Created
May 4, 2017 18:49
-
-
Save fornarat/325cc9797aefa1c1a3e377bd9d805832 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
------------- | |
https://thehackernews.com/ -->https://isc.sans.edu/ | |
58bb5cc7766fa31b75ddd471 ---->58d1715b766fa31b75340b05 | |
2017-03-05T00:33:11.966000Z ---->2017-03-21T18:30:51.040000Z | |
http://thehackernews.com/2015/10/iphone-lockscreen-hack.html ---->https://isc.sans.edu/newssummary.html#1022879 | |
------------- | |
https://trustwave.com/Resources/SpiderLabs-Blog/ -->http://bleepingcomputer.com/ | |
58c836d9766fa31b7510334b ---->58c88b42766fa31b75117a02 | |
2017-03-14T18:30:49.229000Z ---->2017-03-15T00:30:58.121000Z | |
https://trustwave.com/Resources/SpiderLabs-Blog/Microsoft-Patch-Tuesday,-March-2017/?page=1&year=0&month=0 ---->https://www.bleepingcomputer.com/news/microsoft/microsofts-march-2017-patch-tuesday-contains-17-security-updates/ | |
------------- | |
http://csoonline.com/ -->http://arstechnica.com/security/ | |
58d468be766fa31b753f97b5 ---->58d468c3766fa31b753f97c4 | |
2017-03-24T00:30:54.219000Z ---->2017-03-24T00:30:59.226000Z | |
http://csoonline.com/article/3184438/security/wikileaks-documents-show-cias-mac-and-iphone-compromises.html ---->https://arstechnica.com/security/2017/03/new-wikileaks-dump-the-cia-built-thunderbolt-exploit-implants-to-target-macs/ | |
------------- | |
http://www.threatgeek.com/ -->https://grahamcluley.com/ | |
58b864d4766fa31b75d224ce ---->58bb5c3b766fa31b75ddd437 | |
2017-03-02T18:30:44.089000Z ---->2017-03-05T00:30:50.967000Z | |
http://www.threatgeek.com/2017/03/modern-messaging-opsec-popular-app-gives-scammers-a-boost.html ---->https://www.grahamcluley.com/telegram-scammers-stored-contacts/ | |
------------- | |
https://thehackernews.com/ -->https://nakedsecurity.sophos.com/ | |
58ca857e766fa31b751923af ---->58d01fe6766fa31b752eea01 | |
2017-03-16T12:30:54.111000Z ---->2017-03-20T18:31:02.840000Z | |
http://thehackernews.com/2017/03/fappening-emma-watson.html ---->https://nakedsecurity.sophos.com/2017/03/20/emma-watson-among-stars-targeted-by-hackers-in-celebgate-2-0/ | |
------------- | |
https://www.illumio.com/blog -->http://www.mimecast.com/blog/ | |
58c88b3b766fa31b751179f3 ---->58cd290a766fa31b75236211 | |
2017-03-15T00:30:51.407000Z ---->2017-03-18T12:33:14.244000Z | |
https://www.illumio.com/blog/security-is-no-match-for-human-error ---->http://www.mimecast.com/blog/2015/03/the-human-firewall-why-the-humans-might-be-the-answer/ | |
------------- | |
http://securityaffairs.co/wordpress/ -->https://securityledger.com/ | |
58b961fc766fa31b75d5f3fd ---->58b9b657766fa31b75d759ca | |
2017-03-03T12:30:52.698000Z ---->2017-03-03T18:30:55.607000Z | |
http://securityaffairs.co/wordpress/56833/iot/dbltek-iot-device-flaw.html ---->https://securityledger.com/2017/03/dbl-trouble-fix-falls-short-for-backdoor-in-china-made-devices/ | |
------------- | |
http://csoonline.com/ -->http://securityaffairs.co/wordpress/ | |
58c04ddf766fa31b75f19c6e ---->58c0a23d766fa31b75f2e285 | |
2017-03-08T18:30:55.150000Z ---->2017-03-09T00:30:53.457000Z | |
http://csoonline.com/article/3177994/security/cia-false-flag-team-repurposed-shamoon-data-wiper-other-malware.html ---->http://securityaffairs.co/wordpress/56983/intelligence/wikileaks-vault7-cia-umbrage-team.html | |
------------- | |
https://securityintelligence.com/ -->https://schneier.com/ | |
58d17164766fa31b75340b25 ---->58dba8f9766fa31b755be1fd | |
2017-03-21T18:31:00.526000Z ---->2017-03-29T12:30:49.598000Z | |
https://securityintelligence.com/security-orchestration-for-an-uncertain-world/ ---->https://www.schneier.com/blog/archives/2017/03/security_orches.html | |
------------- | |
https://securityintelligence.com/ -->https://www.pwnieexpress.com/blog | |
58ca857f766fa31b751923b3 ---->58d95a61766fa31b7552dfda | |
2017-03-16T12:30:55.251000Z ---->2017-03-27T18:30:56.980000Z | |
https://securityintelligence.com/health-care-providers-need-to-comply-with-hipaa-regulations-and-address-these-five-critical-security-issues/ ---->https://www.pwnieexpress.com/blog/wireless-healthcare-and-compliance | |
------------- | |
http://securityaffairs.co/wordpress/ -->http://bleepingcomputer.com/ | |
58ca857f766fa31b751923b2 ---->58cad9e0766fa31b751a6b07 | |
2017-03-16T12:30:55.189000Z ---->2017-03-16T18:30:56.586000Z | |
http://securityaffairs.co/wordpress/57176/malware/majikpos-malware.html ---->https://www.bleepingcomputer.com/news/security/north-americans-targeted-by-new-majikpos-dual-threat-malware/ | |
------------- | |
https://securityledger.com/ -->http://darkreading.com/ | |
58c88b3e766fa31b751179f9 ---->58cb2e3d766fa31b751bb287 | |
2017-03-15T00:31:00.316000Z ---->2017-03-17T00:30:53.040000Z | |
https://securityledger.com/2017/03/hacking-crews-all-apt-now/ ---->http://darkreading.com/mandiant-financial-cybercriminals-looking-more-like-nation-states/d/d-id/1328426 | |
------------- | |
https://nakedsecurity.sophos.com/ -->https://blog.avira.com/ | |
58c04de3766fa31b75f19c79 ---->58d95a6d766fa31b7552dffd | |
2017-03-08T18:30:59.095000Z ---->2017-03-27T18:31:09.075000Z | |
https://nakedsecurity.sophos.com/2017/03/08/amazon-fight-to-keep-echo-recording-out-of-murder-trial-now-moot/ ---->https://blog.avira.com/murder-alexa-beeped/ | |
------------- | |
https://helpnetsecurity.com/ -->https://isc.sans.edu/ | |
58c69102766fa31b7509d330 ---->58c7e27c766fa31b750eecbc | |
2017-03-13T12:31:10.344000Z ---->2017-03-14T12:30:52.813000Z | |
https://www.helpnetsecurity.com/2017/03/13/android-devices-pre-installed-malware/ ---->https://isc.sans.edu/newssummary.html#1021981 | |
------------- | |
http://bleepingcomputer.com/ -->https://thehackernews.com/ | |
58c9dcb7766fa31b75169586 ---->58d3c035766fa31b753d05ee | |
2017-03-16T00:30:47.108000Z ---->2017-03-23T12:31:49.349000Z | |
https://www.bleepingcomputer.com/news/security/russian-hacker-kolypto-who-worked-on-citadel-trojan-extradited-to-the-us/ ---->http://thehackernews.com/2017/03/citadel-trojan-hacker.html | |
------------- | |
https://security.googleblog.com/ -->https://thehackernews.com/ | |
58c739bc766fa31b750c6001 ---->58c7e27f766fa31b750eecbe | |
2017-03-14T00:30:52.779000Z ---->2017-03-14T12:30:55.061000Z | |
https://security.googleblog.com/2017/03/detecting-and-eliminating-chamois-fraud.html ---->http://thehackernews.com/2017/03/android-adware-malware-google.html | |
------------- | |
http://bleepingcomputer.com/ -->https://thehackernews.com/ | |
58ce79ff766fa31b7528821f ---->58d01fdd766fa31b752ee9de | |
2017-03-19T12:30:55.432000Z ---->2017-03-20T18:30:53.630000Z | |
https://www.bleepingcomputer.com/news/security/new-but-old-technique-hijacks-user-sessions-on-all-windows-versions/ ---->http://thehackernews.com/2017/03/hack-windows-user-account.html | |
------------- | |
http://bleepingcomputer.com/ -->https://grahamcluley.com/ | |
58cc7fc0766fa31b7520d1f4 ---->58d11cf9766fa31b7532c2bb | |
2017-03-18T00:30:56.897000Z ---->2017-03-21T12:30:49.688000Z | |
https://www.bleepingcomputer.com/news/security/ask-com-toolbar-network-compromised-twice-in-two-months/ ---->https://www.grahamcluley.com/malicious-hackers-discovered-way-deliver-malware-unloved-ask-toolbar/ | |
------------- | |
http://csoonline.com/ -->http://securityaffairs.co/wordpress/ | |
58b8b93f766fa31b75d369e1 ---->58bcadb4766fa31b75e30e6c | |
2017-03-03T00:30:54.934000Z ---->2017-03-06T00:30:44.390000Z | |
http://csoonline.com/article/3176599/security/slack-bug-paved-the-way-for-a-hack-that-can-steal-user-access.html ---->http://securityaffairs.co/wordpress/56901/hacking/slack-flaw.html | |
------------- | |
https://security.googleblog.com/ -->https://isc.sans.edu/ | |
58b71355766fa31b75cd114d ---->58b9b667766fa31b75d759e9 | |
2017-03-01T18:30:45.563000Z ---->2017-03-03T18:31:03.314000Z | |
https://security.googleblog.com/2017/03/expanding-protection-for-chrome-users.html ---->https://isc.sans.edu/newssummary.html#1020053 | |
------------- | |
https://securityledger.com/ -->http://krebsonsecurity.com/ | |
58b71351766fa31b75cd1139 ---->58cc7fbb766fa31b7520d1ed | |
2017-03-01T18:30:54.081000Z ---->2017-03-18T00:30:51.064000Z | |
https://securityledger.com/2017/03/podcast-fraud-linked-to-stolen-w-2s-a-growing-problem-for-uncle-sam/ ---->https://krebsonsecurity.com/2017/03/govt-cybersecurity-contractor-hit-in-w-2-phishing-scam/ | |
------------- | |
https://helpnetsecurity.com/ -->https://securityledger.com/ | |
58c836d7766fa31b75103343 ---->58d2c2d6766fa31b75392c7c | |
2017-03-14T18:30:53.011000Z ---->2017-03-22T18:30:58.145000Z | |
https://www.helpnetsecurity.com/2017/03/14/us-air-force-data-exposed-online/ ---->https://securityledger.com/2017/03/nas-holes-air-force-data-leak-the-tip-of-very-large-iceberg/ | |
------------- | |
https://helpnetsecurity.com/ -->https://securityintelligence.com/ | |
58c19f5a766fa31b75f6b509 ---->58cc2b63766fa31b751f8a04 | |
2017-03-09T18:30:59.733000Z ---->2017-03-17T18:30:59.052000Z | |
https://www.helpnetsecurity.com/2017/03/09/west-african-cybercriminal-ecosystem-unlike/ ---->https://securityintelligence.com/your-cybercriminal-has-an-image-problem/ | |
------------- | |
http://bleepingcomputer.com/ -->https://securityledger.com/ | |
58dbfd61766fa31b755d2b9d ---->58dd4ee2766fa31b75625291 | |
2017-03-29T18:30:57.373000Z ---->2017-03-30T18:31:03.947000Z | |
https://www.bleepingcomputer.com/news/security/about-90-percent-of-smart-tvs-vulnerable-to-remote-hacking-via-rogue-tv-signals/ ---->https://securityledger.com/2017/03/researcher-says-9-in-10-smart-tvs-vulnerable-to-broadcast-based-attacks/ | |
------------- | |
https://helpnetsecurity.com/ -->http://bitdefender.com/blog/ | |
58cad9dd766fa31b751a6b00 ---->58cbd6ff766fa31b751e420a | |
2017-03-16T18:30:57.803000Z ---->2017-03-17T12:30:55.685000Z | |
https://www.helpnetsecurity.com/2017/03/16/wishbone-data-breach/ ---->https://hotforsecurity.bitdefender.com/blog/wishbone-hack-leaks-2-million-user-records-on-the-dark-web-mostly-of-underage-girls-17810.html | |
------------- | |
http://bleepingcomputer.com/ -->https://schneier.com/ | |
58c53f7c766fa31b7504ba1c ---->58ca8578766fa31b751923a0 | |
2017-03-12T12:30:52.546000Z ---->2017-03-16T12:30:48.057000Z | |
https://www.bleepingcomputer.com/news/hardware/-super-malware-steals-encryption-keys-from-intel-sgx-enclaves/ ---->https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html | |
------------- | |
http://itsecurityguru.org/ -->https://helpnetsecurity.com/ | |
58bea807766fa31b75eb3f4c ---->58bea808766fa31b75eb3f4e | |
2017-03-07T12:31:52.805000Z ---->2017-03-07T12:31:05.071000Z | |
http://www.itsecurityguru.org/2017/03/07/ca-technologies-acquire-veracode-leading-saas-based-secure-devops-platform-provider/ ---->https://www.helpnetsecurity.com/2017/03/07/ca-technologies-acquires-veracode/ | |
------------- | |
https://thehackernews.com/ -->http://bleepingcomputer.com/ | |
58dba900766fa31b755be20c ---->58dba903766fa31b755be212 | |
2017-03-29T12:30:56.462000Z ---->2017-03-29T12:30:59.409000Z | |
http://thehackernews.com/2017/03/linux-botnet-ebury.html ---->https://www.bleepingcomputer.com/news/security/russian-hacker-pleads-guilty-for-role-in-infamous-linux-ebury-malware/ | |
------------- | |
http://welivesecurity.com/ -->http://scmagazine.com/ | |
58bea7f8766fa31b75eb3f36 ---->58befc59766fa31b75ec84d9 | |
2017-03-07T12:30:50.547000Z ---->2017-03-07T18:30:49.583000Z | |
http://www.welivesecurity.com/2017/03/07/wordpress-webmasters-urged-upgrade-version-4-73-patch-six-security-holes/ ---->https://www.scmagazine.com/upgrade-to-v473-wordpress-users-advised/article/642436/ | |
------------- | |
https://thehackernews.com/ -->http://bleepingcomputer.com/ | |
58b8106f766fa31b75d0dfd2 ---->58b864f4766fa31b75d224f6 | |
2017-03-02T12:30:39.676000Z ---->2017-03-02T18:31:16.206000Z | |
http://thehackernews.com/2017/03/google-mad-gadget-flaw.html ---->https://www.bleepingcomputer.com/news/security/50-google-engineers-volunteered-to-patch-thousands-of-java-open-source-projects/ | |
------------- | |
http://spgedwards.com/ -->http://welivesecurity.com/ | |
58bb5c64766fa31b75ddd450 ---->58c19fa1766fa31b75f6b546 | |
2017-03-05T00:31:32.374000Z ---->2017-03-09T18:32:01.560000Z | |
http://www.spgedwards.com/2012/09/sophos-anti-virus-kills-own-updater.html ---->http://www.welivesecurity.com/2011/06/10/fake-windows-updates-are-easy-to-avoid/ | |
------------- | |
https://thehackernews.com/ -->https://helpnetsecurity.com/ | |
58d26e77766fa31b7537e414 ---->58d2c2da766fa31b75392c8b | |
2017-03-22T12:30:47.590000Z ---->2017-03-22T18:31:01.267000Z | |
http://thehackernews.com/2017/03/hacking-windows-dll-injection.html ---->https://www.helpnetsecurity.com/2017/03/22/windows-doubleagent-attack/ | |
------------- | |
https://community.rapid7.com/community/metasploit/blog -->http://securityaffairs.co/wordpress/ | |
58d11cf4766fa31b7532c2af ---->58d26e78766fa31b7537e415 | |
2017-03-21T12:30:44.041000Z ---->2017-03-22T12:30:48.391000Z | |
https://community.rapid7.com/community/metasploit/blog/2017/03/21/metasploits-rf-transceiver-capabilities ---->http://securityaffairs.co/wordpress/57329/hacking/metasploit-rftransceiver-iot.html | |
------------- | |
http://csoonline.com/ -->https://thehackernews.com/ | |
58d5ba3d766fa31b7544bba4 ---->58d6b75b766fa31b7548970c | |
2017-03-25T00:30:53.743000Z ---->2017-03-25T18:30:51.019000Z | |
http://csoonline.com/article/3184771/fraud/bot-attacking-gift-card-accounts.html ---->http://thehackernews.com/2017/03/GiftGhostBot-gift-cards.html | |
------------- | |
http://bleepingcomputer.com/ -->https://isc.sans.edu/ | |
58c1f3be766fa31b75f7fb66 ---->58c836dd766fa31b75103359 | |
2017-03-10T00:30:54.017000Z ---->2017-03-14T18:30:53.701000Z | |
https://www.bleepingcomputer.com/news/security/over-a-third-of-websites-use-outdated-and-vulnerable-javascript-libraries/ ---->https://isc.sans.edu/newssummary.html#1021993 | |
------------- | |
https://thehackernews.com/ -->http://securityaffairs.co/wordpress/ | |
58c29c74766fa31b75fa87b3 ---->58c3453d766fa31b75fd144c | |
2017-03-10T12:30:44.015000Z ---->2017-03-11T00:30:53.269000Z | |
http://thehackernews.com/2017/03/decrypt-pgp-encryption.html ---->http://securityaffairs.co/wordpress/57036/cyber-crime/blackberry-pgp-messages.html | |
------------- | |
http://blog.uncommonsensesecurity.com/ -->http://csoonline.com/ | |
58cf771e766fa31b752c59db ---->58d1c5bf766fa31b75355370 | |
2017-03-20T06:30:54.328000Z ---->2017-03-22T00:30:55.170000Z | |
http://blog.uncommonsensesecurity.com/2017/03/on-loss-and-responsibility.html ---->http://csoonline.com/article/3183459/security/goodbye-becky-bace-the-cybersecurity-community-will-miss-you.html | |
------------- | |
http://bleepingcomputer.com/ -->https://grahamcluley.com/ | |
58d3173e766fa31b753a750f ---->58d414fd766fa31b753e4eb6 | |
2017-03-23T00:30:54.673000Z ---->2017-03-23T18:33:33.250000Z | |
https://www.bleepingcomputer.com/news/security/the-next-big-thing-for-android-malware-is-plugin-frameworks-/ ---->https://www.grahamcluley.com/android-adware-abusing-plugin-frameworks-promote-potentially-malicious-apps/ | |
------------- | |
https://isc.sans.edu/ -->http://securityaffairs.co/wordpress/ | |
58ba5f13766fa31b75da04dd ---->58bc04fd766fa31b75e060ba | |
2017-03-04T06:30:43.011000Z ---->2017-03-05T12:30:53.795000Z | |
https://isc.sans.edu/newssummary.html#1020147 ---->http://securityaffairs.co/wordpress/56886/hacking/metasploit-vulnerable-services-emulator.html | |
------------- | |
http://darkreading.com/ -->https://www.tenable.com/blog | |
58c19f54766fa31b75f6b4f7 ---->58cfcb7d766fa31b752da1d1 | |
2017-03-09T18:30:44.758000Z ---->2017-03-20T12:30:53.756000Z | |
http://darkreading.com/perimeter/securing-todays-elastic-attack-surface/a/d-id/1328355 ---->https://www.tenable.com/blog/2017-time-to-shake-up-your-understanding-of-risk | |
------------- | |
https://f5.com/about-us/blog -->http://packetpushers.net/ | |
58c19f57766fa31b75f6b4fd ---->58ca8577766fa31b7519239f | |
2017-03-09T18:30:47.044000Z ---->2017-03-16T12:30:47.585000Z | |
https://f5.com/about-us/blog/articles/turns-out-sdn-is-not-dead-yet-24785 ---->http://packetpushers.net/simplified-approach-sdn-network-disaggregation/ | |
------------- | |
https://blog.avira.com/ -->https://isc.sans.edu/ | |
58cfcb7d766fa31b752da1d0 ---->58daabd9766fa31b75580589 | |
2017-03-20T12:31:03.585000Z ---->2017-03-28T18:30:49.433000Z | |
https://blog.avira.com/3d-printer-for-anyone/ ---->https://isc.sans.edu/forums/Preventing+outside+sources+accessing+the+local+network+via+open+ports+on+a+networked+printer/1737 | |
------------- | |
http://darkreading.com/ -->http://itsecurityguru.org/ | |
58da0320766fa31b755572a5 ---->58da5787766fa31b7556bc1d | |
2017-03-28T06:30:56.389000Z ---->2017-03-28T12:31:09.866000Z | |
http://darkreading.com/threat-intelligence/hacking-the-business-email-compromise-/d/d-id/1328497 ---->http://www.itsecurityguru.org/2017/03/28/business-email-compromise-bec-attacks-increase-45-percent-23-use-spoofed-email-domains-trick-victims/ | |
------------- | |
http://bleepingcomputer.com/ -->https://nakedsecurity.sophos.com/ | |
58c2f0db766fa31b75fbce0a ---->58c836da766fa31b75103350 | |
2017-03-10T18:30:51.861000Z ---->2017-03-14T18:30:50.466000Z | |
https://www.bleepingcomputer.com/news/security/isp-blocks-teamviewer-because-of-tech-support-scammers/ ---->https://nakedsecurity.sophos.com/2017/03/14/questions-linger-after-isp-blocks-teamviewer-over-fraud-fears/ | |
------------- | |
http://securityaffairs.co/wordpress/ -->http://bitdefender.com/blog/ | |
58c836d6766fa31b75103340 ---->58c933fc766fa31b75140751 | |
2017-03-14T18:30:46.487000Z ---->2017-03-15T12:30:51.383000Z | |
http://securityaffairs.co/wordpress/57130/hacking/cra-apache-struts-hack.html ---->https://hotforsecurity.bitdefender.com/blog/apache-vulnerability-exposes-canadian-government-websites-to-hackers-17797.html | |
------------- | |
http://arstechnica.com/security/ -->http://csoonline.com/ | |
58da0320766fa31b755572a4 ---->58dbfd6b766fa31b755d2bc1 | |
2017-03-28T06:30:56.221000Z ---->2017-03-29T18:31:07.891000Z | |
https://arstechnica.com/security/2017/03/ransomware-scammers-exploited-safari-bug-to-extort-porn-viewing-ios-users/ ---->http://csoonline.com/article/3185761/ios/scammers-scare-iphone-users-into-paying-to-unlock-not-really-locked-safari.html | |
------------- | |
https://community.rapid7.com/community/metasploit/blog -->http://bleepingcomputer.com/ | |
58c0a23a766fa31b75f2e27c ---->58d3c039766fa31b753d05f3 | |
2017-03-09T00:30:49.995000Z ---->2017-03-23T12:31:53.401000Z | |
https://community.rapid7.com/community/metasploit/blog/2017/03/08/attacking-microsoft-office-openoffice-with-metasploit-macro-exploits ---->https://www.bleepingcomputer.com/news/security/word-document-spreads-macro-malware-targeting-both-windows-and-macos/ | |
------------- | |
http://securityaffairs.co/wordpress/ -->https://thehackernews.com/ | |
58d95a62766fa31b7552dfe5 ---->58d95a66766fa31b7552dff6 | |
2017-03-27T18:30:58.125000Z ---->2017-03-27T18:31:02.342000Z | |
http://securityaffairs.co/wordpress/57457/iot/mele-washer-disinfector-flaw.html ---->http://thehackernews.com/2017/03/iot-washer-disinfector.html | |
------------- | |
https://nakedsecurity.sophos.com/ -->http://securityaffairs.co/wordpress/ | |
58b864d3766fa31b75d224cc ---->58b961f5766fa31b75d5f3eb | |
2017-03-02T18:30:43.646000Z ---->2017-03-03T12:30:45.573000Z | |
https://nakedsecurity.sophos.com/2017/03/02/cloudflare-chief-pledges-third-party-review-of-code/ ---->http://securityaffairs.co/wordpress/56845/hacking/cloudbleed-incident-impact.html | |
------------- | |
https://www.helpnetsecurity.com/ -->http://csoonline.com/ | |
58cbd703766fa31b751e4215 ---->58dba8fc766fa31b755be1ff | |
2017-03-17T12:30:59.496000Z ---->2017-03-29T12:30:52.193000Z | |
https://www.helpnetsecurity.com/2017/03/17/impact-artificial-intelligence-business/ ---->http://csoonline.com/article/3184577/application-development/ai-will-transform-information-security-but-it-won-t-happen-overnight.html | |
------------- | |
http://bleepingcomputer.com/ -->https://nakedsecurity.sophos.com/ | |
58c933fe766fa31b75140757 ---->58d2c2df766fa31b75392c9a | |
2017-03-15T12:30:54.384000Z ---->2017-03-22T18:30:55.384000Z | |
https://www.bleepingcomputer.com/news/hardware/researchers-hack-accelerometers-with-sound-waves/ ---->https://nakedsecurity.sophos.com/2017/03/22/soundwaves-used-to-produce-fake-data-from-accelerometers/ | |
------------- | |
https://helpnetsecurity.com/ -->http://bleepingcomputer.com/ | |
58d1715d766fa31b75340b0f ---->58d41501766fa31b753e4ec6 | |
2017-03-21T18:31:01.186000Z ---->2017-03-23T18:33:37.112000Z | |
https://www.helpnetsecurity.com/2017/03/21/nest-security-cameras-stop-recording/ ---->https://www.bleepingcomputer.com/news/security/bluetooth-bug-lets-burglars-disable-google-nest-cams/ | |
------------- | |
https://www.proofpoint.com/us/threat-insight -->https://www.zscaler.com/blogs/research | |
58c78e1e766fa31b750da657 ---->58d414f5766fa31b753e4e9c | |
2017-03-14T06:30:53.909000Z ---->2017-03-23T18:33:25.771000Z | |
https://www.proofpoint.com/us/threat-insight/post/mobile-malware-masquerades-as-POS-management-app ---->https://www.zscaler.com/blogs/research/nasty-adware-hiding-apps-google-play-store | |
------------- | |
https://nakedsecurity.sophos.com/ -->http://bleepingcomputer.com/ | |
58bdaadc766fa31b75e6ff38 ---->58c496be766fa31b75022db0 | |
2017-03-06T18:30:52.457000Z ---->2017-03-12T00:30:54.533000Z | |
https://nakedsecurity.sophos.com/2017/03/06/news-in-brief-facebook-tags-disputed-news-products-to-be-judged-on-security-smart-meters-snafu/ ---->https://www.bleepingcomputer.com/news/hardware/millions-of-smart-meters-may-over-inflate-readings-by-up-to-600-percent/ | |
------------- | |
http://csoonline.com/ -->http://bleepingcomputer.com/ | |
58c2f0e0766fa31b75fbce13 ---->58c3edf6766fa31b75ffa134 | |
2017-03-10T18:30:56.916000Z ---->2017-03-11T12:30:46.411000Z | |
http://csoonline.com/article/3179450/security/after-cia-leak-intel-security-releases-detection-tool-for-efi-rootkits.html ---->https://www.bleepingcomputer.com/news/security/intel-security-mcafee-releases-rootkit-scanner-following-vault-7-cia-leak/ | |
------------- | |
https://ananalyticalapproach.blogspot.de/ -->http://darkreading.com/ | |
58d95a5f766fa31b7552dfd9 ---->58d95a65766fa31b7552dff3 | |
2017-03-27T18:30:55.333000Z ---->2017-03-27T18:31:01.657000Z | |
https://ananalyticalapproach.blogspot.de/2017/03/data-visualization-keeping-eye-on.html ---->http://darkreading.com/threat-intelligence/data-visualization-keeping-an-eye-on-security/a/d-id/1328493 | |
------------- | |
https://secureworks.com/blog -->http://bankinfosecurity.com/ | |
58cc2b5c766fa31b751f89e9 ---->58d5ba41766fa31b7544bba9 | |
2017-03-17T18:30:52.806000Z ---->2017-03-25T00:30:56.755000Z | |
https://secureworks.com/blog/regulatory-compliance ---->http://www.bankinfosecurity.com/fccs-pending-isp-privacy-regulation-in-jeopardy-a-9793 | |
------------- | |
https://hackerone.com/blog -->http://bleepingcomputer.com/ | |
58b864d4766fa31b75d224d0 ---->58b8b93c766fa31b75d369df | |
2017-03-02T18:30:44.633000Z ---->2017-03-03T00:30:51.957000Z | |
https://hackerone.com/blog/HackerOne-Professional-Free-For-Open-Source-Projects ---->https://www.bleepingcomputer.com/news/security/hackerone-offers-free-bug-bounty-programs-for-open-source-projects/ | |
------------- | |
http://bleepingcomputer.com/ -->http://securityaffairs.co/wordpress/ | |
58dba8fe766fa31b755be207 ---->58dbfd61766fa31b755d2b9a | |
2017-03-29T12:30:54.018000Z ---->2017-03-29T18:30:57.001000Z | |
https://www.bleepingcomputer.com/news/security/new-iis-6-0-zero-day-exploited-in-live-attacks-since-july-2016/ ---->http://securityaffairs.co/wordpress/57513/hacking/iis-6-0-zero-day.html | |
------------- | |
http://bleepingcomputer.com/ -->http://bitdefender.com/blog/ | |
58bb07d5766fa31b75dc8f1b ---->58bdaadb766fa31b75e6ff35 | |
2017-03-04T18:30:45.694000Z ---->2017-03-06T18:30:51.390000Z | |
https://www.bleepingcomputer.com/news/microsoft/third-party-vendor-issues-temporary-patch-for-windows-gdi-vulnerability/ ---->https://hotforsecurity.bitdefender.com/blog/third-party-patch-released-for-microsoft-zero-day-that-google-made-public-17767.html | |
------------- | |
http://securityaffairs.co/wordpress/ -->http://bleepingcomputer.com/ | |
58dca61b766fa31b755fbf1c ---->58dcfa80766fa31b756108cf | |
2017-03-30T06:30:51.480000Z ---->2017-03-30T12:30:55.988000Z | |
http://securityaffairs.co/wordpress/57523/malware/mirai-botnet-54hh-ddosa.html ---->https://www.bleepingcomputer.com/news/security/new-mirai-botnet-slams-us-college-with-54-hour-ddos-attack/ | |
------------- | |
http://securityaffairs.co/wordpress/ -->https://nakedsecurity.sophos.com/ | |
58dba8fd766fa31b755be204 ---->58dbfd66766fa31b755d2bb4 | |
2017-03-29T12:30:53.535000Z ---->2017-03-29T18:31:02.416000Z | |
http://securityaffairs.co/wordpress/57504/hacking/lastpass-flaw.html ---->https://nakedsecurity.sophos.com/2017/03/29/another-hole-opens-up-in-lastpass-that-could-take-weeks-to-fix/ | |
------------- | |
https://trustwave.com/Resources/SpiderLabs-Blog/ -->http://itsecurityguru.org/ | |
58b864d8766fa31b75d224db ---->58b9b663766fa31b75d759e5 | |
2017-03-02T18:30:48.224000Z ---->2017-03-03T18:31:17.895000Z | |
https://trustwave.com/Resources/SpiderLabs-Blog/Undocumented-Backdoor-Account-in-DBLTek-GoIP/?page=1&year=0&month=0 ---->http://www.itsecurityguru.org/2017/03/03/trustwave-discovers-hidden-backdoor-chinese-iot-devices/ | |
------------- | |
http://bleepingcomputer.com/ -->http://csoonline.com/ | |
58cc2b60766fa31b751f89fd ---->58cfcb7a766fa31b752da1ca | |
2017-03-17T18:30:56.727000Z ---->2017-03-20T12:31:01.924000Z | |
https://www.bleepingcomputer.com/news/security/us-cert-security-products-that-perform-https-interception-weaken-security/ ---->http://csoonline.com/article/3182704/security/some-https-inspection-tools-might-weaken-security.html | |
------------- | |
https://www.gigamon.com/blog/ -->https://holisticinfosec.blogspot.de/ | |
58d56673766fa31b7543728d ---->58d8b19e766fa31b75504cf7 | |
2017-03-24T18:33:22.879000Z ---->2017-03-27T06:30:54.535000Z | |
https://www.gigamon.com/blog/2017/03/24/tools-deserve-solid-foundation/ ---->https://holisticinfosec.blogspot.de/2017/03/toolsmith-124-dripcap-caffeinated.html | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment