic: Data Breaches
Article: Cat-Phishing, Living-Off-The-Land, Fake Invoices Top Q1 Cyberthreats: Report - published 5 months ago.
Content: Cat-phishing, using a popular Microsoft file transfer tool to become a network parasite, and bogus invoicing are among the notable techniques cybercriminals deployed during the first three months of 2024, according to the quarterly HP Wolf Security Threat Insights Report. The post Cat-Phishing, Living-Off-The-Land, Fake Invoices Top Q1 Cyberthreats: Report a...
https://www.technewsworld.com/story/cat-phishing-living-off-the-land-fake-invoices-top-q1-cyberthreats-report-179198.html?rss=1   
Published: 2024 05 16 12:00:09
Received: 2024 05 16 12:07:12
Feed: TechNewsWorld
Source: TechNewsWorld
Category: News
Topic: Cyber Security
Article: Cat-Phishing, Living-Off-The-Land, Fake Invoices Top Q1 Cyberthreats: Report - published 5 months ago.
Content: Cat-phishing, using a popular Microsoft file transfer tool to become a network parasite, and bogus invoicing are among the notable techniques cybercriminals deployed during the first three months of 2024, according to the quarterly HP Wolf Security Threat Insights Report. The post Cat-Phishing, Living-Off-The-Land, Fake Invoices Top Q1 Cyberthreats: Report a...
https://www.technewsworld.com/story/cat-phishing-living-off-the-land-fake-invoices-top-q1-cyberthreats-report-179198.html?rss=1   
Published: 2024 05 16 12:00:09
Received: 2024 05 16 12:07:12
Feed: TechNewsWorld
Source: TechNewsWorld
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: iPhone 16 Pro Max Looks This Much Bigger Beside iPhone 15 Pro Max - published 5 months ago.
Content:
https://www.macrumors.com/2024/05/16/iphone-16-pro-max-larger-size-comparison/   
Published: 2024 05 16 11:51:51
Received: 2024 05 16 12:07:06
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPhone 16 Pro Max Looks This Much Bigger Beside iPhone 15 Pro Max - published 5 months ago.
Content:
https://www.macrumors.com/2024/05/16/iphone-16-pro-max-larger-size-comparison/   
Published: 2024 05 16 11:51:51
Received: 2024 05 16 12:07:06
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Understanding the alert budget: A security team’s second ledger - published 5 months ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/100664-understanding-the-alert-budget-a-security-teams-second-ledger   
Published: 2024 05 16 12:00:00
Received: 2024 05 16 12:05:27
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Understanding the alert budget: A security team’s second ledger - published 5 months ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/100664-understanding-the-alert-budget-a-security-teams-second-ledger   
Published: 2024 05 16 12:00:00
Received: 2024 05 16 12:05:27
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Draft of 2025 defense bill includes mobile device cybersecurity evaluation - SC Magazine - published 5 months ago.
Content: The Department of Defense will evaluate the cybersecurity of mobile devices used by analysts and servicemembers as mandated in the draft text of ...
https://www.scmagazine.com/brief/draft-of-2025-defense-bill-includes-mobile-device-cybersecurity-evaluation   
Published: 2024 05 16 02:50:41
Received: 2024 05 16 11:22:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Draft of 2025 defense bill includes mobile device cybersecurity evaluation - SC Magazine - published 5 months ago.
Content: The Department of Defense will evaluate the cybersecurity of mobile devices used by analysts and servicemembers as mandated in the draft text of ...
https://www.scmagazine.com/brief/draft-of-2025-defense-bill-includes-mobile-device-cybersecurity-evaluation   
Published: 2024 05 16 02:50:41
Received: 2024 05 16 11:22:21
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Nigeria Halts Cybersecurity Tax After Public Outrage - Dark Reading - published 5 months ago.
Content: The Nigerian government halted its effort to fund national cybersecurity improvements through a 0.5% levy on domestic electronic transactions ...
https://www.darkreading.com/cyber-risk/nigeria-halts-cybersecurity-tax-after-public-outrage   
Published: 2024 05 16 08:30:37
Received: 2024 05 16 11:22:20
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Nigeria Halts Cybersecurity Tax After Public Outrage - Dark Reading - published 5 months ago.
Content: The Nigerian government halted its effort to fund national cybersecurity improvements through a 0.5% levy on domestic electronic transactions ...
https://www.darkreading.com/cyber-risk/nigeria-halts-cybersecurity-tax-after-public-outrage   
Published: 2024 05 16 08:30:37
Received: 2024 05 16 11:22:20
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: "RiskFlow Orchestration" Wins at the 2024 Cybersecurity Excellence Awards - EU Reporter - published 5 months ago.
Content: Significat's “RiskFlow Orchestration" solution has been declared the Winner in the Fraud Prevention category at the 2024 Cybersecurity Excellence ...
https://www.eureporter.co/business/data-protection/2024/05/16/riskflow-orchestration-wins-at-the-2024-cybersecurity-excellence-awards/   
Published: 2024 05 16 09:18:25
Received: 2024 05 16 11:22:20
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: "RiskFlow Orchestration" Wins at the 2024 Cybersecurity Excellence Awards - EU Reporter - published 5 months ago.
Content: Significat's “RiskFlow Orchestration" solution has been declared the Winner in the Fraud Prevention category at the 2024 Cybersecurity Excellence ...
https://www.eureporter.co/business/data-protection/2024/05/16/riskflow-orchestration-wins-at-the-2024-cybersecurity-excellence-awards/   
Published: 2024 05 16 09:18:25
Received: 2024 05 16 11:22:20
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: The Cybersecurity Implications Of Gen Z's Tech-Savvy Lifestyle - Forbes - published 5 months ago.
Content: This reliance on digital channels increases the risk of exposure to phishing attacks and privacy breaches. Cybersecurity education focused on these ...
https://www.forbes.com/sites/davidbalaban/2024/05/16/the-cybersecurity-implications-of-gen-zs-tech-savvy-lifestyle/   
Published: 2024 05 16 10:53:42
Received: 2024 05 16 11:22:20
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: The Cybersecurity Implications Of Gen Z's Tech-Savvy Lifestyle - Forbes - published 5 months ago.
Content: This reliance on digital channels increases the risk of exposure to phishing attacks and privacy breaches. Cybersecurity education focused on these ...
https://www.forbes.com/sites/davidbalaban/2024/05/16/the-cybersecurity-implications-of-gen-zs-tech-savvy-lifestyle/   
Published: 2024 05 16 10:53:42
Received: 2024 05 16 11:22:20
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report

All Articles

Ordered by Date Received : Year: "2024"
Page: << < 775 (of 1,537) > >>

Total Articles in this collection: 76,850


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor