Created
May 4, 2017 18:43
-
-
Save fornarat/b23363d2899edc8352b2ffa571ec9f71 to your computer and use it in GitHub Desktop.
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
the first results were out of reach on the console | |
format: clusterId, published, link | |
then: after each cluster, the intersection of the BOWs for all the cleaned_text in these docs | |
**/ | |
.... | |
180 | |
181 | |
182 | |
183 | |
183 2017-03-01T06:32:54.830000Z https://www.mimecast.com/blog/2012/02/mime--20-a-happy-anniversary/ | |
183 2017-03-16T18:32:40.019000Z https://www.mimecast.com/blog/2012/03/twinterview-with-mime-co-creator-nathaniel-borenstein/ | |
183 2017-03-18T12:35:35.055000Z http://www.mimecast.com/blog/2012/03/twinterview-with-mime-co-creator-nathaniel-borenstein/ | |
183 2017-03-18T12:35:36.813000Z http://www.mimecast.com/blog/2012/02/mime--20-a-happy-anniversary/ | |
['acceptable', 'africa', 'ago', 'also', 'america', 'anniversary', 'apps', 'archive', 'archiving', 'asia', 'attack', 'audio', 'award', 'barbershop', 'become', 'blog', 'borenstein', 'bundle', 'business', 'career', 'center', 'central', 'chat', 'chief', 'chord', 'clip', 'coalition', 'comment', 'company', 'compliance', 'contact', 'content', 'continuity', 'control', 'customer', 'cyber', 'data', 'day', 'demo', 'detail', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'east', 'email', 'enable', 'europe', 'even', 'event', 'exchange', 'extension', 'facebook', 'file', 'filed', 'first', 'future', 'get', 'google', 'history', 'home', 'hosting', 'hybrid', 'im', 'image', 'information', 'internet', 'investor', 'javascript', 'knowledgebase', 'large', 'leadership', 'legacy', 'like', 'login', 'mail', 'managed', 'management', 'member', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mime', 'mimecast', 'mimecaster', 'mobility', 'multipurpose', 'nathaniel', 'network', 'news', 'north', 'office', 'option', 'overview', 'pacific', 'partner', 'people', 'personal', 'picture', 'platform', 'please', 'policy', 'post', 'posted', 'powered', 'press', 'privacy', 'product', 'productivity', 'professional', 'program', 'protection', 'quote', 'receive', 'registration', 'related', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'sale', 'schedule', 'scientist', 'secure', 'security', 'send', 'service', 'share', 'signature', 'singing', 'sitemap', 'software', 'solution', 'south', 'success', 'support', 'targeted', 'team', 'technical', 'technology', 'telephone', 'term', 'threat', 'time', 'today', 'training', 'trillion', 'trust', 'twenty', 'use', 'via', 'view', 'webinars', 'week', 'whole', 'word', 'work', 'world', 'year'] | |
184 | |
185 | |
186 | |
186 2017-03-08T18:30:55.150000Z http://csoonline.com/article/3177994/security/cia-false-flag-team-repurposed-shamoon-data-wiper-other-malware.html | |
186 2017-03-09T00:30:53.457000Z http://securityaffairs.co/wordpress/56983/intelligence/wikileaks-vault7-cia-umbrage-team.html | |
['able', 'abused', 'achieve', 'agency', 'also', 'analyst', 'another', 'article', 'attack', 'attribute', 'attribution', 'author', 'behind', 'best', 'blamed', 'borrowed', 'branch', 'breach', 'bypass', 'called', 'capture', 'causing', 'center', 'central', 'check', 'cia', 'cloud', 'code', 'collection', 'commercial', 'company', 'component', 'computer', 'considered', 'content', 'cost', 'could', 'cyber', 'darkcomet', 'data', 'desired', 'develop', 'developed', 'development', 'device', 'disk', 'document', 'driver', 'dubbed', 'effort', 'eldos', 'encryption', 'escalation', 'even', 'example', 'exploit', 'extract', 'extracted', 'false', 'file', 'find', 'first', 'flag', 'focused', 'found', 'goal', 'group', 'hack', 'hacking', 'help', 'hikit', 'home', 'implant', 'implementation', 'implemented', 'information', 'instead', 'intelligence', 'interested', 'internal', 'italian', 'law', 'leaked', 'led', 'library', 'license', 'like', 'linked', 'maintains', 'make', 'malware', 'management', 'many', 'might', 'mobile', 'multiple', 'named', 'national', 'network', 'new', 'news', 'nuclear', 'obtained', 'one', 'operation', 'others', 'pack', 'persistence', 'piece', 'policy', 'possible', 'practice', 'privilege', 'project', 'rat', 'rawdisk', 'rebound', 'recently', 'reduce', 'related', 'remote', 'reported', 'researcher', 'resource', 'review', 'right', 'rootkit', 'russian', 'sample', 'saudi', 'security', 'shamoon', 'source', 'specific', 'sponsored', 'state', 'stealth', 'story', 'strong', 'surveillance', 'system', 'team', 'technique', 'test', 'thoroughly', 'threat', 'time', 'tool', 'trojan', 'umbrage', 'upclicker', 'use', 'used', 'using', 'video', 'virtual', 'webcam', 'wikileaks', 'wild', 'window', 'wiping', 'year'] | |
187 | |
187 2017-03-18T06:31:10.383000Z http://www.welivesecurity.com/2014/05/19/biometrics-pioneer-now-wary-monster-created/ | |
187 2017-03-27T12:32:39.808000Z https://www.welivesecurity.com/2014/05/19/biometrics-pioneer-now-wary-monster-created/ | |
['accept', 'according', 'accuracy', 'advisor', 'age', 'ai', 'allowed', 'allowing', 'also', 'analyst', 'anonymity', 'app', 'apps', 'artificial', 'atick', 'attractive', 'author', 'automatically', 'available', 'awareness', 'basically', 'become', 'believe', 'billion', 'biometric', 'biometrics', 'blackphone', 'bought', 'call', 'camera', 'changed', 'choice', 'citizen', 'company', 'concern', 'connext', 'consequence', 'contractor', 'could', 'created', 'data', 'demonstration', 'described', 'difficult', 'disagree', 'dr', 'early', 'eat', 'electronic', 'email', 'encrypted', 'encryption', 'enjoy', 'everyone', 'evolved', 'expensive', 'explo', 'face', 'facebook', 'facial', 'far', 'fear', 'feature', 'fellow', 'figure', 'fingerprint', 'found', 'founded', 'french', 'friend', 'frost', 'gadget', 'galaxy', 'glass', 'golden', 'google', 'goverments', 'growing', 'grown', 'habit', 'heavily', 'helping', 'hotel', 'human', 'id', 'identify', 'industry', 'information', 'inhibiting', 'instance', 'instrumental', 'intelligence', 'inventor', 'invested', 'issue', 'joseph', 'known', 'large', 'lead', 'live', 'looking', 'made', 'make', 'maybe', 'military', 'million', 'monster', 'nametag', 'nato', 'new', 'number', 'one', 'page', 'people', 'per', 'person', 'pgp', 'phil', 'phone', 'photograph', 'pick', 'pioneer', 'plate', 'politician', 'posted', 'premium', 'print', 'privacy', 'protection', 'read', 'recognition', 'recognize', 'relating', 'report', 'responsibility', 'right', 'rob', 'robbing', 'said', 'say', 'security', 'seen', 'sell', 'selling', 'served', 'several', 'software', 'speaking', 'specialises', 'step', 'sullivan', 'surveil', 'surveillance', 'system', 'tecchnology', 'technical', 'technology', 'think', 'time', 'total', 'turning', 'two', 'uncontrollled', 'unexpected', 'unless', 'use', 'user', 'verge', 'version', 'vicarious', 'visionics', 'voice', 'want', 'warned', 'waugh', 'whats', 'whoever', 'whose', 'wider', 'widespread', 'woman', 'year', 'york', 'zimmermann'] | |
188 | |
188 2017-03-06T18:31:00.729000Z https://www.helpnetsecurity.com/2017/03/06/hack-animal-tracking-systems/ | |
188 2017-03-07T00:30:47.138000Z https://www.bleepingcomputer.com/news/government/poachers-hack-gps-trackers-extract-metadata-from-public-photos-to-hunt-animals/ | |
188 2017-03-10T18:30:49.895000Z https://nakedsecurity.sophos.com/2017/03/10/endangered-animals-at-growing-risk-from-gps-cyber-poachers/ | |
['animal', 'hack', 'poacher', 'system', 'tracking'] | |
189 | |
190 | |
191 | |
191 2017-03-01T06:31:36.571000Z https://www.mimecast.com/blog/2015/04/introducing-mimecast-secure-messaging/ | |
191 2017-03-18T12:33:10.208000Z http://www.mimecast.com/blog/2015/04/introducing-mimecast-secure-messaging/ | |
['access', 'accident', 'accountability', 'acquisition', 'across', 'act', 'action', 'advantage', 'alongside', 'also', 'announcing', 'approach', 'appropriate', 'archiving', 'articulating', 'ask', 'australia', 'avoid', 'award', 'azure', 'bachelor', 'back', 'backup', 'based', 'better', 'blackberry', 'blog', 'blueprint', 'brand', 'branded', 'breach', 'building', 'built', 'business', 'card', 'cloud', 'color', 'comment', 'common', 'communication', 'company', 'compelling', 'competitive', 'competitor', 'complex', 'compliance', 'confidence', 'confident', 'confidential', 'confidently', 'consider', 'consideration', 'content', 'continued', 'continuity', 'control', 'corporate', 'costly', 'could', 'cover', 'credential', 'credit', 'critical', 'crucial', 'customer', 'customized', 'cybersecurity', 'damage', 'dan', 'data', 'degree', 'designed', 'destroy', 'detail', 'development', 'difference', 'director', 'disclose', 'dispute', 'disqus', 'dlp', 'dropbox', 'email', 'emerging', 'employee', 'enable', 'encryption', 'enforce', 'enforces', 'ensure', 'enterprise', 'era', 'essential', 'established', 'even', 'exchange', 'expect', 'expensive', 'exposure', 'external', 'file', 'filed', 'financial', 'flow', 'form', 'fully', 'garbage', 'gateway', 'glba', 'global', 'grade', 'hack', 'hardware', 'health', 'healthcare', 'held', 'help', 'helping', 'higher', 'hipaa', 'hold', 'home', 'identifiable', 'including', 'industry', 'information', 'insurance', 'intellectual', 'introducing', 'javascript', 'joined', 'joining', 'keep', 'launch', 'leak', 'legal', 'level', 'like', 'linkedin', 'listed', 'logo', 'loss', 'make', 'making', 'maliciously', 'manufacturer', 'marketing', 'meanwhile', 'measure', 'meet', 'mention', 'merger', 'message', 'messaging', 'microsoft', 'mimecast', 'must', 'name', 'need', 'new', 'night', 'number', 'office', 'often', 'online', 'organization', 'outage', 'outside', 'overall', 'part', 'partner', 'patient', 'personal', 'please', 'portability', 'portal', 'post', 'posted', 'potential', 'potentially', 'powered', 'predictive', 'prepared', 'price', 'prior', 'privacy', 'private', 'product', 'property', 'proposition', 'prospect', 'protected', 'protection', 'protects', 'psychology', 'publicly', 'put', 'question', 'real', 'reason', 'receive', 'recipient', 'recognition', 'regularly', 'regulation', 'regulatory', 'related', 'remains', 'reminder', 'reputation', 'research', 'responsible', 'result', 'risk', 'role', 'safeguard', 'sale', 'satisfied', 'scenario', 'secure', 'security', 'see', 'send', 'sending', 'sends', 'sensitive', 'service', 'share', 'shared', 'sharing', 'six', 'sloshberg', 'software', 'sometimes', 'step', 'strategy', 'suite', 'supplier', 'support', 'take', 'taken', 'technology', 'threat', 'three', 'today', 'top', 'traditional', 'uk', 'user', 'valuable', 'value', 'variety', 'via', 'view', 'wake', 'web', 'whaling', 'wider', 'winner', 'within', 'worked', 'working', 'world', 'would', 'year', 'yet'] | |
193 | |
193 2017-03-25T06:31:19.724000Z http://www.welivesecurity.com/2013/07/31/researchers-remote-control-an-80-million-yacht-and-even-aircraft-could-be-vulnerable/ | |
193 2017-03-27T12:32:54.490000Z https://www.welivesecurity.com/2013/07/31/researchers-remote-control-an-80-million-yacht-and-even-aircraft-could-be-vulnerable/ | |
['able', 'across', 'actually', 'aircraft', 'amiss', 'antenna', 'anyone', 'anything', 'app', 'applicable', 'attack', 'author', 'autopilot', 'believe', 'better', 'blocked', 'blue', 'board', 'box', 'broadcast', 'broadcasting', 'broader', 'cap', 'chart', 'civil', 'coast', 'cockrell', 'colleague', 'control', 'could', 'course', 'crew', 'curve', 'deal', 'deck', 'detect', 'device', 'difficult', 'display', 'drachs', 'email', 'even', 'experiment', 'fake', 'false', 'feel', 'fooling', 'freight', 'friend', 'gain', 'gave', 'going', 'got', 'gps', 'great', 'greece', 'human', 'humphreys', 'identifying', 'implication', 'international', 'invited', 'italy', 'jammed', 'know', 'led', 'line', 'live', 'marine', 'meanwhile', 'mile', 'million', 'monaco', 'moving', 'new', 'onboard', 'onto', 'operated', 'overwhelmed', 'page', 'part', 'percent', 'performed', 'possible', 'posted', 'print', 'put', 'received', 'register', 'required', 'researcher', 'rhodes', 'rigging', 'rob', 'rose', 'said', 'saw', 'sea', 'security', 'see', 'seen', 'sensor', 'series', 'ship', 'showed', 'sign', 'signal', 'sky', 'slowly', 'solve', 'spoof', 'spoofing', 'steering', 'straight', 'successfully', 'superyacht', 'system', 'thinking', 'threat', 'todd', 'took', 'touching', 'traffic', 'transport', 'transportation', 'travelling', 'turned', 'two', 'understanding', 'university', 'upper', 'us', 'vehicle', 'vessel', 'vulnerable', 'wake', 'water', 'waugh', 'whats', 'wheel', 'white', 'whole', 'without', 'would', 'yacht'] | |
194 | |
195 | |
195 2017-03-05T00:41:39.968000Z http://thehackernews.com/2011/05/underground-security-forums.html | |
195 2017-03-05T00:44:06.091000Z http://thehackernews.com/2011/03/shia-community-forums-hacked-by.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'forum', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
196 | |
197 | |
197 2017-03-17T12:30:53.025000Z https://www.bleepingcomputer.com/news/security/ubiquiti-devices-exposed-to-hacking-via-20-years-old-php-version/ | |
197 2017-03-17T18:30:53.148000Z http://www.darknet.org.uk/2017/03/ubiquiti-wi-fi-gear-hackable-via-1997-php-version/ | |
197 2017-03-17T18:31:01.137000Z https://www.helpnetsecurity.com/2017/03/17/ubiquiti-networks-flaw/ | |
['device', 'flaw', 'network', 'ubiquiti'] | |
198 | |
198 2017-03-20T18:31:04.484000Z https://www.bleepingcomputer.com/news/security/numbers-show-locky-ransomware-is-slowly-fading-away/ | |
198 2017-03-21T18:31:03.988000Z https://isc.sans.edu/newssummary.html#1022925 | |
198 2017-03-22T12:31:05.408000Z https://www.helpnetsecurity.com/2017/03/22/necurs-botnet-stock-market/ | |
['botnet', 'necurs', 'stock'] | |
199 | |
200 | |
201 | |
202 | |
203 | |
203 2017-03-03T00:31:07.379000Z https://isc.sans.edu/newssummary.html#1019969 | |
203 2017-03-03T00:31:10.591000Z https://isc.sans.edu/newssummary.html#1019987 | |
['ago', 'board', 'cyber', 'cybersecurity', 'department', 'dfs', 'even', 'financial', 'force', 'highly', 'hour', 'industry', 'new', 'one', 'operational', 'regulated', 'regulation', 'room', 'security', 'securityweek', 'service', 'state', 'synopsis', 'view', 'york'] | |
204 | |
205 | |
206 | |
207 | |
207 2017-03-23T12:31:56.217000Z http://www.welivesecurity.com/2017/03/23/google-websites-failing-victim-cybercriminals/ | |
207 2017-03-24T12:33:46.824000Z http://www.welivesecurity.com/2017/03/23/google-websites-falling-victim-cybercriminals/ | |
207 2017-03-27T12:31:15.196000Z https://www.welivesecurity.com/2017/03/23/google-websites-falling-victim-cybercriminals/ | |
['according', 'added', 'adding', 'additionally', 'advice', 'affecting', 'aftermath', 'agent', 'alert', 'always', 'anytime', 'app', 'approach', 'area', 'association', 'attack', 'attempt', 'author', 'automatically', 'become', 'best', 'breach', 'british', 'brought', 'case', 'certain', 'channel', 'clean', 'communicate', 'company', 'compromised', 'console', 'creates', 'cyberattackers', 'cyberattacks', 'cybercrime', 'cybercriminals', 'data', 'deal', 'dealing', 'diverted', 'documentation', 'editor', 'email', 'enough', 'eset', 'experienced', 'fake', 'feedback', 'filled', 'fix', 'focus', 'friend', 'giant', 'gibberish', 'give', 'good', 'google', 'guide', 'hack', 'health', 'heeding', 'higher', 'however', 'identified', 'incident', 'information', 'japanese', 'keywords', 'latest', 'link', 'listening', 'lose', 'main', 'meanwhile', 'momentum', 'monetized', 'never', 'new', 'news', 'nonsense', 'notification', 'number', 'numerous', 'offer', 'offering', 'one', 'order', 'page', 'people', 'popular', 'posed', 'posted', 'preventative', 'prevention', 'previous', 'print', 'proved', 'rather', 'received', 'remains', 'reporting', 'request', 'result', 'say', 'search', 'secure', 'security', 'seems', 'selling', 'severe', 'sharp', 'show', 'shown', 'sign', 'simpler', 'site', 'slow', 'soon', 'spiral', 'still', 'store', 'subsequently', 'suffered', 'take', 'taken', 'tech', 'text', 'threat', 'travel', 'type', 'understand', 'unfortunately', 'unlikely', 'unrelated', 'uptake', 'urged', 'used', 'verifying', 'victim', 'visit', 'way', 'weakness', 'webmaster', 'website', 'week', 'well', 'whats', 'year'] | |
208 | |
209 | |
209 2017-03-01T18:30:43.463000Z http://www.darknet.org.uk/2017/03/another-mongodb-hack-leaks-two-million-recordings-of-kids/ | |
209 2017-03-06T18:30:48.467000Z http://www.darknet.org.uk/2017/03/mongoaudit-mongodb-auditing-pen-testing-tool/ | |
209 2017-03-29T18:30:58.634000Z https://trustwave.com/Resources/SpiderLabs-Blog/Protecting-Yourself-from-MongoDB-Ransomware/?page=1&year=0&month=0 | |
['accessible', 'another', 'authentication', 'database', 'default', 'last', 'link', 'mongodb', 'one', 'port', 'posted', 'report', 'security', 'server', 'two'] | |
210 | |
210 2017-03-09T18:31:15.903000Z https://www.pwnieexpress.com/blog/penetration-testing-tales-trenches-part-1-webinar | |
210 2017-03-22T06:31:12.999000Z https://www.pwnieexpress.com/blog/introduction-evilap | |
210 2017-03-22T06:31:16.804000Z https://www.pwnieexpress.com/blog/simple-4g-freedom-stick-pwn-plug | |
210 2017-03-25T06:31:05.603000Z https://www.pwnieexpress.com/blog/evilap-practical-example | |
210 2017-03-25T06:31:07.118000Z https://www.pwnieexpress.com/blog/advanced-persistent-pentesting-slides | |
210 2017-03-28T00:31:23.925000Z https://www.pwnieexpress.com/blog/mapping-wifi-networks-pwn-pad-2014 | |
['accessory', 'android', 'apparel', 'assessment', 'blog', 'bluetooth', 'boston', 'byod', 'career', 'category', 'classification', 'community', 'detection', 'device', 'distributed', 'edition', 'email', 'enforcement', 'event', 'express', 'floor', 'introducing', 'iot', 'latest', 'mobile', 'network', 'news', 'open', 'pad', 'penetration', 'pentesting', 'policy', 'post', 'press', 'privacy', 'product', 'project', 'pulse', 'pwn', 'pwnie', 'related', 'release', 'reserved', 'resource', 'right', 'rogue', 'sdr', 'security', 'sensor', 'service', 'share', 'solution', 'store', 'street', 'subscribe', 'summer', 'support', 'team', 'term', 'testing', 'update', 'vulnerability', 'wired', 'wireless', 'zanti'] | |
211 | |
212 | |
213 | |
214 | |
214 2017-03-05T00:41:11.733000Z http://thehackernews.com/2011/06/clubhack-chmag-issue-17th-june-2011.html | |
214 2017-03-05T00:41:52.985000Z http://thehackernews.com/2011/05/chmag-issue-16th-april-2011-download.html | |
214 2017-03-05T00:43:58.943000Z http://thehackernews.com/2011/03/clubhack-chmag-issue-14th-march-2011.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chmag', 'chunk', 'cisa', 'cism', 'cissp', 'clubhack', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'content', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'download', 'downloads', 'dridex', 'easy', 'ebook', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'general', 'get', 'give', 'google', 'guide', 'gyan', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'issue', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'legal', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'mom', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'part', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'vibhag', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
215 | |
215 2017-03-16T18:30:59.651000Z https://blog.elearnsecurity.com/elearnsecurity-at-gisec-2015.html | |
215 2017-03-16T18:31:02.798000Z https://blog.elearnsecurity.com/elearnsecurity-christmas-2014-offer.html | |
['author', 'based', 'comment', 'company', 'cyber', 'dubai', 'edcel', 'el', 'elearnsecurity', 'linkedin', 'marketing', 'news', 'offer', 'online', 'part', 'security', 'sunny', 'suyo', 'tag', 'team'] | |
216 | |
217 | |
217 2017-03-21T18:31:00.526000Z https://securityintelligence.com/security-orchestration-for-an-uncertain-world/ | |
217 2017-03-29T12:30:49.598000Z https://www.schneier.com/blog/archives/2017/03/security_orches.html | |
['ability', 'access', 'achieve', 'action', 'adaptive', 'addition', 'advance', 'advantage', 'adversarial', 'adversary', 'affair', 'affect', 'afghanistan', 'agile', 'airplane', 'allow', 'allows', 'almost', 'along', 'also', 'always', 'amount', 'ancillary', 'antivirus', 'anything', 'applicable', 'approach', 'area', 'army', 'artificial', 'attack', 'attempt', 'attended', 'augment', 'authentication', 'automate', 'automated', 'automatic', 'automation', 'based', 'battlefield', 'became', 'become', 'becomes', 'belief', 'believe', 'believed', 'best', 'blindly', 'blog', 'broadly', 'brought', 'bulk', 'called', 'capability', 'category', 'center', 'centralization', 'certain', 'certainty', 'change', 'changing', 'child', 'choice', 'circumstance', 'collaboration', 'collect', 'collecting', 'collection', 'command', 'commander', 'company', 'computer', 'conference', 'confirmed', 'conflict', 'constantly', 'continues', 'control', 'coordinate', 'coordination', 'course', 'cyber', 'cyberdefense', 'cybersecurity', 'dangerous', 'dashboard', 'data', 'deal', 'decentralization', 'decentralized', 'defense', 'degree', 'delegate', 'demand', 'develop', 'developed', 'difference', 'directly', 'director', 'display', 'dogfight', 'drone', 'dynamic', 'effective', 'effectively', 'enable', 'end', 'enormous', 'enough', 'environment', 'equal', 'equation', 'especially', 'essay', 'eventually', 'ever', 'everything', 'example', 'execution', 'exercise', 'exhibit', 'exhibiting', 'extent', 'fails', 'failure', 'fallacy', 'far', 'feeling', 'fiction', 'field', 'figure', 'finally', 'find', 'firewall', 'fixed', 'floor', 'fly', 'focus', 'fog', 'fought', 'four', 'freeform', 'front', 'fuel', 'fundamental', 'future', 'get', 'give', 'giving', 'go', 'goal', 'going', 'good', 'ground', 'guess', 'hand', 'harder', 'heading', 'hole', 'human', 'ibm', 'important', 'incident', 'incredibly', 'information', 'ingest', 'initiative', 'insight', 'instead', 'integration', 'intelligence', 'intelligent', 'internet', 'intrusion', 'iraq', 'know', 'knowing', 'last', 'laudable', 'learned', 'learning', 'lecture', 'led', 'level', 'lifetime', 'like', 'likely', 'line', 'loop', 'lot', 'machine', 'make', 'making', 'malicious', 'manage', 'management', 'manager', 'manifesting', 'many', 'matter', 'mcmaster', 'might', 'military', 'minimal', 'mistake', 'mistakenly', 'model', 'modern', 'modify', 'month', 'much', 'must', 'national', 'necessary', 'need', 'needed', 'networked', 'never', 'none', 'observation', 'offered', 'one', 'ooda', 'operate', 'orchestration', 'originally', 'otherwise', 'outlining', 'part', 'patch', 'patching', 'path', 'pattern', 'people', 'perfect', 'philosophy', 'place', 'planning', 'point', 'possible', 'powerful', 'prefer', 'premium', 'preplanning', 'president', 'pretty', 'prioritize', 'prioritized', 'prioritizes', 'problem', 'process', 'product', 'promise', 'promised', 'provides', 'providing', 'purpose', 'real', 'reality', 'region', 'relationship', 'release', 'relevant', 'repercussion', 'replace', 'replaced', 'replacing', 'report', 'represents', 'required', 'resilient', 'respond', 'responder', 'responding', 'response', 'result', 'resulted', 'reveal', 'revolution', 'right', 'rma', 'rsa', 'rule', 'satellite', 'saw', 'scale', 'scared', 'science', 'security', 'seductive', 'see', 'selling', 'sensor', 'service', 'shifted', 'short', 'show', 'simple', 'simply', 'soldier', 'sometimes', 'specific', 'speed', 'stand', 'step', 'still', 'strategist', 'strong', 'stupid', 'supposed', 'surveillance', 'synchronization', 'system', 'tag', 'take', 'talk', 'talked', 'talking', 'target', 'team', 'technique', 'technology', 'term', 'territory', 'testing', 'thing', 'think', 'thinking', 'though', 'thought', 'time', 'today', 'took', 'tool', 'topic', 'touched', 'traditional', 'troop', 'true', 'trusting', 'trying', 'uncertain', 'uncertainty', 'understand', 'understanding', 'union', 'unprecedented', 'useful', 'value', 'want', 'war', 'warfare', 'watson', 'way', 'weaponry', 'well', 'went', 'within', 'word', 'work', 'worked', 'world', 'would', 'wrong', 'yes', 'yet'] | |
218 | |
218 2017-03-16T18:31:29.792000Z https://www.mimecast.com/blog/2015/04/stand-together-to-fight-cybercrime-in-south-africa/ | |
218 2017-03-18T12:33:08.008000Z http://www.mimecast.com/blog/2015/04/stand-together-to-fight-cybercrime-in-south-africa/ | |
['accessible', 'according', 'acknowledges', 'across', 'activity', 'actually', 'address', 'addressing', 'africa', 'african', 'alone', 'already', 'analysis', 'announced', 'approach', 'area', 'armed', 'around', 'ask', 'associated', 'attack', 'available', 'award', 'awareness', 'backing', 'barack', 'barometer', 'beginning', 'bekker', 'bellwether', 'better', 'big', 'billion', 'blog', 'body', 'brandon', 'brief', 'clear', 'click', 'cloud', 'collaborative', 'collaboratively', 'collaborator', 'combat', 'comment', 'company', 'considered', 'context', 'continue', 'continuity', 'cost', 'costing', 'could', 'country', 'course', 'craig', 'credential', 'crime', 'currently', 'customer', 'cyber', 'cyberattacks', 'cybercrime', 'cybersecurity', 'data', 'debate', 'develop', 'developing', 'disqus', 'download', 'drastically', 'earlier', 'easier', 'economy', 'educating', 'education', 'effort', 'electronic', 'elsewhere', 'email', 'enable', 'encouragement', 'ensure', 'era', 'even', 'every', 'executive', 'explains', 'face', 'fight', 'fighting', 'filed', 'financial', 'focus', 'focusing', 'follow', 'form', 'front', 'future', 'garbage', 'gdp', 'general', 'global', 'going', 'government', 'guideline', 'hack', 'happens', 'help', 'highlight', 'hit', 'home', 'however', 'identity', 'implement', 'importance', 'improved', 'improving', 'including', 'increase', 'increased', 'information', 'infrastructure', 'initiate', 'initiative', 'insight', 'institution', 'intensified', 'interesting', 'introduced', 'issue', 'javascript', 'key', 'lack', 'landscape', 'legislation', 'linkedin', 'list', 'made', 'make', 'management', 'market', 'md', 'method', 'mimecast', 'mitigate', 'monitoring', 'nearer', 'need', 'needing', 'new', 'next', 'night', 'number', 'obama', 'officiate', 'operating', 'order', 'outline', 'part', 'partner', 'partnership', 'past', 'percent', 'perhaps', 'place', 'play', 'please', 'point', 'police', 'policy', 'pool', 'post', 'posted', 'powered', 'predictive', 'prepared', 'prevent', 'priority', 'private', 'problem', 'protect', 'protecting', 'psychology', 'public', 'pull', 'punishable', 'question', 'real', 'reason', 'regarding', 'related', 'relevant', 'report', 'reporting', 'resource', 'result', 'right', 'risk', 'role', 'rosewarne', 'rule', 'safe', 'sale', 'sector', 'security', 'seriously', 'service', 'share', 'similar', 'society', 'solution', 'south', 'sparked', 'specialized', 'stance', 'stand', 'standard', 'start', 'step', 'still', 'success', 'superhero', 'support', 'suspicious', 'system', 'tackling', 'taken', 'team', 'technology', 'theft', 'though', 'threat', 'together', 'top', 'unit', 'united', 'upgrade', 'used', 'view', 'vital', 'warrior', 'way', 'well', 'whaling', 'wider', 'winner', 'wolfpack', 'world', 'year'] | |
219 | |
219 2017-03-05T00:36:24.173000Z http://thehackernews.com/2013/05/hacker-insulted-thai-prime-minister.html | |
219 2017-03-05T00:38:40.911000Z http://thehackernews.com/2012/02/australian-nokia-sub-domain-defaced-by.html | |
219 2017-03-05T00:38:44.569000Z http://thehackernews.com/2012/02/honda-thailand-defaced-by-spydevilz-mr.html | |
219 2017-03-05T00:38:50.745000Z http://thehackernews.com/2012/01/inna-romanian-singers-site-defaced-by.html | |
219 2017-03-05T00:39:31.311000Z http://thehackernews.com/2011/10/microsoft-fuse-labs-sub-domain-defaced.html | |
219 2017-03-05T00:40:15.393000Z http://thehackernews.com/2011/08/joomla-canada-website-defaced-by-group.html | |
219 2017-03-05T00:40:17.541000Z http://thehackernews.com/2011/08/incom-hacked-and-defaced-by-mr25.html | |
219 2017-03-05T00:41:04.995000Z http://thehackernews.com/2011/06/150-united-kingdom-couk-domains-defaced.html | |
219 2017-03-05T00:42:38.948000Z http://thehackernews.com/2011/04/253-website-defaced-by-imm0rt4l-indian.html | |
219 2017-03-05T00:43:46.084000Z http://thehackernews.com/2011/03/indianmicrofinancecom-defaced-by-hex786.html | |
219 2017-03-05T00:43:50.162000Z http://thehackernews.com/2011/03/pakbugs-defaced-by-god-and-whole.html | |
219 2017-03-05T00:44:00.935000Z http://thehackernews.com/2011/03/ravi3ggsmindiacom-defaced-by-fedora-pak.html | |
219 2017-03-05T00:44:19.623000Z http://thehackernews.com/2011/02/48-sites-defaced-by-th0ght-breaker.html | |
219 2017-03-05T00:45:28.342000Z http://thehackernews.com/2011/01/ibm-developer-works-defaced-by-hmei7.html | |
219 2017-03-05T00:45:47.912000Z http://thehackernews.com/2010/12/2-websites-defaced-by-cybersam.html | |
219 2017-03-05T00:46:04.643000Z http://thehackernews.com/2010/12/5-websites-defaced-by-mckast.html | |
219 2017-03-05T00:46:35.322000Z http://thehackernews.com/2010/11/4-websites-defaced-by-r0ckykhan.html | |
219 2017-03-05T00:46:46.426000Z http://thehackernews.com/2010/11/162-websites-defaced-by-r00t3r.html | |
219 2017-03-05T00:47:00.169000Z http://thehackernews.com/2010/11/primrosegallerycouk-defaced-by.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defaced', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
220 | |
221 | |
221 2017-03-01T00:30:46.504000Z https://www.mimecast.com/blog/2017/02/top-moments-at-rsa-conference-2017/ | |
221 2017-03-18T12:30:53.498000Z http://www.mimecast.com/blog/2017/02/top-moments-at-rsa-conference-2017/ | |
['able', 'acceptable', 'action', 'adam', 'adopt', 'africa', 'also', 'america', 'among', 'apps', 'archive', 'archiving', 'ari', 'around', 'asia', 'assesment', 'assessment', 'attack', 'attend', 'award', 'bank', 'become', 'black', 'blog', 'bob', 'booth', 'breakaway', 'bruzzese', 'bundle', 'camera', 'career', 'center', 'central', 'ceo', 'challenge', 'chat', 'check', 'click', 'client', 'coalition', 'comment', 'company', 'compliance', 'conference', 'consensus', 'contact', 'content', 'continuity', 'control', 'cto', 'customer', 'cyber', 'cybersecurity', 'daily', 'dark', 'data', 'defense', 'demo', 'demonstrated', 'detail', 'digital', 'disclaimer', 'disclosure', 'discussed', 'disqus', 'diversity', 'dlp', 'early', 'ease', 'east', 'educate', 'eia', 'email', 'enable', 'engage', 'engineering', 'equal', 'esra', 'eu', 'europe', 'event', 'everyone', 'exchange', 'expert', 'face', 'facing', 'feel', 'file', 'filed', 'firm', 'francisco', 'front', 'full', 'gain', 'gap', 'gardiner', 'gartner', 'get', 'gist', 'google', 'got', 'great', 'hack', 'hacker', 'hacking', 'happened', 'hat', 'highlighted', 'home', 'hosted', 'house', 'hybrid', 'iep', 'im', 'image', 'included', 'incorporated', 'incumbent', 'industry', 'infographic', 'information', 'insight', 'interested', 'internal', 'interview', 'intriguing', 'investor', 'issue', 'jamie', 'javascript', 'joined', 'julian', 'knowing', 'knowledgebase', 'laliberte', 'large', 'latest', 'launched', 'lead', 'leader', 'leadership', 'legacy', 'light', 'like', 'live', 'login', 'look', 'magic', 'major', 'malware', 'managed', 'management', 'manager', 'many', 'martin', 'matthew', 'mechanism', 'medium', 'meet', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'missed', 'mobility', 'moderated', 'moment', 'morning', 'murray', 'must', 'name', 'nasdaq', 'neil', 'network', 'new', 'news', 'north', 'number', 'office', 'one', 'onsite', 'option', 'organization', 'overview', 'pacific', 'page', 'partner', 'peer', 'periscope', 'phishing', 'plaguing', 'platform', 'please', 'policy', 'post', 'posted', 'powered', 'press', 'primary', 'privacy', 'problem', 'product', 'productivity', 'professional', 'program', 'promise', 'proposed', 'prospect', 'protecting', 'protection', 'provide', 'quadrant', 'question', 'quote', 'reading', 'recap', 'registration', 'related', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resilient', 'resource', 'responsible', 'right', 'risk', 'role', 'room', 'rsa', 'sale', 'san', 'schedule', 'schwartz', 'secure', 'security', 'see', 'send', 'senior', 'service', 'session', 'seven', 'share', 'show', 'signature', 'sitemap', 'six', 'size', 'small', 'social', 'solution', 'solving', 'south', 'start', 'stopped', 'strategist', 'strategy', 'success', 'summary', 'support', 'system', 'take', 'targeted', 'team', 'technical', 'term', 'thank', 'think', 'thought', 'threat', 'today', 'top', 'training', 'trust', 'unknown', 'use', 'valuable', 'various', 'video', 'view', 'watch', 'watching', 'webinars', 'whalen', 'whaling', 'win', 'without', 'work', 'working', 'world', 'would'] | |
222 | |
222 2017-03-16T12:30:55.251000Z https://securityintelligence.com/health-care-providers-need-to-comply-with-hipaa-regulations-and-address-these-five-critical-security-issues/ | |
222 2017-03-27T18:30:56.980000Z https://www.pwnieexpress.com/blog/wireless-healthcare-and-compliance | |
['access', 'accountability', 'act', 'address', 'also', 'available', 'business', 'care', 'chain', 'compliance', 'comply', 'control', 'critical', 'data', 'device', 'ehr', 'electronic', 'encrypted', 'encryption', 'event', 'financial', 'government', 'hacking', 'handling', 'health', 'hipaa', 'however', 'include', 'including', 'individual', 'industry', 'information', 'institution', 'insurance', 'internet', 'like', 'many', 'measure', 'medical', 'move', 'must', 'network', 'organization', 'others', 'part', 'passed', 'patient', 'policy', 'portability', 'post', 'practice', 'prevent', 'privacy', 'protected', 'provider', 'ranging', 'record', 'regulation', 'related', 'report', 'reporting', 'research', 'right', 'secure', 'security', 'see', 'service', 'share', 'since', 'solution', 'store', 'storing', 'successful', 'system', 'tag', 'technology', 'thief', 'threat', 'time', 'top', 'type', 'unauthorized', 'update', 'use', 'year'] | |
223 | |
223 2017-03-16T18:30:58.686000Z https://isc.sans.edu/newssummary.html#1022441 | |
223 2017-03-16T18:31:03.653000Z https://isc.sans.edu/newssummary.html#1022467 | |
223 2017-03-16T18:31:05.354000Z https://isc.sans.edu/newssummary.html#1022487 | |
223 2017-03-16T18:31:07.155000Z https://isc.sans.edu/newssummary.html#1022501 | |
['ago', 'hack', 'hour', 'inforisktoday', 'synopsis', 'view', 'yahoo'] | |
224 | |
224 2017-03-02T00:30:50.491000Z https://arstechnica.com/security/2017/03/132-google-play-apps-tried-to-infect-android-users-with-windows-malware/ | |
224 2017-03-02T12:30:51.008000Z https://www.bleepingcomputer.com/news/security/132-google-play-store-apps-infected-by-windows-malware/ | |
224 2017-03-02T18:30:46.547000Z https://isc.sans.edu/forums/diary/Infected+Apps+in+Google+Play+Store+its+not+what+you+think/22139/ | |
224 2017-03-03T12:30:46.666000Z https://www.grahamcluley.com/132-android-apps/ | |
224 2017-03-08T18:30:54.441000Z https://nakedsecurity.sophos.com/2017/03/08/why-is-windows-malware-cropping-up-in-android-apps/ | |
224 2017-03-13T18:30:51.675000Z http://www.veracode.com/blog/security-news/android-app-holes-means-youre-your-own | |
['also', 'alto', 'android', 'app', 'apps', 'code', 'developer', 'domain', 'google', 'infected', 'malicious', 'malware', 'network', 'one', 'palo', 'play', 'post', 'security', 'user', 'window'] | |
225 | |
226 | |
227 | |
228 | |
228 2017-03-23T18:34:17.967000Z http://www.welivesecurity.com/2009/06/29/blackberry-sundae/ | |
228 2017-03-27T12:34:13.215000Z https://www.welivesecurity.com/2009/06/29/blackberry-sundae/ | |
['abta', 'access', 'account', 'accurate', 'achieve', 'actually', 'add', 'adhere', 'administrator', 'advice', 'affect', 'al', 'allied', 'also', 'altogether', 'android', 'anyone', 'app', 'applicable', 'applies', 'archive', 'arm', 'article', 'assessed', 'assessment', 'assurance', 'author', 'ba', 'blackberry', 'blog', 'breach', 'bullish', 'car', 'cause', 'cert', 'cesg', 'cissp', 'citp', 'classification', 'classify', 'clear', 'clearly', 'code', 'communication', 'community', 'company', 'compromise', 'conference', 'confidence', 'confidential', 'confidentiality', 'conform', 'connected', 'considered', 'construed', 'contact', 'context', 'copious', 'copyright', 'cybersecurity', 'damage', 'data', 'david', 'de', 'detail', 'deutsch', 'difficult', 'diplomatic', 'direct', 'director', 'disabling', 'disadvantage', 'div', 'doctrine', 'documentation', 'easily', 'easy', 'economics', 'effectiveness', 'email', 'embarrassment', 'embed', 'en', 'english', 'enterprise', 'eset', 'español', 'eventuality', 'exceptionally', 'expanded', 'expected', 'experience', 'expert', 'exploited', 'facebook', 'far', 'fbcs', 'feature', 'follow', 'force', 'friend', 'functionality', 'furthermore', 'gchq', 'give', 'go', 'government', 'grave', 'group', 'gsm', 'hackable', 'handling', 'harley', 'headquarters', 'heart', 'hmg', 'hold', 'hole', 'home', 'hot', 'however', 'http', 'impact', 'implant', 'impressive', 'inbox', 'information', 'insight', 'intelligence', 'interested', 'internal', 'involve', 'ir', 'issue', 'jic', 'language', 'latest', 'le', 'legal', 'level', 'liberty', 'life', 'likely', 'link', 'linkedin', 'little', 'long', 'longer', 'loss', 'lot', 'lynchpin', 'magazine', 'maintain', 'major', 'make', 'malware', 'mapping', 'marked', 'marking', 'material', 'matrix', 'mean', 'might', 'minor', 'month', 'motion', 'multimedia', 'name', 'national', 'navigation', 'netgear', 'news', 'newsletter', 'operation', 'operational', 'opinion', 'overall', 'page', 'paper', 'partway', 'patch', 'personal', 'phone', 'podcasts', 'policy', 'political', 'popular', 'post', 'posted', 'potentially', 'pretty', 'print', 'priority', 'privacy', 'procedure', 'protect', 'protected', 'protection', 'protective', 'protectively', 'public', 'published', 'purpose', 'qualify', 'quite', 'radar', 'range', 'ransomware', 'read', 'recent', 'related', 'relation', 'requirement', 'research', 'reserved', 'respect', 'restricted', 'right', 'rim', 'risk', 'router', 'safety', 'scare', 'search', 'secret', 'sector', 'security', 'seen', 'select', 'serious', 'sign', 'signal', 'site', 'sitemap', 'six', 'solution', 'sound', 'specific', 'specifically', 'stability', 'standard', 'stated', 'steal', 'story', 'stylesheet', 'suitable', 'sundae', 'support', 'surprised', 'system', 'tell', 'though', 'three', 'toggle', 'top', 'topic', 'training', 'twitter', 'uk', 'undecided', 'unique', 'upgrade', 'urged', 'use', 'used', 'user', 'various', 'version', 'video', 'view', 'virus', 'warns', 'way', 'webmaster', 'wechseln', 'whats', 'white', 'whole', 'widely', 'widespread', 'wls', 'word', 'wordpress', 'worked', 'year', 'youtube', 'zero', 'zum'] | |
229 | |
231 | |
232 | |
232 2017-03-16T12:30:55.189000Z http://securityaffairs.co/wordpress/57176/malware/majikpos-malware.html | |
232 2017-03-16T18:30:56.586000Z https://www.bleepingcomputer.com/news/security/north-americans-targeted-by-new-majikpos-dual-threat-malware/ | |
['access', 'according', 'admin', 'agent', 'allowed', 'also', 'american', 'ammyy', 'another', 'around', 'article', 'attack', 'attacker', 'author', 'available', 'based', 'breach', 'bulk', 'called', 'canada', 'card', 'club', 'contact', 'content', 'copyright', 'crook', 'dark', 'data', 'detected', 'device', 'different', 'diner', 'discover', 'dump', 'expert', 'express', 'fastpos', 'feature', 'file', 'find', 'first', 'forum', 'fsb', 'ftp', 'gorynych', 'hacker', 'hacking', 'home', 'id', 'including', 'information', 'installed', 'like', 'maestro', 'magic', 'majikpos', 'malware', 'management', 'many', 'mastercard', 'member', 'memory', 'micro', 'modified', 'modpos', 'modular', 'need', 'network', 'new', 'news', 'next', 'north', 'one', 'package', 'panel', 'part', 'password', 'past', 'please', 'po', 'policy', 'post', 'previous', 'priced', 'privacy', 'ram', 'ransomware', 'rat', 'rdp', 'remote', 'researcher', 'reserved', 'resource', 'respectively', 'right', 'sale', 'scan', 'scraping', 'security', 'sent', 'server', 'social', 'steal', 'stolen', 'strong', 'system', 'targeted', 'targeting', 'team', 'technique', 'threat', 'tool', 'trend', 'trojan', 'twitter', 'two', 'type', 'us', 'use', 'used', 'user', 'using', 'variant', 'version', 'via', 'visa', 'vnc', 'web', 'website', 'would', 'written', 'yahoo', 'year'] | |
233 | |
234 | |
234 2017-03-02T06:30:51.210000Z https://www.bleepingcomputer.com/offer/deals/new-deal-97-percent-off-the-the-complete-linux-mastery-bundle/ | |
234 2017-03-04T00:30:50.982000Z https://www.bleepingcomputer.com/offer/deals/new-deal-python-3-bootcamp-bundle/ | |
234 2017-03-06T18:30:57.754000Z https://www.bleepingcomputer.com/offer/deals/new-deal-96-percent-off-the-ethical-hacking-a-to-z-bundle/ | |
234 2017-03-13T18:30:50.140000Z https://www.bleepingcomputer.com/offer/deals/new-deal-94-percent-off-the-complete-c-coding-bootcamp/ | |
234 2017-03-15T18:30:54.302000Z https://www.bleepingcomputer.com/offer/deals/new-deal-88-percent-off-the-information-security-certification-training-bundle/ | |
234 2017-03-17T18:30:59.320000Z https://www.bleepingcomputer.com/offer/deals/new-deal-pay-what-you-want-2017-master-game-development-course-bundle/ | |
['abusive', 'account', 'advertising', 'adwcleaner', 'agreement', 'allowed', 'also', 'alureon', 'anonymously', 'antivirus', 'article', 'available', 'bleeping', 'bleepingcomputer', 'bundle', 'category', 'certification', 'changelog', 'chat', 'check', 'close', 'combofix', 'command', 'comment', 'commission', 'community', 'company', 'computer', 'contact', 'content', 'copy', 'copyright', 'course', 'cryptodefense', 'cryptolocker', 'cryptorbit', 'database', 'deal', 'disclosure', 'downloaded', 'downloads', 'earns', 'elearning', 'emsisoft', 'every', 'facebook', 'faq', 'featured', 'feed', 'file', 'find', 'folder', 'follow', 'form', 'forum', 'furthermore', 'gadget', 'gear', 'giveaway', 'glossary', 'going', 'google', 'guide', 'handle', 'harmful', 'help', 'hidden', 'home', 'hour', 'howdecrypt', 'inappropriate', 'included', 'information', 'installed', 'instruction', 'irc', 'language', 'latest', 'learn', 'license', 'like', 'llc', 'locky', 'login', 'made', 'main', 'malware', 'manager', 'member', 'mode', 'msevents', 'need', 'new', 'news', 'newsletter', 'offer', 'order', 'participate', 'partnership', 'password', 'periodic', 'please', 'policy', 'popular', 'post', 'posted', 'potplayer', 'previous', 'privacy', 'problem', 'program', 'prompt', 'ransomware', 'receive', 'recover', 'redirects', 'register', 'registration', 'remember', 'removal', 'remove', 'reporter', 'required', 'reserved', 'resource', 'right', 'rkill', 'rootkit', 'rule', 'safe', 'sale', 'section', 'security', 'securitytool', 'see', 'shadow', 'show', 'sign', 'sitemap', 'social', 'spam', 'sponsored', 'stackcommerce', 'start', 'startup', 'store', 'strong', 'submit', 'submitting', 'task', 'tdss', 'tdsskiller', 'tool', 'topic', 'training', 'trojan', 'tutorial', 'twitter', 'understand', 'uninstall', 'update', 'use', 'useful', 'user', 'username', 'using', 'version', 'viewed', 'virtumonde', 'virus', 'volume', 'welcome', 'window', 'winfixer', 'worm', 'write', 'yet'] | |
236 | |
236 2017-03-04T00:30:48.217000Z http://packetpushers.net/podcast/podcasts/show-329-meet-nbase-t-ethernet-alliance/ | |
236 2017-03-15T18:30:44.785000Z http://packetpushers.net/podcast/podcasts/datanauts-075-aws-warts/ | |
236 2017-03-20T18:30:55.697000Z http://packetpushers.net/podcast/podcasts/network-break-127/ | |
236 2017-03-21T18:30:50.708000Z http://packetpushers.net/survey-snapshot-id-theft-credit-monitoring/ | |
236 2017-03-22T18:30:45.977000Z http://packetpushers.net/podcast/podcasts/datanauts-076-aws-azure/ | |
236 2017-03-28T18:30:51.760000Z http://packetpushers.net/silver-peak-adds-bgp-firewall-capabilities-sd-wan-product/ | |
['add', 'address', 'advertising', 'also', 'announces', 'arista', 'audit', 'bank', 'barefoot', 'barely', 'blog', 'book', 'break', 'build', 'cancel', 'capability', 'chip', 'cloud', 'comment', 'community', 'company', 'compendium', 'complete', 'contact', 'content', 'cutovers', 'data', 'datanauts', 'day', 'delegate', 'delighted', 'delivered', 'design', 'detect', 'device', 'donut', 'drew', 'email', 'emphasis', 'enough', 'enterprise', 'episode', 'ethan', 'etsi', 'event', 'extends', 'extreme', 'faq', 'field', 'first', 'follow', 'forum', 'free', 'future', 'get', 'global', 'help', 'home', 'human', 'indicates', 'information', 'infotrek', 'infrastructure', 'infrequent', 'inside', 'interactive', 'interop', 'iot', 'itx', 'job', 'last', 'latest', 'leave', 'let', 'life', 'list', 'live', 'llc', 'login', 'love', 'magazine', 'main', 'manufacturer', 'many', 'marked', 'member', 'merchant', 'moderation', 'much', 'name', 'netbeez', 'network', 'networking', 'netwrix', 'new', 'news', 'newsletter', 'novel', 'office', 'open', 'openstack', 'operating', 'oracle', 'packet', 'page', 'partner', 'passionate', 'peak', 'people', 'permission', 'podcast', 'podcasts', 'policy', 'pq', 'priority', 'private', 'project', 'published', 'pusher', 'queue', 'radar', 'reach', 'real', 'recent', 'relation', 'reply', 'required', 'research', 'reserved', 'right', 'scanner', 'search', 'security', 'series', 'service', 'show', 'side', 'signups', 'silicon', 'silver', 'site', 'smart', 'snapshot', 'source', 'spam', 'spare', 'stack', 'startup', 'streamlines', 'subscribe', 'support', 'supporter', 'survey', 'switch', 'system', 'talk', 'target', 'tata', 'tea', 'tech', 'technology', 'time', 'toolbox', 'twitter', 'update', 'useful', 'user', 'velocloud', 'vendor', 'versa', 'video', 'viptela', 'virtual', 'vulnerability', 'website', 'weekly', 'would', 'writes', 'writing', 'year', 'zerostack'] | |
237 | |
237 2017-03-09T18:31:16.008000Z http://www.welivesecurity.com/2016/01/05/shipping-industry-gets-first-set-cybersecurity-guidelines/ | |
237 2017-03-27T12:31:57.196000Z https://www.welivesecurity.com/2016/01/05/shipping-industry-gets-first-set-cybersecurity-guidelines/ | |
['able', 'activist', 'add', 'admit', 'advises', 'al', 'also', 'android', 'another', 'app', 'appreciate', 'approach', 'appropriate', 'archive', 'article', 'aspect', 'ass', 'attack', 'attacker', 'author', 'bimco', 'blog', 'botnets', 'breach', 'causing', 'certain', 'clia', 'coalition', 'code', 'come', 'commercial', 'common', 'community', 'company', 'conference', 'connected', 'consequence', 'contact', 'copyright', 'criminal', 'cyber', 'cyberattacks', 'cybercrime', 'cybersecurity', 'damage', 'data', 'de', 'deal', 'decided', 'department', 'designed', 'deutsch', 'developed', 'direct', 'div', 'document', 'easy', 'email', 'embed', 'emerged', 'en', 'engineering', 'english', 'enough', 'ensure', 'environmental', 'eset', 'español', 'ever', 'evidence', 'example', 'experienced', 'expert', 'facebook', 'feature', 'financial', 'first', 'focus', 'follow', 'friend', 'gain', 'get', 'go', 'google', 'growing', 'guided', 'guideline', 'head', 'help', 'historical', 'home', 'hot', 'http', 'ic', 'immune', 'implement', 'inbox', 'incident', 'industry', 'information', 'infrastructure', 'initiated', 'innovation', 'insight', 'inspired', 'intercargo', 'interested', 'intertanko', 'ir', 'key', 'lack', 'language', 'latest', 'leading', 'legal', 'level', 'like', 'link', 'linkedin', 'live', 'magazine', 'main', 'make', 'management', 'material', 'might', 'million', 'month', 'motif', 'multimedia', 'narinder', 'national', 'navigation', 'nevertheless', 'new', 'news', 'newsletter', 'noted', 'number', 'offer', 'officer', 'one', 'operational', 'operator', 'opinion', 'opposed', 'organization', 'owner', 'page', 'paper', 'partner', 'phishing', 'play', 'podcasts', 'policy', 'popular', 'post', 'posted', 'prepared', 'prime', 'print', 'privacy', 'process', 'protect', 'publishing', 'purba', 'radar', 'ransomware', 'read', 'related', 'relevant', 'reporting', 'reputational', 'requirement', 'research', 'reserved', 'response', 'responsibility', 'right', 'risk', 'safety', 'search', 'secure', 'security', 'select', 'senior', 'set', 'ship', 'shipping', 'sign', 'significant', 'site', 'sitemap', 'social', 'spurred', 'stakeholder', 'standard', 'stylesheet', 'system', 'tackle', 'taking', 'target', 'technique', 'technological', 'therefore', 'threat', 'together', 'toggle', 'topic', 'twitter', 'type', 'uk', 'understanding', 'unique', 'vessel', 'victim', 'video', 'view', 'virus', 'web', 'wechseln', 'well', 'whats', 'white', 'wls', 'youtube', 'zum'] | |
238 | |
238 2017-03-25T06:31:44.573000Z http://www.welivesecurity.com/2009/07/02/june-threatsense-report/ | |
238 2017-03-27T12:34:11.169000Z https://www.welivesecurity.com/2009/07/02/june-threatsense-report/ | |
238 2017-03-29T18:31:26.074000Z https://www.welivesecurity.com/2009/07/06/statistical-accuracy-and-the-gullibility-gene/ | |
['activity', 'actually', 'add', 'al', 'also', 'android', 'app', 'apple', 'archive', 'article', 'author', 'autorun', 'ba', 'back', 'blog', 'car', 'case', 'cert', 'cia', 'cissp', 'citp', 'code', 'community', 'conference', 'conficker', 'connected', 'contact', 'continuing', 'copyright', 'cybersecurity', 'david', 'de', 'deal', 'detection', 'detects', 'deutsch', 'different', 'difficult', 'direct', 'director', 'disabling', 'div', 'download', 'easily', 'easy', 'economics', 'email', 'embed', 'en', 'english', 'eset', 'español', 'exact', 'expert', 'exploit', 'exploited', 'facebook', 'factor', 'fbcs', 'follow', 'friend', 'general', 'generic', 'go', 'google', 'hackable', 'harley', 'heart', 'hole', 'home', 'hot', 'however', 'http', 'impact', 'implant', 'important', 'inbox', 'information', 'insight', 'intelligence', 'interested', 'ir', 'language', 'latest', 'le', 'legal', 'like', 'link', 'linkedin', 'lot', 'machine', 'magazine', 'make', 'malware', 'material', 'mean', 'mechanism', 'might', 'minecraft', 'mod', 'month', 'multimedia', 'navigation', 'netgear', 'network', 'new', 'news', 'newsletter', 'nowadays', 'number', 'one', 'opinion', 'page', 'paper', 'patch', 'patching', 'people', 'pick', 'play', 'podcasts', 'policy', 'popular', 'post', 'posted', 'print', 'privacy', 'properly', 'protected', 'radar', 'ransomware', 'rather', 'read', 'really', 'related', 'report', 'research', 'reserved', 'revealed', 'right', 'router', 'say', 'scare', 'search', 'second', 'securing', 'security', 'select', 'share', 'sign', 'site', 'sitemap', 'six', 'source', 'steal', 'still', 'stylesheet', 'successfully', 'taking', 'term', 'threat', 'time', 'timely', 'toggle', 'topic', 'trend', 'twitter', 'undecided', 'underwhelmed', 'upgrade', 'urged', 'use', 'used', 'variant', 'vector', 'version', 'video', 'view', 'virus', 'warns', 'webmaster', 'wechseln', 'well', 'whats', 'white', 'wikileaks', 'wls', 'wordpress', 'would', 'year', 'youtube', 'zum'] | |
239 | |
240 | |
241 | |
242 | |
242 2017-03-23T00:31:03.319000Z http://www.welivesecurity.com/2015/02/13/facebook-exploit-allowed-attackers-remotely-delete-photos/ | |
242 2017-03-27T12:32:13.521000Z https://www.welivesecurity.com/2015/02/13/facebook-exploit-allowed-attackers-remotely-delete-photos/ | |
['able', 'abta', 'abuse', 'according', 'account', 'add', 'ago', 'al', 'alan', 'album', 'allowed', 'allowing', 'also', 'always', 'android', 'anyone', 'api', 'app', 'archive', 'article', 'attacker', 'author', 'awarded', 'backup', 'belong', 'belonging', 'blog', 'bounty', 'breach', 'bug', 'changed', 'code', 'community', 'company', 'completed', 'conference', 'consuming', 'contact', 'content', 'control', 'copyright', 'could', 'course', 'cybersecurity', 'data', 'de', 'delete', 'deleted', 'deutsch', 'direct', 'dissecting', 'div', 'economics', 'email', 'embed', 'en', 'english', 'eset', 'español', 'experience', 'expert', 'explaining', 'exploit', 'exploited', 'extremely', 'facebook', 'fan', 'far', 'fb', 'first', 'firstly', 'follow', 'fool', 'found', 'friend', 'function', 'get', 'giant', 'go', 'going', 'graph', 'hack', 'hacker', 'hoax', 'home', 'hot', 'hour', 'http', 'hungry', 'hunter', 'id', 'idrive', 'im', 'inbox', 'information', 'inserting', 'insight', 'interested', 'ir', 'issue', 'jonathan', 'knowledge', 'language', 'large', 'latest', 'laxman', 'left', 'legal', 'like', 'limitation', 'limiter', 'line', 'link', 'linkedin', 'linux', 'made', 'magazine', 'manipulate', 'martin', 'mashable', 'material', 'mean', 'medium', 'might', 'mine', 'month', 'multimedia', 'muthiyah', 'navigation', 'need', 'needed', 'network', 'networking', 'news', 'newsletter', 'nothing', 'notice', 'observes', 'one', 'online', 'opinion', 'outlined', 'owned', 'page', 'paper', 'patched', 'photo', 'photograph', 'place', 'please', 'podcasts', 'policy', 'popular', 'post', 'posted', 'print', 'privacy', 'problem', 'provide', 'public', 'pull', 'radar', 'ransomware', 'rate', 'read', 'reason', 'register', 'related', 'remotely', 'report', 'reported', 'required', 'research', 'reserved', 'rid', 'right', 'safety', 'scale', 'script', 'search', 'secondly', 'secure', 'security', 'see', 'select', 'setting', 'share', 'short', 'sign', 'since', 'site', 'sitemap', 'social', 'software', 'soon', 'spark', 'spreading', 'starting', 'step', 'stop', 'stopped', 'stylesheet', 'targeted', 'team', 'thanked', 'third', 'time', 'tip', 'toggle', 'token', 'topic', 'trace', 'trick', 'trust', 'twitter', 'two', 'undecided', 'undesirable', 'us', 'use', 'using', 'vanished', 'vendor', 'victim', 'video', 'view', 'virus', 'want', 'wanted', 'website', 'wechseln', 'whats', 'white', 'wish', 'within', 'wls', 'worm', 'would', 'year', 'youtube', 'zum'] | |
243 | |
243 2017-03-20T12:31:06.105000Z http://www.itsecurityguru.org/2017/03/20/governance-getting-way-innovation/ | |
243 2017-03-20T12:31:07.772000Z http://www.itsecurityguru.org/2017/03/20/visibility-context-control-three-blind-mice-application-security/ | |
243 2017-03-20T12:32:49.297000Z http://www.itsecurityguru.org/2017/03/20/cisco-finds-zero-day-vulnerability-vault-7-leak/ | |
243 2017-03-20T12:33:05.194000Z http://www.itsecurityguru.org/2017/03/20/saks-fifth-avenue-leaves-personal-information-thousands-customers-exposed-online/ | |
243 2017-03-20T18:31:43.280000Z http://www.itsecurityguru.org/2017/03/20/uks-brightest-cyber-security-talent-come-imperial-college-london/ | |
['ability', 'account', 'across', 'ad', 'administrator', 'advanced', 'affect', 'afraid', 'ago', 'ai', 'amazon', 'american', 'amid', 'amidst', 'anonabox', 'application', 'applies', 'appreciate', 'appriver', 'approves', 'around', 'article', 'arturplavnik', 'ask', 'atm', 'attack', 'avenue', 'back', 'backlash', 'bad', 'badly', 'baker', 'bank', 'banking', 'believe', 'biggest', 'binary', 'biometrics', 'blind', 'board', 'bot', 'breach', 'broadly', 'build', 'business', 'campaign', 'change', 'cisco', 'citibank', 'clearance', 'cm', 'combat', 'come', 'comment', 'communication', 'community', 'concern', 'costing', 'couple', 'creating', 'criminal', 'customer', 'cyber', 'cybersecurity', 'dangerous', 'dark', 'data', 'date', 'day', 'ddos', 'decrypted', 'development', 'doe', 'dtmf', 'ebay', 'editor', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'even', 'event', 'experience', 'explain', 'exposed', 'express', 'extremism', 'facebook', 'family', 'fifth', 'financial', 'find', 'finnish', 'firm', 'flaw', 'flynn', 'follow', 'ford', 'forum', 'fraud', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'gmail', 'goodbye', 'got', 'government', 'grip', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'help', 'hitting', 'home', 'hospital', 'http', 'impact', 'imposter', 'improve', 'incident', 'information', 'infosec', 'infosecurity', 'inside', 'jay', 'jesse', 'jones', 'joyce', 'know', 'landmark', 'law', 'leaf', 'leak', 'leave', 'lee', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'macos', 'making', 'malware', 'many', 'met', 'mike', 'million', 'mind', 'mitigation', 'mixed', 'ne', 'netflix', 'new', 'news', 'next', 'num', 'offensive', 'online', 'open', 'operation', 'option', 'paid', 'paypal', 'people', 'persistent', 'personal', 'pervasive', 'phishing', 'platform', 'pm', 'polite', 'popular', 'post', 'posted', 'postin', 'previous', 'primary', 'privacy', 'professional', 'protecting', 'protection', 'quality', 'ramond', 'ransomware', 'really', 'recent', 'regulation', 'related', 'relationship', 'remains', 'response', 'retailer', 'return', 'rich', 'rise', 'risk', 'round', 'run', 'running', 'saks', 'sale', 'scam', 'secure', 'security', 'senior', 'sensitive', 'share', 'shortage', 'sign', 'skill', 'software', 'sold', 'sort', 'source', 'spam', 'spot', 'squad', 'stick', 'still', 'stock', 'story', 'supporter', 'suspends', 'tackle', 'tag', 'tagged', 'talking', 'tania', 'target', 'targeting', 'technology', 'ten', 'term', 'themed', 'thing', 'thousand', 'threat', 'time', 'tool', 'top', 'trading', 'trend', 'trump', 'turning', 'tweet', 'twitter', 'uk', 'uncovers', 'understanding', 'underway', 'usb', 'used', 'user', 'using', 'usps', 'vector', 'video', 'viral', 'vulnerability', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'wild', 'within', 'working', 'worse', 'yahoo', 'year', 'youtube'] | |
244 | |
245 | |
245 2017-03-18T06:31:12.185000Z http://www.welivesecurity.com/2014/05/18/technology-giants-join-forces-batttle-tech-support-phone-scams/ | |
245 2017-03-27T12:32:40.835000Z https://www.welivesecurity.com/2014/05/18/technology-giants-join-forces-batttle-tech-support-phone-scams/ | |
['account', 'active', 'actor', 'ad', 'add', 'advertiser', 'advertising', 'advice', 'advised', 'advisor', 'adware', 'aim', 'airline', 'al', 'alert', 'also', 'although', 'android', 'aol', 'app', 'archive', 'article', 'ask', 'asked', 'attempting', 'author', 'automated', 'away', 'bad', 'basic', 'battle', 'beware', 'blog', 'bogus', 'breach', 'calling', 'catch', 'certified', 'code', 'come', 'community', 'company', 'compared', 'comptuer', 'conference', 'consumer', 'contact', 'contained', 'copyright', 'criminal', 'crucial', 'customer', 'cybersecurity', 'damaging', 'david', 'de', 'dealing', 'dedicated', 'deeper', 'detail', 'deutsch', 'direct', 'director', 'div', 'download', 'downloaded', 'dual', 'easily', 'email', 'embed', 'emirate', 'en', 'encouraged', 'english', 'eset', 'español', 'ever', 'executive', 'expert', 'extensively', 'facebook', 'fake', 'file', 'filtering', 'fix', 'flight', 'follow', 'fooled', 'force', 'form', 'found', 'fraudulent', 'free', 'freely', 'friend', 'giant', 'give', 'go', 'good', 'google', 'government', 'great', 'guide', 'haralson', 'harder', 'harley', 'harmful', 'harrison', 'hide', 'highly', 'holiday', 'home', 'hot', 'http', 'identity', 'impact', 'inbox', 'information', 'initial', 'insight', 'install', 'interested', 'internet', 'ir', 'issue', 'join', 'joined', 'keystroke', 'language', 'large', 'latest', 'legal', 'legitimate', 'length', 'line', 'link', 'linked', 'linkedin', 'live', 'logger', 'magazine', 'malicious', 'malware', 'manual', 'material', 'medium', 'microsoft', 'might', 'miscreant', 'month', 'move', 'multimedia', 'navigation', 'needing', 'netflix', 'network', 'new', 'news', 'newsletter', 'number', 'offer', 'offering', 'official', 'often', 'online', 'opinion', 'order', 'organization', 'page', 'paper', 'password', 'pc', 'pdf', 'phone', 'piece', 'plague', 'platform', 'podcasts', 'point', 'policy', 'popular', 'post', 'posted', 'presenting', 'pretend', 'preventing', 'prey', 'print', 'privacy', 'product', 'program', 'promise', 'provide', 'provider', 'provides', 'publish', 'published', 'radar', 'ransomware', 'rather', 'read', 'regular', 'reign', 'related', 'report', 'reported', 'representative', 'required', 'research', 'reserved', 'review', 'right', 'rob', 'role', 'said', 'say', 'scam', 'scammer', 'search', 'season', 'security', 'select', 'senate', 'service', 'sign', 'site', 'sitemap', 'small', 'social', 'software', 'solve', 'solving', 'sophisticated', 'spain', 'speak', 'special', 'spyware', 'stamp', 'step', 'stylesheet', 'support', 'suspicious', 'take', 'tech', 'technical', 'techniciian', 'technique', 'technology', 'theft', 'threat', 'ticket', 'toggle', 'topic', 'trend', 'trust', 'trustinads', 'trying', 'twitter', 'uggs', 'unbeknownst', 'understanding', 'unsuspecting', 'use', 'used', 'user', 'using', 'valuable', 'variety', 'various', 'victim', 'video', 'view', 'virus', 'wake', 'warning', 'waugh', 'website', 'wechseln', 'whats', 'whatsapp', 'white', 'wide', 'without', 'wls', 'work', 'written', 'youtube', 'zum'] | |
246 | |
247 | |
247 2017-03-25T06:31:22.189000Z http://www.welivesecurity.com/2013/07/30/thomson-reuters-is-latest-victim-of-high-profile-twitter-hacks/ | |
247 2017-03-27T12:32:55.653000Z https://www.welivesecurity.com/2013/07/30/thomson-reuters-is-latest-victim-of-high-profile-twitter-hacks/ | |
['abta', 'according', 'account', 'add', 'affiliated', 'agency', 'al', 'also', 'android', 'app', 'apple', 'apps', 'archive', 'army', 'article', 'attack', 'author', 'bad', 'banking', 'believe', 'bite', 'blame', 'blog', 'breach', 'bug', 'car', 'cartoon', 'cbs', 'charge', 'chat', 'claimed', 'closed', 'code', 'community', 'company', 'compromised', 'compromising', 'conference', 'conflict', 'connected', 'connection', 'contact', 'continue', 'copyright', 'corporate', 'current', 'currently', 'customer', 'cybercrime', 'cybercriminals', 'cybersecurity', 'data', 'de', 'deutsch', 'direct', 'div', 'download', 'earlier', 'economics', 'electronic', 'email', 'embed', 'en', 'english', 'eset', 'español', 'experience', 'expert', 'fabricated', 'facebook', 'feed', 'financial', 'follow', 'friend', 'fsb', 'go', 'google', 'group', 'hack', 'hacked', 'hacker', 'hacking', 'happening', 'high', 'home', 'hostage', 'hot', 'http', 'icloud', 'inbox', 'including', 'individual', 'information', 'insight', 'interested', 'international', 'ir', 'language', 'latest', 'le', 'leaking', 'legal', 'link', 'linkedin', 'live', 'magazine', 'massive', 'material', 'medium', 'messaging', 'might', 'minecraft', 'mod', 'month', 'multimedia', 'navigation', 'news', 'newsletter', 'official', 'opinion', 'organization', 'page', 'paper', 'past', 'period', 'play', 'podcasts', 'policy', 'popular', 'post', 'posted', 'previous', 'print', 'privacy', 'published', 'radar', 'ransomware', 'read', 'really', 'reason', 'related', 'relating', 'remote', 'report', 'research', 'reserved', 'responsibility', 'reuters', 'right', 'rob', 'rtm', 'russian', 'said', 'saying', 'search', 'security', 'select', 'sent', 'series', 'sign', 'site', 'sitemap', 'smartphones', 'source', 'spokesperson', 'stealthy', 'stylesheet', 'suspended', 'syria', 'syrian', 'system', 'tango', 'target', 'targeting', 'thing', 'thomson', 'thomsonreuters', 'time', 'today', 'toggle', 'topic', 'truth', 'tweet', 'twitter', 'unauthorized', 'undecided', 'used', 'value', 'viber', 'victim', 'video', 'view', 'virus', 'wake', 'waugh', 'website', 'wechseln', 'week', 'well', 'whats', 'white', 'wls', 'yahoo', 'year', 'youtube', 'zum'] | |
248 | |
249 | |
250 | |
250 2017-03-09T18:31:56.575000Z http://www.welivesecurity.com/2011/12/06/wi-fi-and-fertility-warm-but-not-so-fuzzy/ | |
250 2017-03-27T12:33:32.182000Z https://www.welivesecurity.com/2011/12/06/wi-fi-and-fertility-warm-but-not-so-fuzzy/ | |
['accurate', 'active', 'add', 'additional', 'al', 'also', 'american', 'amount', 'android', 'app', 'archive', 'argentinian', 'article', 'author', 'avar', 'away', 'balancing', 'battery', 'blog', 'body', 'bulletin', 'burn', 'business', 'ca', 'carried', 'carry', 'census', 'cissp', 'citp', 'close', 'code', 'cold', 'community', 'concern', 'conference', 'contact', 'copyright', 'course', 'customer', 'cybersecurity', 'damage', 'data', 'david', 'de', 'deutsch', 'device', 'digital', 'direct', 'disconcerting', 'div', 'dna', 'email', 'embed', 'en', 'energetically', 'english', 'eset', 'español', 'even', 'experienced', 'experiment', 'expert', 'extent', 'facebook', 'fbcs', 'fellow', 'fertility', 'fish', 'follow', 'found', 'friend', 'fuzzy', 'generation', 'go', 'google', 'hack', 'harley', 'health', 'heat', 'highlighted', 'home', 'hot', 'however', 'http', 'human', 'immediate', 'inbox', 'indicates', 'indication', 'inflight', 'information', 'insight', 'interested', 'internet', 'ir', 'issue', 'kept', 'language', 'lap', 'laptop', 'latest', 'le', 'legal', 'link', 'linkedin', 'look', 'magazine', 'material', 'might', 'month', 'multimedia', 'navigation', 'network', 'nevertheless', 'news', 'newsletter', 'opinion', 'page', 'paper', 'people', 'placed', 'plane', 'play', 'podcasts', 'policy', 'pool', 'popular', 'post', 'posted', 'presentation', 'print', 'privacy', 'probably', 'published', 'radar', 'ransomware', 'read', 'really', 'reduce', 'related', 'remit', 'report', 'research', 'researcher', 'reserved', 'right', 'risk', 'router', 'running', 'safety', 'search', 'security', 'select', 'senior', 'sign', 'signal', 'site', 'sitemap', 'slightly', 'smartphones', 'specimen', 'sperm', 'sterility', 'still', 'stylesheet', 'suffered', 'suffering', 'suggestion', 'swam', 'swim', 'taken', 'tasty', 'technology', 'telegraph', 'temperature', 'time', 'toggle', 'topic', 'twitter', 'unborn', 'update', 'used', 'usual', 'usually', 'video', 'view', 'virus', 'vitro', 'wardriving', 'warm', 'warning', 'wechseln', 'well', 'whats', 'white', 'wifi', 'wireless', 'within', 'wls', 'wonder', 'would', 'yet', 'youtube', 'zum'] | |
252 | |
252 2017-03-17T18:30:56.412000Z https://corero.com/blog/805-iot-security-is-an-oxymoron.html | |
252 2017-03-23T18:33:37.602000Z https://corero.com/blog/805-lack-of-iot-security-fuels-terabit-ddos-attacks.html | |
['accelerate', 'according', 'affordable', 'afterthought', 'also', 'architected', 'architecture', 'article', 'attack', 'automated', 'automatic', 'award', 'bane', 'become', 'better', 'billion', 'boon', 'botnet', 'brings', 'build', 'bullet', 'care', 'carrier', 'category', 'caused', 'ceo', 'check', 'code', 'comment', 'common', 'communication', 'company', 'connected', 'consumer', 'contact', 'continues', 'control', 'corero', 'cost', 'creator', 'crippling', 'current', 'customer', 'ddos', 'ddpaas', 'default', 'defense', 'denial', 'dependent', 'destiny', 'detection', 'device', 'difficult', 'direction', 'disqus', 'distributed', 'domain', 'done', 'dunnit', 'dyn', 'enable', 'end', 'enterprise', 'entity', 'erratum', 'establishing', 'even', 'ever', 'experience', 'fall', 'fight', 'find', 'forget', 'fueled', 'furthermore', 'future', 'gaming', 'gartner', 'get', 'given', 'going', 'graham', 'great', 'hacker', 'hand', 'happen', 'hosting', 'however', 'hundred', 'immune', 'implementing', 'important', 'improve', 'improved', 'including', 'inconvenience', 'infect', 'infected', 'infecting', 'infection', 'information', 'install', 'instrumental', 'interested', 'internet', 'investment', 'iot', 'javascript', 'large', 'launched', 'le', 'life', 'like', 'likely', 'lot', 'made', 'majority', 'make', 'malware', 'manipulating', 'manufacturer', 'many', 'market', 'marketing', 'meet', 'million', 'minute', 'mirai', 'mitigation', 'money', 'name', 'near', 'need', 'network', 'offer', 'often', 'one', 'online', 'organization', 'oxymoron', 'password', 'patch', 'pcworld', 'penetration', 'please', 'poor', 'portfolio', 'post', 'posted', 'potential', 'powered', 'president', 'product', 'professional', 'progress', 'protection', 'provider', 'real', 'reputation', 'right', 'rising', 'road', 'rob', 'rush', 'scalable', 'sea', 'security', 'send', 'service', 'setting', 'share', 'silver', 'solution', 'source', 'stem', 'step', 'stephanie', 'strain', 'strives', 'substantial', 'system', 'take', 'taken', 'tarnished', 'therefore', 'thing', 'thousand', 'threat', 'tide', 'time', 'trend', 'universally', 'unlikely', 'update', 'usually', 'vast', 'vice', 'view', 'war', 'weagle', 'window', 'winning', 'within', 'world', 'year'] | |
253 | |
254 | |
254 2017-03-01T06:32:50.456000Z https://www.mimecast.com/blog/2012/05/exchange-sp2-hybrid-configuration-wizard-and-proxy-servers/ | |
254 2017-03-18T12:35:27.315000Z http://www.mimecast.com/blog/2012/05/exchange-sp2-hybrid-configuration-wizard-and-proxy-servers/ | |
['able', 'acceptable', 'access', 'accommodate', 'achieved', 'adding', 'address', 'africa', 'america', 'applies', 'apps', 'archive', 'archiving', 'article', 'asia', 'assumed', 'assumes', 'assuming', 'attempting', 'award', 'become', 'behind', 'best', 'blank', 'blatantly', 'blog', 'bundle', 'byod', 'bypass', 'call', 'career', 'center', 'central', 'certificate', 'chat', 'cleared', 'coalition', 'command', 'comment', 'company', 'compliance', 'configuration', 'connect', 'connected', 'connection', 'connectivity', 'connects', 'contact', 'content', 'context', 'continuity', 'control', 'controller', 'correct', 'cpu', 'creation', 'customer', 'cyber', 'data', 'deal', 'demo', 'detail', 'diagnosis', 'direct', 'directly', 'disclaimer', 'disclosure', 'displaying', 'disqus', 'dlp', 'domain', 'driving', 'east', 'email', 'enable', 'end', 'enter', 'environment', 'europe', 'event', 'evil', 'exchange', 'explorer', 'fail', 'fails', 'feature', 'federation', 'file', 'filed', 'find', 'firewall', 'first', 'following', 'follows', 'gateway', 'generates', 'get', 'google', 'guarantee', 'gui', 'help', 'hinderance', 'hit', 'home', 'hope', 'however', 'hybrid', 'ignoring', 'im', 'immediatelly', 'imply', 'import', 'imported', 'including', 'information', 'installed', 'interactively', 'internet', 'investor', 'item', 'javascript', 'knowledge', 'knowledgebase', 'large', 'lastly', 'leadership', 'legacy', 'line', 'liner', 'little', 'local', 'login', 'managed', 'management', 'massively', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'modern', 'modify', 'netsh', 'network', 'new', 'news', 'nicolas', 'north', 'number', 'office', 'often', 'omitted', 'one', 'option', 'outright', 'overview', 'owa', 'pacific', 'parameter', 'partner', 'people', 'piece', 'platform', 'please', 'policy', 'possible', 'post', 'posted', 'powered', 'powershell', 'press', 'privacy', 'product', 'productivity', 'professional', 'program', 'prompt', 'protection', 'proxy', 'querying', 'quote', 'ready', 'registration', 'relation', 'release', 'required', 'requiring', 'reseller', 'reserved', 'reset', 'resilience', 'resolved', 'resolving', 'resource', 'responsible', 'right', 'risk', 'role', 'route', 'routed', 'run', 'running', 'sale', 'save', 'scenario', 'schedule', 'secure', 'security', 'self', 'send', 'sequence', 'server', 'service', 'set', 'setting', 'share', 'show', 'signature', 'signed', 'simple', 'simplified', 'sitemap', 'software', 'solution', 'south', 'start', 'starting', 'state', 'step', 'subsequent', 'success', 'successfully', 'support', 'system', 'targeted', 'team', 'technical', 'term', 'thereby', 'thing', 'threat', 'time', 'training', 'troubleshooting', 'trust', 'type', 'understanding', 'use', 'used', 'using', 'utility', 'via', 'view', 'vmware', 'webinars', 'well', 'window', 'winhttp', 'without', 'wizard', 'work', 'workstation'] | |
255 | |
255 2017-03-13T12:30:51.842000Z https://corero.com/blog/804-ddos-attacks-can-you-find-who-dunnit.html | |
255 2017-03-15T00:30:57.057000Z https://corero.com/blog/804-ddos-attacks-who-dunnit-the-fight-for-improved-detection-and-protection.html | |
['address', 'aerospace', 'already', 'also', 'among', 'another', 'anyone', 'approach', 'associated', 'attack', 'attacker', 'automotive', 'aviation', 'awareness', 'back', 'belief', 'believed', 'benefit', 'best', 'blamed', 'botnet', 'brand', 'breadcrumb', 'brought', 'business', 'carry', 'casebank', 'caused', 'certainly', 'close', 'come', 'comment', 'company', 'competitor', 'complex', 'concern', 'conduct', 'consultant', 'contact', 'content', 'corero', 'cost', 'country', 'customer', 'damaged', 'ddos', 'defect', 'denial', 'determine', 'device', 'difficult', 'direct', 'disgruntled', 'disqus', 'distributed', 'door', 'dunnit', 'easily', 'easy', 'employee', 'enable', 'enforcement', 'enforcer', 'enterprise', 'equipment', 'even', 'evidence', 'experience', 'extremely', 'fault', 'financial', 'find', 'flood', 'foreign', 'former', 'found', 'generation', 'given', 'government', 'ha', 'hacker', 'hard', 'harm', 'help', 'high', 'hit', 'hope', 'horse', 'hunting', 'importance', 'increase', 'industrial', 'industry', 'inexpensive', 'infecting', 'inflict', 'information', 'insider', 'interested', 'interesting', 'international', 'investigation', 'iot', 'ip', 'isolation', 'javascript', 'joy', 'justice', 'kaspersky', 'lab', 'launched', 'law', 'lead', 'left', 'legitimate', 'let', 'leveraged', 'likewise', 'little', 'machine', 'malicious', 'malware', 'manufacturer', 'many', 'market', 'marketing', 'maybe', 'mean', 'medical', 'mirai', 'mitigation', 'money', 'moral', 'motivation', 'network', 'nurturing', 'one', 'organization', 'origin', 'others', 'paranoid', 'part', 'perpetrator', 'perps', 'place', 'please', 'pointless', 'political', 'polled', 'possible', 'post', 'posted', 'powered', 'prevent', 'program', 'protection', 'proverbial', 'reasonable', 'recently', 'relatively', 'rent', 'reo', 'reputational', 'respondent', 'rival', 'running', 'sabotage', 'said', 'secret', 'security', 'seldom', 'server', 'service', 'share', 'single', 'software', 'source', 'specializes', 'speculating', 'spoofed', 'stable', 'statistic', 'story', 'support', 'suspect', 'suspicion', 'system', 'tech', 'technology', 'tell', 'threat', 'time', 'trace', 'tracking', 'trend', 'trick', 'typically', 'upon', 'useless', 'usually', 'vary', 'victim', 'view', 'visibility', 'wanted', 'window', 'would', 'year', 'yes'] | |
256 | |
256 2017-03-21T12:31:01.444000Z http://www.itsecurityguru.org/2017/03/21/ultima-13-uk-companies-failing-educate-staff-cyber-security/ | |
256 2017-03-21T12:31:03.045000Z http://www.itsecurityguru.org/2017/03/21/ixias-first-annual-security-report-shows-organizations-still-vulnerable-brute-force-attacks/ | |
256 2017-03-21T12:31:26.341000Z http://www.itsecurityguru.org/2017/03/21/tsa-bans-gear-bigger-phones-airplane-cabins/ | |
256 2017-03-21T12:31:28.162000Z http://www.itsecurityguru.org/2017/03/21/cyber-terrorist-hi-tech-james-bond-cufflinks-facing-jail/ | |
256 2017-03-21T12:31:29.892000Z http://www.itsecurityguru.org/2017/03/21/took-mozilla-22-hours-patch-firefox-vulnerability-discovered-pwn2own/ | |
256 2017-03-21T12:31:32.621000Z http://www.itsecurityguru.org/2017/03/21/russian-hacker-accused-creating-citadel-malware-infected-nearly-11-million-computers-pleads-guilty/ | |
['ability', 'account', 'accused', 'across', 'ad', 'administrator', 'advanced', 'affect', 'afraid', 'ago', 'ai', 'airplane', 'allowed', 'amazon', 'american', 'amidst', 'anonabox', 'application', 'applies', 'appreciate', 'appriver', 'approves', 'around', 'article', 'arturplavnik', 'ask', 'atm', 'attack', 'avenue', 'back', 'backlash', 'badly', 'baker', 'ban', 'bank', 'banking', 'believe', 'bigger', 'biggest', 'binary', 'biometrics', 'blind', 'board', 'breach', 'broadly', 'build', 'business', 'cabin', 'campaign', 'change', 'cisco', 'citadel', 'citibank', 'cm', 'combat', 'come', 'comment', 'communication', 'community', 'company', 'complete', 'computer', 'control', 'couple', 'creating', 'criminal', 'cufflink', 'customer', 'cyber', 'cybersecurity', 'dark', 'data', 'date', 'ddos', 'decrypted', 'development', 'discovered', 'doe', 'dtmf', 'ebay', 'editor', 'editorial', 'educate', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'experience', 'explain', 'exposed', 'express', 'facebook', 'facing', 'failing', 'family', 'fifth', 'find', 'finnish', 'firefox', 'flaw', 'follow', 'ford', 'forum', 'fraud', 'gain', 'gdpr', 'gear', 'general', 'generation', 'get', 'getting', 'globally', 'gmail', 'goodbye', 'got', 'government', 'grip', 'guilty', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'head', 'help', 'hitting', 'home', 'hospital', 'hour', 'http', 'impact', 'imposter', 'improve', 'incident', 'infected', 'information', 'infosec', 'infosecurity', 'inside', 'jackson', 'jail', 'japonica', 'jay', 'jesse', 'jones', 'joyce', 'know', 'landmark', 'law', 'leaf', 'leak', 'leave', 'lee', 'like', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'macos', 'making', 'malware', 'many', 'met', 'million', 'min', 'mind', 'mitigation', 'mixed', 'mozilla', 'ne', 'nearly', 'netflix', 'new', 'news', 'next', 'num', 'online', 'open', 'operation', 'option', 'patch', 'paypal', 'people', 'persistent', 'personal', 'pervasive', 'phishing', 'phone', 'platform', 'pleads', 'please', 'pm', 'polite', 'popular', 'posted', 'postin', 'previous', 'primary', 'privacy', 'professional', 'protecting', 'protection', 'quality', 'ramond', 'ransomware', 'really', 'recent', 'regulation', 'related', 'relationship', 'remains', 'response', 'retailer', 'return', 'revealed', 'rich', 'rise', 'risk', 'round', 'run', 'russian', 'saks', 'sale', 'scam', 'secure', 'security', 'sensitive', 'share', 'shortage', 'sign', 'skill', 'software', 'sold', 'sort', 'source', 'spam', 'spot', 'squad', 'staff', 'stock', 'story', 'supporter', 'tackle', 'tag', 'tagged', 'talking', 'tania', 'target', 'technology', 'telegram', 'ten', 'term', 'terrorist', 'themed', 'thing', 'thousand', 'threat', 'time', 'took', 'tool', 'top', 'touch', 'trading', 'trend', 'tsa', 'turning', 'tweet', 'uk', 'ultimabusiness', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'video', 'viral', 'vulnerability', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'whatsapp', 'within', 'working', 'worse', 'yahoo', 'year'] | |
258 | |
259 | |
260 | |
261 | |
261 2017-03-01T00:30:42.760000Z https://secureworks.com/blog/strong-security-gains-for-state-governments-but-the-work-isnt-done-yet | |
261 2017-03-01T00:30:49.171000Z http://darkreading.com/partner-perspectives/bitdefender/report-only-2-in-3-cyber-attacks-can-be-stopped-with-current-defenses/a/d-id/1328283 | |
261 2017-03-01T12:31:12.755000Z https://www.helpnetsecurity.com/2017/03/01/gdpr-confusion/ | |
261 2017-03-01T18:30:36.449000Z http://blog.checkpoint.com/2017/03/01/check-point-r80-just-made-neopharms-security-management-simpler/ | |
261 2017-03-01T18:30:48.964000Z http://csoonline.com/article/3174439/security/global-cybercrime-prosecution-a-patchwork-of-alliances.html | |
261 2017-03-01T18:30:51.515000Z http://darkreading.com/partner-perspectives/bitdefender/insider-sabotage-among-top-3-threats-cisos-cant-yet-handle/a/d-id/1328286 | |
261 2017-03-02T00:30:47.547000Z http://blog.cimcor.com/file-integrity-monitoring-vs-activity-monitoring-which-best | |
261 2017-03-02T12:30:40.532000Z https://www.webroot.com/blog/2017/02/17/cyber-news-rundown-edition-2172017/ | |
261 2017-03-02T12:30:48.053000Z https://securityintelligence.com/prepared-for-the-general-data-protection-regulation-gdpr-top-10-findings-from-hurwitz-associates-survey/ | |
261 2017-03-02T12:31:30.156000Z https://www.helpnetsecurity.com/2017/03/02/attackers-market/ | |
261 2017-03-02T12:31:38.840000Z https://www.helpnetsecurity.com/2017/03/02/fighting-sophisticated-phishing-threats/ | |
261 2017-03-02T18:30:46.857000Z http://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/ | |
261 2017-03-03T00:30:50.240000Z https://community.rapid7.com/community/infosec/blog/2017/03/02/the-cis-critical-controls-explained-control-1-inventory-of-authorized-and-unauthorized-devices | |
261 2017-03-03T12:30:48.553000Z https://hotforsecurity.bitdefender.com/blog/half-of-businesses-still-vulnerable-to-spam-phishing-iot-hacks-17755.html | |
261 2017-03-03T12:31:01.567000Z https://www.helpnetsecurity.com/2017/03/03/alienvault-usm-anywhere/ | |
261 2017-03-03T12:30:54.195000Z https://www.helpnetsecurity.com/2017/03/03/agile-it-stack-grows/ | |
261 2017-03-03T12:31:03.760000Z https://www.helpnetsecurity.com/2017/03/03/bitglass-cloud-mobile-security/ | |
261 2017-03-03T18:30:50.519000Z https://www.scmagazine.com/watching-the-detectors-government-demands/article/638467/ | |
261 2017-03-03T18:31:22.727000Z http://www.welivesecurity.com/2013/04/09/warning-over-too-much-information-after-electricity-companies-targeted-with-clever-spear-phishing-campaign/ | |
261 2017-03-03T18:31:27.989000Z http://www.welivesecurity.com/2011/11/29/facebook-ftc-settlement-means-20-years-of-federal-privacy-audits/ | |
261 2017-03-05T00:31:20.671000Z http://www.spgedwards.com/2013/01/howto-bullet-proof-your-email-account.html | |
261 2017-03-06T12:31:09.254000Z https://www.helpnetsecurity.com/2017/03/06/cyber-attack-lifecycle/ | |
261 2017-03-06T12:30:49.619000Z http://securityaffairs.co/wordpress/56906/cyber-crime/financial-services-impact-cybercrime.html | |
261 2017-03-06T12:31:10.557000Z https://www.helpnetsecurity.com/2017/03/06/key-areas-risk-managers/ | |
261 2017-03-06T18:30:48.624000Z https://www.alienvault.com/blogs/security-essentials/new-law-in-new-york-state-could-shape-cyber-security-across-the-us | |
261 2017-03-06T18:31:32.481000Z http://www.welivesecurity.com/2017/03/06/10-ways-ruin-cybercriminals-day/ | |
261 2017-03-06T18:31:20.080000Z http://www.welivesecurity.com/2013/04/10/global-center-for-cyber-security-to-be-set-up-at-oxford-university/ | |
261 2017-03-07T00:30:52.170000Z http://darkreading.com/attacks-breaches/new-yorks-cyber-regulations-how-to-take-action-and-whos-next/a/d-id/1328318 | |
261 2017-03-07T06:30:47.128000Z https://www.proofpoint.com/us/threat-insight/post/phishing-goes-mobile-sms | |
261 2017-03-07T12:31:26.715000Z https://www.helpnetsecurity.com/2017/03/07/self-healing-endpoint-security/ | |
261 2017-03-07T18:30:53.575000Z http://csoonline.com/article/3176565/data-breach/ransomware-picks-off-broader-targets-with-greater-severity.html | |
261 2017-03-08T00:30:44.841000Z https://www.webroot.com/blog/2017/03/03/cyber-news-rundown-edition-3317/ | |
261 2017-03-08T00:30:45.469000Z https://blogs.forcepoint.com/insights/millennials-machine | |
261 2017-03-08T00:30:50.884000Z https://digitalguardian.com/blog/advanced-threat-protection-expert-tips-protecting-your-organization-against-advanced-threats | |
261 2017-03-08T12:31:11.706000Z https://www.helpnetsecurity.com/2017/03/08/fighting-attackers-data-jacking/ | |
261 2017-03-08T18:30:50.421000Z https://blogs.bromium.com/2017/03/08/malwares-newest-disguise-the-humble-resume/ | |
261 2017-03-08T18:30:50.598000Z http://www.securityskeptic.com/2017/03/solving-the-bigger-data-question-in-cybersecurity.html | |
261 2017-03-08T18:31:03.521000Z http://darkreading.com/partner-perspectives/malwarebytes/4-ways-to-recover-from-a-cyberattack-/a/d-id/1328338 | |
261 2017-03-08T18:31:00.652000Z https://www.helpnetsecurity.com/2017/03/08/insecure-sha-1-certificates-usage/ | |
261 2017-03-08T18:31:05.801000Z http://csoonline.com/article/3178097/security/article.html | |
261 2017-03-09T12:30:59.729000Z https://www.helpnetsecurity.com/2017/03/09/security-posture-fortune-1000/ | |
261 2017-03-10T12:31:02.341000Z https://blog.avira.com/cat-mouse-game-with-government/ | |
261 2017-03-11T00:30:57.157000Z https://digitalguardian.com/blog/friday-five-3/10-edition | |
261 2017-03-13T12:31:00.426000Z https://www.helpnetsecurity.com/2017/03/13/secure-operations-automation/ | |
261 2017-03-14T00:30:50.781000Z https://secureworks.com/blog/cybersecurity-risk-questions-boards-should-be-asking | |
261 2017-03-14T12:31:23.270000Z https://www.helpnetsecurity.com/2017/03/14/threat-operations-threatq/ | |
261 2017-03-14T18:30:46.259000Z https://nakedsecurity.sophos.com/2017/03/14/data-matching-what-happens-when-firms-join-the-dots-about-you/ | |
261 2017-03-14T18:30:48.906000Z https://blog.tanium.com/skills-gap-disorganization-key-obstacles-uks-cybersecurity-progress/ | |
261 2017-03-14T18:30:55.307000Z https://nakedsecurity.sophos.com/2017/03/14/sxsw-the-real-cost-of-free-services-is-giving-up-your-data/ | |
261 2017-03-15T06:30:54.347000Z https://troyhunt.com/weve-lost-control-of-our-personal-data-including-33m-netprospex-records/ | |
261 2017-03-15T12:31:00.920000Z https://www.helpnetsecurity.com/2017/03/15/mobile-workers-security-risks/ | |
261 2017-03-15T18:30:48.173000Z https://www.alienvault.com/blogs/security-essentials/change-is-automatic-progress-is-not | |
261 2017-03-15T18:31:00.218000Z https://nakedsecurity.sophos.com/2017/03/15/latest-phishing-tactics-infected-pdfs-bogus-friend-requests-fake-hr-emails/ | |
261 2017-03-16T12:31:18.462000Z https://www.helpnetsecurity.com/2017/03/16/data-breaches-new-rules/ | |
261 2017-03-17T12:30:48.265000Z http://pwc.blogs.com/cyber_security_updates/2017/03/connected-homes-what-are-the-cyber-security-and-data-privacy-challenges-1.html | |
261 2017-03-17T12:30:51.552000Z http://securitythinkingcap.com/safeguarding-insider-threat/ | |
261 2017-03-17T12:31:06.834000Z https://www.helpnetsecurity.com/2017/03/17/information-security-marketplace-shift/ | |
261 2017-03-17T18:30:56.587000Z https://hotforsecurity.bitdefender.com/blog/gmail-phishing-scam-fools-even-the-tech-savviest-17813.html | |
261 2017-03-17T18:30:57.194000Z https://secureworks.com/blog/cybersecurity-vs-network-security-vs-information-security | |
261 2017-03-18T12:31:00.576000Z http://www.mimecast.com/blog/2017/02/gdpr--cybercrime-is-email-part-of-your-compliance-strategy/ | |
261 2017-03-18T12:31:55.152000Z http://www.mimecast.com/blog/2016/07/mr.-robot-highlights-the-price-point-temptation-of-email-ransomware/ | |
261 2017-03-18T12:32:24.671000Z http://www.mimecast.com/blog/2016/05/predictive-cybersecurity-out-with-garbage-in-with-data/ | |
261 2017-03-18T12:32:52.397000Z http://www.mimecast.com/blog/2015/12/discover-2015-london-the-office-365-dawn/ | |
261 2017-03-21T18:30:50.114000Z https://www.webroot.com/blog/2017/03/15/education-become-cybersmart/ | |
261 2017-03-21T18:30:55.481000Z http://darkreading.com/threat-intelligence/report-oilrig-attacks-expanding-across-industries-geographies/a/d-id/1328443 | |
261 2017-03-22T00:30:55.924000Z http://securityaffairs.co/wordpress/57325/data-breach/three-mobile.html | |
261 2017-03-22T00:31:00.462000Z https://www.scmagazine.com/cybersecurity-made-simple/article/645639/ | |
261 2017-03-22T18:30:49.335000Z https://security.googleblog.com/2017/03/diverse-protections-for-diverse.html | |
261 2017-03-22T18:30:50.731000Z https://securosis.com/blog/introducing-threat-operations-to-in-action | |
261 2017-03-23T06:30:52.470000Z https://www.helpnetsecurity.com/2017/03/23/ransomware-strike-game/ | |
261 2017-03-23T12:32:23.245000Z https://www.helpnetsecurity.com/2017/03/23/security-spend/ | |
261 2017-03-23T12:32:06.348000Z https://www.helpnetsecurity.com/2017/03/23/security-operations-transition-cloud/ | |
261 2017-03-23T18:33:29.432000Z https://secureworks.com/blog/privacy-vs-security | |
261 2017-03-23T18:33:33.659000Z https://nakedsecurity.sophos.com/2017/03/23/spam-mails-circulate-file-shredding-malware-how-to-protect-yourself/ | |
261 2017-03-23T18:33:37.264000Z https://blog.elearnsecurity.com/sally-beauty-security-breach-yet-another-credit-card-attack.html | |
261 2017-03-24T00:30:55.039000Z http://securityaffairs.co/wordpress/57383/data-breach/android-forums-data-breach.html | |
261 2017-03-24T12:33:56.300000Z https://www.helpnetsecurity.com/2017/03/24/healthcare-data-safe-cloud/ | |
261 2017-03-25T00:30:54.225000Z https://security.googleblog.com/2017/03/reassuring-our-users-about-government.html | |
261 2017-03-27T18:30:54.988000Z https://blogs.microsoft.com/microsoftsecure/2017/03/27/what-you-need-to-know-about-casbs/ | |
261 2017-03-28T00:30:54.133000Z https://blogs.microsoft.com/microsoftsecure/2017/03/27/giving-cisos-assurance-in-the-cloud/ | |
261 2017-03-28T00:30:56.754000Z https://community.rapid7.com/community/infosec/blog/2017/03/27/r7-2015-28-multiple-eview-ev-07s-gps-tracker-vulnerabilities | |
261 2017-03-29T00:31:00.882000Z https://blogs.technet.microsoft.com/mmpc/2017/03/28/world-backup-day-is-as-good-as-any-to-back-up-your-data/ | |
261 2017-03-29T12:30:54.118000Z https://hotforsecurity.bitdefender.com/blog/data-of-3-7-million-hong-kong-registered-voters-stolen-17860.html | |
261 2017-03-29T18:30:57.555000Z https://security.googleblog.com/2017/03/updates-to-google-safe-browsings-site.html | |
261 2017-03-29T18:30:57.874000Z https://blog.tanium.com/looking-inward-best-threat-data/ | |
261 2017-03-29T18:30:58.291000Z https://www.root9b.com/newsroom/proactive-cyber-defense-innovation-and-collaboration | |
261 2017-03-29T18:31:20.105000Z https://www.welivesecurity.com/2011/06/22/linkedin-privacy/ | |
261 2017-03-30T12:31:14.495000Z https://www.helpnetsecurity.com/2017/03/30/records-compromised-2016/ | |
261 2017-03-30T12:31:06.870000Z https://www.helpnetsecurity.com/2017/03/30/shaping-future-work/ | |
261 2017-03-30T18:31:04.443000Z http://csoonline.com/article/3186685/internet-of-things/heres-how-microsoft-is-helping-companies-build-iot-hardware.html | |
[] | |
262 | |
262 2017-03-09T12:31:57.624000Z http://www.itsecurityguru.org/2017/03/09/shadow-bigger-problem-us-realize/ | |
262 2017-03-09T12:31:48.868000Z http://www.itsecurityguru.org/2017/03/09/cisco-apache-issue-warnings-zero-day-flaw-targeted-wild/ | |
262 2017-03-09T12:31:52.046000Z http://www.itsecurityguru.org/2017/03/09/wikileaks-cia-hacking-revelations-cyber-security-experts-respond-collective-meh/ | |
262 2017-03-09T12:31:53.927000Z http://www.itsecurityguru.org/2017/03/09/cia-exploit-list-full-good-bad-ugly/ | |
262 2017-03-09T12:31:55.689000Z http://www.itsecurityguru.org/2017/03/09/apache-struts-2-needs-patching-without-delay-attack-now/ | |
['ability', 'ad', 'administrator', 'advanced', 'affare', 'afraid', 'allow', 'american', 'amidst', 'analysis', 'anderson', 'angel', 'anonabox', 'anyone', 'apache', 'application', 'appreciate', 'appriver', 'approves', 'around', 'article', 'arturplavnik', 'ask', 'atm', 'attack', 'avente', 'back', 'backlash', 'bad', 'bank', 'banking', 'barare', 'betty', 'big', 'bigger', 'biggest', 'bill', 'binary', 'biometrics', 'blank', 'blind', 'board', 'bought', 'bounty', 'boxen', 'breach', 'broadly', 'bug', 'build', 'business', 'ca', 'campaign', 'card', 'cash', 'change', 'cia', 'cio', 'cisco', 'citibank', 'cloud', 'cm', 'collective', 'combat', 'comment', 'community', 'confirms', 'cool', 'creating', 'credential', 'criminal', 'cybe', 'cyber', 'cyberhacklords', 'cybersecurity', 'dahua', 'dark', 'data', 'date', 'ddos', 'dead', 'delay', 'development', 'device', 'di', 'doe', 'ebay', 'editor', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'expert', 'explain', 'exploit', 'exposed', 'express', 'facebook', 'family', 'fight', 'financial', 'find', 'finnish', 'flaw', 'follow', 'fraud', 'full', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'good', 'goodbye', 'google', 'got', 'government', 'grip', 'ha', 'hack', 'hacked', 'hacker', 'hacking', 'happened', 'hello', 'help', 'helped', 'hitting', 'home', 'hospital', 'http', 'humanising', 'il', 'impact', 'imposter', 'improve', 'incident', 'increase', 'information', 'infosec', 'infosecurity', 'inside', 'institution', 'internet', 'iot', 'issue', 'know', 'knowing', 'landmark', 'law', 'lead', 'leave', 'left', 'like', 'link', 'list', 'literacy', 'lizard', 'look', 'lure', 'machine', 'making', 'malware', 'manufacturer', 'many', 'marito', 'microsoft', 'mind', 'mitigation', 'moglie', 'need', 'netflix', 'new', 'news', 'next', 'num', 'oh', 'ongoing', 'open', 'operation', 'option', 'patching', 'paypal', 'percent', 'persistent', 'pervasive', 'phishing', 'planning', 'platform', 'pm', 'polish', 'popular', 'posted', 'postin', 'previous', 'primary', 'privacy', 'problem', 'programmed', 'project', 'protecting', 'protection', 'provides', 'ramond', 'ransomware', 'realize', 'really', 'recent', 'regulation', 'related', 'remains', 'respond', 'response', 'result', 'retailer', 'return', 'revelation', 'rich', 'rise', 'risk', 'round', 'run', 'sailpoint', 'sale', 'sarah', 'scam', 'security', 'see', 'sensitive', 'service', 'shadow', 'share', 'shortage', 'shrunk', 'sign', 'skill', 'software', 'sort', 'source', 'spam', 'spot', 'squad', 'stark', 'stock', 'story', 'strut', 'su', 'supporter', 'survey', 'tackle', 'tag', 'talend', 'talking', 'target', 'targeted', 'ten', 'term', 'themed', 'thing', 'threat', 'tip', 'top', 'trading', 'tremendous', 'trend', 'tua', 'tuo', 'turning', 'tweet', 'ugly', 'uk', 'un', 'uncovers', 'understanding', 'underway', 'unplug', 'unveils', 'used', 'user', 'using', 'usps', 'vector', 'veracode', 'victim', 'video', 'view', 'viral', 'vulnerability', 'walcot', 'warning', 'warns', 'wd', 'weakest', 'web', 'webinar', 'webinars', 'week', 'weeping', 'well', 'wild', 'within', 'without', 'working', 'worse', 'would', 'wow', 'year', 'yokehew'] | |
264 | |
265 | |
265 2017-03-29T18:31:03.888000Z https://www.bleepingcomputer.com/news/security/github-users-targeted-with-dimnie-trojan/ | |
265 2017-03-30T00:30:56.089000Z https://arstechnica.com/security/2017/03/someone-is-putting-lots-of-work-into-hacking-github-developers/ | |
265 2017-03-30T12:30:52.317000Z http://thehackernews.com/2017/03/github-email-scam.html | |
['advanced', 'alto', 'attached', 'attacker', 'behind', 'campaign', 'command', 'comment', 'computer', 'data', 'developer', 'dimnie', 'directly', 'domain', 'download', 'execute', 'fake', 'file', 'firm', 'first', 'github', 'give', 'hacking', 'infected', 'macro', 'malicious', 'malware', 'memory', 'message', 'multiple', 'network', 'new', 'palo', 'password', 'pc', 'powershell', 'process', 'reconnaissance', 'repository', 'request', 'researcher', 'screenshots', 'security', 'start', 'take', 'targeted', 'three', 'traffic', 'trojan', 'use', 'used', 'user', 'web', 'window', 'year'] | |
266 | |
267 | |
268 | |
269 | |
269 2017-03-03T00:31:13.632000Z http://www.welivesecurity.com/2014/04/02/with-just-days-to-go-just-how-many-pcs-are-still-running-windows-xp/ | |
269 2017-03-09T18:31:41.754000Z http://www.welivesecurity.com/2014/04/08/love-someone-upgrade-xp/ | |
269 2017-03-11T12:31:08.491000Z http://www.welivesecurity.com/2014/04/08/goodbye-windows-xp/ | |
269 2017-03-27T12:32:48.751000Z https://www.welivesecurity.com/2014/04/16/xp-diency-beyond-the-end-of-the-line/ | |
['add', 'al', 'also', 'android', 'app', 'archive', 'article', 'attack', 'author', 'blog', 'code', 'community', 'conference', 'contact', 'copyright', 'could', 'data', 'day', 'de', 'deutsch', 'direct', 'div', 'email', 'embed', 'en', 'english', 'eset', 'español', 'even', 'expert', 'facebook', 'follow', 'friend', 'go', 'good', 'google', 'home', 'hot', 'http', 'inbox', 'information', 'insight', 'interested', 'internet', 'ir', 'language', 'latest', 'legal', 'link', 'linkedin', 'magazine', 'malware', 'many', 'material', 'microsoft', 'might', 'month', 'move', 'multimedia', 'navigation', 'news', 'newsletter', 'old', 'operating', 'opinion', 'page', 'paper', 'patch', 'pc', 'play', 'podcasts', 'policy', 'popular', 'post', 'posted', 'print', 'privacy', 'protecting', 'radar', 'ransomware', 'read', 'related', 'research', 'reserved', 'right', 'search', 'security', 'select', 'sign', 'site', 'sitemap', 'still', 'stylesheet', 'system', 'time', 'tip', 'toggle', 'topic', 'twitter', 'using', 'version', 'video', 'view', 'virus', 'way', 'wechseln', 'whats', 'white', 'window', 'wls', 'xp', 'youtube', 'zum'] | |
270 | |
270 2017-03-23T18:34:11.722000Z http://www.welivesecurity.com/2010/08/19/android-application-security-2/ | |
270 2017-03-27T12:33:46.801000Z https://www.welivesecurity.com/2010/08/19/android-application-security-2/ | |
['ability', 'able', 'abrams', 'abta', 'abuse', 'access', 'account', 'acquired', 'act', 'ad', 'add', 'address', 'advises', 'agenda', 'al', 'allowed', 'also', 'although', 'among', 'andriod', 'android', 'another', 'anti', 'antivirus', 'anything', 'api', 'app', 'appearing', 'application', 'approve', 'approximately', 'apps', 'archive', 'array', 'article', 'asking', 'asks', 'aspect', 'attack', 'attention', 'audit', 'authenticator', 'author', 'available', 'back', 'based', 'believe', 'beta', 'better', 'bit', 'blog', 'bluetooth', 'bolino', 'breach', 'broadcasting', 'ca', 'call', 'called', 'careful', 'chamber', 'check', 'choosing', 'cleaning', 'click', 'close', 'code', 'combination', 'come', 'communication', 'community', 'concern', 'conference', 'confident', 'connection', 'considering', 'contact', 'cool', 'copy', 'copyright', 'cost', 'could', 'covering', 'cramming', 'create', 'crook', 'currently', 'curt', 'cybersecurity', 'dangerous', 'data', 'david', 'de', 'decision', 'delivering', 'description', 'desktop', 'despite', 'detect', 'deutsch', 'developer', 'different', 'direct', 'directly', 'director', 'disinfection', 'distribute', 'div', 'doe', 'download', 'downloading', 'economics', 'educated', 'education', 'email', 'embed', 'en', 'english', 'enough', 'entire', 'epic', 'error', 'eset', 'español', 'even', 'example', 'existing', 'expect', 'experience', 'expert', 'exploit', 'facebook', 'fact', 'fairly', 'fake', 'far', 'feature', 'file', 'finalized', 'fix', 'follow', 'follower', 'following', 'form', 'found', 'free', 'friend', 'full', 'future', 'game', 'generally', 'get', 'getting', 'give', 'go', 'good', 'google', 'gps', 'grant', 'great', 'guy', 'handhelds', 'harley', 'headset', 'heard', 'help', 'hi', 'home', 'hope', 'hot', 'however', 'http', 'hurt', 'identity', 'imagine', 'implemented', 'inbox', 'information', 'insight', 'install', 'installation', 'installed', 'installing', 'instead', 'interested', 'interesting', 'internet', 'introducing', 'iphone', 'ir', 'istall', 'jason', 'keep', 'know', 'language', 'latest', 'launch', 'legal', 'legitimate', 'licensing', 'like', 'limiting', 'link', 'linkedin', 'list', 'little', 'llc', 'location', 'longer', 'look', 'looked', 'lot', 'magazine', 'make', 'malicious', 'malware', 'manage', 'manager', 'market', 'material', 'mean', 'mention', 'message', 'metaphor', 'might', 'mimic', 'mm', 'mobile', 'model', 'moment', 'money', 'month', 'motorola', 'motospeak', 'multimedia', 'must', 'navigation', 'near', 'need', 'needed', 'network', 'new', 'news', 'newsletter', 'number', 'offer', 'one', 'onto', 'opinion', 'opportunity', 'pacific', 'page', 'paper', 'patrick', 'pay', 'paying', 'people', 'permission', 'personal', 'phone', 'plan', 'platform', 'play', 'playing', 'plea', 'please', 'podcasts', 'policy', 'popular', 'post', 'posted', 'print', 'prisma', 'privacy', 'problem', 'product', 'program', 'promised', 'prospective', 'protecting', 'radar', 'randomly', 'randy', 'ransomware', 'read', 'really', 'reason', 'receive', 'related', 'releasing', 'reply', 'replying', 'required', 'requiring', 'research', 'reserved', 'responded', 'result', 'right', 'run', 'rynearson', 'sabotage', 'safe', 'sality', 'samsung', 'say', 'saying', 'screen', 'search', 'searched', 'secretly', 'sector', 'security', 'see', 'seem', 'select', 'selected', 'send', 'sender', 'sense', 'sent', 'server', 'service', 'sign', 'similar', 'site', 'sitemap', 'sm', 'smart', 'smartphone', 'software', 'solution', 'sound', 'space', 'speak', 'spying', 'spyware', 'stagefright', 'state', 'store', 'stylesheet', 'subset', 'supplier', 'support', 'sure', 'symbian', 'system', 'take', 'tapsnake', 'technical', 'tell', 'telling', 'testing', 'text', 'tha', 'thanks', 'thing', 'think', 'though', 'time', 'today', 'toggle', 'topic', 'tricked', 'trojan', 'true', 'trust', 'twitter', 'type', 'typically', 'undecided', 'understand', 'understanding', 'upon', 'use', 'user', 'using', 'usual', 'video', 'view', 'virus', 'want', 'wanted', 'wap', 'waste', 'watch', 'way', 'wechseln', 'whats', 'white', 'wilson', 'window', 'wing', 'wls', 'work', 'would', 'write', 'written', 'yet', 'youtube', 'zum'] | |
271 | |
271 2017-03-16T18:31:17.572000Z http://www.welivesecurity.com/2010/08/17/inter-species-marriage/ | |
271 2017-03-27T12:33:52.265000Z https://www.welivesecurity.com/2010/08/17/inter-species-marriage/ | |
['able', 'abrams', 'absolute', 'absolutely', 'account', 'accurate', 'across', 'actually', 'add', 'address', 'agree', 'agreement', 'al', 'allow', 'almost', 'already', 'also', 'android', 'animal', 'another', 'anyone', 'app', 'applicable', 'application', 'appreciating', 'approach', 'apps', 'archive', 'arising', 'article', 'ask', 'assume', 'attached', 'attacked', 'attention', 'author', 'bamso', 'bank', 'based', 'basic', 'become', 'begin', 'believe', 'bestiality', 'better', 'bill', 'billing', 'blackberry', 'blog', 'breach', 'bug', 'came', 'capability', 'carrier', 'cdma', 'change', 'choice', 'choosing', 'chose', 'claim', 'click', 'code', 'come', 'comfortable', 'communication', 'community', 'complete', 'completely', 'comply', 'conduct', 'conducted', 'conference', 'confidentiality', 'contact', 'convenient', 'copy', 'copyright', 'court', 'current', 'customer', 'dangerous', 'data', 'de', 'decision', 'default', 'delivering', 'deutsch', 'device', 'different', 'difficult', 'direct', 'director', 'discovered', 'discovery', 'div', 'doe', 'dog', 'done', 'download', 'droid', 'education', 'effort', 'email', 'embed', 'en', 'enable', 'encrypt', 'end', 'english', 'enough', 'eset', 'español', 'essential', 'essentially', 'establish', 'ever', 'everyone', 'evidently', 'exercise', 'experience', 'expert', 'exploit', 'facebook', 'facilitate', 'fair', 'fairness', 'fake', 'figure', 'finding', 'fine', 'first', 'fixed', 'follow', 'follower', 'found', 'friend', 'froyo', 'get', 'getting', 'go', 'going', 'gone', 'google', 'got', 'greatly', 'gross', 'gsm', 'guarantee', 'high', 'hip', 'hold', 'home', 'hot', 'http', 'hurt', 'husbandry', 'identification', 'immediately', 'inactivity', 'inbox', 'include', 'including', 'increased', 'indicates', 'information', 'insight', 'install', 'instead', 'intent', 'interested', 'interesting', 'interval', 'introducing', 'involves', 'ir', 'issue', 'keep', 'keyboard', 'know', 'language', 'latest', 'learn', 'learning', 'least', 'left', 'legal', 'let', 'liability', 'license', 'like', 'link', 'linkedin', 'little', 'llc', 'location', 'lock', 'locked', 'locking', 'logical', 'long', 'low', 'macbook', 'magazine', 'maintain', 'maintaining', 'make', 'malware', 'marketing', 'marriage', 'married', 'material', 'mean', 'measure', 'metaphor', 'might', 'mimic', 'model', 'month', 'much', 'multimedia', 'must', 'name', 'narrowing', 'navigation', 'need', 'negligence', 'nest', 'network', 'new', 'news', 'newsletter', 'nobody', 'nokia', 'notice', 'notify', 'number', 'obligation', 'obviously', 'old', 'older', 'online', 'operating', 'opinion', 'opt', 'optimized', 'ordered', 'page', 'paper', 'part', 'particularly', 'password', 'past', 'pay', 'paying', 'payment', 'people', 'perception', 'perform', 'period', 'personal', 'phone', 'physical', 'picture', 'pin', 'play', 'please', 'podcasts', 'policy', 'popular', 'possible', 'post', 'posted', 'print', 'prisma', 'privacy', 'pro', 'probably', 'problem', 'proceeding', 'process', 'product', 'promised', 'protected', 'protection', 'provide', 'purpose', 'quite', 'radar', 'randy', 'ransomware', 'rather', 'read', 'really', 'reason', 'reasonable', 'regard', 'registration', 'related', 'rely', 'request', 'requires', 'requiring', 'research', 'reserved', 'responsibility', 'responsible', 'review', 'right', 'risk', 'running', 'say', 'screen', 'search', 'second', 'secure', 'security', 'seems', 'select', 'send', 'separation', 'service', 'set', 'setup', 'share', 'sign', 'signed', 'significant', 'since', 'site', 'sitemap', 'smart', 'solely', 'soon', 'sound', 'spam', 'spends', 'stagefright', 'start', 'statement', 'stylesheet', 'switched', 'synchronization', 'system', 'take', 'talking', 'technical', 'technically', 'telephone', 'tell', 'telling', 'tend', 'thereto', 'thing', 'time', 'timeout', 'toggle', 'topic', 'totally', 'toward', 'transaction', 'travel', 'trick', 'tricked', 'trojan', 'true', 'try', 'trying', 'twitter', 'two', 'understands', 'unlock', 'unsuitable', 'updated', 'upon', 'use', 'used', 'user', 'verizon', 'version', 'video', 'view', 'virus', 'want', 'way', 'wechseln', 'well', 'whats', 'white', 'wife', 'window', 'wireless', 'within', 'without', 'wls', 'wondering', 'work', 'world', 'would', 'xp', 'yes', 'yet', 'youtube', 'zum'] | |
272 | |
272 2017-03-01T06:31:47.141000Z https://www.mimecast.com/blog/2014/10/top-priorities-for-cios-over-the-next-year/ | |
272 2017-03-01T06:33:57.902000Z https://www.mimecast.com/blog/2010/08/cloud-new-lego-building-blocks-of-compute/ | |
272 2017-03-18T12:31:39.499000Z http://www.mimecast.com/blog/2016/10/never-be-a-ransomware-hostage/ | |
272 2017-03-18T12:33:02.650000Z http://www.mimecast.com/blog/2015/07/office-365-and-always-on-email-in-a-cloud-first-world/ | |
272 2017-03-18T12:33:30.446000Z http://www.mimecast.com/blog/2014/10/top-priorities-for-cios-over-the-next-year/ | |
272 2017-03-18T12:33:32.050000Z http://www.mimecast.com/blog/2014/09/forrester-and-mimecast-webinar-protecting-against-targeted-attacks/ | |
272 2017-03-18T12:33:34.081000Z http://www.mimecast.com/blog/2014/09/feeling-insecure-about-security/ | |
272 2017-03-18T12:33:50.390000Z http://www.mimecast.com/blog/2014/05/the-rise-and-rise-of-targeted-threats/ | |
272 2017-03-18T12:33:55.595000Z http://www.mimecast.com/blog/2014/03/three-predictions-for-the-future-of-the-web/ | |
272 2017-03-18T12:33:59.959000Z http://www.mimecast.com/blog/2014/03/happy-25th-birthday-world-wide-web-the-next-25-years-are-looking-good-mostly/ | |
272 2017-03-18T12:34:07.918000Z http://www.mimecast.com/blog/2014/01/paying-tribute-to-our-mimecast-trainers-1000-times-over/ | |
272 2017-03-18T12:34:10.954000Z http://www.mimecast.com/blog/2013/12/information-banking-the-next-cloud-frontier/ | |
272 2017-03-18T12:34:20.073000Z http://www.mimecast.com/blog/2013/10/mimecast-recognized-by-government-backed-future-fifty-as-technology-leader-in-the-uk/ | |
272 2017-03-18T12:34:28.218000Z http://www.mimecast.com/blog/2013/08/a-change-is-gonna-come/ | |
272 2017-03-18T12:34:38.017000Z http://www.mimecast.com/blog/2013/07/dont-play-dice-with-your-email/ | |
272 2017-03-18T12:34:40.245000Z http://www.mimecast.com/blog/2013/07/email-is-1-for-comms-at-work-over-social-technologies/ | |
272 2017-03-18T12:35:02.782000Z http://www.mimecast.com/blog/2013/04/good-clouds-and-bad-clouds-nathaniel-and-orlando-explore-how-you-can-tell-the-difference/ | |
272 2017-03-18T12:35:09.755000Z http://www.mimecast.com/blog/2012/11/mimecasts-vision-for-the-interactive-archive/ | |
272 2017-03-18T12:35:19.939000Z http://www.mimecast.com/blog/2012/08/individual-feature-enablement/ | |
272 2017-03-18T12:35:42.104000Z http://www.mimecast.com/blog/2012/02/delivering-software-at-mimecast-like-facebook/ | |
272 2017-03-18T12:35:58.914000Z http://www.mimecast.com/blog/2011/10/rim-outage-not-only-hitting-consumers/ | |
272 2017-03-18T12:36:10.020000Z http://www.mimecast.com/blog/2011/08/it-pet-peeves-email-/ | |
272 2017-03-18T12:36:30.307000Z http://www.mimecast.com/blog/2011/05/forrester-confirm-motivation-for-cloud-email/ | |
272 2017-03-18T12:36:39.665000Z http://www.mimecast.com/blog/2011/03/message-headers-in-outlook-2010/ | |
272 2017-03-18T12:36:48.011000Z http://www.mimecast.com/blog/2011/02/the-hidden-menace-of-generation-gmail/ | |
272 2017-03-18T12:36:50.188000Z http://www.mimecast.com/blog/2011/02/why-is-email-so-complicated-part-562--people-lie-about-what-they-want/ | |
272 2017-03-18T12:36:54.527000Z http://www.mimecast.com/blog/2011/01/looking-back-going-forward-2010-in-review/ | |
272 2017-03-18T12:36:59.949000Z http://www.mimecast.com/blog/2010/12/richard-stallmans-cloudy-vision/ | |
272 2017-03-18T12:37:07.649000Z http://www.mimecast.com/blog/2010/11/welcome-to-my-world-mr-zuckerberg/ | |
272 2017-03-18T12:37:10.142000Z http://www.mimecast.com/blog/2010/11/what-are-the-different-types-of-cloud-standards/ | |
272 2017-03-18T12:37:27.669000Z http://www.mimecast.com/blog/2010/09/liberating-data-starts-at-home/ | |
272 2017-03-18T12:37:29.236000Z http://www.mimecast.com/blog/2010/09/the-realities-of-cloud-security-or-the-realities-of-due-diligence/ | |
272 2017-03-18T12:37:38.727000Z http://www.mimecast.com/blog/2010/08/getting-behind-the-botnet-a-solution/ | |
272 2017-03-18T12:37:45.596000Z http://www.mimecast.com/blog/2010/08/cloud-new-lego-building-blocks-of-compute/ | |
272 2017-03-18T12:37:54.125000Z http://www.mimecast.com/blog/2010/07/email-archiving-case-study-townsend-manages-email-in-the-cloud-video/ | |
272 2017-03-18T12:37:59.288000Z http://www.mimecast.com/blog/2010/07/4-steps-to-defensibility-using-an-email-archive/ | |
272 2017-03-18T12:38:11.539000Z http://www.mimecast.com/blog/2009/02/information-banking-interview-with-the-internet-economy/ | |
272 2017-03-18T12:38:14.149000Z http://www.mimecast.com/blog/2009/02/outages-happen...just-less-often-in-enterprises/ | |
272 2017-03-18T12:38:18.336000Z http://www.mimecast.com/blog/2008/10/storm-clouds-over-stallman/ | |
272 2017-03-18T12:38:20.732000Z http://www.mimecast.com/blog/2008/09/conference-season/ | |
['acceptable', 'africa', 'america', 'apps', 'archive', 'archiving', 'asia', 'award', 'become', 'blog', 'bundle', 'career', 'center', 'central', 'chat', 'coalition', 'comment', 'company', 'compliance', 'contact', 'content', 'continuity', 'control', 'customer', 'cyber', 'data', 'demo', 'detail', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'east', 'email', 'enable', 'europe', 'event', 'exchange', 'file', 'filed', 'get', 'google', 'home', 'hybrid', 'im', 'information', 'investor', 'javascript', 'knowledgebase', 'large', 'leadership', 'legacy', 'login', 'managed', 'management', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'network', 'news', 'north', 'office', 'option', 'overview', 'pacific', 'partner', 'platform', 'please', 'policy', 'post', 'posted', 'powered', 'press', 'privacy', 'product', 'productivity', 'professional', 'program', 'protection', 'quote', 'registration', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'sale', 'schedule', 'secure', 'security', 'send', 'service', 'share', 'signature', 'sitemap', 'solution', 'south', 'success', 'support', 'targeted', 'team', 'technical', 'term', 'threat', 'training', 'trust', 'use', 'view', 'webinars', 'work'] | |
273 | |
273 2017-03-07T12:30:52.008000Z https://securityintelligence.com/reimagining-the-future-of-identity-management-with-blockchain/ | |
273 2017-03-14T12:31:01.826000Z https://securityintelligence.com/enterprise-intelligence-brief-three-experts-discuss-blockchain-in-cybersecurity/ | |
273 2017-03-23T12:32:33.776000Z http://www.itsecurityguru.org/2017/03/23/will-blockchain-make-payments-industry-secure/ | |
273 2017-03-29T00:30:57.871000Z http://packetpushers.net/blockchains-need-public-networks-kill-private-wans/ | |
['blockchain', 'business', 'financial', 'must', 'network', 'news', 'prevent', 'service', 'technology', 'transaction', 'year'] | |
274 | |
274 2017-03-07T18:31:05.805000Z http://csoonline.com/article/3177359/security/wikileaks-cia-document-dump-shows-agency-can-compromise-android-tvs.html | |
274 2017-03-08T00:30:46.237000Z http://csoonline.com/article/3178011/security/wikileaks-cia-documents-and-some-sober-thoughts.html | |
['address', 'agency', 'alert', 'among', 'analysis', 'android', 'applied', 'area', 'around', 'article', 'backup', 'bad', 'based', 'best', 'blog', 'bluetooth', 'brandposts', 'breach', 'brochure', 'business', 'carol', 'center', 'chris', 'christmas', 'cia', 'cloud', 'cloudy', 'come', 'comma', 'comment', 'compromise', 'concern', 'confide', 'contacted', 'content', 'control', 'converged', 'cost', 'credit', 'cso', 'cybersecurity', 'data', 'day', 'deal', 'deluxe', 'device', 'discount', 'discounted', 'discovery', 'document', 'download', 'easy', 'election', 'email', 'emailing', 'engineer', 'entire', 'error', 'essential', 'evaluating', 'expect', 'expose', 'facebook', 'featured', 'federal', 'fit', 'five', 'follow', 'friend', 'future', 'gartner', 'gathered', 'george', 'get', 'glance', 'go', 'going', 'google', 'government', 'guide', 'hacking', 'harvard', 'hash', 'headline', 'high', 'home', 'hottest', 'infrastructure', 'inhibit', 'instantly', 'intel', 'intelligence', 'interesting', 'internet', 'invent', 'job', 'keyboard', 'know', 'largest', 'latest', 'leadership', 'learn', 'let', 'life', 'like', 'limited', 'link', 'live', 'logitech', 'mackeeper', 'made', 'make', 'management', 'market', 'master', 'message', 'metro', 'might', 'modernization', 'move', 'much', 'multiple', 'national', 'network', 'new', 'news', 'newsletter', 'next', 'nordvpn', 'one', 'online', 'operation', 'page', 'paper', 'perspective', 'policy', 'popular', 'practical', 'president', 'privacy', 'private', 'pro', 'pt', 'ransomware', 'reddits', 'related', 'released', 'researcher', 'resource', 'right', 'risk', 'roundtable', 'said', 'salted', 'say', 'secure', 'security', 'see', 'senior', 'sent', 'sentinelone', 'separate', 'server', 'service', 'set', 'sign', 'software', 'sorry', 'spam', 'spammer', 'sponsored', 'spy', 'state', 'store', 'story', 'strategic', 'stream', 'tax', 'technology', 'terabyte', 'thank', 'time', 'top', 'trend', 'trove', 'turbotax', 'tv', 'twitter', 'update', 'use', 'value', 'vce', 'vickery', 'video', 'virtual', 'visit', 'vpn', 'vulnerability', 'washington', 'waste', 'website', 'wherever', 'white', 'wikileaks', 'year'] | |
275 | |
276 | |
277 | |
278 | |
278 2017-03-15T00:31:00.316000Z https://securityledger.com/2017/03/hacking-crews-all-apt-now/ | |
278 2017-03-17T00:30:53.040000Z http://darkreading.com/mandiant-financial-cybercriminals-looking-more-like-nation-states/d/d-id/1328426 | |
['according', 'activity', 'actor', 'also', 'annual', 'another', 'api', 'application', 'attack', 'attacker', 'aware', 'backdoor', 'bad', 'become', 'better', 'boot', 'business', 'caught', 'compromise', 'compromised', 'cover', 'crime', 'criminal', 'custom', 'cyber', 'data', 'decade', 'deep', 'difficult', 'drive', 'email', 'endpoint', 'engagement', 'even', 'evolution', 'experience', 'exposed', 'financial', 'finding', 'fireeye', 'firm', 'forensics', 'found', 'full', 'group', 'hacking', 'host', 'identifying', 'incident', 'including', 'increased', 'information', 'intelligence', 'investigation', 'last', 'like', 'line', 'load', 'longer', 'make', 'malware', 'mandiant', 'method', 'modification', 'network', 'new', 'noisy', 'one', 'operating', 'order', 'organization', 'persistent', 'print', 'privacy', 'process', 'range', 'record', 'related', 'relatively', 'remain', 'report', 'response', 'said', 'security', 'see', 'seen', 'sophisticated', 'sophistication', 'system', 'take', 'targeted', 'team', 'technique', 'technology', 'threat', 'time', 'tool', 'track', 'trend', 'two', 'undetected', 'use', 'used', 'vbr', 'victim', 'volume', 'way', 'window', 'year'] | |
281 | |
282 | |
283 | |
283 2017-03-21T00:31:20.410000Z http://www.welivesecurity.com/2011/12/12/how-secure-is-tsa-congress-isnt-impressed/ | |
283 2017-03-27T12:33:24.459000Z https://www.welivesecurity.com/2011/12/12/how-secure-is-tsa-congress-isnt-impressed/ | |
['according', 'acting', 'administration', 'administrator', 'advice', 'agency', 'allows', 'alone', 'among', 'another', 'app', 'appliance', 'appointment', 'architecture', 'area', 'asked', 'audit', 'author', 'avoid', 'awry', 'basic', 'beef', 'best', 'bet', 'big', 'billion', 'breaking', 'brochure', 'budget', 'bureaucracy', 'business', 'buying', 'cameron', 'camp', 'certainly', 'challenge', 'characterized', 'civil', 'classified', 'clear', 'clearly', 'combined', 'company', 'concerned', 'congress', 'congressional', 'consistently', 'consolidating', 'continuing', 'cost', 'costly', 'could', 'covered', 'cybersecurity', 'defense', 'defined', 'department', 'deployed', 'detect', 'detection', 'dispose', 'distracted', 'email', 'end', 'enormous', 'ensure', 'environment', 'equipment', 'eroded', 'eset', 'expect', 'expenditure', 'expert', 'explosive', 'find', 'finding', 'focus', 'friend', 'full', 'function', 'get', 'goal', 'gone', 'good', 'gradually', 'grown', 'guarantee', 'headed', 'help', 'highlighted', 'hire', 'hope', 'human', 'important', 'impressed', 'improve', 'inception', 'inert', 'inflexible', 'infrastructure', 'initiative', 'inline', 'instead', 'internally', 'keep', 'kind', 'latest', 'leadership', 'learned', 'left', 'lengthy', 'lesson', 'like', 'little', 'long', 'lost', 'lot', 'machine', 'make', 'management', 'massive', 'meeting', 'might', 'million', 'mission', 'money', 'must', 'narrow', 'nearly', 'necessarily', 'need', 'network', 'news', 'next', 'often', 'one', 'operational', 'opined', 'organization', 'original', 'others', 'outlook', 'outside', 'pace', 'page', 'paid', 'past', 'per', 'performance', 'period', 'perspective', 'piece', 'pieices', 'place', 'plan', 'planning', 'portal', 'positive', 'posted', 'power', 'practice', 'print', 'proactive', 'proactively', 'problem', 'procure', 'properly', 'purchase', 'rack', 'rapidly', 'reactively', 'realtime', 'recently', 'reflect', 'released', 'report', 'resource', 'result', 'return', 'reviewing', 'right', 'rudderless', 'run', 'saying', 'scathing', 'scenario', 'secure', 'securing', 'security', 'seem', 'segmented', 'server', 'shiny', 'shoring', 'significantly', 'solid', 'speaking', 'spending', 'spent', 'spread', 'staff', 'stance', 'status', 'steady', 'still', 'storage', 'strategy', 'substitute', 'surprised', 'suspected', 'tangential', 'taxpayer', 'technology', 'ten', 'term', 'thing', 'threat', 'time', 'ton', 'touting', 'trace', 'transportation', 'trust', 'tsa', 'unflattering', 'unit', 'updating', 'useless', 'vision', 'wasted', 'way', 'weak', 'whats', 'whether', 'wind', 'wish', 'within', 'without', 'wrote', 'year'] | |
284 | |
285 | |
285 2017-03-09T18:31:46.591000Z http://www.welivesecurity.com/2013/07/22/apple-developer-site-hacked-leak-sparks-security-overhaul/ | |
285 2017-03-27T12:33:06.365000Z https://www.welivesecurity.com/2013/07/22/apple-developer-site-hacked-leak-sparks-security-overhaul/ | |
['able', 'access', 'accessed', 'address', 'admits', 'also', 'app', 'apple', 'around', 'attack', 'attempt', 'attempted', 'author', 'balic', 'bug', 'channel', 'claimed', 'clock', 'closed', 'company', 'completely', 'confirmed', 'cybercrime', 'data', 'database', 'day', 'denied', 'detail', 'developer', 'email', 'encrypted', 'entire', 'etc', 'exposed', 'final', 'first', 'four', 'friend', 'gas', 'get', 'hack', 'hacked', 'happening', 'hour', 'however', 'ibrahim', 'immediately', 'inform', 'information', 'informed', 'instead', 'intruder', 'intrusion', 'issue', 'know', 'last', 'later', 'leak', 'like', 'list', 'live', 'mailing', 'name', 'offline', 'order', 'overhaul', 'overhauling', 'page', 'personal', 'portal', 'possibility', 'post', 'posted', 'prevent', 'print', 'provided', 'publicly', 'rebuilding', 'recently', 'registered', 'remained', 'report', 'reported', 'research', 'researcher', 'responsibility', 'rob', 'rule', 'said', 'saying', 'search', 'secure', 'security', 'server', 'since', 'site', 'software', 'spark', 'sparked', 'spirit', 'started', 'statement', 'still', 'system', 'techcrunch', 'threat', 'took', 'transparency', 'updating', 'user', 'via', 'wake', 'want', 'waugh', 'website', 'week', 'whats', 'whitehat', 'working', 'yet', 'youtube'] | |
288 | |
289 | |
290 | |
290 2017-03-02T18:30:46.702000Z https://www.onelogin.com/blog/new-dynamic-app-catalog | |
290 2017-03-15T00:30:56.881000Z https://www.onelogin.com/blog/onelogin-comes-to-microsoft-edge-the-up-and-coming-browser-of-the-enterprise | |
['access', 'account', 'acquired', 'add', 'app', 'application', 'apps', 'authentication', 'author', 'browser', 'build', 'building', 'catalog', 'chrome', 'cloud', 'company', 'complex', 'credential', 'deal', 'detection', 'detects', 'directly', 'director', 'dusan', 'dynamic', 'email', 'employee', 'enjoys', 'enterprise', 'even', 'event', 'extension', 'fully', 'give', 'go', 'google', 'help', 'identity', 'industry', 'internet', 'introducing', 'john', 'latest', 'log', 'login', 'love', 'make', 'management', 'need', 'new', 'offer', 'onelogin', 'online', 'password', 'policy', 'portadi', 'portal', 'portfolio', 'post', 'prior', 'problem', 'product', 'profile', 'quickly', 'save', 'security', 'shadow', 'sign', 'simple', 'single', 'solution', 'spent', 'startup', 'team', 'technology', 'think', 'today', 'update', 'use', 'user', 'using', 'view', 'vitek', 'web', 'website', 'year'] | |
291 | |
291 2017-03-21T12:30:48.798000Z https://blog.coresecurity.com/blog/horrible-mistakes-youre-making-pen-testing-pt-1 | |
291 2017-03-23T18:33:39.729000Z https://securityledger.com/2017/03/you-dont-know-hack-public-struggles-with-cyber-security-concepts/ | |
291 2017-03-24T18:33:23.043000Z https://www.illumio.com/blog/week-in-cyber-march-24 | |
['correctly', 'many', 'year'] | |
292 | |
293 | |
294 | |
295 | |
295 2017-03-08T18:30:59.095000Z https://nakedsecurity.sophos.com/2017/03/08/amazon-fight-to-keep-echo-recording-out-of-murder-trial-now-moot/ | |
295 2017-03-27T18:31:09.075000Z https://blog.avira.com/murder-alexa-beeped/ | |
['alexa', 'also', 'amazon', 'arkansas', 'around', 'bates', 'case', 'collins', 'consumption', 'could', 'court', 'data', 'death', 'device', 'echo', 'even', 'first', 'found', 'gadget', 'get', 'given', 'gotten', 'hand', 'help', 'home', 'hot', 'hour', 'iot', 'james', 'legal', 'meter', 'mobile', 'murder', 'next', 'night', 'one', 'phone', 'police', 'privacy', 'protected', 'protection', 'question', 'recorded', 'recording', 'remain', 'request', 'right', 'run', 'said', 'search', 'security', 'silent', 'smart', 'time', 'tub', 'two', 'victor', 'voice', 'water', 'way'] | |
296 | |
297 | |
299 | |
300 | |
301 | |
304 | |
307 | |
307 2017-03-08T18:30:47.844000Z http://insight.cryptzone.com/secure-access/is-your-aws-environment-a-security-risk/ | |
307 2017-03-14T18:30:43.768000Z http://insight.cryptzone.com/secure-access/challenges-to-achieving-compliance-in-the-cloud/ | |
['abbr', 'access', 'accessibility', 'acronym', 'address', 'also', 'appgate', 'application', 'apply', 'archive', 'attribute', 'aws', 'back', 'bad', 'biggest', 'blockquote', 'blog', 'breach', 'byod', 'cancel', 'category', 'challenge', 'chief', 'cite', 'cloud', 'code', 'collaboration', 'comment', 'company', 'complexity', 'compliance', 'compute', 'connect', 'contact', 'content', 'control', 'cryptzone', 'customer', 'data', 'day', 'del', 'devops', 'em', 'email', 'employee', 'endpoint', 'enforce', 'ensure', 'enterprise', 'environment', 'field', 'general', 'good', 'governance', 'group', 'help', 'helped', 'hold', 'home', 'html', 'implementing', 'including', 'individualized', 'industry', 'infosecurity', 'introducing', 'learn', 'leave', 'location', 'management', 'marked', 'mobile', 'model', 'move', 'multiple', 'must', 'name', 'need', 'network', 'next', 'offer', 'operational', 'organization', 'perimeter', 'post', 'privileged', 'professional', 'protection', 'provide', 'published', 'reduce', 'reduced', 'related', 'reply', 'required', 'resource', 'risk', 'sdp', 'search', 'secure', 'security', 'several', 'sharepoint', 'solution', 'source', 'strategy', 'strike', 'strong', 'system', 'tag', 'technology', 'threat', 'ultimate', 'uncategorized', 'use', 'user', 'vendor', 'way', 'web', 'website', 'whether'] | |
308 | |
309 | |
310 | |
310 2017-03-03T12:30:59.143000Z https://www.helpnetsecurity.com/2017/03/03/infosec-products-march-3/ | |
310 2017-03-10T06:31:06.830000Z https://www.helpnetsecurity.com/2017/03/10/infosec-products-march-10/ | |
310 2017-03-17T12:31:04.769000Z https://www.helpnetsecurity.com/2017/03/17/infosec-products-march-17/ | |
310 2017-03-24T12:34:01.912000Z https://www.helpnetsecurity.com/2017/03/24/infosec-products-march-24/ | |
['infosec', 'new', 'product'] | |
311 | |
311 2017-03-15T12:30:45.078000Z http://csoonline.com/article/3180972/security/court-blocks-american-from-suing-ethiopia-for-infecting-his-computer.html | |
311 2017-03-16T12:30:53.423000Z https://hotforsecurity.bitdefender.com/blog/man-accuses-ethiopian-officials-of-infecting-him-with-finspy-us-dismisses-case-17805.html | |
311 2017-03-16T18:30:52.551000Z https://nakedsecurity.sophos.com/2017/03/16/court-blocks-american-from-suing-ethiopia-over-alleged-hacking/ | |
['act', 'allegedly', 'american', 'appeal', 'asylum', 'attachment', 'case', 'circuit', 'citizen', 'columbia', 'computer', 'country', 'court', 'device', 'district', 'early', 'electronic', 'entirely', 'ethiopia', 'ethiopian', 'exception', 'finspy', 'foreign', 'forwarded', 'foundation', 'free', 'frontier', 'government', 'immunity', 'including', 'infected', 'kidane', 'long', 'order', 'outside', 'pseudonym', 'remote', 'ruled', 'ruling', 'said', 'server', 'sovereign', 'spy', 'state', 'surveillance', 'tort', 'transnational', 'would'] | |
312 | |
312 2017-03-13T12:31:10.344000Z https://www.helpnetsecurity.com/2017/03/13/android-devices-pre-installed-malware/ | |
312 2017-03-14T12:30:52.813000Z https://isc.sans.edu/newssummary.html#1021981 | |
['android', 'device', 'malware'] | |
313 | |
314 | |
316 | |
316 2017-03-01T00:30:44.352000Z http://securityaffairs.co/wordpress/56761/breaking-news/amazon-s3-outage.html | |
316 2017-03-01T00:30:47.632000Z http://securityaffairs.co/wordpress/56756/intelligence/gamaredon-group-backdoor.html | |
['ability', 'able', 'accidental', 'according', 'adrotate', 'affair', 'agency', 'allows', 'also', 'amazon', 'analyst', 'antivirus', 'apple', 'application', 'apt', 'arsenal', 'article', 'attack', 'author', 'awareness', 'aws', 'back', 'belief', 'believe', 'best', 'bill', 'blog', 'boeing', 'book', 'breach', 'campaign', 'catcher', 'certified', 'chief', 'contact', 'content', 'cookie', 'copyright', 'council', 'court', 'crime', 'currency', 'cyber', 'dark', 'data', 'deep', 'defence', 'defense', 'deploy', 'digital', 'dubbed', 'due', 'ec', 'employee', 'endpoint', 'enisa', 'error', 'eset', 'espionage', 'ethical', 'european', 'evangelist', 'exfiltrated', 'experience', 'expert', 'extended', 'field', 'find', 'firm', 'flaw', 'following', 'founded', 'freelance', 'gamaredon', 'group', 'hack', 'hacker', 'hacking', 'hacktivism', 'hit', 'home', 'icttf', 'id', 'identified', 'identity', 'imsi', 'increased', 'information', 'infosec', 'institute', 'intelligence', 'internet', 'island', 'landscape', 'law', 'leader', 'leak', 'led', 'london', 'mac', 'magazine', 'major', 'malware', 'management', 'many', 'member', 'ministry', 'mobile', 'must', 'named', 'national', 'network', 'new', 'news', 'notified', 'officer', 'outage', 'outside', 'paganini', 'passion', 'patch', 'personal', 'pierluigi', 'please', 'policy', 'previous', 'prison', 'promote', 'publication', 'published', 'rate', 'read', 'recently', 'regulation', 'report', 'reserved', 'resource', 'right', 'russian', 'secret', 'security', 'securityaffairs', 'service', 'share', 'sharing', 'show', 'singaporean', 'social', 'solution', 'sponsored', 'stakeholder', 'still', 'story', 'strong', 'team', 'terrorism', 'thing', 'threat', 'top', 'tracked', 'treat', 'union', 'used', 'using', 'virtual', 'war', 'warfare', 'weapon', 'web', 'writer', 'writing', 'year', 'zone'] | |
317 | |
318 | |
319 | |
320 | |
321 | |
322 | |
323 | |
324 | |
326 | |
327 | |
328 | |
328 2017-03-01T06:31:17.632000Z https://www.mimecast.com/blog/2016/03/it-security-is-a-team-sport/ | |
328 2017-03-18T12:32:33.148000Z http://www.mimecast.com/blog/2016/03/it-security-is-a-team-sport/ | |
['according', 'across', 'affect', 'agree', 'also', 'amazingly', 'answer', 'appropriate', 'argued', 'ask', 'attack', 'balance', 'balancing', 'bet', 'better', 'big', 'blog', 'board', 'boardroom', 'book', 'boston', 'breach', 'broader', 'build', 'business', 'care', 'causing', 'ceo', 'cfo', 'changing', 'chief', 'cio', 'ciso', 'clear', 'college', 'combining', 'comment', 'commercial', 'company', 'concerned', 'conference', 'confidence', 'confident', 'conflict', 'consider', 'control', 'conversation', 'corporate', 'cost', 'could', 'create', 'cultural', 'cyber', 'cyberattack', 'cybersecurity', 'damage', 'data', 'deal', 'death', 'delegate', 'delivering', 'deprioritize', 'despite', 'difference', 'disable', 'discussion', 'disqus', 'diverse', 'east', 'ed', 'effort', 'email', 'employee', 'enable', 'enforcement', 'engaged', 'enterprise', 'equation', 'equipped', 'etc', 'every', 'everyone', 'excellence', 'exceptional', 'executive', 'exposure', 'expression', 'extend', 'extremely', 'facing', 'feel', 'filed', 'fix', 'focus', 'follow', 'found', 'function', 'get', 'good', 'graduate', 'growth', 'hack', 'high', 'higher', 'hold', 'home', 'human', 'ill', 'inappropriately', 'informed', 'innovative', 'interest', 'investment', 'involved', 'involvement', 'isaca', 'issue', 'javascript', 'jennings', 'kellogg', 'language', 'law', 'lead', 'leadership', 'learn', 'learned', 'length', 'lesson', 'level', 'life', 'like', 'likely', 'lip', 'lot', 'major', 'make', 'management', 'manager', 'many', 'market', 'matter', 'mba', 'mean', 'medium', 'might', 'mimecast', 'model', 'money', 'much', 'nature', 'need', 'nervous', 'new', 'next', 'nobody', 'number', 'officer', 'operating', 'operational', 'opportunity', 'organization', 'part', 'percent', 'picture', 'placed', 'planning', 'play', 'please', 'post', 'posted', 'powered', 'prioritize', 'priority', 'private', 'pro', 'problem', 'process', 'proper', 'protect', 'protecting', 'protection', 'proven', 'public', 'put', 'range', 'ransomware', 'rapid', 'real', 'recent', 'recognize', 'reconsider', 'record', 'regulator', 'related', 'relationship', 'report', 'reporting', 'reputation', 'research', 'resilience', 'resource', 'respondent', 'responsibility', 'risk', 'role', 'rsa', 'saas', 'safeguarding', 'sale', 'say', 'school', 'security', 'see', 'seemed', 'seriously', 'service', 'session', 'share', 'shared', 'shareholder', 'show', 'side', 'significant', 'small', 'snapchat', 'somewhat', 'sony', 'speak', 'speaker', 'specializes', 'sport', 'strategy', 'suffered', 'support', 'surprise', 'surprisingly', 'surveyed', 'take', 'taken', 'taking', 'talked', 'target', 'team', 'technology', 'term', 'threat', 'time', 'together', 'track', 'trust', 'understand', 'understood', 'velocity', 'veteran', 'view', 'want', 'whaling', 'wider', 'win', 'work', 'worse', 'would'] | |
329 | |
329 2017-03-14T00:30:49.560000Z http://www.zonealarm.com/blog/2017/03/secure-smart-home-devices/ | |
329 2017-03-20T12:30:50.364000Z http://www.zonealarm.com/blog/2017/03/secure-your-smart-home-devices/ | |
329 2017-03-20T18:30:52.921000Z http://www.zonealarm.com/blog/2017/03/secure-smarthome-device/ | |
['abbr', 'able', 'access', 'accessing', 'acronym', 'address', 'admin', 'advantage', 'alarm', 'allows', 'also', 'antivirus', 'anything', 'appliance', 'application', 'attribute', 'available', 'banking', 'block', 'blockquote', 'boost', 'bring', 'built', 'camera', 'cancel', 'certain', 'certainly', 'change', 'check', 'cite', 'code', 'come', 'comment', 'communicate', 'complex', 'computer', 'connected', 'connection', 'connectivity', 'control', 'convenience', 'could', 'create', 'current', 'daily', 'data', 'default', 'definitely', 'del', 'detail', 'device', 'different', 'disadvantage', 'easy', 'either', 'em', 'email', 'enabling', 'enhance', 'enjoy', 'ensure', 'even', 'exactly', 'experiencing', 'exposed', 'extreme', 'facebook', 'field', 'figure', 'find', 'firewall', 'firmware', 'first', 'form', 'found', 'free', 'get', 'give', 'guaranteed', 'guess', 'hack', 'hacker', 'harder', 'home', 'house', 'household', 'however', 'html', 'idea', 'identifies', 'identify', 'ii', 'immediately', 'include', 'incoming', 'information', 'instead', 'internet', 'intruder', 'ip', 'keep', 'kind', 'last', 'learn', 'leave', 'listen', 'location', 'lock', 'made', 'make', 'marked', 'meant', 'much', 'name', 'network', 'never', 'notification', 'number', 'obvious', 'often', 'one', 'online', 'open', 'password', 'patch', 'pattern', 'personal', 'phone', 'port', 'pro', 'product', 'protect', 'protected', 'protection', 'protocol', 'public', 'published', 'push', 'put', 'receive', 'recent', 'remotely', 'reply', 'required', 'restrict', 'restricting', 'risk', 'routine', 'safe', 'safer', 'second', 'secure', 'security', 'see', 'separate', 'separating', 'shopping', 'smart', 'smartphone', 'smartphones', 'specific', 'spy', 'spyware', 'stay', 'strict', 'strike', 'strong', 'sure', 'surveillance', 'system', 'tablet', 'tag', 'terrific', 'thermostat', 'thing', 'tip', 'together', 'track', 'traffic', 'tweet', 'two', 'unique', 'unwanted', 'update', 'use', 'used', 'username', 'usernames', 'usually', 'virus', 'vulnerability', 'wearable', 'website', 'well', 'wifi', 'wireless', 'without', 'would', 'zonealarm'] | |
330 | |
330 2017-03-06T18:31:29.871000Z http://www.welivesecurity.com/2010/01/22/bemused-by-zimuse-dis-is-not-one-half/ | |
330 2017-03-07T12:31:16.818000Z http://www.welivesecurity.com/2010/01/22/we-are-not-zimused-a-few-updates/ | |
330 2017-03-23T00:31:19.964000Z http://www.welivesecurity.com/2010/01/30/twitter-and-i/ | |
330 2017-03-23T18:34:12.425000Z http://www.welivesecurity.com/2010/01/31/two-new-white-papers/ | |
330 2017-03-27T12:33:59.023000Z https://www.welivesecurity.com/2010/02/05/mac-virus-resurgent/ | |
['also', 'app', 'author', 'ba', 'blogging', 'cissp', 'citp', 'community', 'david', 'director', 'ecity', 'email', 'enabled', 'eset', 'fbcs', 'friend', 'harley', 'http', 'initiative', 'intelligence', 'malware', 'might', 'month', 'notification', 'page', 'paper', 'posted', 'preview', 'print', 'right', 'securing', 'threatblog', 'time', 'tinyurl', 'twitter', 'whats', 'white'] | |
331 | |
332 | |
333 | |
334 | |
335 | |
335 2017-03-27T18:31:42.162000Z https://isc.sans.edu/newssummary.html#1023541 | |
335 2017-03-27T18:31:43.298000Z https://isc.sans.edu/newssummary.html#1023557 | |
335 2017-03-27T18:31:45.273000Z https://isc.sans.edu/newssummary.html#1023571 | |
['ago', 'hour', 'synopsis', 'view'] | |
336 | |
337 | |
338 | |
339 | |
339 2017-03-03T18:30:46Z https://nakedsecurity.sophos.com/2017/03/03/news-in-brief-virginia-greenlights-delivery-bots-line-to-launch-ai-assistant-uber-seeks-licence/ | |
339 2017-03-06T18:30:55.018000Z https://nakedsecurity.sophos.com/2017/03/06/uber-under-fire-for-greyball-program-used-to-dodge-enforcement-officials/ | |
['android', 'antivirus', 'app', 'brief', 'car', 'catch', 'clearly', 'company', 'computer', 'device', 'driver', 'edition', 'engineer', 'facebook', 'family', 'firewall', 'follow', 'free', 'home', 'learn', 'life', 'linkedin', 'linux', 'look', 'mac', 'made', 'mobile', 'nakedsecurity', 'navigation', 'new', 'news', 'position', 'post', 'previous', 'provider', 'reddit', 'removal', 'security', 'share', 'smart', 'software', 'sophos', 'story', 'tool', 'twitter', 'uber', 'virus', 'week', 'window', 'xg'] | |
340 | |
342 | |
343 | |
344 | |
345 | |
345 2017-03-05T00:44:02.217000Z http://thehackernews.com/2011/03/43-indian-sites-hacked-by-killermind.html | |
345 2017-03-05T00:45:16.298000Z http://thehackernews.com/2011/01/brazilian-government-website-hacked-by.html | |
345 2017-03-05T00:45:45.937000Z http://thehackernews.com/2010/12/urdumelacom-database-owned-by.html | |
345 2017-03-05T00:45:47.513000Z http://thehackernews.com/2010/12/5-websites-hacked-by-killermind.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'killermind', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pakistan', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
346 | |
347 | |
347 2017-03-23T00:31:14.998000Z http://www.welivesecurity.com/2011/12/12/malware-and-cybercrime-predictions-tis-the-season/ | |
347 2017-03-27T12:33:23.475000Z https://www.welivesecurity.com/2011/12/12/malware-and-cybercrime-predictions-tis-the-season/ | |
['actual', 'actually', 'aggregated', 'allocate', 'annual', 'app', 'aspect', 'author', 'avoid', 'based', 'battle', 'begin', 'best', 'better', 'big', 'blog', 'ca', 'called', 'cobb', 'collective', 'come', 'coming', 'contributor', 'could', 'culminating', 'cybercrime', 'cycle', 'day', 'dealing', 'deciding', 'different', 'diverged', 'effort', 'email', 'end', 'energy', 'eset', 'every', 'expect', 'experience', 'expert', 'face', 'fear', 'friend', 'future', 'get', 'going', 'guess', 'head', 'helpful', 'hesitant', 'hindsight', 'hit', 'imagine', 'inclination', 'information', 'keeping', 'kind', 'leave', 'little', 'lump', 'make', 'malware', 'many', 'mindful', 'much', 'note', 'notice', 'often', 'one', 'outcome', 'page', 'particular', 'particularly', 'pas', 'past', 'person', 'phenomenon', 'posted', 'prediction', 'print', 'process', 'prognosticate', 'prognostication', 'publish', 'reader', 'reality', 'reason', 'resident', 'resource', 'say', 'season', 'seasonal', 'security', 'sharply', 'someone', 'sort', 'special', 'spirit', 'stephen', 'strategy', 'stripe', 'tell', 'thing', 'threat', 'true', 'try', 'upon', 'used', 'variety', 'week', 'whats', 'worried', 'worse', 'worth', 'year'] | |
348 | |
349 | |
350 | |
352 | |
352 2017-03-16T00:30:47.108000Z https://www.bleepingcomputer.com/news/security/russian-hacker-kolypto-who-worked-on-citadel-trojan-extradited-to-the-us/ | |
352 2017-03-23T12:31:49.349000Z http://thehackernews.com/2017/03/citadel-trojan-hacker.html | |
['accused', 'also', 'antivirus', 'arrest', 'arrested', 'article', 'banking', 'belorossov', 'breach', 'browser', 'charge', 'citadel', 'click', 'code', 'comment', 'company', 'computer', 'creator', 'data', 'deal', 'developed', 'dimitry', 'doj', 'exploit', 'extradited', 'extradition', 'find', 'first', 'four', 'hack', 'hacker', 'hacking', 'helped', 'home', 'hundred', 'infected', 'information', 'initially', 'international', 'known', 'kolypto', 'latest', 'law', 'leaked', 'like', 'made', 'malware', 'man', 'manager', 'mark', 'month', 'new', 'news', 'newsletter', 'norway', 'one', 'online', 'password', 'period', 'popular', 'prison', 'product', 'program', 'rainerfox', 'ransomware', 'researcher', 'role', 'russian', 'said', 'security', 'sentenced', 'shadow', 'show', 'six', 'software', 'source', 'started', 'tech', 'today', 'tool', 'trojan', 'two', 'update', 'use', 'user', 'using', 'variant', 'vartanyan', 'version', 'window', 'year', 'yet', 'zeus'] | |
353 | |
353 2017-03-14T00:30:52.779000Z https://security.googleblog.com/2017/03/detecting-and-eliminating-chamois-fraud.html | |
353 2017-03-14T12:30:55.061000Z http://thehackernews.com/2017/03/android-adware-malware-google.html | |
['actor', 'ad', 'additional', 'also', 'analysis', 'analyzed', 'android', 'app', 'application', 'apps', 'automatically', 'avoid', 'background', 'bad', 'based', 'behind', 'best', 'blocked', 'botnet', 'capable', 'chamois', 'clicking', 'code', 'comment', 'commit', 'configuration', 'custom', 'date', 'deceptive', 'deeper', 'detail', 'detecting', 'detection', 'developer', 'device', 'different', 'discovered', 'displaying', 'downloading', 'ecosystem', 'effort', 'employed', 'encrypted', 'evade', 'evaluation', 'eye', 'family', 'file', 'find', 'first', 'found', 'fraud', 'game', 'google', 'graphic', 'harmful', 'however', 'including', 'installed', 'installing', 'kicked', 'knowledge', 'largest', 'like', 'line', 'make', 'malicious', 'message', 'method', 'new', 'number', 'obfuscation', 'one', 'part', 'payload', 'performing', 'phas', 'plugins', 'post', 'potentially', 'premium', 'professional', 'promotion', 'quality', 'recently', 'required', 'resulted', 'risk', 'routine', 'security', 'seemingly', 'sending', 'several', 'sm', 'software', 'sometimes', 'sophisticated', 'storage', 'system', 'take', 'team', 'technique', 'technology', 'text', 'threat', 'traffic', 'trick', 'tricked', 'tried', 'trying', 'understand', 'us', 'user', 'using', 'verify', 'would', 'written', 'year'] | |
355 | |
355 2017-03-09T18:30:49.209000Z http://darkreading.com/mobile/trojan-android-app-bullies-google-play-users-into-giving-it-5-stars/d/d-id/1328353 | |
355 2017-03-09T18:30:57.832000Z http://darkreading.com/perimeter/9-phishing-lures-that-could-hijack-your-2017-tax-refund-/d/d-id/1328334 | |
355 2017-03-10T00:30:52.067000Z http://darkreading.com/attacks-breaches/attacks-under-way-against-easily-exploitable-apache-struts-flaw/d/d-id/1328362 | |
355 2017-03-10T18:30:49.791000Z http://darkreading.com/iot/iot-and-liability-how-organizations-can-hold-themselves-accountable-/a/d-id/1328324 | |
355 2017-03-10T18:30:53.685000Z http://darkreading.com/application-security/financial-institutions-less-appsec-savvy-than-youd-think/d/d-id/1328364 | |
355 2017-03-10T18:30:56.234000Z http://darkreading.com/vulnerabilities---threats/wikileaks-says-it-will-help-firms-thwart-cia-hack-tools/d/d-id/1328366 | |
355 2017-03-10T18:30:58.398000Z http://darkreading.com/endpoint/fbi-chief-calls-for-united-fight-against-cybercrime/d/d-id/1328365 | |
355 2017-03-11T00:30:52.194000Z http://darkreading.com/vulnerabilities---threats/stockpiling-0-day-bugs-not-so-dangerous-after-all-rand-study-shows/d/d-id/1328379 | |
355 2017-03-13T12:30:52.711000Z http://darkreading.com/risk/irs-guides-taxpayers-to-avoid-online-scammers/d/d-id/1328383 | |
355 2017-03-13T18:30:46.877000Z http://darkreading.com/operations/what-your-secops-team-can-(and-should)-do/a/d-id/1328359 | |
355 2017-03-14T00:30:57.885000Z http://darkreading.com/mobile/enterprises-hit-with-malware-preinstalled-on-their-androids/d/d-id/1328391 | |
355 2017-03-14T18:30:50.381000Z http://darkreading.com/endpoint/60--of-businesses-mistakenly-sent-out-sensitive-documents-/d/d-id/1328396 | |
355 2017-03-14T18:30:57.312000Z http://darkreading.com/application-security/the-industrial-revolution-of-application-security/a/d-id/1328373 | |
355 2017-03-15T00:30:51.725000Z http://darkreading.com/threat-intelligence/new-petrwrap-signals-intensified-rivalry-among-ransomware-gangs/d/d-id/1328401 | |
355 2017-03-16T18:30:51.984000Z http://darkreading.com/application-security/database-security/erp-attack-risks-come-into-focus/d/d-id/1328418 | |
355 2017-03-16T18:30:56.281000Z http://darkreading.com/perimeter/ethical-hacking-the-most-important-job-no-one-talks-about/a/d-id/1328400 | |
355 2017-03-16T18:31:01.090000Z http://darkreading.com/attacks-breaches/personal-data-leak-affects-33-million-us-employees/d/d-id/1328415 | |
355 2017-03-16T18:31:03.235000Z http://darkreading.com/mobile/google-removes-chamois-apps-botnet-from-play-store/d/d-id/1328414 | |
355 2017-03-17T00:30:49.625000Z http://darkreading.com/vulnerabilities---threats/us-cert-warns-that-https-inspection-tools-weaken-tls/d/d-id/1328423 | |
355 2017-03-17T00:30:56.919000Z http://darkreading.com/risk/in-cyber-who-do-we-trust-to-protect-the-business-/a/d-id/1328245 | |
355 2017-03-17T18:30:57.494000Z http://darkreading.com/attacks-breaches/north-koreas-lazarus-likely-behind-new-wave-of-cyberattacks/d/d-id/1328429 | |
355 2017-03-17T18:30:59.716000Z http://darkreading.com/threat-intelligence/embrace-the-machine-and-other-goals-for-cisos/a/d-id/1328433 | |
355 2017-03-20T18:30:52.938000Z http://darkreading.com/threat-intelligence/new-wave-of-security-acquisitions-signals-start-of-consolidation-trend/d/d-id/1328431 | |
355 2017-03-20T18:30:57.238000Z http://darkreading.com/careers-and-people/secrets-of-a-highly-productive-cio-ciso-relationship/d/d-id/1328432 | |
355 2017-03-20T18:31:00.186000Z http://darkreading.com/endpoint/star-trek-themed-ransomware-demands-new-crypto-currency/d/d-id/1328436 | |
355 2017-03-20T18:31:05.114000Z http://darkreading.com/attacks-breaches/irs-warns-taxpayers-of-email-scams/d/d-id/1328438 | |
355 2017-03-22T00:30:54.725000Z http://darkreading.com/application-security/the-true-state-of-devsecops/d/d-id/1328453 | |
355 2017-03-22T00:30:57.786000Z http://darkreading.com/threat-intelligence/new-metasploit-extension-available-for-testing-iot-device-security/d/d-id/1328452 | |
355 2017-03-22T18:30:48.351000Z http://darkreading.com/attacks-breaches/google-jigsaw-offer-free-cyber-protection-to-election-sites/d/d-id/1328456 | |
355 2017-03-22T18:30:53.808000Z http://darkreading.com/attacks-breaches/new-yorkers-see-60--rise-in-data-breaches-in-2016/d/d-id/1328455 | |
355 2017-03-22T18:31:00.766000Z http://darkreading.com/threat-intelligence/future-of-the-siem-/d/d-id/1328457 | |
355 2017-03-23T00:30:51.446000Z http://darkreading.com/threat-intelligence/windows-doubleagent-attack-turns-av-tools-into-malware-/d/d-id/1328462 | |
355 2017-03-23T12:31:47.816000Z http://darkreading.com/threat-intelligence/20-million-mobile-devices-at-high-risk-of-attack-study-finds---------/d/d-id/1328463 | |
355 2017-03-23T18:33:29.119000Z http://darkreading.com/application-security/7-steps-to-transforming-yourself-into-a-devsecops-rockstar/d/d-id/1328467 | |
355 2017-03-23T18:33:32.968000Z http://darkreading.com/risk/5-ways-cisos-could-work-better-with-their-cyber-insurers/a/d-id/1328461 | |
355 2017-03-23T18:33:36.275000Z http://darkreading.com/vulnerabilities---threats/lastpass-fixes-serious-security-flaw-in-chrome-firefox-extensions/d/d-id/1328466 | |
355 2017-03-23T18:33:41.732000Z http://darkreading.com/attacks-breaches/russian-man-pleads-guilty-for-role-in-citadel-malware-attacks/d/d-id/1328468 | |
355 2017-03-24T18:33:22.038000Z http://darkreading.com/risk/intro-to-cyber-insurance-7-questions-to-ask/d/d-id/1328481 | |
355 2017-03-24T18:33:29.864000Z http://darkreading.com/vulnerabilities---threats/americas-joblink-suffers-security-breach/d/d-id/1328480 | |
355 2017-03-24T18:33:31.310000Z http://darkreading.com/attacks-breaches/sandia-testing-new-intrusion-detection-tool-that-mimics-human-brain/d/d-id/1328478 | |
355 2017-03-24T18:33:32.126000Z http://darkreading.com/vulnerabilities---threats/us-senate-overturns-obama-consumer-privacy-rule/d/d-id/1328479 | |
355 2017-03-25T00:30:56.924000Z http://darkreading.com/attacks-breaches/apple-mac-iphone-bugs-that-cia-allegedly-exploited-were-fixed-years-ago/d/d-id/1328484 | |
355 2017-03-27T12:30:52.118000Z http://darkreading.com/endpoint/cybercriminals-exploit-march-madness-frenzy/d/d-id/1328488 | |
355 2017-03-27T18:31:00.981000Z http://darkreading.com/endpoint/this-week-on-dark-reading-event-calendar/a/d-id/1328494 | |
355 2017-03-28T00:30:53.050000Z http://darkreading.com/attacks-breaches/fbi-attackers-targeting-anonymous-ftp-servers-in-healthcare/d/d-id/1328496 | |
355 2017-03-28T18:30:56.666000Z http://darkreading.com/endpoint/how-identity-deception-increases-the-success-of-ransomware/a/d-id/1328490 | |
355 2017-03-28T18:30:58.761000Z http://darkreading.com/attacks-breaches/two-israeli-youths-may-be-charged-for-vdos-operation/d/d-id/1328498 | |
355 2017-03-29T00:30:57.623000Z http://darkreading.com/endpoint/commercial-iot-big-trouble-in-small-devices/a/d-id/1328502 | |
355 2017-03-29T18:31:00.055000Z http://darkreading.com/attacks-breaches/dutch-parliament-website-suffers-ransomware-attack/d/d-id/1328508 | |
355 2017-03-29T18:31:03.368000Z http://darkreading.com/threat-intelligence/millions-of-stolen-us-university-email-credentials-for-sale-on-the-dark-web--/d/d-id/1328511 | |
355 2017-03-29T18:31:05.564000Z http://darkreading.com/endpoint/to-gain-influence-cisos-must-get-securitys-human-element-right/a/d-id/1328492 | |
355 2017-03-29T18:31:08.444000Z http://darkreading.com/cloud/cloud-security-new-research-says-it-pros-still-skittish-/d/d-id/1328510 | |
355 2017-03-30T00:30:57.344000Z http://darkreading.com/endpoint/privacy/privacy-babel-making-sense-of-global-privacy-regulations/a/d-id/1328500 | |
355 2017-03-30T18:31:00.789000Z http://darkreading.com/attacks-breaches/patch-unlikely-for-widely-publicized-flaw-in-microsoft-iis-60-/d/d-id/1328522 | |
355 2017-03-30T18:31:01.789000Z http://darkreading.com/risk/internets-security-woes-are-not-all-technical-/d/d-id/1328523 | |
355 2017-03-30T18:31:03.381000Z http://darkreading.com/vulnerabilities---threats/30--of-malware-attacks-are-zero-day-exploits/d/d-id/1328521 | |
['access', 'account', 'adapter', 'addition', 'advanced', 'advertise', 'advertising', 'afp', 'aix', 'aka', 'allows', 'analytics', 'anomali', 'apic', 'app', 'application', 'arbitrary', 'archive', 'archived', 'attack', 'attacker', 'authentication', 'author', 'automated', 'back', 'bae', 'best', 'bio', 'black', 'box', 'breach', 'bug', 'build', 'button', 'ca', 'calendar', 'car', 'career', 'cartoon', 'cause', 'challenge', 'channel', 'cisco', 'click', 'close', 'cloud', 'code', 'combining', 'coming', 'comment', 'communication', 'community', 'company', 'compliance', 'computing', 'conference', 'connect', 'consumption', 'contact', 'content', 'controller', 'coolest', 'copyright', 'create', 'creative', 'csrf', 'current', 'cybersecurity', 'cylance', 'dark', 'darkreading', 'data', 'database', 'defense', 'deloitte', 'demonstrated', 'denial', 'development', 'device', 'devops', 'difference', 'direct', 'directory', 'discovered', 'discus', 'download', 'dr', 'drm', 'editor', 'email', 'emerging', 'enabled', 'endpoint', 'enterprise', 'event', 'evolution', 'execute', 'execution', 'executive', 'extplorer', 'facebook', 'favorite', 'feed', 'fibre', 'file', 'find', 'first', 'flash', 'follow', 'foreground', 'forgery', 'found', 'free', 'full', 'fusion', 'future', 'gain', 'gamasutra', 'game', 'gdc', 'gem', 'graphic', 'group', 'guest', 'gundert', 'hack', 'handle', 'hat', 'hdi', 'higgins', 'hijack', 'host', 'ibm', 'icmi', 'id', 'identity', 'impact', 'independent', 'info', 'information', 'informationweek', 'infrastructure', 'insider', 'insight', 'institute', 'intelligence', 'interesting', 'interop', 'involving', 'iot', 'issue', 'item', 'itx', 'jackson', 'jitter', 'juniper', 'kamkar', 'kelly', 'kernel', 'key', 'lab', 'later', 'latest', 'leader', 'learn', 'leveraging', 'levi', 'library', 'licensing', 'link', 'linkedin', 'linux', 'list', 'live', 'local', 'login', 'machine', 'make', 'management', 'manager', 'many', 'marketing', 'mean', 'medical', 'memory', 'might', 'mimecast', 'mishandles', 'mobile', 'monitoring', 'move', 'must', 'national', 'need', 'netstat', 'network', 'new', 'newest', 'news', 'newsletter', 'next', 'object', 'oldest', 'operation', 'operationalizing', 'opportunity', 'pace', 'page', 'paper', 'past', 'people', 'perimeter', 'php', 'please', 'policy', 'poll', 'post', 'practice', 'president', 'print', 'privacy', 'privilege', 'process', 'profile', 'promise', 'published', 'qnap', 'qts', 'radio', 'rate', 'rating', 'raytheon', 'read', 'reader', 'reading', 'recorded', 'remote', 'rendering', 'report', 'reprint', 'request', 'researcher', 'reserved', 'responding', 'right', 'risk', 'samy', 'save', 'schedule', 'sec', 'secdevops', 'secure', 'security', 'served', 'service', 'share', 'show', 'sitemap', 'slideshows', 'solution', 'ssh', 'statement', 'strategic', 'study', 'subscribe', 'subsystem', 'support', 'system', 'tackle', 'talk', 'target', 'team', 'tech', 'technology', 'teller', 'term', 'testing', 'threaded', 'threat', 'tool', 'top', 'toward', 'transition', 'traversal', 'tweet', 'twitter', 'ubm', 'university', 'unspecified', 'unusual', 'use', 'used', 'useful', 'user', 'vector', 'veracode', 'via', 'vice', 'video', 'view', 'vios', 'vrdc', 'vulnerability', 'vulns', 'watch', 'way', 'webcasts', 'webinar', 'webinars', 'white', 'working', 'world', 'write', 'year'] | |
356 | |
357 | |
358 | |
359 | |
360 | |
361 | |
361 2017-03-09T18:31:39.630000Z http://www.welivesecurity.com/2014/05/14/gartner-study-finds-users-byod-arent-worried-risks/ | |
361 2017-03-27T12:32:47.722000Z https://www.welivesecurity.com/2014/05/14/gartner-study-finds-users-byod-arent-worried-risks/ | |
['access', 'according', 'add', 'adhere', 'admitted', 'agreement', 'al', 'allow', 'also', 'always', 'analyst', 'android', 'app', 'archive', 'article', 'attack', 'author', 'average', 'aware', 'biggest', 'blog', 'body', 'breach', 'bring', 'bulletin', 'business', 'byod', 'caused', 'challenge', 'claim', 'code', 'community', 'company', 'concerned', 'conference', 'confused', 'consequently', 'consider', 'considering', 'contact', 'copyright', 'cyber', 'cybersecurity', 'data', 'day', 'de', 'deutsch', 'device', 'direct', 'div', 'earlier', 'effective', 'either', 'email', 'embed', 'employee', 'employer', 'en', 'engineering', 'english', 'escherich', 'eset', 'español', 'essential', 'even', 'expert', 'facebook', 'facing', 'faulty', 'file', 'find', 'follow', 'formal', 'found', 'four', 'friend', 'fully', 'gartner', 'get', 'go', 'google', 'head', 'home', 'host', 'hot', 'hour', 'http', 'implication', 'inbox', 'increasing', 'information', 'insight', 'interested', 'ir', 'isaca', 'issue', 'know', 'language', 'last', 'late', 'latest', 'leader', 'leaving', 'legal', 'link', 'linkedin', 'live', 'loss', 'magazine', 'making', 'management', 'many', 'material', 'mean', 'meike', 'might', 'mobile', 'month', 'multimedia', 'navigation', 'need', 'news', 'newsletter', 'office', 'one', 'operating', 'operational', 'opinion', 'organization', 'overcoming', 'page', 'paper', 'past', 'per', 'percent', 'personal', 'place', 'play', 'podcasts', 'policy', 'popular', 'pose', 'posed', 'possible', 'post', 'posted', 'practice', 'principal', 'print', 'privacy', 'private', 'problem', 'professional', 'protection', 'purpose', 'radar', 'ransomware', 'read', 'regularly', 'related', 'report', 'reported', 'research', 'researcher', 'reserved', 'respondent', 'rest', 'result', 'right', 'risk', 'rob', 'roessing', 'rolf', 'said', 'search', 'secure', 'security', 'select', 'sensitive', 'sign', 'signed', 'site', 'sitemap', 'slide', 'smartphone', 'smartphones', 'sneak', 'social', 'step', 'study', 'stylesheet', 'sure', 'survey', 'system', 'tablet', 'task', 'team', 'third', 'threat', 'toggle', 'topic', 'trade', 'twitter', 'understand', 'unsecured', 'use', 'used', 'user', 'video', 'view', 'virus', 'von', 'warns', 'waugh', 'wechseln', 'whats', 'white', 'wls', 'work', 'working', 'workplace', 'worried', 'wrote', 'year', 'yet', 'youtube', 'zum'] | |
362 | |
362 2017-03-23T00:30:57.965000Z http://www.welivesecurity.com/2016/01/11/blackenergy-and-the-ukrainian-power-outage-what-we-really-know/ | |
362 2017-03-27T12:31:44.430000Z https://www.welivesecurity.com/2016/01/11/blackenergy-and-the-ukrainian-power-outage-what-we-really-know/ | |
['abta', 'access', 'account', 'achilles', 'actually', 'add', 'agency', 'agree', 'al', 'allowing', 'alone', 'also', 'always', 'among', 'analysis', 'android', 'another', 'answer', 'app', 'applied', 'archive', 'arisen', 'article', 'aspect', 'associated', 'attack', 'attacker', 'attribution', 'author', 'back', 'backdoor', 'backdoored', 'banking', 'behind', 'believed', 'blackenergy', 'blackout', 'blame', 'blamed', 'blast', 'blog', 'breach', 'broke', 'capable', 'car', 'case', 'centrifuge', 'cert', 'charge', 'citizen', 'clear', 'code', 'come', 'common', 'commonly', 'community', 'company', 'complex', 'complicated', 'component', 'conclusion', 'conference', 'connect', 'connected', 'connection', 'consequence', 'contact', 'control', 'copyright', 'cost', 'could', 'country', 'course', 'critical', 'currently', 'customized', 'cyber', 'cyberattacks', 'cybercrime', 'cybercriminals', 'cybersecurity', 'damaged', 'dangerous', 'data', 'de', 'dedicated', 'defense', 'defensive', 'definite', 'definitive', 'describe', 'destruction', 'destructive', 'detail', 'detailed', 'detected', 'deutsch', 'different', 'difficult', 'direct', 'disclose', 'discovered', 'discovery', 'distribution', 'div', 'door', 'dream', 'economics', 'editor', 'education', 'electricity', 'email', 'embed', 'emerged', 'en', 'energy', 'engineering', 'english', 'enhanced', 'enough', 'enrichment', 'environment', 'error', 'eset', 'español', 'even', 'every', 'evolution', 'exactly', 'example', 'experience', 'experienced', 'expert', 'expose', 'face', 'facebook', 'facility', 'fact', 'family', 'fascinating', 'fewer', 'fiction', 'find', 'first', 'firstly', 'focus', 'follow', 'found', 'friend', 'fsb', 'functional', 'functionality', 'furnace', 'future', 'gang', 'german', 'get', 'getting', 'giving', 'go', 'google', 'group', 'hacking', 'hand', 'harden', 'harder', 'hardware', 'heavily', 'heel', 'help', 'home', 'hope', 'hot', 'however', 'http', 'human', 'hundred', 'imagine', 'important', 'inbox', 'incentive', 'including', 'indicate', 'industrial', 'information', 'inside', 'insight', 'institute', 'institution', 'interconnected', 'interconnection', 'interested', 'internet', 'interview', 'introduces', 'ir', 'iranian', 'issued', 'killdisk', 'know', 'language', 'later', 'latest', 'leaked', 'left', 'legal', 'lifetime', 'light', 'like', 'link', 'linkedin', 'linux', 'lipovsky', 'live', 'look', 'lot', 'lowering', 'magazine', 'make', 'making', 'malicious', 'malware', 'management', 'massive', 'material', 'matter', 'maximum', 'maybe', 'mean', 'medium', 'member', 'might', 'mill', 'mind', 'misinterpretation', 'month', 'motif', 'much', 'multimedia', 'multiple', 'must', 'navigation', 'necessary', 'network', 'news', 'newsletter', 'nuclear', 'number', 'offer', 'official', 'often', 'old', 'one', 'online', 'opening', 'operated', 'operating', 'operation', 'operational', 'opinion', 'option', 'order', 'organization', 'origin', 'others', 'outage', 'outlet', 'page', 'paper', 'past', 'patch', 'patching', 'pc', 'piece', 'planting', 'podcasts', 'policy', 'popular', 'possible', 'post', 'posted', 'power', 'practicality', 'prevent', 'primarily', 'print', 'prison', 'privacy', 'probably', 'problematic', 'program', 'proof', 'proper', 'proven', 'published', 'puzzle', 'question', 'radar', 'ransomware', 'rating', 'reach', 'read', 'reader', 'reality', 'really', 'reason', 'recent', 'recommended', 'referred', 'regard', 'regular', 'relate', 'related', 'remote', 'reported', 'research', 'researcher', 'reserved', 'responsible', 'right', 'risk', 'rival', 'robert', 'rtm', 'rule', 'run', 'running', 'russian', 'sad', 'sans', 'saving', 'search', 'section', 'sector', 'security', 'seems', 'select', 'senior', 'separate', 'serious', 'serve', 'server', 'set', 'setting', 'several', 'shed', 'shutting', 'sign', 'significant', 'similar', 'simple', 'single', 'site', 'sitemap', 'small', 'smartphones', 'social', 'software', 'someone', 'sometimes', 'sound', 'source', 'speculation', 'ssh', 'started', 'stealthy', 'steel', 'story', 'strategy', 'stylesheet', 'supposedly', 'surrounding', 'suspected', 'system', 'take', 'target', 'targeted', 'targeting', 'technology', 'telling', 'tend', 'theoretically', 'thing', 'think', 'thousand', 'threat', 'throughout', 'tier', 'together', 'toggle', 'tolerance', 'tool', 'topic', 'triggered', 'trojan', 'true', 'trying', 'twitter', 'two', 'ukraine', 'ukrainian', 'undecided', 'underestimate', 'undergone', 'unfortunate', 'unfortunately', 'uranium', 'used', 'user', 'using', 'vector', 'version', 'victim', 'video', 'view', 'virus', 'warning', 'way', 'wechseln', 'week', 'whatever', 'whats', 'whether', 'white', 'widely', 'wild', 'window', 'wiping', 'without', 'witnessed', 'wls', 'world', 'worldwide', 'would', 'yahoo', 'yes', 'youtube', 'zum'] | |
363 | |
363 2017-03-18T12:35:48.880000Z http://www.mimecast.com/blog/2011/12/2012-predictions-for-the-it-industry-part-three/ | |
363 2017-03-18T12:35:51.293000Z http://www.mimecast.com/blog/2011/12/2012-predictions-for-the-it-industry-part-two/ | |
['acceptable', 'africa', 'amazon', 'america', 'andrew', 'announces', 'apple', 'application', 'apps', 'archive', 'archiving', 'asia', 'atos', 'attack', 'award', 'barely', 'become', 'best', 'birthday', 'blog', 'blurred', 'borenstein', 'bundle', 'business', 'career', 'case', 'cause', 'center', 'central', 'ceo', 'chat', 'chief', 'click', 'coalition', 'collapse', 'college', 'comment', 'company', 'compliance', 'congress', 'consulted', 'contact', 'content', 'continuity', 'control', 'converge', 'covering', 'customer', 'cyber', 'data', 'dead', 'defend', 'demo', 'designed', 'detail', 'developer', 'disclaimer', 'disclosure', 'disqus', 'distinguished', 'dlp', 'east', 'email', 'employee', 'enable', 'engineer', 'europe', 'event', 'exchange', 'expert', 'extension', 'facebook', 'faculty', 'feel', 'feeling', 'file', 'filed', 'find', 'first', 'found', 'four', 'future', 'get', 'good', 'goodbye', 'google', 'grinnell', 'happy', 'history', 'hit', 'hold', 'home', 'hospital', 'hp', 'hybrid', 'ibm', 'im', 'including', 'industry', 'information', 'insecure', 'internet', 'investor', 'jabber', 'javascript', 'joining', 'kinect', 'know', 'knowledgebase', 'known', 'large', 'last', 'late', 'lawyer', 'leader', 'leadership', 'legacy', 'like', 'line', 'linkedin', 'login', 'looking', 'mail', 'mailbox', 'major', 'managed', 'management', 'member', 'mesaging', 'message', 'messaging', 'metamail', 'michigan', 'microsoft', 'middle', 'migration', 'mime', 'mimecast', 'mimecaster', 'mobility', 'mostly', 'multipurpose', 'nathaniel', 'need', 'network', 'news', 'next', 'north', 'noticed', 'nt', 'numerous', 'office', 'one', 'operation', 'option', 'overview', 'pacific', 'palm', 'part', 'partner', 'party', 'patent', 'patient', 'payment', 'pending', 'percent', 'personal', 'platform', 'please', 'policy', 'portfolio', 'post', 'posted', 'powered', 'prediction', 'press', 'previously', 'privacy', 'product', 'productivity', 'professional', 'program', 'promptly', 'protection', 'quarter', 'quote', 'record', 'registration', 'related', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'sale', 'say', 'scale', 'schedule', 'scientist', 'secure', 'security', 'send', 'served', 'service', 'several', 'share', 'signature', 'sitemap', 'software', 'solution', 'south', 'standard', 'steve', 'stock', 'success', 'support', 'system', 'targeted', 'team', 'technical', 'term', 'thankful', 'thanksgiving', 'thing', 'threat', 'three', 'training', 'trust', 'two', 'unfortunately', 'university', 'unprepared', 'use', 'useful', 'vault', 'version', 'view', 'way', 'web', 'webinars', 'whatever', 'whitman', 'wide', 'winhealth', 'work', 'workmail', 'world', 'would', 'year'] | |
364 | |
365 | |
366 | |
366 2017-03-14T06:31:13.818000Z http://www.welivesecurity.com/2011/12/08/carrier-iq-detection-check-your-source-before-you-install/ | |
366 2017-03-27T12:33:29.540000Z https://www.welivesecurity.com/2011/12/08/carrier-iq-detection-check-your-source-before-you-install/ | |
['abrams', 'accept', 'actually', 'add', 'advantage', 'al', 'allows', 'also', 'always', 'ambiguous', 'analogous', 'android', 'another', 'app', 'application', 'apps', 'archive', 'article', 'assuming', 'attention', 'author', 'av', 'bad', 'blame', 'blog', 'bringing', 'calling', 'capability', 'careful', 'carrier', 'carrieriq', 'chance', 'check', 'ciq', 'cissp', 'citp', 'clarify', 'clause', 'click', 'code', 'coming', 'community', 'company', 'conference', 'confuse', 'consequence', 'contact', 'continue', 'copyright', 'corporate', 'course', 'credential', 'dan', 'danger', 'dangerous', 'david', 'de', 'decoy', 'delivering', 'denial', 'desktop', 'detecting', 'detection', 'detector', 'determine', 'deutsch', 'direct', 'directly', 'div', 'doe', 'download', 'edition', 'email', 'embed', 'en', 'english', 'enterprising', 'eset', 'español', 'essentially', 'even', 'evil', 'expert', 'exploit', 'extent', 'facebook', 'fact', 'fair', 'fake', 'fbcs', 'fellow', 'firestorm', 'focused', 'follow', 'follower', 'forget', 'found', 'friend', 'get', 'getting', 'go', 'good', 'google', 'happen', 'harley', 'hat', 'help', 'home', 'hot', 'http', 'hurt', 'implemented', 'inbox', 'infection', 'information', 'insight', 'install', 'installed', 'instead', 'interested', 'introducing', 'iq', 'ir', 'issue', 'keylogging', 'know', 'lack', 'language', 'latest', 'legal', 'legitimate', 'like', 'likely', 'limited', 'link', 'linkedin', 'little', 'lot', 'magazine', 'make', 'malicious', 'malware', 'market', 'material', 'metaphor', 'might', 'mimic', 'mind', 'mobile', 'month', 'multimedia', 'name', 'navigation', 'necessarily', 'need', 'new', 'news', 'newsletter', 'number', 'offer', 'opinion', 'opportunity', 'overblown', 'page', 'paper', 'pass', 'paying', 'payment', 'people', 'phone', 'play', 'podcasts', 'pointing', 'policy', 'popular', 'post', 'posted', 'potential', 'pr', 'practice', 'presence', 'present', 'print', 'prisma', 'privacy', 'problem', 'promised', 'quinton', 'radar', 'randy', 'ransomware', 'read', 'real', 'related', 'released', 'relevant', 'remembering', 'remove', 'research', 'researcher', 'reserved', 'respectable', 'responsible', 'right', 'route', 'say', 'screaming', 'search', 'security', 'seen', 'select', 'senior', 'sensitivity', 'service', 'sign', 'significant', 'simply', 'site', 'sitemap', 'snooping', 'software', 'something', 'sometimes', 'source', 'stagefright', 'stylesheet', 'supplied', 'surprise', 'system', 'take', 'taking', 'tell', 'think', 'thinking', 'though', 'tip', 'today', 'toggle', 'topic', 'tricked', 'trojan', 'twitter', 'uk', 'unfair', 'used', 'user', 'using', 'video', 'view', 'virus', 'volume', 'want', 'watt', 'way', 'web', 'wechseln', 'whats', 'whether', 'white', 'wls', 'worse', 'worth', 'would', 'youtube', 'zum'] | |
368 | |
369 | |
370 | |
371 | |
372 | |
373 | |
373 2017-03-16T12:31:37.433000Z http://www.itsecurityguru.org/2017/03/16/expelling-myths-gdpr/ | |
373 2017-03-16T12:31:41.100000Z http://www.itsecurityguru.org/2017/03/16/european-small-businesses-popular-target-ransomware-attacks-say-datto/ | |
373 2017-03-16T12:31:22.342000Z http://www.itsecurityguru.org/2017/03/16/evolution-ciso-cio/ | |
373 2017-03-16T12:31:44.957000Z http://www.itsecurityguru.org/2017/03/16/whatsapp-security-flaw-exposed-millions-users-hackers/ | |
373 2017-03-16T12:31:28.830000Z http://www.itsecurityguru.org/2017/03/16/emma-watson-taking-legal-action-private-photos-stolen-hack/ | |
373 2017-03-16T12:31:35.055000Z http://www.itsecurityguru.org/2017/03/16/popular-teen-quiz-app-wishbone-hacked-exposing-tons-user-information/ | |
['ability', 'action', 'ad', 'administrator', 'advanced', 'affect', 'afraid', 'ago', 'aid', 'also', 'american', 'amidst', 'anderson', 'android', 'anonabox', 'app', 'application', 'appreciate', 'appriver', 'approaching', 'approves', 'around', 'article', 'arturplavnik', 'ask', 'atm', 'attack', 'back', 'backlash', 'badly', 'baker', 'bank', 'banking', 'biggest', 'binary', 'biometrics', 'blind', 'board', 'botnet', 'breach', 'broadly', 'build', 'bulletin', 'business', 'campaign', 'chamois', 'change', 'chief', 'cio', 'ciso', 'citibank', 'cloudlink', 'cm', 'combat', 'comment', 'communication', 'community', 'couple', 'creating', 'criminal', 'critical', 'cso', 'cyber', 'cybersecurity', 'data', 'date', 'datto', 'day', 'ddos', 'demonstrate', 'development', 'diligence', 'doe', 'dtmf', 'ebay', 'editor', 'email', 'embracing', 'emma', 'employee', 'enable', 'enabled', 'encryption', 'enemy', 'enterprise', 'environment', 'eset', 'eu', 'european', 'event', 'evolution', 'expelling', 'experience', 'explain', 'exposed', 'exposing', 'express', 'extreme', 'facebook', 'family', 'find', 'finnish', 'flaw', 'follow', 'ford', 'fraud', 'gchq', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'goodbye', 'google', 'got', 'government', 'grip', 'guru', 'ha', 'hack', 'hacked', 'hacker', 'hacking', 'hana', 'head', 'help', 'helped', 'hitting', 'home', 'hospital', 'hour', 'http', 'huge', 'impact', 'imposter', 'improve', 'incident', 'including', 'information', 'infosec', 'infosecurity', 'inside', 'jay', 'jesse', 'joyce', 'know', 'landmark', 'landscape', 'law', 'learning', 'leave', 'lee', 'legal', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'making', 'malware', 'many', 'massive', 'met', 'microsoft', 'military', 'million', 'min', 'mind', 'mitigation', 'mixed', 'must', 'myth', 'nazi', 'ne', 'need', 'netflix', 'new', 'news', 'next', 'nsa', 'num', 'open', 'operation', 'option', 'orloff', 'patch', 'paypal', 'persistent', 'personnel', 'pervasive', 'phishing', 'photo', 'platform', 'pm', 'polite', 'popular', 'posted', 'postin', 'previous', 'primary', 'privacy', 'private', 'professional', 'propaganda', 'protecting', 'protection', 'public', 'quality', 'quiz', 'ramond', 'ransomware', 'really', 'recent', 'regulation', 'related', 'release', 'remains', 'research', 'response', 'retailer', 'return', 'rich', 'rick', 'rise', 'risk', 'round', 'run', 'rush', 'sale', 'sap', 'say', 'scam', 'secruity', 'sector', 'secure', 'security', 'sensitive', 'share', 'shortage', 'shuts', 'sign', 'skill', 'small', 'software', 'sort', 'source', 'spam', 'spot', 'spread', 'squad', 'stock', 'stolen', 'story', 'supporter', 'swastika', 'tackle', 'tag', 'tagged', 'taking', 'talk', 'talking', 'target', 'technology', 'teen', 'ten', 'term', 'themed', 'thing', 'threat', 'time', 'ton', 'top', 'trading', 'tremendous', 'trend', 'turning', 'tweet', 'twitter', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'video', 'viral', 'vulnerability', 'walcot', 'warns', 'watson', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'whatsapp', 'wishbone', 'within', 'woman', 'working', 'worse', 'year'] | |
374 | |
375 | |
375 2017-03-11T12:31:01.674000Z http://www.welivesecurity.com/2015/02/11/outlook-app-blocked-eu-parliament-serious-security-issues/ | |
375 2017-03-27T12:32:20.820000Z https://www.welivesecurity.com/2015/02/11/outlook-app-blocked-eu-parliament-serious-security-issues/ | |
['access', 'according', 'acompli', 'added', 'administrator', 'advice', 'advising', 'alan', 'already', 'android', 'app', 'application', 'author', 'available', 'ban', 'banned', 'block', 'blocked', 'blocking', 'bought', 'capability', 'case', 'change', 'claim', 'cloud', 'concern', 'concerned', 'continue', 'control', 'controlling', 'corporate', 'credential', 'customer', 'delft', 'department', 'detail', 'detailed', 'device', 'done', 'dutch', 'email', 'entirely', 'ep', 'eset', 'eu', 'european', 'even', 'first', 'follow', 'former', 'friend', 'hardware', 'however', 'immediately', 'including', 'information', 'install', 'institution', 'io', 'made', 'magazine', 'mail', 'martin', 'meet', 'member', 'microsoft', 'modified', 'new', 'outlook', 'page', 'parliament', 'party', 'password', 'pc', 'people', 'place', 'please', 'policy', 'posted', 'print', 'privacy', 'report', 'reported', 'said', 'saying', 'sc', 'security', 'seen', 'service', 'spokesman', 'step', 'store', 'taken', 'technet', 'temporarily', 'third', 'took', 'transferred', 'transparent', 'two', 'uninstall', 'university', 'unusual', 'use', 'used', 'using', 'version', 'warning', 'web', 'week', 'well', 'whats', 'wisconsin', 'world'] | |
376 | |
377 | |
377 2017-03-29T00:31:04.243000Z http://www.veracode.com/blog/research/cryptographically-secure-pseudo-random-number-generator-csprng | |
377 2017-03-30T00:30:54.860000Z https://veracode.com/blog/research/cryptographically-secure-pseudo-random-number-generator-csprng | |
['absolute', 'absolutely', 'accept', 'account', 'across', 'acute', 'add', 'addition', 'additional', 'address', 'advance', 'advantage', 'alert', 'algo', 'algorithm', 'also', 'always', 'analysis', 'anyone', 'appears', 'application', 'applied', 'approach', 'architectural', 'argument', 'array', 'ask', 'aspect', 'assuming', 'assurance', 'attack', 'attained', 'automation', 'available', 'avid', 'avoid', 'avoided', 'aware', 'away', 'aws', 'based', 'basic', 'become', 'behavior', 'behind', 'best', 'binary', 'bit', 'bitcoin', 'block', 'blocking', 'blog', 'breaking', 'building', 'byte', 'call', 'called', 'care', 'career', 'carry', 'case', 'challenge', 'choose', 'chosen', 'circumstance', 'class', 'clone', 'code', 'combination', 'come', 'command', 'comment', 'complete', 'complicated', 'complimentary', 'composed', 'compromise', 'computationally', 'conclude', 'condition', 'config', 'configuration', 'configured', 'configuring', 'congruential', 'considered', 'construction', 'constructor', 'container', 'content', 'continuing', 'continuous', 'continuously', 'correct', 'could', 'cover', 'covered', 'crack', 'cracking', 'create', 'cryptographer', 'cryptographic', 'cryptographically', 'cryptography', 'csprng', 'csprngs', 'currently', 'customer', 'dangerously', 'data', 'date', 'deadlock', 'debugging', 'default', 'defending', 'delayed', 'denial', 'dependency', 'depending', 'depends', 'derives', 'described', 'designing', 'detail', 'deterministically', 'developer', 'difference', 'different', 'directly', 'documented', 'doe', 'done', 'downside', 'dr', 'drained', 'due', 'easily', 'effectively', 'element', 'email', 'encourage', 'entropy', 'entry', 'environment', 'etc', 'event', 'ever', 'everyone', 'example', 'exception', 'exhibit', 'existing', 'explained', 'explains', 'explicit', 'explicitly', 'external', 'fairly', 'field', 'file', 'find', 'finding', 'first', 'following', 'form', 'full', 'functionality', 'gather', 'general', 'generate', 'generated', 'generates', 'generating', 'generation', 'generator', 'get', 'getinstance', 'give', 'given', 'goal', 'going', 'guide', 'hacker', 'hardware', 'heavily', 'highest', 'highly', 'home', 'homepage', 'however', 'http', 'idea', 'illustrates', 'immediately', 'impact', 'implement', 'implementation', 'importance', 'important', 'inappropriate', 'incident', 'initial', 'initialization', 'initially', 'insecure', 'instance', 'involved', 'iv', 'james', 'java', 'jca', 'keep', 'keeping', 'kept', 'keyboard', 'keying', 'language', 'largely', 'later', 'lead', 'leading', 'least', 'letting', 'level', 'like', 'limited', 'line', 'linear', 'linux', 'list', 'long', 'longer', 'low', 'machine', 'mainclass', 'mainly', 'make', 'making', 'mandatory', 'manner', 'mansi', 'marked', 'material', 'matter', 'mean', 'measure', 'method', 'might', 'millisecond', 'mind', 'miner', 'module', 'mollom', 'motto', 'mouse', 'multiple', 'name', 'nativeprng', 'nativeprngblocking', 'nativeprngnon', 'nativeprngnonblocking', 'nearly', 'need', 'needed', 'never', 'new', 'news', 'next', 'nist', 'nonce', 'note', 'nothing', 'number', 'object', 'observation', 'observe', 'observed', 'obviously', 'occur', 'occurs', 'one', 'operating', 'option', 'order', 'os', 'output', 'overview', 'page', 'passing', 'perfectly', 'permutation', 'pessimistic', 'pick', 'place', 'platform', 'play', 'please', 'policy', 'pool', 'poorly', 'popular', 'portable', 'possible', 'post', 'practical', 'precise', 'predictable', 'preferred', 'previous', 'principal', 'privacy', 'private', 'prng', 'problem', 'professor', 'program', 'property', 'proportional', 'prove', 'provide', 'provided', 'provider', 'provides', 'providing', 'publicly', 'published', 'purpose', 'python', 'ranbytes', 'random', 'randomizer', 'randomness', 'recent', 'recommend', 'recommendation', 'recommended', 'refer', 'reference', 'regardless', 'reliably', 'rely', 'relying', 'remember', 'reproduced', 'request', 'requesting', 'require', 'required', 'requires', 'research', 'researcher', 'resource', 'respectively', 'responsibility', 'return', 'returned', 'review', 'rng', 'role', 'roper', 'rule', 'run', 'safe', 'safely', 'sample', 'scenario', 'scene', 'second', 'secran', 'secure', 'secured', 'securedaesusage', 'securely', 'securerandom', 'security', 'see', 'seed', 'seeded', 'seeding', 'selected', 'series', 'serve', 'service', 'setseed', 'share', 'shared', 'sharing', 'sheth', 'show', 'shown', 'simple', 'since', 'site', 'situation', 'skip', 'snapshot', 'solution', 'source', 'specific', 'specifying', 'start', 'started', 'static', 'stay', 'step', 'still', 'straightforward', 'strength', 'strictly', 'stronger', 'strongrng', 'submitting', 'suffice', 'sufficient', 'sufficiently', 'suggest', 'suggestion', 'suggests', 'suitable', 'summarize', 'supplement', 'sure', 'system', 'take', 'taken', 'target', 'task', 'technical', 'technology', 'tends', 'theft', 'thing', 'three', 'thus', 'time', 'tip', 'tl', 'tomcat', 'took', 'traveller', 'troubleshoot', 'turn', 'two', 'underlying', 'unix', 'unless', 'unpredictable', 'unseeded', 'update', 'updated', 'upon', 'us', 'usage', 'use', 'used', 'user', 'using', 'value', 'various', 'vary', 'vastly', 'vector', 'veracode', 'virtual', 'virtualization', 'virtualized', 'vm', 'vulnerability', 'want', 'way', 'weak', 'website', 'week', 'well', 'whatever', 'whether', 'widely', 'wikipedia', 'window', 'wish', 'work', 'would'] | |
378 | |
378 2017-03-10T06:30:53.855000Z https://www.bleepingcomputer.com/news/security/new-cerber-ransomware-variant-released-that-keeps-original-filename/ | |
378 2017-03-11T00:30:57.065000Z https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-10th-2017-spora-cerber-and-technical-writeups/ | |
378 2017-03-18T18:30:51.054000Z https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-17th-2017-revenge-petrwrap-and-captain-kirk/ | |
378 2017-03-25T00:30:57.481000Z https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-23th-2017-decline-of-locky-andamp-spora-stats/ | |
['abrams', 'abusive', 'administration', 'advertising', 'adwcleaner', 'agreement', 'allowed', 'also', 'alureon', 'anonymously', 'antivirus', 'appends', 'area', 'article', 'bleeping', 'bleepingcomputer', 'category', 'certification', 'changelog', 'chat', 'close', 'combofix', 'command', 'comment', 'community', 'company', 'computer', 'contact', 'content', 'copy', 'copyright', 'course', 'creator', 'cryptodefense', 'cryptolocker', 'cryptomix', 'cryptorbit', 'cryptosearch', 'database', 'deal', 'decryptor', 'defragmentation', 'discovered', 'downloaded', 'downloads', 'dummy', 'editor', 'elearning', 'emsisoft', 'encrypted', 'expertise', 'extension', 'facebook', 'faq', 'featured', 'feed', 'field', 'file', 'find', 'folder', 'follow', 'forensics', 'form', 'forum', 'found', 'gadget', 'gear', 'glossary', 'going', 'google', 'guide', 'harmful', 'help', 'hidden', 'home', 'howdecrypt', 'inappropriate', 'include', 'includes', 'information', 'installed', 'instruction', 'irc', 'language', 'latest', 'lawrence', 'learn', 'license', 'like', 'llc', 'locky', 'login', 'main', 'malware', 'manager', 'member', 'mode', 'msevents', 'na', 'need', 'new', 'news', 'newsletter', 'note', 'offline', 'order', 'owner', 'password', 'periodic', 'please', 'policy', 'popular', 'post', 'posted', 'potplayer', 'previous', 'privacy', 'problem', 'program', 'prompt', 'rakhnidecryptor', 'ransom', 'ransomware', 'receive', 'recover', 'recovery', 'redirects', 'register', 'released', 'remember', 'removal', 'remove', 'reporter', 'researcher', 'reserved', 'resource', 'right', 'rkill', 'rootkit', 'rootkits', 'rule', 'safe', 'sample', 'screen', 'section', 'security', 'securitytool', 'see', 'shadow', 'show', 'sign', 'sitemap', 'social', 'spam', 'start', 'startup', 'strong', 'submit', 'submitting', 'task', 'tdss', 'tdsskiller', 'technical', 'tool', 'topic', 'trojan', 'tutorial', 'twitter', 'understand', 'uninstall', 'update', 'use', 'useful', 'user', 'username', 'using', 'variant', 'version', 'viewed', 'virtumonde', 'virus', 'volume', 'welcome', 'window', 'winfixer', 'winternals', 'worm', 'write', 'yet'] | |
379 | |
379 2017-03-16T18:31:14.856000Z http://www.welivesecurity.com/2011/12/09/malware-drive-by-infection-video-from-fake-fdic-message-to-infection/ | |
379 2017-03-27T12:33:27.192000Z https://www.welivesecurity.com/2011/12/09/malware-drive-by-infection-video-from-fake-fdic-message-to-infection/ | |
['account', 'acrobat', 'adobe', 'advantage', 'also', 'america', 'anything', 'app', 'appearing', 'author', 'bank', 'banking', 'campaign', 'click', 'cobb', 'code', 'computer', 'corporation', 'couple', 'dedicated', 'deposit', 'document', 'downloaded', 'email', 'enduring', 'entity', 'eset', 'execute', 'fact', 'fake', 'fdic', 'federal', 'file', 'follower', 'format', 'friend', 'general', 'heard', 'including', 'infection', 'insurance', 'keep', 'lead', 'legitimate', 'like', 'likely', 'link', 'look', 'malware', 'mass', 'message', 'misunderstood', 'nasty', 'never', 'nevertheless', 'news', 'noteworthy', 'one', 'onto', 'page', 'part', 'phishing', 'piece', 'popularity', 'posted', 'pretend', 'print', 'probably', 'program', 'scam', 'seeing', 'sends', 'stephen', 'thing', 'today', 'trojan', 'try', 'turn', 'type', 'used', 'video', 'website', 'whats', 'without', 'work', 'yet', 'zombie'] | |
380 | |
380 2017-03-19T12:30:55.432000Z https://www.bleepingcomputer.com/news/security/new-but-old-technique-hijacks-user-sessions-on-all-windows-versions/ | |
380 2017-03-20T18:30:53.630000Z http://thehackernews.com/2017/03/hack-windows-user-account.html | |
['access', 'according', 'account', 'action', 'admin', 'administrator', 'alexander', 'also', 'apple', 'article', 'attack', 'attacker', 'bank', 'behave', 'benjamin', 'best', 'billing', 'blog', 'breach', 'call', 'come', 'command', 'comment', 'company', 'computer', 'consider', 'could', 'couple', 'creation', 'credential', 'data', 'day', 'deal', 'delpy', 'desktop', 'detailed', 'employee', 'entirely', 'escalation', 'even', 'execute', 'exploit', 'feature', 'figure', 'find', 'first', 'flaw', 'french', 'get', 'google', 'hack', 'hacked', 'hacking', 'hijack', 'hijacking', 'home', 'issue', 'know', 'knowing', 'korznikov', 'latest', 'leaving', 'likely', 'local', 'lock', 'locked', 'log', 'logging', 'lunch', 'machine', 'malicious', 'malware', 'manager', 'microsoft', 'network', 'new', 'news', 'newsletter', 'one', 'password', 'perform', 'performed', 'physical', 'policy', 'popular', 'privilege', 'ransomware', 'rdp', 'require', 'researcher', 'right', 'security', 'server', 'service', 'session', 'six', 'special', 'start', 'supposed', 'switch', 'sysadmin', 'system', 'targeted', 'task', 'technique', 'technology', 'tool', 'trick', 'twitter', 'use', 'user', 'using', 'version', 'video', 'vulnerability', 'want', 'way', 'window', 'without', 'work', 'workstation', 'year'] | |
381 | |
382 | |
383 | |
384 | |
384 2017-03-22T06:30:49.226000Z https://isc.sans.edu/forums/diary/Blank+Slate+campaign+still+pushing+Cerber+ransomware/22207/ | |
384 2017-03-22T18:30:46.461000Z https://isc.sans.edu/forums/diary/Blank+Slate+malspam+still+pushing+Cerber+ransomware/22215/ | |
['abuse', 'across', 'acted', 'address', 'ago', 'along', 'also', 'always', 'amount', 'another', 'archive', 'article', 'aspect', 'attachment', 'background', 'basis', 'batch', 'began', 'binary', 'bitcoin', 'blank', 'brad', 'byte', 'call', 'campaign', 'case', 'cerber', 'chain', 'change', 'changed', 'checked', 'code', 'collected', 'come', 'compromise', 'computer', 'configuration', 'consist', 'consisted', 'consistently', 'consists', 'constant', 'contacted', 'contains', 'content', 'continue', 'cost', 'current', 'cycle', 'daily', 'data', 'decent', 'decryption', 'decryptor', 'default', 'description', 'designed', 'desktop', 'detail', 'diary', 'different', 'directly', 'discovered', 'document', 'dollar', 'domain', 'downloaded', 'dropped', 'duncan', 'earlier', 'effective', 'either', 'else', 'email', 'enable', 'ending', 'enough', 'event', 'every', 'everything', 'exactly', 'example', 'execute', 'exploit', 'extracted', 'far', 'file', 'filtering', 'final', 'find', 'first', 'followed', 'following', 'found', 'frequently', 'generated', 'get', 'globe', 'go', 'ha', 'handler', 'hash', 'header', 'host', 'hosting', 'hour', 'however', 'hta', 'http', 'image', 'indicate', 'indicator', 'infect', 'infected', 'infection', 'information', 'initial', 'instruction', 'interested', 'interesting', 'introduction', 'ioc', 'ip', 'isc', 'javascript', 'keep', 'kit', 'let', 'like', 'line', 'little', 'longer', 'look', 'macro', 'magnitude', 'mail', 'majority', 'malicious', 'malspam', 'malware', 'many', 'message', 'method', 'microsoft', 'month', 'must', 'name', 'noted', 'nothing', 'number', 'numerous', 'obfuscated', 'one', 'open', 'operation', 'page', 'part', 'pcap', 'people', 'port', 'post', 'potential', 'presence', 'previous', 'probably', 'process', 'provider', 'pseudodarkleech', 'pushed', 'pushing', 'ran', 'random', 'ransom', 'ransomware', 'recent', 'recently', 'recipient', 'redacted', 'reflected', 'reliable', 'reply', 'request', 'rig', 'sample', 'screen', 'script', 'second', 'see', 'seen', 'sending', 'server', 'several', 'shot', 'shown', 'side', 'similar', 'since', 'size', 'slate', 'source', 'spam', 'specifically', 'spoofed', 'start', 'starting', 'still', 'subject', 'subscribe', 'targeting', 'ten', 'text', 'think', 'three', 'tracking', 'traffic', 'try', 'two', 'type', 'udp', 'using', 'usually', 'vague', 'value', 'vast', 'victim', 'visibility', 'vulnerable', 'web', 'week', 'whenever', 'window', 'within', 'without', 'wonder', 'word', 'work', 'worring', 'writeup', 'wrote', 'wscript', 'zip'] | |
385 | |
385 2017-03-18T00:30:56.897000Z https://www.bleepingcomputer.com/news/security/ask-com-toolbar-network-compromised-twice-in-two-months/ | |
385 2017-03-21T12:30:49.688000Z https://www.grahamcluley.com/malicious-hackers-discovered-way-deliver-malware-unloved-ask-toolbar/ | |
['access', 'activity', 'advertising', 'allowed', 'also', 'apn', 'article', 'ask', 'attack', 'attacker', 'based', 'black', 'breach', 'browser', 'canary', 'carbon', 'category', 'certificate', 'command', 'comment', 'company', 'compromised', 'computer', 'contact', 'content', 'copyright', 'credential', 'data', 'decryptor', 'deliver', 'detected', 'device', 'download', 'end', 'event', 'exploit', 'facebook', 'feed', 'firefox', 'first', 'follow', 'found', 'future', 'gadget', 'game', 'gear', 'google', 'hacked', 'happened', 'hijacked', 'home', 'incident', 'install', 'installed', 'issued', 'laterally', 'latest', 'launched', 'like', 'linux', 'login', 'malicious', 'malware', 'mechanism', 'medium', 'microsoft', 'month', 'name', 'network', 'new', 'news', 'newsletter', 'one', 'order', 'partner', 'past', 'pc', 'policy', 'popular', 'post', 'privacy', 'problem', 'product', 'program', 'ransomware', 'recent', 'red', 'register', 'remote', 'remove', 'reported', 'researcher', 'reserved', 'revoked', 'right', 'second', 'security', 'shell', 'signed', 'social', 'software', 'spam', 'support', 'system', 'tech', 'three', 'took', 'toolbar', 'topic', 'twitter', 'update', 'used', 'user', 'using', 'version', 'victim', 'vulnerability', 'want', 'way', 'web', 'window', 'write', 'yet'] | |
386 | |
387 | |
388 | |
389 | |
390 | |
391 | |
391 2017-03-01T18:30:50.219000Z https://securityintelligence.com/viva-las-vegas-and-viva-effective-application-security-testing-practices/ | |
391 2017-03-02T18:30:49.463000Z https://securityintelligence.com/nine-security-tips-that-go-outside-the-box/ | |
391 2017-03-03T12:30:49.728000Z https://securityintelligence.com/abuse-of-privileges-common-barriers-to-managing-privileged-accounts/ | |
391 2017-03-03T18:30:50.714000Z https://securityintelligence.com/avoid-lengthy-pit-stops-along-the-road-to-the-data-protection-finish-line/ | |
391 2017-03-06T12:30:49.309000Z https://securityintelligence.com/cheap-shock-why-shellshock-is-still-a-thing/ | |
391 2017-03-06T12:30:51.408000Z https://securityintelligence.com/media/data-privacy-and-the-gdpr-what-you-need-to-know/ | |
391 2017-03-06T18:30:53.107000Z https://securityintelligence.com/building-a-cybersecurity-culture-around-layer-8/ | |
391 2017-03-07T18:30:59.791000Z https://securityintelligence.com/the-role-of-the-security-intelligence-analyst-and-the-three-main-elements-of-cybersecurity/ | |
391 2017-03-08T18:30:56.581000Z https://securityintelligence.com/information-overload-now-what/ | |
391 2017-03-08T18:30:59.445000Z https://securityintelligence.com/connecting-to-the-future-with-cognitive-security/ | |
391 2017-03-09T12:30:55.971000Z https://securityintelligence.com/five-steps-to-propel-your-privileged-identity-management-strategy-to-the-next-level/ | |
391 2017-03-09T18:30:53.308000Z https://securityintelligence.com/nine-security-practices-that-may-not-be-effective/ | |
391 2017-03-09T18:30:57.191000Z https://securityintelligence.com/showcasing-threat-intelligence-at-ibm-interconnect/ | |
391 2017-03-10T12:30:51.143000Z https://securityintelligence.com/detect-analyze-respond-attend-these-key-talks-at-infosec-world-2017/ | |
391 2017-03-10T12:30:53.860000Z https://securityintelligence.com/lesson-learned-from-stuxnet/ | |
391 2017-03-10T18:30:55.581000Z https://securityintelligence.com/five-advantages-of-cloud-based-siem-for-security-intelligence-and-operations/ | |
391 2017-03-13T12:30:53.361000Z https://securityintelligence.com/inside-the-mind-of-a-hacker-attacking-web-pages-with-cross-site-scripting/ | |
391 2017-03-13T18:30:53.028000Z https://securityintelligence.com/the-enterprise-mobility-conundrum-how-to-control-the-data/ | |
391 2017-03-14T12:30:59.457000Z https://securityintelligence.com/qradar-waves-from-the-leader-position-in-the-forrester-2017-security-analytics-wave/ | |
391 2017-03-16T12:30:58.083000Z https://securityintelligence.com/five-steps-to-protect-your-critical-data-from-insider-threats/ | |
391 2017-03-17T12:30:55.120000Z https://securityintelligence.com/churn-under-the-surface-of-global-cybercrime/ | |
391 2017-03-17T12:30:56.412000Z https://securityintelligence.com/identity-and-access-governance-lessons-from-the-front-line/ | |
391 2017-03-19T18:31:06.726000Z https://securityintelligence.com/man-versus-machine-ibm-brings-science-fiction-to-life-with-cognitive-security/ | |
391 2017-03-20T06:30:55.663000Z https://securityintelligence.com/taking-a-cognitive-approach-to-unified-endpoint-management/ | |
391 2017-03-21T12:30:49.606000Z https://securityintelligence.com/five-ways-to-improve-the-ciso-board-relationship/ | |
391 2017-03-21T12:30:53.670000Z https://securityintelligence.com/media/the-shifting-panorama-of-global-financial-cybercrime/ | |
391 2017-03-21T18:30:57.415000Z https://securityintelligence.com/understanding-cyber-threat-hunting/ | |
391 2017-03-22T12:30:49.187000Z https://securityintelligence.com/smart-forensics-for-the-internet-of-things-iot/ | |
391 2017-03-22T12:30:50.386000Z https://securityintelligence.com/securing-your-cloud-based-resources-start-with-these-four-areas/ | |
391 2017-03-22T18:30:54.151000Z https://securityintelligence.com/breaking-down-barriers-to-information-security-progress/ | |
391 2017-03-23T12:31:53.945000Z https://securityintelligence.com/the-ciso-as-a-digital-trust-diplomat/ | |
391 2017-03-24T00:30:59.405000Z https://securityintelligence.com/the-retail-industry-and-the-challenges-of-enterprise-mobility-management/ | |
391 2017-03-24T12:33:47.458000Z https://securityintelligence.com/why-your-enterprise-security-strategy-needs-to-evolve/ | |
391 2017-03-24T12:33:50.972000Z https://securityintelligence.com/why-blockchain-as-a-service-should-be-on-your-radar/ | |
391 2017-03-24T18:33:30.688000Z https://securityintelligence.com/the-third-party-security-challenge/ | |
391 2017-03-27T18:30:59.744000Z https://securityintelligence.com/hey-phishing-you-old-foe-catch-this-cognitive-drift/ | |
391 2017-03-28T12:31:01.554000Z https://securityintelligence.com/the-changing-fintech-landscape-in-asia-pacific-and-its-security-implications/ | |
391 2017-03-28T18:30:57.659000Z https://securityintelligence.com/the-nukebot-trojan-a-bruised-ego-and-a-surprising-source-code-leak/ | |
391 2017-03-29T12:30:57.251000Z https://securityintelligence.com/commercial-malware-makes-a-comeback-in-2016/ | |
391 2017-03-30T18:31:01.419000Z https://securityintelligence.com/do-we-need-to-worry-about-shadow-it/ | |
['accessibility', 'analysis', 'article', 'author', 'become', 'brought', 'contact', 'contributor', 'event', 'expand', 'expressed', 'facebook', 'follow', 'home', 'ibm', 'industry', 'information', 'insight', 'intelligence', 'linkedin', 'medium', 'navigation', 'necessarily', 'news', 'official', 'opinion', 'policy', 'position', 'privacy', 'professional', 'quora', 'read', 'reflect', 'related', 'research', 'search', 'security', 'share', 'slideshare', 'subscribe', 'term', 'toggle', 'topic', 'twitter', 'use', 'view', 'webinars', 'youtube'] | |
393 | |
393 2017-03-05T00:40:09.626000Z http://thehackernews.com/2011/08/korean-hsbc-bank-hacked-turkguvenligi.html | |
393 2017-03-05T00:40:16.829000Z http://thehackernews.com/2011/08/free-gary-mckinnon-campaign-websites.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'campaign', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'deface', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'gary', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'mckinnon', 'message', 'microsoft', 'million', 'mirror', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'tg', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'turkguvenligi', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
394 | |
394 2017-03-01T06:31:08.912000Z https://www.mimecast.com/blog/2016/05/mimecast-wins-big-at-mes-east/ | |
394 2017-03-18T12:32:17.536000Z http://www.mimecast.com/blog/2016/05/mimecast-wins-big-at-mes-east/ | |
['abreast', 'access', 'achmad', 'advisory', 'agility', 'alarming', 'also', 'among', 'app', 'appear', 'application', 'architecture', 'archiving', 'arm', 'attack', 'austin', 'away', 'back', 'barracuda', 'bernie', 'best', 'big', 'biggest', 'billion', 'blog', 'blown', 'board', 'boardroom', 'bolder', 'booth', 'boundless', 'brainstorming', 'breach', 'breakaway', 'business', 'cakewalk', 'candidate', 'capex', 'catch', 'category', 'center', 'central', 'chadran', 'channel', 'chatter', 'cio', 'closing', 'cloud', 'coincide', 'comfortable', 'coming', 'comment', 'committed', 'company', 'completely', 'compliance', 'conduit', 'content', 'continue', 'corporate', 'creativity', 'credential', 'critical', 'crucial', 'customer', 'cybercrime', 'cybercriminals', 'cybersecurity', 'data', 'degree', 'demonstrated', 'department', 'deploy', 'development', 'disclosure', 'discussion', 'disqus', 'distract', 'dollar', 'donald', 'east', 'effort', 'eia', 'email', 'emailed', 'emerged', 'enable', 'enterprise', 'even', 'event', 'excited', 'exec', 'executive', 'experience', 'exploit', 'expo', 'faced', 'fall', 'fan', 'feedback', 'filed', 'finally', 'firewall', 'first', 'focusing', 'forrester', 'frequency', 'full', 'garbage', 'gartner', 'gathering', 'gdpr', 'goal', 'good', 'grateful', 'great', 'grow', 'guest', 'hack', 'hand', 'happened', 'happening', 'headline', 'heard', 'held', 'helped', 'home', 'hope', 'house', 'huge', 'human', 'idea', 'impersonation', 'important', 'improve', 'independent', 'indiana', 'indianapolis', 'inflection', 'information', 'intronis', 'javascript', 'join', 'joining', 'julian', 'killer', 'large', 'last', 'layered', 'leader', 'learn', 'led', 'like', 'linkedin', 'magic', 'maintain', 'majority', 'management', 'manager', 'many', 'market', 'marketing', 'martin', 'matter', 'message', 'met', 'midmarket', 'midsize', 'migrate', 'migration', 'mimecast', 'mix', 'month', 'move', 'msp', 'name', 'nature', 'negotiating', 'network', 'new', 'news', 'nominating', 'note', 'numerous', 'observation', 'ohio', 'one', 'operation', 'opex', 'opportunity', 'organization', 'part', 'party', 'personal', 'phishing', 'platform', 'please', 'plenty', 'point', 'position', 'post', 'posted', 'powered', 'predictive', 'premise', 'presidential', 'primary', 'prior', 'product', 'provided', 'provider', 'psychology', 'quadrant', 'race', 'reached', 'real', 'reason', 'receive', 'recognition', 'recounted', 'related', 'relegating', 'report', 'repository', 'reward', 'rise', 'risk', 'roadmap', 'sale', 'sander', 'scale', 'secure', 'security', 'see', 'seem', 'senior', 'sensitive', 'sent', 'server', 'service', 'session', 'several', 'share', 'shared', 'shift', 'show', 'side', 'siemens', 'sign', 'single', 'solution', 'special', 'spend', 'sport', 'stay', 'steal', 'stop', 'story', 'strategic', 'strategy', 'streamline', 'suited', 'summit', 'takeaway', 'team', 'technology', 'tell', 'thank', 'thanks', 'theme', 'third', 'threat', 'time', 'top', 'transformation', 'trump', 'ultimate', 'unit', 'university', 'unprecedented', 'update', 'urgent', 'usually', 'validating', 'vast', 'vector', 'vehicle', 'vendor', 'view', 'virginia', 'visit', 'vital', 'vp', 'want', 'war', 'wave', 'week', 'well', 'went', 'west', 'whaling', 'whether', 'white', 'willing', 'win', 'winning', 'wisely', 'wonder', 'yet'] | |
395 | |
395 2017-03-15T12:30:44.356000Z http://thehackernews.com/2017/03/twitter-account-hack.html | |
395 2017-03-15T18:30:52.166000Z http://securityaffairs.co/wordpress/57158/hacktivism/turkey-holland-dispute-twitter.html | |
395 2017-03-15T18:31:01.079000Z https://www.bleepingcomputer.com/news/security/turkish-hackers-deface-hundreds-of-websites-and-twitter-accounts/ | |
395 2017-03-17T00:30:55.124000Z https://securityledger.com/2017/03/twitter-hack-is-latest-to-underscore-third-party-app-risk/ | |
395 2017-03-24T00:30:54.067000Z https://blog.fox-it.com/2017/03/23/turkish-hacktivists-targeting-the-netherlands-high-noise-low-impact/ | |
['account', 'dutch', 'hacker', 'hacking', 'security', 'turkish', 'twitter', 'used', 'using'] | |
396 | |
398 | |
399 | |
399 2017-03-01T00:30:44.404000Z https://www.scmagazine.com/cloudpets-toys-leak-kid-adult-user-info-voice-recordings/article/640920/ | |
399 2017-03-01T00:30:47.811000Z https://www.scmagazine.com/hacker-leaks-800k-accounts-after-exploiting-vbulletin-forums/article/640911/ | |
399 2017-03-01T00:30:49.620000Z https://www.scmagazine.com/rtm-cyber-gang-targets-russian-businesses-that-conduct-remote-banking/article/640909/ | |
399 2017-03-01T00:30:51.924000Z https://www.scmagazine.com/critical-sql-injection-bug-in-wordpress-plugin/article/640723/ | |
399 2017-03-01T12:30:47.147000Z https://www.scmagazine.com/bridging-the-talent-gap-in-cybersecurity/article/638588/ | |
399 2017-03-01T12:30:54.319000Z https://www.scmagazine.com/closing-emails-40-year-trust-gap/article/638448/ | |
399 2017-03-01T18:30:50.167000Z https://www.scmagazine.com/ny-state-cybersecurity-regs-go-into-effect-today-industry-responds/article/641375/ | |
399 2017-03-02T00:30:53.555000Z https://www.scmagazine.com/only-12-of-android-phones-have-the-most-up-to-date-version-of-the-os/article/641386/ | |
399 2017-03-02T00:30:56.728000Z https://www.scmagazine.com/uk-post-brexit-digital-strategy-criticised-by-cyber-security-industry/article/641377/ | |
399 2017-03-02T00:30:58.487000Z https://www.scmagazine.com/talos-flags-flaw-in-ciscos-smart-install-clients/article/641372/ | |
399 2017-03-02T18:30:46.712000Z https://www.scmagazine.com/google-pumps-up-chrome-security-for-macos/article/641693/ | |
399 2017-03-02T18:30:53.902000Z https://www.scmagazine.com/vulnerability-in-cisco-netflow-generation-appliances-could-create-dos-condition/article/641538/ | |
399 2017-03-03T00:30:55.884000Z https://www.scmagazine.com/howard-schmidt-leaves-indelible-influence-on-cybersecurity/article/641746/ | |
399 2017-03-03T00:30:59.950000Z https://www.scmagazine.com/cryptolocker-bursts-onto-scene-again-targeting-europe-and-us/article/641731/ | |
399 2017-03-03T00:31:06.647000Z https://www.scmagazine.com/new-malware-attack-shutters-london-hospital/article/641548/ | |
399 2017-03-03T06:30:46.536000Z https://www.scmagazine.com/pence-used-aol-for-indiana-govt-business-released-emails-show/article/641821/ | |
399 2017-03-03T18:30:47.163000Z https://www.scmagazine.com/bold-phishers-use-australian-mygov-to-pull-pii/article/641854/ | |
399 2017-03-03T18:30:53.399000Z https://www.scmagazine.com/apparel-and-food-industry-hit-with-uptick-in-online-fraud-attacks/article/641730/ | |
399 2017-03-04T00:30:57.424000Z https://www.scmagazine.com/china-outlines-goals-of-state-run-internet-in-cyberpolicy-paper/article/642033/ | |
399 2017-03-04T00:31:01.939000Z https://www.scmagazine.com/doj-and-fbi-indict-19-in-international-cybercrime-ring/article/642004/ | |
399 2017-03-06T18:30:50.727000Z https://www.scmagazine.com/hackers-use-stolen-inside-info-to-blackmail-progressive-political-groups/article/642290/ | |
399 2017-03-06T18:30:53.834000Z https://www.scmagazine.com/hackers-steal-nude-kate-moss-wedding-photos/article/642143/ | |
399 2017-03-06T18:30:57.266000Z https://www.scmagazine.com/proton-rat-malware-not-a-positive-development-for-mac-users/article/642132/ | |
399 2017-03-06T18:30:59.726000Z https://www.scmagazine.com/a-phishing-campaign-about-nothing/article/642130/ | |
399 2017-03-06T18:31:01.953000Z https://www.scmagazine.com/10-reasons-why-cybercriminals-target-smartphones/article/642013/ | |
399 2017-03-07T00:30:47.487000Z https://www.scmagazine.com/major-spam-operation-suffers-data-leak-containing-14-billion-records/article/642322/ | |
399 2017-03-07T00:30:50.732000Z https://www.scmagazine.com/one-million-yahoo-and-gmail-account-passwords-for-sale-on-the-dark-web/article/642319/ | |
399 2017-03-07T00:30:51.829000Z https://www.scmagazine.com/office-365-bug-bounty-maximum-prize-30000-until-may-1/article/642315/ | |
399 2017-03-07T00:30:53.837000Z https://www.scmagazine.com/hackerone-offering-free-bug-bounty-coordination/article/642295/ | |
399 2017-03-07T00:30:56.995000Z https://www.scmagazine.com/global-cyber-alliance-phishing-and-dmarc/article/642332/ | |
399 2017-03-07T18:30:59.731000Z https://www.scmagazine.com/vbulletin-exploited-to-display-malvertising-sucuri-report/article/642589/ | |
399 2017-03-07T18:31:07.761000Z https://www.scmagazine.com/the-retail-industry-steps-up-the-fight-against-cyber-threats/article/642420/ | |
399 2017-03-08T18:30:52.175000Z https://www.scmagazine.com/nearly-two-thirds-of-polled-organizations-hit-by-ransomware-cyberedge-report/article/642739/ | |
399 2017-03-08T18:30:56.694000Z https://www.scmagazine.com/doxing-threats-lead-alphabay-marketplace-to-pay-extortionist-37000/article/642729/ | |
399 2017-03-09T00:30:58.292000Z https://www.scmagazine.com/flash-seats-ticketing-app-users-could-get-scalped-by-a-mitm-attack/article/642731/ | |
399 2017-03-09T00:31:03.779000Z https://www.scmagazine.com/fort-myers-man-arrested-for-taking-san-diego-firm-offline/article/642892/ | |
399 2017-03-09T00:31:13.524000Z https://www.scmagazine.com/corero-ddos-attacks-and-more/article/642907/ | |
399 2017-03-09T18:31:01.427000Z https://www.scmagazine.com/alleged-silk-road-admin-to-be-extradited-to-us-despite-aspergers/article/643034/ | |
399 2017-03-09T18:31:04.419000Z https://www.scmagazine.com/verifone-calls-security-breach-limited-after-quick-response/article/643032/ | |
399 2017-03-10T00:30:58.504000Z https://www.scmagazine.com/iot-designers-admit-products-could-be-fatal-yet-still-security-measures-lack/article/643215/ | |
399 2017-03-10T00:31:03.591000Z https://www.scmagazine.com/instagram-users-targeted-with-malicious-apps-eset/article/643213/ | |
399 2017-03-10T18:30:54.857000Z https://www.scmagazine.com/pandalabs-attacking-computers-without-running-any-malware/article/643308/ | |
399 2017-03-11T00:30:59.094000Z https://www.scmagazine.com/trend-micro-details-new-iot-ddos-threat/article/643500/ | |
399 2017-03-11T00:31:01.167000Z https://www.scmagazine.com/home-depot-to-pay-25m-in-breach-settlement/article/643491/ | |
399 2017-03-13T18:30:55.688000Z https://www.scmagazine.com/canadian-tax-and-labor-websites-taken-offline-this-weekend/article/643629/ | |
399 2017-03-14T00:30:59.810000Z https://www.scmagazine.com/cybersecurity-pros-say-more-industrial-iot-cyberattacks-expected/article/643821/ | |
399 2017-03-14T00:31:01.766000Z https://www.scmagazine.com/intel-security-responds-to-efi-rootkit-malware-updates-detection-tool/article/643802/ | |
399 2017-03-14T18:30:55.292000Z https://www.scmagazine.com/charities-increasingly-a-target-for-cyberthieves/article/643946/ | |
399 2017-03-14T18:30:57.352000Z https://www.scmagazine.com/nsa-hacker-joyce-will-be-white-house-cyber-czar-reports-say/article/643942/ | |
399 2017-03-14T18:30:59.297000Z https://www.scmagazine.com/adobe-researcher-spots-json-web-encryption-vulnerability/article/643938/ | |
399 2017-03-15T00:30:57.903000Z https://www.scmagazine.com/patch-tuesday-microsoft-releases-18-security-bulletins-8-critical/article/644148/ | |
399 2017-03-15T00:30:58.971000Z https://www.scmagazine.com/us-air-force-personnel-data-exposed-on-internet/article/644143/ | |
399 2017-03-15T18:30:55.748000Z https://www.scmagazine.com/four-indicted-for-breach-of-yahoo-including-russian-spies/article/644377/ | |
399 2017-03-15T18:31:02.628000Z https://www.scmagazine.com/researchers-develop-sound-based-attacks-on-iot-devices/article/644249/ | |
399 2017-03-15T18:31:05.898000Z https://www.scmagazine.com/cyberuk-2017-gchq-director-explains-ncsc-ethos-in-parting-interview/article/644240/ | |
399 2017-03-16T00:30:46.978000Z https://www.scmagazine.com/becky-baces-passing-hits-cybersecurity-community-hard/article/644432/ | |
399 2017-03-16T00:30:52.029000Z https://www.scmagazine.com/dun-bradstreet-database-breached-336m-files-vulnerable/article/644419/ | |
399 2017-03-16T00:30:54.073000Z https://www.scmagazine.com/petrwrap-ransomware-found-attacks-and-locks-up-entire-organizations/article/644403/ | |
399 2017-03-16T18:30:53.625000Z https://www.scmagazine.com/association-of-british-travel-agents-web-server-breach-impacts-43000-individuals/article/644702/ | |
399 2017-03-16T18:30:57.382000Z https://www.scmagazine.com/hacker-leaks-private-icloud-photos-from-emma-watson-and-others-celebs/article/644555/ | |
399 2017-03-16T18:31:00.331000Z https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ | |
399 2017-03-16T18:31:02.269000Z https://www.scmagazine.com/zscaler-reveals-risk-of-ssl-based-threats-warns-of-new-security-priority/article/644539/ | |
399 2017-03-17T00:30:47.592000Z https://www.scmagazine.com/cyberespionage-may-be-next-top-threat-to-businesses-this-year/article/644720/ | |
399 2017-03-17T00:30:51.501000Z https://www.scmagazine.com/majikpos-works-its-dastardly-pos-malware-magic/article/644562/ | |
399 2017-03-17T00:30:54.373000Z https://www.scmagazine.com/adobe-patches-flash-player-shockwave-vulnerabilities/article/644721/ | |
399 2017-03-17T00:30:56.564000Z https://www.scmagazine.com/cisco-patches-several-tools/article/644719/ | |
399 2017-03-17T18:30:56.321000Z https://www.scmagazine.com/star-trek-themed-captain-kirk-ransomware-with-spock-decryptor-spotted/article/644995/ | |
399 2017-03-17T18:31:02.113000Z https://www.scmagazine.com/cincinnati-eye-institute-staffers-tax-data-possibly-exposed/article/644835/ | |
399 2017-03-18T00:30:53.030000Z https://www.scmagazine.com/justice-sends-docs-to-congressional-committees-probing-trump-wiretap-claims/article/645039/ | |
399 2017-03-18T00:30:56.677000Z https://www.scmagazine.com/google-searchers-beware-police-might-soon-be-searching-for-you/article/645023/ | |
399 2017-03-18T00:31:01.397000Z https://www.scmagazine.com/trump-tower-clinton-email-investigation-info-on-stolen-secret-service-agents-laptop/article/645025/ | |
399 2017-03-20T18:30:55.397000Z https://www.scmagazine.com/government-contractor-defense-point-security-hit-with-w-2-scam/article/645310/ | |
399 2017-03-20T18:30:59.219000Z https://www.scmagazine.com/20-year-old-flaw-found-in-ubiquiti-networking-gear-running-ancient-php/article/645159/ | |
399 2017-03-20T18:31:02.298000Z https://www.scmagazine.com/spam-hitting-germans-with-personalized-messages/article/645158/ | |
399 2017-03-21T00:30:59.650000Z https://www.scmagazine.com/irs-warns-of-new-last-minute-tax-scams/article/645371/ | |
399 2017-03-21T00:31:06.662000Z https://www.scmagazine.com/write-and-wrong-attackers-compromise-websites-with-subdirectory-files-to-promote-essay-spam/article/645370/ | |
399 2017-03-21T00:31:11.444000Z https://www.scmagazine.com/spammers-take-advantage-of-celebgate-20-with-amazon-gift-cards/article/645309/ | |
399 2017-03-21T18:31:00.694000Z https://www.scmagazine.com/overcoming-the-cyber-security-skills-gap-experience-vs-qualifications/article/645454/ | |
399 2017-03-21T18:31:02.537000Z https://www.scmagazine.com/16-million-for-breached-customers-as-us-retailer-neiman-marcus-settles/article/645453/ | |
399 2017-03-22T00:30:56.495000Z https://www.scmagazine.com/ask-partner-network-compromised-again-to-spread-malware/article/645637/ | |
399 2017-03-22T00:31:01.330000Z https://www.scmagazine.com/xbox-live-azure-among-micrsooft-products-knocked-offline-tuesday/article/645633/ | |
399 2017-03-22T18:30:54.342000Z https://www.scmagazine.com/demi-lovato-photos-leaked-spearphisher-demands-sex-show-from-private-citizens/article/645770/ | |
399 2017-03-22T18:30:59.782000Z https://www.scmagazine.com/website-hacks-up-by-a-third-in-2016-google/article/645761/ | |
399 2017-03-23T00:30:53.650000Z https://www.scmagazine.com/study-infections-of-industrial-systems-common-but-few-are-targeted/article/645906/ | |
399 2017-03-23T18:33:33.315000Z https://www.scmagazine.com/breach-of-dol-jobs-database-a-threat-to-10-states-so-far/article/646023/ | |
399 2017-03-23T18:33:42.018000Z https://www.scmagazine.com/lithuanian-arrested-in-100-million-multinational-bec-whaling-fraud/article/645998/ | |
399 2017-03-23T18:33:44.306000Z https://www.scmagazine.com/necurs-botnet-drops-locky-ransomware-picks-up-financial-fraud-spam/article/645997/ | |
399 2017-03-24T00:30:55.795000Z https://www.scmagazine.com/senate-overturns-isp-privacy-ruling/article/646195/ | |
399 2017-03-24T00:30:59.952000Z https://www.scmagazine.com/industry-pros-share-cyber-budgeting-tips/article/646183/ | |
399 2017-03-24T00:31:02.926000Z https://www.scmagazine.com/apples-app-store-found-housing-third-party-app-store/article/646174/ | |
399 2017-03-24T00:31:05.009000Z https://www.scmagazine.com/hack-of-abcs-twitter-account-hails-trump/article/646159/ | |
399 2017-03-24T00:31:13.230000Z https://www.scmagazine.com/sentinelone/article/646170/ | |
399 2017-03-24T18:33:30.748000Z https://www.scmagazine.com/lawmakers-rights-groups-react-after-senate-votes-to-kill-fcc-privacy-protections/article/646413/ | |
399 2017-03-24T18:33:32.113000Z https://www.scmagazine.com/saudi-arabia-hit-with-cyberespionage-spearphishing-campaign/article/646417/ | |
399 2017-03-24T18:33:36.475000Z https://www.scmagazine.com/uk-police-fed-officers-abusing-investigatory-powers-for-personal-matters/article/646276/ | |
399 2017-03-25T00:30:59.265000Z https://www.scmagazine.com/giftghostbot-botnet-stealing-retailer-gift-card-balances/article/646439/ | |
399 2017-03-25T00:31:00.474000Z https://www.scmagazine.com/google-revokes-symantec-certs/article/646293/ | |
399 2017-03-27T18:31:01.257000Z https://www.scmagazine.com/teenage-israeli-cybercriminals-close-to-indictment-report/article/646680/ | |
399 2017-03-27T18:31:03.569000Z https://www.scmagazine.com/vulnerable-connected-dishwasher-could-allow-attacker-to-access-network/article/646539/ | |
399 2017-03-27T18:31:04.646000Z https://www.scmagazine.com/uk-official-backdoor-needed-into-whatsapp/article/646538/ | |
399 2017-03-29T00:31:04.321000Z https://www.scmagazine.com/cerber-upgrades-evade-machine-learning-techniques/article/646981/ | |
399 2017-03-29T00:31:05.523000Z https://www.scmagazine.com/daytona-state-college-hit-with-double-breach-affecting-staff-and-students/article/646957/ | |
399 2017-03-29T18:31:06.770000Z https://www.scmagazine.com/cybercrime-blotter-ebury-botnet-creator-maxim-senakh-pleads-guilty/article/647119/ | |
399 2017-03-29T18:31:08.691000Z https://www.scmagazine.com/pandora-apple-app-vulnerable-to-mitm-attacks/article/647106/ | |
399 2017-03-29T18:31:17.692000Z https://www.scmagazine.com/sc-chats-with-fireeye-ceo-kevin-mandia/article/647085/ | |
399 2017-03-30T00:30:59.891000Z https://www.scmagazine.com/new-mexico-soon-to-have-data-breach-statute/article/647277/ | |
['acceptance', 'advertise', 'advisory', 'afghanistan', 'africa', 'african', 'albania', 'algeria', 'american', 'andorra', 'angola', 'anguilla', 'antarctica', 'antigua', 'antilles', 'arab', 'arabia', 'archive', 'argentina', 'arm', 'armenia', 'article', 'aruba', 'australia', 'austria', 'authorization', 'award', 'azerbaijan', 'bahamas', 'bahrain', 'bangladesh', 'bar', 'barbados', 'barbuda', 'belarus', 'belgium', 'belize', 'benin', 'bermuda', 'bhutan', 'blog', 'board', 'bolivia', 'bosnia', 'botswana', 'bouvet', 'brazil', 'breach', 'british', 'broadcast', 'brunei', 'bulgaria', 'burkina', 'burundi', 'business', 'buzz', 'caicos', 'caledonia', 'cambodia', 'cameroon', 'canada', 'cape', 'cayman', 'center', 'central', 'chad', 'challenge', 'chile', 'china', 'christmas', 'city', 'click', 'cloud', 'coco', 'colombia', 'comment', 'comoros', 'compliance', 'condition', 'conference', 'congo', 'constitutes', 'contact', 'cook', 'copyright', 'costa', 'countless', 'croatia', 'cuba', 'cybercrime', 'cybersecurity', 'cyprus', 'czech', 'côte', 'darussalam', 'data', 'day', 'delivered', 'denmark', 'depth', 'djibouti', 'dominica', 'dominican', 'drc', 'ecuador', 'egypt', 'el', 'email', 'emirate', 'equatorial', 'eritrea', 'establish', 'estonia', 'ethiopia', 'event', 'face', 'fact', 'falkland', 'faq', 'faroe', 'faso', 'fast', 'feature', 'featured', 'fiji', 'finland', 'first', 'follow', 'form', 'france', 'french', 'futuna', 'gabon', 'gambia', 'georgia', 'germany', 'get', 'ghana', 'gibraltar', 'greece', 'greenland', 'grenada', 'grenadine', 'group', 'guadeloupe', 'guam', 'guatemala', 'guiana', 'guinea', 'guyana', 'haiti', 'haymarket', 'heard', 'helena', 'herzegovina', 'honduras', 'hong', 'hungary', 'iceland', 'inbox', 'india', 'indian', 'indonesia', 'information', 'insider', 'iot', 'iran', 'iraq', 'ireland', 'island', 'israel', 'italy', 'jamaica', 'japan', 'jordan', 'kazakhstan', 'keeling', 'kenya', 'kingdom', 'kiribati', 'kitts', 'kong', 'korea', 'kuwait', 'kyrgyzstan', 'lanka', 'lao', 'latvia', 'lebanon', 'leone', 'lesotho', 'liberia', 'library', 'libya', 'liechtenstein', 'like', 'lithuania', 'log', 'login', 'look', 'lucia', 'luxembourg', 'macao', 'macedonia', 'madagascar', 'magazine', 'malawi', 'malaysia', 'maldives', 'mali', 'malta', 'malvinas', 'malware', 'management', 'mariana', 'marino', 'marshall', 'martin', 'martinique', 'material', 'mauritania', 'mauritius', 'mayen', 'mayotte', 'mcdonald', 'medium', 'meet', 'member', 'menu', 'mexico', 'micronesia', 'miquelon', 'mobile', 'moldova', 'monaco', 'mongolia', 'montenegro', 'montserrat', 'morocco', 'mozambique', 'must', 'myanmar', 'namibia', 'nauru', 'need', 'nepal', 'netherlands', 'network', 'nevis', 'new', 'news', 'newswire', 'nicaragua', 'niger', 'nigeria', 'niue', 'norfolk', 'north', 'northern', 'norway', 'ny', 'ocean', 'oman', 'online', 'opinion', 'overall', 'pakistan', 'palau', 'panama', 'paper', 'papua', 'paraguay', 'peru', 'philippine', 'phishing', 'pierre', 'pitcairn', 'poland', 'policy', 'polynesia', 'portugal', 'post', 'posture', 'principe', 'prior', 'privacy', 'product', 'professional', 'published', 'puerto', 'qatar', 'ransomware', 'read', 'reboot', 'receive', 'redistributed', 'register', 'registered', 'relevant', 'reprint', 'republic', 'reserved', 'resource', 'reunion', 'review', 'rewritten', 'rica', 'rico', 'right', 'risk', 'risksec', 'romania', 'rsa', 'russia', 'rwanda', 'saint', 'salvador', 'samoa', 'san', 'sao', 'saudi', 'sc', 'search', 'security', 'senegal', 'seychelles', 'show', 'sierra', 'singapore', 'site', 'slovakia', 'slovenia', 'solomon', 'somalia', 'source', 'south', 'southern', 'spain', 'sri', 'state', 'strategy', 'subscribe', 'sudan', 'suriname', 'svalbard', 'swaziland', 'sweden', 'switzerland', 'syria', 'tackle', 'taiwan', 'tajikistan', 'tanzania', 'team', 'technical', 'term', 'territory', 'test', 'thailand', 'threat', 'tobago', 'togo', 'tokelau', 'tome', 'tonga', 'toronto', 'trinidad', 'tunisia', 'turk', 'turkey', 'turkmenistan', 'tuvalu', 'uganda', 'uk', 'ukraine', 'unbiased', 'underpin', 'united', 'uruguay', 'use', 'user', 'uzbekistan', 'vanuatu', 'vatican', 'venezuela', 'verde', 'via', 'video', 'vietnam', 'vincent', 'virgin', 'virtual', 'vulnerability', 'wallis', 'webcasts', 'website', 'western', 'white', 'whitepaper', 'whitepapers', 'without', 'would', 'yemen', 'yugoslavia', 'zambia', 'zealand', 'zimbabwe'] | |
400 | |
401 | |
402 | |
404 | |
405 | |
407 | |
408 | |
409 | |
410 | |
411 | |
412 | |
413 | |
413 2017-03-25T06:30:57.673000Z http://www.welivesecurity.com/2016/01/12/data-thieves-need-handed-tougher-sentences/ | |
413 2017-03-27T12:31:39.906000Z https://www.welivesecurity.com/2016/01/12/data-thieves-need-handed-tougher-sentences/ | |
['able', 'accessing', 'added', 'ago', 'app', 'appropriately', 'argues', 'author', 'average', 'back', 'backburner', 'belonging', 'call', 'calling', 'car', 'case', 'cash', 'christopher', 'claim', 'come', 'comment', 'commissioner', 'community', 'company', 'computer', 'copied', 'court', 'cowboy', 'crime', 'criminal', 'crook', 'customer', 'data', 'deemed', 'discourage', 'discovered', 'effective', 'elaborated', 'email', 'enough', 'enterprise', 'even', 'explained', 'fact', 'far', 'fine', 'fined', 'firm', 'found', 'fraudsters', 'friend', 'general', 'given', 'graham', 'guilty', 'handed', 'happen', 'hayes', 'high', 'highlight', 'homeworker', 'imperative', 'increasingly', 'individual', 'information', 'insufficient', 'involving', 'issue', 'issuing', 'large', 'lenient', 'like', 'limited', 'live', 'london', 'many', 'market', 'member', 'message', 'moment', 'nagra', 'narinder', 'need', 'news', 'number', 'offender', 'option', 'page', 'parliament', 'pay', 'people', 'personal', 'photograph', 'place', 'pleaded', 'posted', 'power', 'pressing', 'print', 'prison', 'process', 'punished', 'purba', 'pushing', 'realised', 'received', 'recent', 'record', 'remains', 'rental', 'risk', 'security', 'see', 'send', 'sensitive', 'sentence', 'sentencing', 'serious', 'seriousness', 'service', 'seven', 'sindy', 'sold', 'something', 'staff', 'steal', 'stealing', 'strong', 'suspended', 'swathe', 'theft', 'thief', 'time', 'took', 'tougher', 'uk', 'via', 'viewing', 'voted', 'westminster', 'whats', 'whose', 'worst', 'wrong', 'year'] | |
415 | |
417 | |
418 | |
418 2017-03-01T00:30:47.803000Z http://darkreading.com/how-security-pros-can-bridge-the-skills-shortage/a/d-id/1328276 | |
418 2017-03-09T12:30:56.641000Z http://www.welivesecurity.com/2017/03/09/ways-plug-infosec-talent-gap/ | |
418 2017-03-27T12:31:28.446000Z https://www.welivesecurity.com/2017/03/09/ways-plug-infosec-talent-gap/ | |
['able', 'almost', 'also', 'another', 'anything', 'applicant', 'application', 'applied', 'avoid', 'biggest', 'black', 'bootcamps', 'business', 'career', 'certification', 'change', 'code', 'coderdojo', 'college', 'company', 'computer', 'cost', 'cultivate', 'current', 'cyberjutsu', 'cybersecurity', 'cyberwatchwest', 'data', 'degree', 'department', 'developer', 'development', 'education', 'email', 'encourage', 'enterprise', 'eset', 'especially', 'even', 'event', 'experience', 'expert', 'fewer', 'fill', 'find', 'formal', 'gap', 'generation', 'girl', 'got', 'group', 'growing', 'hackathons', 'half', 'hand', 'help', 'helping', 'hire', 'increase', 'industry', 'information', 'insight', 'interest', 'interested', 'internship', 'isaca', 'isc', 'job', 'join', 'keep', 'kid', 'lab', 'learning', 'light', 'like', 'list', 'listing', 'local', 'lot', 'lysa', 'maintain', 'making', 'malware', 'many', 'mean', 'million', 'month', 'myers', 'national', 'necessary', 'need', 'neither', 'new', 'news', 'next', 'open', 'opportunity', 'pace', 'paper', 'people', 'point', 'position', 'print', 'problem', 'professional', 'pursue', 'qualified', 'quality', 'quantity', 'quarter', 'ransomware', 'rapid', 'recently', 'related', 'released', 'report', 'research', 'resource', 'respondent', 'right', 'said', 'scholarship', 'science', 'security', 'seeking', 'set', 'several', 'shed', 'shortage', 'shortfall', 'significant', 'site', 'six', 'skill', 'society', 'staffing', 'stem', 'student', 'support', 'surveyed', 'take', 'talent', 'teal', 'technical', 'technology', 'ten', 'th', 'tide', 'trend', 'unable', 'untapped', 'view', 'virus', 'volunteer', 'way', 'week', 'well', 'white', 'wicys', 'woman', 'workforce', 'workload', 'yet'] | |
419 | |
420 | |
420 2017-03-15T18:30:43.923000Z http://blog.checkpoint.com/2017/03/15/check-point-discloses-vulnerability-whatsapp-telegram/ | |
420 2017-03-15T18:31:08.204000Z https://www.helpnetsecurity.com/2017/03/15/whatsapp-telegram-vulnerability/ | |
420 2017-03-16T00:30:44.988000Z http://securityaffairs.co/wordpress/57166/hacking/whatsapp-and-telegram-hack.html | |
420 2017-03-16T00:30:49.978000Z https://www.bleepingcomputer.com/news/security/researchers-find-vulnerability-in-whatsapp-and-telegrams-web-clients/ | |
420 2017-03-30T00:31:01.328000Z https://blog.checkpoint.com/2017/03/15/check-point-discloses-vulnerability-whatsapp-telegram/ | |
['account', 'allowed', 'telegram', 'vulnerability', 'whatsapp'] | |
421 | |
421 2017-03-22T00:30:55.442000Z https://veracode.com/blog/security-news/podcast-how-approach-ny-dfs-cybersecurity-regulations-appsec-review | |
421 2017-03-28T18:30:55.803000Z http://www.veracode.com/blog/security-news/podcast-how-approach-ny-dfs-cybersecurity-regulations-appsec-review | |
['accept', 'additional', 'address', 'addressing', 'advice', 'among', 'application', 'approach', 'appsec', 'best', 'blog', 'brian', 'cengage', 'ciccone', 'ciso', 'clear', 'comment', 'company', 'compelling', 'content', 'cybersecurity', 'data', 'date', 'department', 'detail', 'dfs', 'differ', 'discus', 'download', 'ebsco', 'editor', 'email', 'episode', 'establish', 'evan', 'explore', 'field', 'financial', 'fitzgerald', 'form', 'forrester', 'framework', 'guidance', 'guide', 'guideline', 'handling', 'home', 'homepage', 'including', 'information', 'kept', 'learning', 'light', 'listen', 'many', 'marked', 'marketing', 'mollom', 'name', 'navigating', 'new', 'news', 'ny', 'opportunity', 'orphan', 'page', 'part', 'past', 'please', 'podcast', 'policy', 'post', 'practice', 'previous', 'privacy', 'private', 'professional', 'program', 'publicly', 'published', 'regulation', 'required', 'requirement', 'research', 'review', 'role', 'schuman', 'security', 'service', 'share', 'shed', 'shown', 'solid', 'stay', 'submitting', 'surrounding', 'suzanne', 'team', 'thing', 'unprecedented', 'use', 'veracode', 'way', 'working', 'writer', 'year', 'york'] | |
422 | |
423 | |
423 2017-03-01T00:30:47.590000Z http://www.veracode.com/blog/security-news/live-rsa-topics-leadership-and-teamwork-dame-stella-rimington | |
423 2017-03-17T18:30:59.785000Z https://nakedsecurity.sophos.com/2017/03/17/studies-are-nice-but-women-in-security-say-its-time-for-the-next-step/ | |
423 2017-03-21T12:30:50.506000Z http://csoonline.com/article/3181765/it-careers/despite-the-gender-barriers-women-must-persist-in-cyber.html | |
['also', 'around', 'career', 'challenge', 'company', 'director', 'email', 'every', 'form', 'get', 'go', 'going', 'home', 'industry', 'information', 'job', 'leadership', 'like', 'make', 'men', 'news', 'next', 'one', 'people', 'professional', 'really', 'right', 'role', 'said', 'security', 'share', 'skill', 'woman', 'work', 'would', 'year'] | |
424 | |
424 2017-03-01T00:30:42.592000Z http://darkreading.com/attacks-breaches/massive-necurs-spam-botnet-now-equipped-to-launch-ddos-attacks/d/d-id/1328287 | |
424 2017-03-02T00:30:55.117000Z http://darkreading.com/mobile/malware-kits-advertising-trojans-drive-mobile-risk-/d/d-id/1328298 | |
424 2017-03-02T00:30:57.113000Z http://darkreading.com/risk/new-cybersecurity-regulations-begin-today-for-ny-banks/d/d-id/1328295 | |
424 2017-03-02T00:30:58.698000Z http://darkreading.com/attacks-breaches/best-practices-for-lowering-ransomware-risk/a/d-id/1328294 | |
424 2017-03-03T00:30:53.361000Z http://darkreading.com/attacks-breaches/cloudflare-breach-had-potential-to-be-much-worse/d/d-id/1328308 | |
424 2017-03-03T18:30:45.540000Z http://darkreading.com/endpoint/how-to-use-and-share-customer-data-without-damaging-trust/a/d-id/1328314 | |
424 2017-03-03T18:30:49.624000Z http://darkreading.com/vulnerabilities---threats/hackerone-offers-free-service-for-open-source-projects/d/d-id/1328310 | |
424 2017-03-03T18:30:52.326000Z http://darkreading.com/careers-and-people/yahoo-ceo-punished-for-data-breaches/d/d-id/1328309 | |
424 2017-03-06T18:30:54.845000Z http://darkreading.com/operations/us-lawmakers-seek-grant-for-state-local-cybersecurity/d/d-id/1328322 | |
424 2017-03-06T18:30:57.161000Z http://darkreading.com/application-security/users-can-now-time-their-windows-10-updates/d/d-id/1328323 | |
424 2017-03-07T00:30:46.640000Z http://darkreading.com/attacks-breaches/shamoon-data-wiping-malware-now-comes-with-ransomware-option/d/d-id/1328327 | |
424 2017-03-07T00:30:50.504000Z http://darkreading.com/application-security/veracode-snapped-up-by-ca-technologies-in-$614-million-deal/d/d-id/1328328 | |
424 2017-03-07T00:30:51.482000Z http://darkreading.com/attacks-breaches/ftc-report-highlights-low-dmarc-adoption/d/d-id/1328325 | |
424 2017-03-07T18:30:48.062000Z http://darkreading.com/threat-intelligence/a-real-life-look-into-responsible-disclosure-for-security-vulnerabilities/a/d-id/1328315 | |
424 2017-03-08T00:30:44.991000Z http://darkreading.com/attacks-breaches/entire-hacking-capacity-of-cia-dumped-on-wikileaks-site-claims/d/d-id/1328339 | |
424 2017-03-08T18:30:51.215000Z http://darkreading.com/risk/fortune-1000-companies-see-security-ratings-drop/d/d-id/1328346 | |
424 2017-03-08T18:30:58.148000Z http://darkreading.com/perimeter/trust-cloud-and-the-quest-for-a-glass-wall-around-security/a/d-id/1328343 | |
424 2017-03-09T00:30:50.751000Z http://darkreading.com/vulnerabilities---threats/researchers-find-multiple-critical-flaws-in-confide-secure-messaging-app/d/d-id/1328352 | |
424 2017-03-09T00:30:55.725000Z http://darkreading.com/vulnerabilities---threats/in-a-cybersecurity-vendor-war-the-end-user-loses-/a/d-id/1328313 | |
424 2017-03-10T00:30:57.320000Z http://darkreading.com/perimeter/mobile-(in)security-dark-reading-cartoon-caption-contest-winners/a/d-id/1328358 | |
['access', 'account', 'adapter', 'addition', 'advanced', 'advertise', 'advertising', 'afp', 'aix', 'aka', 'allows', 'analytics', 'anomali', 'apic', 'app', 'application', 'arbitrary', 'archive', 'archived', 'attack', 'attacker', 'authentication', 'author', 'automated', 'back', 'bae', 'best', 'bio', 'black', 'box', 'breach', 'bug', 'build', 'button', 'ca', 'calendar', 'caption', 'car', 'card', 'career', 'cartoon', 'cause', 'challenge', 'channel', 'cisco', 'click', 'close', 'cloud', 'code', 'combining', 'coming', 'comment', 'communication', 'community', 'company', 'compliance', 'computing', 'conference', 'connect', 'consumption', 'contact', 'content', 'contest', 'controller', 'coolest', 'copyright', 'create', 'creative', 'csrf', 'current', 'cybersecurity', 'cylance', 'dark', 'darkreading', 'data', 'database', 'defense', 'deloitte', 'demonstrated', 'denial', 'development', 'device', 'devops', 'difference', 'dig', 'direct', 'directory', 'discovered', 'discus', 'download', 'dr', 'drm', 'editor', 'email', 'emerging', 'enabled', 'endpoint', 'enterprise', 'event', 'evolution', 'execute', 'execution', 'executive', 'extplorer', 'facebook', 'favorite', 'feed', 'fibre', 'file', 'find', 'first', 'flash', 'follow', 'foreground', 'forgery', 'found', 'free', 'full', 'fusion', 'future', 'gain', 'gamasutra', 'game', 'gdc', 'gem', 'graphic', 'group', 'guest', 'gundert', 'hack', 'handle', 'hat', 'hdi', 'higgins', 'hijack', 'host', 'ibm', 'icmi', 'id', 'identity', 'impact', 'independent', 'info', 'information', 'informationweek', 'infrastructure', 'insider', 'insight', 'institute', 'intel', 'intelligence', 'interesting', 'interop', 'involving', 'iot', 'issue', 'item', 'itx', 'jackson', 'jitter', 'juniper', 'kamkar', 'kelly', 'kernel', 'key', 'lab', 'later', 'latest', 'leader', 'learn', 'leveraging', 'levi', 'library', 'licensing', 'link', 'linkedin', 'linux', 'list', 'live', 'local', 'login', 'machine', 'make', 'management', 'manager', 'many', 'marketing', 'mean', 'medical', 'memory', 'might', 'mimecast', 'mishandles', 'mobile', 'monitoring', 'move', 'must', 'national', 'need', 'netstat', 'network', 'new', 'newest', 'news', 'newsletter', 'next', 'object', 'oldest', 'operation', 'operationalizing', 'opportunity', 'pace', 'page', 'paper', 'past', 'people', 'perimeter', 'php', 'please', 'policy', 'poll', 'post', 'practice', 'president', 'print', 'privacy', 'privilege', 'process', 'profile', 'promise', 'published', 'qnap', 'qts', 'radio', 'rate', 'rating', 'raytheon', 'read', 'reader', 'reading', 'recorded', 'remote', 'rendering', 'report', 'reprint', 'request', 'researcher', 'reserved', 'responding', 'right', 'risk', 'samy', 'save', 'schedule', 'sec', 'secdevops', 'secure', 'security', 'served', 'service', 'share', 'show', 'sitemap', 'slideshows', 'solution', 'ssh', 'starbucks', 'startup', 'statement', 'strategic', 'strategy', 'study', 'subscribe', 'subsystem', 'support', 'system', 'tackle', 'talk', 'target', 'team', 'tech', 'technology', 'teller', 'term', 'testing', 'threaded', 'threat', 'tool', 'top', 'toward', 'transition', 'traversal', 'tweet', 'twitter', 'ubm', 'university', 'unspecified', 'unusual', 'use', 'used', 'useful', 'user', 'vector', 'veracode', 'via', 'vice', 'video', 'view', 'vios', 'vrdc', 'vulnerability', 'vulns', 'watch', 'way', 'webcasts', 'webinar', 'webinars', 'white', 'win', 'working', 'world', 'write', 'year'] | |
425 | |
425 2017-03-05T00:36:55.609000Z http://thehackernews.com/2012/12/anonymous-leaks-database-from-israeli.html | |
425 2017-03-05T00:39:58.783000Z http://thehackernews.com/2011/08/bangladesh-police-website-hacked-by.html | |
425 2017-03-05T00:42:30.414000Z http://thehackernews.com/2011/04/wfaicgovcn-hacked-by-anonymous-hackers.html | |
425 2017-03-05T00:43:13.204000Z http://thehackernews.com/2011/04/hacker-news-magazine-anonymous-edition.html | |
425 2017-03-05T00:44:36.224000Z http://thehackernews.com/2011/02/anonymous-hackers-announces-next-ddos.html | |
425 2017-03-05T00:44:36.761000Z http://thehackernews.com/2011/02/operation-opgoya-live-now-by-anonymous.html | |
425 2017-03-05T00:44:39.574000Z http://thehackernews.com/2011/02/anonymous-hackers-said-we-can-delete.html | |
425 2017-03-05T00:44:40.017000Z http://thehackernews.com/2011/02/anonymous-hackers-announce-operation.html | |
425 2017-03-05T00:44:41.524000Z http://thehackernews.com/2011/02/operation-iran-opiran-anonymous.html | |
425 2017-03-05T00:44:46.302000Z http://thehackernews.com/2011/02/leaderir-next-target-by-anonymous-at.html | |
425 2017-03-05T00:44:46.718000Z http://thehackernews.com/2011/02/rootkitcom-database-leaked-by-anonymous.html | |
425 2017-03-05T00:45:03.751000Z http://thehackernews.com/2011/01/open-letter-from-anonymous-hackers-to.html | |
425 2017-03-05T00:46:16.237000Z http://thehackernews.com/2010/12/anonymous-is-not-hackers-groupits.html | |
['ability', 'amazon', 'anonymity', 'anonymous', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
426 | |
426 2017-03-24T18:33:45.032000Z http://www.welivesecurity.com/2017/03/24/apple-underwhelmed-latest-cia-exploits-revealed-wikileaks/ | |
426 2017-03-27T12:31:07.834000Z https://www.welivesecurity.com/2017/03/24/apple-underwhelmed-latest-cia-exploits-revealed-wikileaks/ | |
['access', 'according', 'account', 'across', 'add', 'addition', 'additionally', 'affected', 'agent', 'ago', 'al', 'albeit', 'allegation', 'alleged', 'also', 'analysis', 'android', 'app', 'apple', 'archive', 'around', 'article', 'assange', 'assessed', 'assessment', 'assured', 'author', 'based', 'blind', 'blog', 'breach', 'car', 'cert', 'cia', 'claimed', 'claiming', 'clear', 'cluley', 'code', 'come', 'comfortable', 'community', 'company', 'condone', 'conference', 'connected', 'contact', 'continued', 'coordinate', 'copyright', 'customer', 'cybersecurity', 'dailymotion', 'day', 'de', 'decided', 'defend', 'defender', 'demand', 'detail', 'detailing', 'deutsch', 'developed', 'device', 'direct', 'disclose', 'disclosure', 'distance', 'div', 'document', 'domain', 'download', 'earlier', 'easily', 'easy', 'economics', 'effort', 'email', 'embed', 'en', 'english', 'ensure', 'entirely', 'eset', 'español', 'exercise', 'expert', 'exploit', 'exploited', 'exposed', 'facebook', 'far', 'firm', 'fixed', 'flaw', 'follow', 'friend', 'gain', 'general', 'given', 'go', 'google', 'graham', 'hackable', 'hacked', 'hacking', 'hard', 'harm', 'headed', 'headline', 'heart', 'hill', 'hole', 'home', 'hot', 'however', 'http', 'implant', 'inbox', 'included', 'including', 'information', 'initial', 'insight', 'instruction', 'intended', 'interest', 'interested', 'investigate', 'io', 'iphone', 'ir', 'issued', 'julian', 'keen', 'known', 'language', 'latest', 'launched', 'leaked', 'legal', 'like', 'link', 'linkedin', 'listen', 'live', 'longer', 'look', 'mac', 'made', 'magazine', 'make', 'managed', 'many', 'material', 'medium', 'method', 'microphone', 'microsoft', 'might', 'million', 'minecraft', 'mod', 'month', 'moon', 'morning', 'multimedia', 'navigation', 'negotiated', 'netgear', 'new', 'news', 'newsletter', 'normal', 'obviously', 'official', 'opinion', 'organisation', 'page', 'panic', 'paper', 'patch', 'perhaps', 'person', 'physical', 'planning', 'play', 'podcasts', 'policy', 'popular', 'post', 'posted', 'preliminarily', 'preliminary', 'preserved', 'press', 'previously', 'print', 'privacy', 'process', 'public', 'radar', 'ransomware', 'read', 'received', 'related', 'release', 'released', 'releasing', 'report', 'reported', 'requesting', 'research', 'reserved', 'responded', 'responsibly', 'rest', 'revealed', 'revelation', 'right', 'router', 'run', 'samsung', 'scare', 'search', 'secret', 'secretly', 'security', 'seems', 'seen', 'select', 'serve', 'sharing', 'show', 'shown', 'sign', 'site', 'sitemap', 'six', 'smart', 'smartphone', 'something', 'specific', 'specifically', 'spy', 'standard', 'statement', 'steal', 'stipulating', 'stolen', 'stylesheet', 'submit', 'techcrunch', 'technical', 'technology', 'term', 'theft', 'think', 'threaten', 'thus', 'time', 'tireless', 'toggle', 'tool', 'topic', 'treasured', 'trusted', 'tv', 'twitter', 'undecided', 'underwhelmed', 'update', 'upgrade', 'upon', 'urged', 'urgent', 'used', 'user', 'vendor', 'version', 'video', 'view', 'vigorously', 'virus', 'vulnerability', 'warns', 'weakness', 'webmaster', 'wechseln', 'whats', 'white', 'wikileaks', 'wish', 'within', 'without', 'wls', 'wordpress', 'work', 'world', 'would', 'year', 'yesterday', 'youtube', 'zum'] | |
428 | |
429 | |
429 2017-03-05T00:46:57.475000Z http://thehackernews.com/2010/11/marjo-chg-from-albania-hack-hxnyzxcn.html | |
429 2017-03-05T00:47:03.610000Z http://thehackernews.com/2010/11/standart-artru-hacked-albania-hackers.html | |
['ability', 'albania', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'link', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
430 | |
431 | |
431 2017-03-09T18:31:13.245000Z http://www.welivesecurity.com/2016/01/05/got-android-hope-youre-patching/ | |
431 2017-03-27T12:31:56.170000Z https://www.welivesecurity.com/2016/01/05/got-android-hope-youre-patching/ | |
['active', 'actually', 'addressing', 'advantage', 'advice', 'agree', 'allow', 'already', 'also', 'android', 'announced', 'another', 'aosp', 'app', 'apply', 'attack', 'author', 'available', 'basis', 'best', 'better', 'bluetooth', 'boobytrap', 'bouncy', 'browsing', 'bulletin', 'buy', 'carrier', 'castle', 'chance', 'cluley', 'code', 'compromise', 'concerning', 'control', 'conversation', 'could', 'credit', 'critical', 'cve', 'data', 'delivered', 'denial', 'described', 'device', 'disclosure', 'done', 'driver', 'early', 'easy', 'elevation', 'email', 'execution', 'exploitation', 'exploited', 'fashion', 'file', 'finding', 'firm', 'fix', 'flaw', 'fortunately', 'found', 'friend', 'future', 'generating', 'get', 'getting', 'given', 'giving', 'google', 'got', 'graham', 'hacker', 'handle', 'handling', 'headache', 'headline', 'high', 'highest', 'hole', 'holiday', 'hope', 'identifier', 'imagination', 'important', 'improve', 'including', 'information', 'informed', 'installed', 'issue', 'job', 'keep', 'keeping', 'kernel', 'kitkat', 'latest', 'le', 'likely', 'listed', 'live', 'lucky', 'made', 'major', 'make', 'malicious', 'malware', 'managing', 'manufacture', 'manufacturer', 'many', 'marshmallow', 'maybe', 'mediaserver', 'medium', 'method', 'million', 'mm', 'moderate', 'month', 'monthly', 'movie', 'multiple', 'need', 'new', 'newly', 'nexus', 'number', 'one', 'open', 'operating', 'ota', 'owner', 'owns', 'page', 'partner', 'patch', 'patching', 'people', 'perhaps', 'period', 'phone', 'picture', 'plant', 'posted', 'potentially', 'pretty', 'print', 'privilege', 'project', 'prompt', 'proper', 'properly', 'provided', 'push', 'rating', 'reasonably', 'receiving', 'recent', 'reduction', 'released', 'remote', 'report', 'reported', 'repository', 'rolling', 'safely', 'say', 'security', 'seem', 'send', 'serious', 'service', 'setup', 'severity', 'shake', 'shaky', 'shortly', 'smartphone', 'smartphones', 'snooping', 'something', 'source', 'stagefright', 'steal', 'strong', 'sure', 'surface', 'syncmanager', 'system', 'taking', 'technology', 'thing', 'time', 'timely', 'told', 'treated', 'trustzone', 'two', 'unsurprisingly', 'update', 'updated', 'upon', 'user', 'variety', 'version', 'via', 'vulnerability', 'vulnerable', 'wait', 'web', 'website', 'whats', 'within', 'wizard', 'word', 'work', 'yes', 'yesterday'] | |
432 | |
433 | |
434 | |
435 | |
435 2017-03-05T00:40:40.229000Z http://thehackernews.com/2011/07/15-porn-sites-defaced-by-amin-safi.html | |
435 2017-03-05T00:46:43.863000Z http://thehackernews.com/2010/11/6-websites-hacked-by-tunisian-hacker.html | |
435 2017-03-05T00:47:09.306000Z http://thehackernews.com/2010/11/drazebnikmostcz-defaced-by-tunisian.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'tunisian', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
436 | |
437 | |
437 2017-03-16T18:33:33.213000Z https://www.mimecast.com/blog/2010/09/asp.net-vulnerability-in-microsoft-exchange-fixed/ | |
437 2017-03-18T12:37:23.353000Z http://www.mimecast.com/blog/2010/09/asp.net-vulnerability-in-microsoft-exchange-fixed/ | |
['acceptable', 'account', 'administrator', 'advisory', 'affected', 'africa', 'america', 'announced', 'announcement', 'application', 'applies', 'applying', 'apps', 'archive', 'archiving', 'around', 'asia', 'asked', 'assessment', 'attack', 'attempt', 'award', 'back', 'barry', 'become', 'benchmarking', 'better', 'bit', 'black', 'blog', 'bundle', 'career', 'center', 'central', 'chat', 'clear', 'coalition', 'code', 'comment', 'company', 'completed', 'compliance', 'consider', 'contact', 'content', 'continuity', 'control', 'could', 'cryptographicexception', 'customer', 'cyber', 'cybercrime', 'data', 'dawn', 'day', 'deeper', 'defend', 'demo', 'detail', 'detailed', 'disclaimer', 'disclosure', 'discover', 'disqus', 'dlp', 'domain', 'east', 'email', 'enable', 'environment', 'europe', 'even', 'event', 'exception', 'exchange', 'excuse', 'exist', 'expert', 'exploit', 'exploited', 'feel', 'file', 'filed', 'fix', 'fixable', 'fixed', 'foo', 'footargetwebapplication', 'full', 'get', 'getting', 'gill', 'giving', 'good', 'google', 'great', 'ha', 'help', 'home', 'hotfixes', 'hybrid', 'id', 'identified', 'im', 'increased', 'indicator', 'inexplicable', 'information', 'installed', 'interactive', 'invalid', 'investigate', 'investor', 'issue', 'javascript', 'knowledgebase', 'large', 'leadership', 'legacy', 'legitimate', 'level', 'log', 'login', 'london', 'look', 'looked', 'machine', 'managed', 'management', 'manner', 'many', 'maybe', 'mesaging', 'message', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'name', 'network', 'news', 'north', 'occurred', 'occurrence', 'office', 'one', 'operating', 'option', 'overview', 'pacific', 'padding', 'partner', 'patch', 'path', 'percent', 'phishing', 'platform', 'please', 'pleased', 'policy', 'post', 'posted', 'powered', 'press', 'privacy', 'process', 'product', 'productivity', 'professional', 'program', 'protect', 'protection', 'quantity', 'quote', 'reason', 'recommend', 'record', 'registration', 'related', 'relation', 'release', 'released', 'removed', 'repair', 'report', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'ruined', 'sale', 'say', 'schedule', 'secure', 'security', 'see', 'send', 'sequence', 'serious', 'server', 'service', 'shape', 'share', 'signature', 'similar', 'simply', 'since', 'sitemap', 'solution', 'something', 'south', 'stop', 'success', 'support', 'system', 'talk', 'targeted', 'team', 'technical', 'technology', 'term', 'testing', 'thankfully', 'threat', 'time', 'timely', 'today', 'together', 'told', 'training', 'trust', 'turning', 'type', 'uk', 'underlying', 'unhandled', 'unprepared', 'use', 'utc', 'validation', 'version', 'view', 'virtual', 'vulnerability', 'wait', 'warning', 'way', 'webinars', 'whaling', 'window', 'within', 'work'] | |
438 | |
438 2017-03-06T00:30:43.792000Z https://www.grahamcluley.com/obama-planning-coup-yes-says-google-home/ | |
438 2017-03-08T06:30:52.177000Z https://www.grahamcluley.com/firefox-52-warns-try-enter-passwords-non-encrypted-websites/ | |
['account', 'adobe', 'advice', 'adwind', 'allowed', 'also', 'analyst', 'android', 'aol', 'appearance', 'apple', 'application', 'apps', 'article', 'ask', 'asked', 'associate', 'attack', 'audio', 'author', 'award', 'back', 'backbone', 'backdoor', 'backup', 'bad', 'best', 'billion', 'bisson', 'blackberry', 'blog', 'blox', 'bob', 'botnet', 'brilliant', 'browser', 'btc', 'buffer', 'bug', 'business', 'carole', 'category', 'celebrity', 'channel', 'check', 'chrome', 'clickjacking', 'cluley', 'comment', 'company', 'computer', 'condition', 'connect', 'contact', 'content', 'contributor', 'cooky', 'copyright', 'could', 'country', 'coup', 'covello', 'crisis', 'cyber', 'data', 'david', 'ddos', 'defence', 'denial', 'destroyed', 'directly', 'doll', 'dr', 'drop', 'early', 'email', 'encryption', 'enisa', 'episode', 'eu', 'event', 'ever', 'exploiting', 'explorer', 'facebook', 'fake', 'feed', 'filed', 'firefox', 'first', 'five', 'fix', 'flash', 'focused', 'follow', 'found', 'free', 'fun', 'game', 'gchq', 'gcluley', 'gear', 'give', 'google', 'government', 'governor', 'graham', 'guest', 'guideline', 'hack', 'hacked', 'hacker', 'happened', 'helping', 'hijack', 'hire', 'hit', 'home', 'hosted', 'hour', 'humbug', 'idea', 'iframes', 'incapsula', 'independent', 'indiana', 'industry', 'information', 'informed', 'internet', 'io', 'jacaranda', 'java', 'jim', 'latest', 'law', 'le', 'leave', 'let', 'life', 'like', 'limited', 'link', 'linkedin', 'linux', 'list', 'listen', 'live', 'login', 'loss', 'macos', 'make', 'malicious', 'malware', 'medium', 'menu', 'microsoft', 'might', 'mike', 'mobile', 'must', 'naked', 'navigation', 'network', 'new', 'news', 'newsletter', 'nude', 'number', 'obama', 'often', 'one', 'online', 'operating', 'opinion', 'oracle', 'order', 'pdf', 'penny', 'people', 'personal', 'philip', 'phishing', 'phone', 'planning', 'play', 'plus', 'podcast', 'podcasts', 'policy', 'popular', 'post', 'potential', 'powered', 'preparedness', 'presentation', 'pressidium', 'privacy', 'protected', 'public', 'put', 'ransomware', 'rat', 'realistic', 'recent', 'reddit', 'register', 'regularly', 'reply', 'reserved', 'return', 'review', 'riche', 'right', 'risk', 'rogue', 'role', 'safari', 'say', 'scammer', 'security', 'send', 'service', 'share', 'simulation', 'since', 'site', 'slack', 'smashing', 'social', 'soliman', 'solomon', 'spam', 'speak', 'speaking', 'sponsor', 'sponsorship', 'stay', 'store', 'stored', 'story', 'stream', 'subscribe', 'support', 'svajcer', 'system', 'tag', 'take', 'telegram', 'term', 'testimonial', 'theriault', 'threat', 'three', 'tip', 'took', 'toolkit', 'top', 'topic', 'try', 'twitter', 'uncategorized', 'used', 'user', 'vanja', 'version', 'veteran', 'victim', 'video', 'view', 'visit', 'vulnerability', 'want', 'way', 'web', 'website', 'week', 'weekly', 'whatsapp', 'wibbling', 'wilf', 'window', 'wordpress', 'worked', 'would', 'write', 'wrote', 'yahoo', 'yasin', 'yes', 'youtube'] | |
439 | |
439 2017-03-24T18:33:43.585000Z http://www.welivesecurity.com/2017/03/24/bad-bugs-bite-apple-icloud-accounts-held-hostage/ | |
439 2017-03-27T12:34:06.451000Z https://www.welivesecurity.com/2017/03/24/bad-bugs-bite-apple-icloud-accounts-held-hostage/ | |
['access', 'account', 'aguilar', 'also', 'amount', 'another', 'anyone', 'app', 'apple', 'approaching', 'appropriate', 'approximately', 'archived', 'attacker', 'attempt', 'attention', 'author', 'authority', 'bad', 'bite', 'bounty', 'breaking', 'bug', 'cache', 'capture', 'carry', 'claim', 'come', 'commence', 'compromise', 'compromised', 'conversation', 'credential', 'crime', 'cryptocurrency', 'currently', 'cybercrime', 'cybercriminals', 'cyberspace', 'data', 'date', 'decision', 'demanded', 'demanding', 'device', 'draw', 'email', 'eset', 'ethos', 'far', 'forcing', 'friend', 'fund', 'given', 'group', 'holding', 'hostage', 'however', 'icloud', 'identifying', 'indication', 'iphone', 'issue', 'itunes', 'large', 'law', 'locate', 'log', 'logging', 'make', 'mass', 'maybe', 'medium', 'message', 'michael', 'million', 'news', 'outlet', 'page', 'part', 'pay', 'picture', 'play', 'possession', 'posted', 'print', 'program', 'provided', 'ransom', 'read', 'receive', 'recently', 'remotely', 'reported', 'reportedly', 'reset', 'reward', 'rumor', 'safe', 'say', 'screen', 'securing', 'security', 'show', 'shown', 'smart', 'stated', 'stating', 'stored', 'subsequent', 'team', 'th', 'transcript', 'true', 'truly', 'turkish', 'unknown', 'unless', 'validating', 'varies', 'various', 'video', 'voucher', 'want', 'whats', 'wipe'] | |
440 | |
441 | |
442 | |
442 2017-03-28T12:30:59.821000Z https://isc.sans.edu/newssummary.html#1023801 | |
442 2017-03-28T12:31:02.274000Z https://isc.sans.edu/newssummary.html#1023819 | |
442 2017-03-28T18:30:56.554000Z https://www.helpnetsecurity.com/2017/03/28/apple-file-system-encryption/ | |
['apple', 'encryption', 'file', 'io', 'new', 'system'] | |
443 | |
443 2017-03-25T06:31:16.539000Z http://www.welivesecurity.com/2014/05/21/ebay-hack-password-stolen-customer-data/ | |
443 2017-03-27T12:32:35.571000Z https://www.welivesecurity.com/2014/05/21/ebay-hack-password-stolen-customer-data/ | |
['able', 'abta', 'abused', 'access', 'accessing', 'account', 'activity', 'add', 'address', 'advised', 'al', 'also', 'android', 'announced', 'app', 'archive', 'area', 'article', 'asked', 'asserts', 'attempt', 'auction', 'authentication', 'author', 'available', 'avoid', 'begun', 'better', 'birth', 'blog', 'bolster', 'breach', 'breached', 'brings', 'browser', 'browsing', 'case', 'change', 'clearly', 'clicking', 'code', 'collection', 'come', 'common', 'community', 'company', 'compromise', 'compromised', 'conference', 'contact', 'copyright', 'corporation', 'could', 'cracked', 'creating', 'credential', 'criminal', 'customer', 'cybersecurity', 'damage', 'data', 'database', 'date', 'de', 'detail', 'deutsch', 'direct', 'directly', 'discovered', 'div', 'doubt', 'download', 'due', 'dump', 'early', 'ebay', 'economics', 'else', 'email', 'embed', 'employee', 'en', 'enabled', 'encrypted', 'encryption', 'english', 'enjoyed', 'eset', 'español', 'every', 'everyone', 'evidence', 'example', 'excellent', 'experience', 'expert', 'exposed', 'facebook', 'factor', 'far', 'fiction', 'finally', 'financial', 'follow', 'following', 'follows', 'forward', 'fraudulent', 'friend', 'ftc', 'gain', 'get', 'getting', 'giant', 'go', 'going', 'good', 'google', 'greatly', 'hack', 'held', 'helpful', 'hole', 'home', 'hot', 'however', 'http', 'huge', 'hvac', 'idea', 'identifiable', 'imply', 'inbox', 'incident', 'included', 'including', 'info', 'information', 'insight', 'interest', 'interested', 'interesting', 'introduction', 'intrusion', 'investigating', 'iot', 'ir', 'issue', 'job', 'keep', 'kept', 'language', 'larger', 'late', 'latest', 'learned', 'legal', 'limit', 'link', 'linkedin', 'lookout', 'lysa', 'magazine', 'maintaining', 'make', 'manager', 'many', 'material', 'mean', 'message', 'might', 'mind', 'minecraft', 'mod', 'month', 'multimedia', 'multiple', 'must', 'myers', 'name', 'navigation', 'necessary', 'netgear', 'network', 'new', 'news', 'newsletter', 'number', 'occurred', 'offer', 'one', 'online', 'open', 'opinion', 'order', 'organization', 'page', 'paper', 'password', 'past', 'paving', 'perform', 'permission', 'personal', 'personally', 'phishing', 'phone', 'physical', 'pii', 'play', 'podcasts', 'point', 'policy', 'popular', 'possibility', 'possible', 'post', 'posted', 'print', 'privacy', 'private', 'push', 'question', 'radar', 'ransomware', 'rather', 'read', 'really', 'related', 'reoccurring', 'requiring', 'research', 'reserved', 'reset', 'retail', 'right', 'role', 'router', 'ryan', 'sale', 'say', 'scam', 'scenario', 'search', 'security', 'see', 'seeing', 'seen', 'segmentation', 'select', 'sensitive', 'separate', 'service', 'setting', 'sharing', 'sign', 'site', 'sitemap', 'small', 'smart', 'stand', 'started', 'store', 'stranger', 'strategy', 'strong', 'stylesheet', 'supplier', 'sure', 'suspicious', 'swenson', 'system', 'target', 'terminal', 'thing', 'time', 'today', 'together', 'toggle', 'topic', 'toy', 'trend', 'tv', 'twitter', 'two', 'type', 'typing', 'unclear', 'uncommon', 'undecided', 'unfortunately', 'unique', 'update', 'updated', 'urged', 'url', 'use', 'used', 'user', 'using', 'valid', 'vendor', 'video', 'view', 'virus', 'vizio', 'way', 'website', 'wechseln', 'well', 'whats', 'whenever', 'whether', 'white', 'within', 'wls', 'worrying', 'worse', 'would', 'year', 'yet', 'youtube', 'zum'] | |
444 | |
445 | |
446 | |
448 | |
449 | |
450 | |
451 | |
452 | |
454 | |
454 2017-03-26T12:30:51.790000Z http://securityaffairs.co/wordpress/57417/cyber-crime/winnti-gang-github.html | |
454 2017-03-26T18:30:56.033000Z http://securityaffairs.co/wordpress/57440/breaking-news/security-affairs-newsletter-round-105-news-week.html | |
['abusing', 'account', 'activity', 'actor', 'address', 'adgholas', 'affair', 'agency', 'also', 'analyst', 'apple', 'application', 'apt', 'arabia', 'article', 'attack', 'attacker', 'author', 'awareness', 'back', 'bangladesh', 'belief', 'best', 'blame', 'blog', 'book', 'breach', 'campaign', 'certified', 'chief', 'chinese', 'code', 'command', 'communication', 'contact', 'content', 'continues', 'control', 'cookie', 'copyright', 'council', 'crime', 'currency', 'cyber', 'dark', 'data', 'deep', 'defense', 'digital', 'discovered', 'ec', 'ek', 'enisa', 'espionage', 'ethical', 'european', 'evangelist', 'experience', 'expert', 'extended', 'field', 'find', 'firm', 'first', 'flaw', 'fortinet', 'founded', 'freelance', 'gang', 'github', 'government', 'group', 'hacker', 'hacking', 'hacktivism', 'heist', 'home', 'ic', 'icttf', 'id', 'identity', 'included', 'infects', 'information', 'infosec', 'institute', 'intelligence', 'internet', 'island', 'korea', 'landscape', 'law', 'leader', 'led', 'leverage', 'like', 'london', 'magazine', 'major', 'malware', 'management', 'many', 'member', 'micro', 'microsoft', 'might', 'million', 'mobile', 'must', 'named', 'national', 'network', 'neutrino', 'new', 'news', 'north', 'officer', 'organization', 'os', 'paganini', 'passion', 'personal', 'phishing', 'pierluigi', 'plc', 'please', 'policy', 'posing', 'previous', 'promote', 'publication', 'read', 'recently', 'regulation', 'report', 'researcher', 'reserved', 'resource', 'right', 'saudi', 'security', 'securityaffairs', 'service', 'share', 'sharing', 'siemens', 'since', 'social', 'solution', 'spear', 'sponsored', 'spotted', 'stakeholder', 'story', 'strong', 'targeted', 'targeting', 'team', 'terrorism', 'thing', 'threat', 'top', 'trend', 'union', 'used', 'virtual', 'war', 'warfare', 'web', 'window', 'winnti', 'worldwide', 'writer', 'writing', 'year', 'zone'] | |
455 | |
455 2017-03-05T00:39:53.033000Z http://thehackernews.com/2011/09/uronimo-mobile-platform-website-hacked.html | |
455 2017-03-05T00:42:11.375000Z http://thehackernews.com/2011/05/nivosb-israel-hackers-make-gaza-hacker.html | |
455 2017-03-05T00:43:39.167000Z http://thehackernews.com/2011/03/uhispameduni-hacked-by-hackers-security.html | |
455 2017-03-05T00:43:43.764000Z http://thehackernews.com/2011/03/chinese-site-hacked-by-cyber-king-team.html | |
455 2017-03-05T00:43:46.644000Z http://thehackernews.com/2011/03/china-government-site-hacked-by-team.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'team', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
456 | |
458 | |
458 2017-03-16T18:32:59.155000Z https://www.mimecast.com/blog/2011/07/one-cheer-for-dkim/ | |
458 2017-03-18T12:36:13.432000Z http://www.mimecast.com/blog/2011/07/one-cheer-for-dkim/ | |
['acceptable', 'accustomed', 'advantage', 'africa', 'ago', 'almost', 'america', 'andrew', 'announcement', 'antispam', 'application', 'approach', 'apps', 'archive', 'archiving', 'asia', 'attack', 'attain', 'award', 'away', 'barely', 'barry', 'become', 'becomes', 'best', 'big', 'birthday', 'bit', 'bite', 'blog', 'borenstein', 'breathing', 'broker', 'bundle', 'ca', 'career', 'case', 'celebrate', 'center', 'central', 'chair', 'chat', 'cheer', 'chief', 'coalition', 'college', 'come', 'comment', 'company', 'complete', 'compliance', 'computer', 'conducted', 'conjunction', 'consulted', 'contact', 'content', 'context', 'continuity', 'control', 'conversation', 'could', 'couple', 'cryptographically', 'cup', 'customer', 'cyber', 'data', 'day', 'decade', 'demo', 'describes', 'designed', 'detail', 'develop', 'developer', 'development', 'disclaimer', 'disclosure', 'disqus', 'distinguished', 'dk', 'dkim', 'dlp', 'doe', 'domain', 'dozen', 'draft', 'dramatic', 'east', 'effectively', 'eight', 'email', 'emerging', 'emptying', 'enable', 'energy', 'engineer', 'europe', 'even', 'event', 'eventually', 'exactly', 'examine', 'example', 'exchange', 'excitement', 'exciting', 'extension', 'facebook', 'faculty', 'far', 'favor', 'feel', 'feeling', 'file', 'filed', 'first', 'flood', 'forgiven', 'formal', 'framework', 'friend', 'full', 'future', 'generally', 'get', 'going', 'good', 'goodbye', 'google', 'grinnell', 'group', 'happening', 'happy', 'hear', 'help', 'helped', 'highest', 'hint', 'hold', 'home', 'hot', 'huh', 'hybrid', 'ibm', 'identified', 'ietf', 'iim', 'im', 'including', 'inevitably', 'information', 'insecure', 'institution', 'integrating', 'interlocking', 'internet', 'investor', 'javascript', 'joining', 'key', 'knowledgebase', 'known', 'large', 'last', 'law', 'leadership', 'learn', 'legacy', 'leiba', 'let', 'level', 'like', 'linking', 'little', 'login', 'long', 'looking', 'made', 'mail', 'making', 'managed', 'management', 'maximal', 'mean', 'measure', 'member', 'merged', 'mesaging', 'message', 'messaging', 'metamail', 'michigan', 'microsoft', 'middle', 'migration', 'mime', 'mimecast', 'mimecaster', 'misleading', 'mobility', 'month', 'moore', 'mostly', 'multiple', 'multipurpose', 'muster', 'nathaniel', 'need', 'network', 'news', 'next', 'normally', 'north', 'nothing', 'noticed', 'numerous', 'ocean', 'office', 'one', 'opponent', 'option', 'oversimplify', 'overview', 'pacific', 'paragraph', 'partner', 'patent', 'payment', 'peace', 'pending', 'people', 'phishing', 'piece', 'platform', 'please', 'policy', 'possibility', 'possible', 'post', 'posted', 'power', 'powered', 'prediction', 'press', 'pretending', 'previously', 'privacy', 'probably', 'process', 'product', 'productivity', 'professional', 'program', 'progress', 'protection', 'quick', 'quote', 'real', 'registration', 'related', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'rock', 'role', 'sale', 'schedule', 'scientist', 'secure', 'security', 'seems', 'send', 'sending', 'served', 'service', 'set', 'several', 'share', 'signature', 'single', 'sitemap', 'software', 'solution', 'south', 'spam', 'spammer', 'spent', 'standard', 'stem', 'stop', 'success', 'successful', 'support', 'system', 'systematic', 'take', 'targeted', 'team', 'technical', 'technology', 'tell', 'term', 'thing', 'think', 'though', 'threat', 'three', 'tide', 'time', 'today', 'together', 'training', 'treaty', 'trust', 'trusted', 'university', 'unsolicited', 'use', 'useful', 'view', 'wall', 'web', 'webinars', 'week', 'well', 'whaling', 'wide', 'work', 'working', 'world', 'year', 'yet'] | |
459 | |
459 2017-03-10T18:30:50.554000Z https://isc.sans.edu/newssummary.html#1021065 | |
459 2017-03-10T18:30:54.356000Z https://isc.sans.edu/newssummary.html#1021087 | |
459 2017-03-10T18:30:56.925000Z https://isc.sans.edu/newssummary.html#1021119 | |
459 2017-03-10T18:30:58.960000Z https://isc.sans.edu/newssummary.html#1021121 | |
459 2017-03-10T18:31:00.585000Z https://isc.sans.edu/newssummary.html#1021131 | |
459 2017-03-11T18:30:55.702000Z https://isc.sans.edu/newssummary.html#1021251 | |
['ago', 'android', 'device', 'hour', 'iphones', 'synopsis', 'view'] | |
460 | |
460 2017-03-09T12:30:56.108000Z http://securityaffairs.co/wordpress/56992/hacking/apache-struts-2-zero-day.html | |
460 2017-03-09T18:30:50.887000Z https://www.bleepingcomputer.com/news/security/nearly-200-000-wifi-cameras-open-to-hacking-right-now/ | |
460 2017-03-13T12:30:51.149000Z http://securityaffairs.co/wordpress/57104/hacking/cve-2017-5638-flaw-cisco.html | |
['according', 'affect', 'affected', 'also', 'analysis', 'article', 'attack', 'attacker', 'available', 'blog', 'breach', 'chinese', 'cia', 'code', 'command', 'contact', 'content', 'copyright', 'dark', 'data', 'exploit', 'file', 'find', 'firewall', 'flaw', 'found', 'hacker', 'hacking', 'home', 'information', 'internet', 'irc', 'issue', 'leak', 'malware', 'many', 'member', 'named', 'network', 'new', 'news', 'please', 'policy', 'previous', 'reserved', 'resource', 'right', 'security', 'server', 'social', 'software', 'story', 'strong', 'target', 'vulnerability', 'vulnerable', 'web', 'wikileaks', 'year'] | |
461 | |
461 2017-03-25T06:31:27.251000Z http://www.welivesecurity.com/2011/12/15/a-dozen-predictions-for-2012/ | |
461 2017-03-27T12:33:17.797000Z https://www.welivesecurity.com/2011/12/15/a-dozen-predictions-for-2012/ | |
['actual', 'additional', 'although', 'amount', 'app', 'appear', 'area', 'aryeh', 'association', 'attempt', 'auspex', 'author', 'away', 'basically', 'becomes', 'begin', 'bios', 'bitcoin', 'black', 'called', 'case', 'cert', 'certainty', 'certificate', 'classified', 'client', 'code', 'colleague', 'commercial', 'computer', 'conficker', 'continue', 'conventionally', 'course', 'currency', 'day', 'decline', 'default', 'deployed', 'developed', 'digital', 'digitally', 'distinguished', 'distributing', 'download', 'downloads', 'dozen', 'ecosystem', 'effort', 'email', 'engine', 'engineering', 'eset', 'especially', 'expect', 'exploited', 'fair', 'field', 'file', 'find', 'firmly', 'flaw', 'forthcoming', 'friend', 'fud', 'functionality', 'future', 'generic', 'get', 'goretsky', 'group', 'hard', 'hat', 'heard', 'heuristic', 'however', 'ieee', 'importance', 'increase', 'increased', 'infrastructure', 'interest', 'legitimate', 'like', 'likely', 'major', 'make', 'malware', 'mean', 'mebromi', 'mining', 'mirroring', 'monetize', 'move', 'much', 'mvp', 'native', 'need', 'network', 'networking', 'next', 'notoriously', 'obfuscators', 'one', 'opponent', 'order', 'packer', 'page', 'particular', 'perhaps', 'phone', 'platform', 'poisoned', 'popular', 'posted', 'predict', 'predicting', 'prediction', 'print', 'proactive', 'promise', 'pua', 'rather', 'realm', 'realtime', 'regard', 'reluctance', 'remain', 'remains', 'replaced', 'report', 'research', 'researcher', 'result', 'rogue', 'rootkits', 'runtime', 'search', 'security', 'see', 'seeking', 'seo', 'setting', 'share', 'shift', 'signature', 'signing', 'site', 'social', 'software', 'something', 'sometimes', 'standard', 'still', 'stolen', 'system', 'taggant', 'tangentially', 'technology', 'ten', 'theoretical', 'thing', 'think', 'threat', 'tie', 'top', 'tradition', 'trend', 'trojan', 'unwise', 'use', 'using', 'value', 'vista', 'volume', 'vulnerability', 'way', 'week', 'well', 'whats', 'window', 'work', 'working', 'wrapper', 'year', 'zvse'] | |
462 | |
462 2017-03-03T00:30:54.934000Z http://csoonline.com/article/3176599/security/slack-bug-paved-the-way-for-a-hack-that-can-steal-user-access.html | |
462 2017-03-06T00:30:44.390000Z http://securityaffairs.co/wordpress/56901/hacking/slack-flaw.html | |
['access', 'account', 'added', 'application', 'article', 'awareness', 'back', 'blog', 'bounty', 'breach', 'breached', 'browser', 'bug', 'call', 'called', 'chat', 'clear', 'clicking', 'communicate', 'communicates', 'content', 'could', 'created', 'data', 'demonstrated', 'discovered', 'enable', 'enables', 'exchanged', 'exploited', 'firm', 'fixed', 'flaw', 'force', 'frans', 'fun', 'hack', 'hacking', 'handover', 'hijack', 'home', 'however', 'hunter', 'implementation', 'indication', 'intelligence', 'internet', 'like', 'link', 'malicious', 'management', 'member', 'message', 'might', 'multiple', 'new', 'news', 'newsletter', 'open', 'origin', 'page', 'policy', 'popular', 'post', 'postmessage', 'president', 'recently', 'researcher', 'resource', 'right', 'rosen', 'security', 'separate', 'service', 'slack', 'sponsored', 'start', 'steal', 'story', 'strong', 'stuff', 'technology', 'threat', 'token', 'top', 'two', 'us', 'user', 'using', 'validating', 'vice', 'video', 'voice', 'way', 'web', 'webpage', 'week', 'window', 'work'] | |
463 | |
464 | |
465 | |
465 2017-03-08T18:30:58.955000Z http://www.welivesecurity.com/2017/03/08/aggressive-ad-displaying-google-play-app-tricks-users-leaving-high-ratings/ | |
465 2017-03-09T18:31:47.924000Z http://www.welivesecurity.com/2013/07/22/draft-how-to-spot-the-latest-android-scam-apps/ | |
465 2017-03-27T12:31:29.139000Z https://www.welivesecurity.com/2017/03/08/aggressive-ad-displaying-google-play-app-tricks-users-leaving-high-ratings/ | |
465 2017-03-27T12:33:07.359000Z https://www.welivesecurity.com/2013/07/22/draft-how-to-spot-the-latest-android-scam-apps/ | |
['add', 'adware', 'aggressive', 'al', 'also', 'analysis', 'android', 'app', 'appear', 'apps', 'archive', 'article', 'author', 'blog', 'code', 'community', 'conference', 'contact', 'copyright', 'credential', 'cybersecurity', 'data', 'de', 'deutsch', 'developer', 'device', 'direct', 'disguised', 'div', 'download', 'downloaded', 'downloading', 'email', 'embed', 'en', 'enabled', 'english', 'enough', 'eset', 'español', 'even', 'expert', 'facebook', 'fake', 'follow', 'forced', 'friend', 'full', 'function', 'game', 'go', 'good', 'google', 'high', 'home', 'hot', 'http', 'inbox', 'information', 'insight', 'install', 'installing', 'interested', 'ir', 'language', 'latest', 'leaving', 'legal', 'like', 'link', 'linkedin', 'magazine', 'malware', 'material', 'mean', 'message', 'might', 'month', 'multimedia', 'navigation', 'news', 'newsletter', 'offer', 'one', 'opinion', 'page', 'paper', 'permission', 'play', 'podcasts', 'policy', 'popular', 'post', 'posted', 'print', 'privacy', 'radar', 'ransomware', 'rating', 'read', 'real', 'recent', 'related', 'request', 'requesting', 'research', 'reserved', 'review', 'right', 'screen', 'search', 'security', 'see', 'select', 'setting', 'sign', 'site', 'sitemap', 'star', 'still', 'store', 'stylesheet', 'time', 'toggle', 'topic', 'trick', 'trojan', 'twitter', 'us', 'use', 'user', 'usually', 'version', 'video', 'view', 'virus', 'way', 'wechseln', 'whats', 'white', 'wls', 'work', 'youtube', 'zum'] | |
466 | |
467 | |
469 | |
472 | |
472 2017-03-07T18:30:49.523000Z https://www.alienvault.com/blogs/security-essentials/security-monitoring-in-azure-using-usm-anywhere | |
472 2017-03-14T18:30:51.778000Z https://www.alienvault.com/blogs/security-essentials/centralized-logging-in-the-cloud | |
472 2017-03-21T18:30:53.691000Z https://www.alienvault.com/blogs/security-essentials/hybrid-cloud-security-part-iii-a-new-approach-to-threat-detection-in-the-cloud-2 | |
472 2017-03-29T06:30:56.774000Z https://www.helpnetsecurity.com/2017/03/29/qualys-cloud-platform/ | |
['also', 'api', 'apis', 'asset', 'aws', 'azure', 'capability', 'change', 'cloud', 'collection', 'connect', 'correlation', 'cost', 'data', 'detection', 'environment', 'get', 'google', 'help', 'hybrid', 'information', 'ip', 'learn', 'look', 'make', 'management', 'microsoft', 'monitor', 'monitoring', 'need', 'new', 'part', 'platform', 'ransomware', 'rest', 'rule', 'securing', 'security', 'server', 'service', 'solution', 'spotting', 'still', 'tag', 'tool', 'use', 'virtual', 'vulnerability', 'web', 'well', 'within'] | |
473 | |
473 2017-03-11T12:30:55.736000Z http://www.welivesecurity.com/2016/01/07/5-devastating-data-breaches-2015/ | |
473 2017-03-27T12:31:53.793000Z https://www.welivesecurity.com/2016/01/07/5-devastating-data-breaches-2015/ | |
['accessed', 'account', 'action', 'active', 'actually', 'add', 'address', 'adultery', 'advanced', 'affected', 'affecting', 'africa', 'agency', 'ago', 'al', 'alone', 'also', 'although', 'among', 'android', 'announced', 'anthem', 'app', 'appealing', 'approximately', 'arabia', 'archive', 'argued', 'around', 'arrested', 'article', 'ashley', 'attack', 'attacker', 'author', 'average', 'back', 'became', 'began', 'behind', 'believed', 'belonging', 'biggest', 'birth', 'birthday', 'black', 'blamed', 'blog', 'blue', 'brand', 'breach', 'brian', 'bypassing', 'came', 'carefirst', 'case', 'check', 'child', 'china', 'civil', 'claiming', 'clearance', 'code', 'combed', 'comey', 'coming', 'community', 'company', 'comprehensive', 'compromised', 'compromising', 'concept', 'conducted', 'conference', 'confirmed', 'connect', 'consolidated', 'consumer', 'contact', 'continues', 'controversy', 'copyright', 'cost', 'could', 'country', 'credential', 'criminal', 'criticised', 'cross', 'crucially', 'current', 'customer', 'cyberattack', 'cyberattacks', 'cybercriminals', 'cybersecurity', 'czech', 'damage', 'damaging', 'danger', 'dark', 'data', 'database', 'date', 'dating', 'de', 'death', 'deemed', 'demonstrated', 'denies', 'described', 'describes', 'despite', 'detail', 'detected', 'deutsch', 'devastating', 'developing', 'digital', 'direct', 'director', 'discovering', 'discreet', 'dismay', 'div', 'documentation', 'dollar', 'download', 'drip', 'dumped', 'east', 'editor', 'educational', 'effort', 'electronics', 'email', 'embed', 'employee', 'en', 'encounter', 'encrypt', 'engineering', 'english', 'entry', 'epic', 'error', 'eset', 'español', 'estimated', 'ever', 'everyone', 'example', 'excellus', 'exist', 'existing', 'expert', 'exploited', 'exposed', 'facebook', 'facing', 'famous', 'fast', 'fbi', 'federal', 'figure', 'finding', 'fingerprint', 'firm', 'first', 'five', 'flood', 'follow', 'forever', 'former', 'fortune', 'forum', 'found', 'four', 'friend', 'future', 'gained', 'game', 'gamers', 'gang', 'gemalto', 'gender', 'go', 'google', 'government', 'grown', 'hacked', 'hacking', 'half', 'haunt', 'headline', 'health', 'healthcare', 'high', 'history', 'hit', 'home', 'hot', 'http', 'huge', 'human', 'hundred', 'ibm', 'id', 'identifiable', 'identifying', 'illegal', 'immediately', 'impact', 'inbox', 'incident', 'included', 'including', 'income', 'increase', 'indicated', 'individual', 'industry', 'infection', 'inflict', 'information', 'initially', 'insider', 'insight', 'insurer', 'interested', 'intrigued', 'intrusion', 'ip', 'ir', 'james', 'kid', 'kit', 'know', 'krebs', 'language', 'largest', 'last', 'later', 'latest', 'law', 'lawsuit', 'leading', 'leak', 'leakage', 'leaked', 'learning', 'legal', 'light', 'like', 'likely', 'link', 'linked', 'linkedin', 'little', 'lodge', 'long', 'look', 'loss', 'made', 'madison', 'magazine', 'main', 'man', 'management', 'manufacturer', 'many', 'market', 'marking', 'married', 'material', 'medical', 'member', 'membership', 'memory', 'middle', 'might', 'military', 'million', 'monetary', 'month', 'moved', 'mspy', 'much', 'multimedia', 'name', 'nature', 'navigation', 'network', 'news', 'newsletter', 'notified', 'number', 'offered', 'office', 'official', 'one', 'online', 'opinion', 'opm', 'opportunity', 'oppressive', 'organized', 'page', 'paper', 'parent', 'particularly', 'password', 'patch', 'people', 'personal', 'personally', 'personnel', 'play', 'podcasts', 'point', 'policy', 'policyholder', 'popular', 'post', 'posted', 'potentially', 'premera', 'print', 'privacy', 'professional', 'profile', 'prominent', 'protect', 'punishable', 'put', 'radar', 'ransomware', 'read', 'recent', 'record', 'registered', 'related', 'relationship', 'release', 'remains', 'reported', 'reporter', 'republic', 'required', 'research', 'reserved', 'resulted', 'resulting', 'revealed', 'revised', 'right', 'risk', 'said', 'saudi', 'search', 'secret', 'secure', 'security', 'see', 'select', 'server', 'service', 'shedding', 'shield', 'shut', 'sign', 'significant', 'since', 'site', 'sitemap', 'social', 'software', 'sold', 'something', 'space', 'specializes', 'spot', 'spyware', 'staff', 'start', 'started', 'state', 'stole', 'store', 'story', 'stylesheet', 'subsequently', 'suicide', 'suit', 'supposedly', 'surprisingly', 'taken', 'team', 'technology', 'ten', 'thick', 'thorough', 'threat', 'threatened', 'today', 'toggle', 'tool', 'topic', 'total', 'toy', 'traction', 'twitter', 'two', 'uk', 'united', 'unprecedented', 'uploaded', 'upon', 'use', 'user', 'using', 'valid', 'various', 'video', 'view', 'vigilante', 'virus', 'vtech', 'vulnerability', 'weak', 'web', 'website', 'wechseln', 'week', 'well', 'whats', 'white', 'wls', 'working', 'world', 'worldwide', 'worth', 'year', 'youtube', 'zum'] | |
474 | |
474 2017-03-01T18:30:57.063000Z https://isc.sans.edu/newssummary.html#1019779 | |
474 2017-03-01T18:31:00.518000Z https://isc.sans.edu/newssummary.html#1019793 | |
['acquittal', 'ago', 'cleared', 'comment', 'commenter', 'criminal', 'director', 'got', 'hour', 'leaving', 'man', 'news', 'offence', 'originally', 'overturned', 'police', 'post', 'prosecution', 'public', 'register', 'retrial', 'set', 'surveillance', 'synopsis', 'tried', 'unpleasant', 'vice', 'view', 'youtube'] | |
475 | |
476 | |
476 2017-03-23T18:33:37.345000Z http://csoonline.com/article/3184117/security/lastpass-fixes-serious-password-leak-vulnerabilities.html | |
476 2017-03-29T00:30:58.260000Z http://csoonline.com/article/3185871/security/lastpass-is-scrambling-to-fix-another-serious-vulnerability.html | |
['according', 'address', 'alert', 'also', 'analysis', 'another', 'apple', 'article', 'attack', 'attacker', 'binary', 'blog', 'brandposts', 'breach', 'brochure', 'browser', 'carol', 'christmas', 'cisco', 'cloud', 'cloudy', 'code', 'comma', 'comment', 'company', 'component', 'computer', 'concern', 'constantin', 'content', 'correspondent', 'cost', 'could', 'credit', 'critical', 'cso', 'customer', 'cybersecurity', 'daily', 'data', 'deal', 'demand', 'developer', 'device', 'discovered', 'download', 'easy', 'email', 'emailing', 'engineering', 'error', 'execute', 'execution', 'exploit', 'extension', 'facebook', 'featured', 'fill', 'first', 'fit', 'fix', 'flaw', 'follow', 'friend', 'george', 'get', 'go', 'going', 'google', 'hacker', 'hacking', 'headline', 'high', 'home', 'idg', 'information', 'inhibit', 'inside', 'installed', 'instantly', 'intel', 'lastpass', 'latest', 'leadership', 'leak', 'learn', 'let', 'life', 'like', 'link', 'lucian', 'made', 'make', 'malicious', 'management', 'manager', 'master', 'message', 'might', 'million', 'move', 'much', 'multiple', 'network', 'new', 'news', 'newsletter', 'next', 'nothing', 'online', 'ormandy', 'page', 'paper', 'password', 'patching', 'phishing', 'plug', 'policy', 'popular', 'post', 'privacy', 'project', 'protection', 'protectwise', 'pt', 'ransom', 'ransomware', 'related', 'reported', 'research', 'researcher', 'resource', 'review', 'right', 'risk', 'romania', 'said', 'secure', 'security', 'sent', 'sentinelone', 'separate', 'serious', 'server', 'service', 'session', 'sign', 'social', 'sorry', 'sponsored', 'start', 'state', 'steal', 'stored', 'story', 'stream', 'tavis', 'tax', 'temperature', 'terabyte', 'thank', 'thing', 'threat', 'threaten', 'time', 'truth', 'twitter', 'two', 'update', 'use', 'used', 'user', 'using', 'vault', 'version', 'video', 'visit', 'vulnerability', 'washington', 'webex', 'website', 'wherever', 'white', 'whole', 'wipe', 'work', 'writes', 'year', 'zero'] | |
477 | |
477 2017-03-22T18:30:57.224000Z http://www.welivesecurity.com/2017/03/22/economics-cybersecurity-undecided/ | |
477 2017-03-27T12:31:15.992000Z https://www.welivesecurity.com/2017/03/22/economics-cybersecurity-undecided/ | |
['able', 'absence', 'acceptable', 'accepting', 'accessible', 'accordance', 'according', 'account', 'activated', 'active', 'activity', 'add', 'addition', 'affect', 'aforementioned', 'agency', 'agenda', 'aggravating', 'allegedly', 'allowed', 'almost', 'alone', 'already', 'alternatively', 'although', 'amounted', 'anderson', 'antivirus', 'anything', 'anywhere', 'app', 'apply', 'approach', 'appropriate', 'approximately', 'argument', 'around', 'arranged', 'aspect', 'assertion', 'attachment', 'attack', 'attacker', 'attitude', 'author', 'available', 'average', 'avoided', 'awareness', 'back', 'backup', 'based', 'basic', 'beale', 'bear', 'became', 'become', 'beg', 'besides', 'better', 'billion', 'bit', 'breach', 'brian', 'browser', 'business', 'buy', 'buyer', 'cambridge', 'campaign', 'carnegie', 'case', 'cause', 'caused', 'cease', 'ceo', 'certain', 'certainly', 'chance', 'charge', 'cheaper', 'check', 'choose', 'circumstance', 'claim', 'clench', 'combined', 'come', 'coming', 'commercial', 'committee', 'communicated', 'community', 'company', 'computer', 'concept', 'concerned', 'conclude', 'confirmed', 'conformism', 'consequence', 'consider', 'consumer', 'containing', 'context', 'conundrum', 'corrective', 'correspondence', 'cost', 'costing', 'could', 'counterintuitive', 'couple', 'course', 'credential', 'croatia', 'cryptolocker', 'cyber', 'cyberattacks', 'cybercrime', 'cybercriminals', 'cybersecurity', 'damage', 'data', 'day', 'ddos', 'dead', 'debated', 'decent', 'decides', 'deciding', 'decision', 'define', 'democratic', 'despite', 'determine', 'developer', 'development', 'differ', 'different', 'dire', 'disable', 'disclosing', 'discovered', 'discrepancy', 'ditch', 'dollar', 'domain', 'downplays', 'dumping', 'dye', 'economics', 'edx', 'effectively', 'efficient', 'either', 'email', 'end', 'enforcement', 'entering', 'equal', 'eset', 'estimate', 'estimated', 'european', 'evaluate', 'even', 'every', 'example', 'expected', 'experienced', 'exploit', 'exploitable', 'face', 'fact', 'fail', 'fake', 'fall', 'far', 'fbi', 'fetch', 'fight', 'figure', 'file', 'finally', 'find', 'firewall', 'first', 'flaw', 'flip', 'force', 'former', 'found', 'fraction', 'free', 'friend', 'general', 'generated', 'get', 'global', 'globally', 'go', 'good', 'gordon', 'government', 'grow', 'guest', 'habit', 'hacking', 'handling', 'happens', 'harder', 'helping', 'home', 'hosted', 'hotly', 'however', 'huge', 'hundred', 'ibm', 'ignored', 'imbalance', 'implement', 'implementation', 'important', 'inaccessible', 'incentive', 'incident', 'inconvenience', 'increase', 'increasingly', 'indicated', 'individual', 'inevitable', 'infection', 'information', 'infrastructure', 'inga', 'installed', 'institute', 'institution', 'interesting', 'internet', 'invest', 'invested', 'investment', 'invisible', 'joint', 'jurisdiction', 'justified', 'key', 'know', 'known', 'late', 'law', 'lawrence', 'lawsuit', 'le', 'leading', 'leaf', 'least', 'legislative', 'license', 'light', 'like', 'link', 'lloyd', 'local', 'located', 'loeb', 'log', 'longer', 'look', 'looking', 'loss', 'make', 'making', 'malware', 'management', 'mandated', 'market', 'martin', 'maryland', 'matter', 'mean', 'measure', 'mellon', 'mercy', 'microsoft', 'might', 'million', 'mimicked', 'mind', 'miroslav', 'misfortune', 'mitigate', 'money', 'move', 'much', 'name', 'national', 'necessary', 'need', 'network', 'never', 'next', 'nikolac', 'nobody', 'noted', 'nothing', 'number', 'obsolete', 'obvious', 'occur', 'odds', 'often', 'one', 'online', 'open', 'opened', 'operational', 'optimal', 'organization', 'others', 'overpaying', 'page', 'paper', 'paradox', 'part', 'particular', 'particularly', 'password', 'patch', 'pay', 'paying', 'pc', 'penalty', 'people', 'per', 'performs', 'perpetrator', 'pervasive', 'petty', 'phishing', 'photo', 'place', 'placing', 'play', 'point', 'police', 'policy', 'ponemon', 'posse', 'posted', 'postpone', 'precarious', 'precisely', 'preemptive', 'president', 'prevent', 'prevented', 'previously', 'print', 'private', 'probability', 'probably', 'procedure', 'product', 'professional', 'profit', 'propagate', 'protection', 'public', 'purchase', 'qualifies', 'quality', 'radar', 'ransomware', 'rarely', 'reach', 'realization', 'recent', 'recklessness', 'record', 'recovery', 'red', 'reducing', 'redundant', 'regardless', 'regular', 'regulation', 'regulatory', 'relenting', 'remains', 'remember', 'report', 'represents', 'requirement', 'rescue', 'research', 'resource', 'respective', 'responsibility', 'rest', 'restoring', 'revenue', 'right', 'risk', 'ross', 'roughly', 'rudimentary', 'run', 'russia', 'safe', 'safekeeping', 'said', 'sample', 'say', 'scheduled', 'school', 'science', 'sector', 'secure', 'securing', 'security', 'see', 'seen', 'senior', 'series', 'service', 'set', 'setup', 'share', 'shifting', 'show', 'sic', 'side', 'sign', 'significantly', 'simply', 'since', 'single', 'site', 'software', 'solution', 'sometimes', 'soon', 'sound', 'sour', 'specific', 'spent', 'statistic', 'stick', 'still', 'stop', 'straight', 'strategic', 'strike', 'study', 'sure', 'surveying', 'symantec', 'system', 'take', 'taking', 'targeted', 'tend', 'tested', 'theft', 'therefore', 'thing', 'threat', 'three', 'thus', 'time', 'timeframe', 'tool', 'total', 'towards', 'training', 'trap', 'tricked', 'trillion', 'trouble', 'trust', 'turn', 'turned', 'two', 'type', 'typical', 'ultimately', 'unable', 'undecided', 'union', 'university', 'unjust', 'unknown', 'upbeat', 'usb', 'use', 'used', 'user', 'usually', 'utility', 'value', 'var', 'vendor', 'verified', 'vice', 'victim', 'virus', 'vulnerability', 'want', 'warning', 'way', 'web', 'webmail', 'weigh', 'went', 'whatever', 'whats', 'whether', 'whole', 'willing', 'within', 'wonder', 'word', 'world', 'worldwide', 'worse', 'worth', 'would', 'writer', 'wrong', 'year', 'zero'] | |
478 | |
478 2017-03-25T06:31:38.388000Z http://www.welivesecurity.com/2010/08/25/adobe-updates-2/ | |
478 2017-03-27T12:33:45.356000Z https://www.welivesecurity.com/2010/08/25/adobe-updates-2/ | |
['abta', 'according', 'acrobat', 'add', 'address', 'adobe', 'advisory', 'affect', 'al', 'allow', 'also', 'android', 'app', 'archive', 'article', 'attacker', 'author', 'available', 'back', 'blog', 'breach', 'bulletin', 'categorizes', 'cissp', 'citp', 'code', 'community', 'concerned', 'conference', 'contact', 'copyright', 'could', 'critical', 'cybersecurity', 'data', 'david', 'de', 'deutsch', 'direct', 'div', 'download', 'earlier', 'economics', 'email', 'embed', 'en', 'english', 'eset', 'español', 'execute', 'experience', 'expert', 'facebook', 'fbcs', 'fellow', 'flash', 'follow', 'friend', 'go', 'google', 'harley', 'home', 'hot', 'http', 'inbox', 'information', 'insight', 'interested', 'ir', 'jeremy', 'kirk', 'language', 'latest', 'legal', 'link', 'linkedin', 'macintosh', 'macworld', 'magazine', 'malicious', 'material', 'might', 'minecraft', 'mod', 'month', 'multimedia', 'navigation', 'news', 'newsletter', 'opinion', 'page', 'paper', 'patched', 'play', 'player', 'podcasts', 'policy', 'popular', 'post', 'posted', 'print', 'privacy', 'radar', 'ransomware', 'rated', 'read', 'reader', 'refers', 'related', 'released', 'report', 'research', 'reserved', 'right', 'search', 'security', 'select', 'senior', 'shockwave', 'sign', 'site', 'sitemap', 'stylesheet', 'toggle', 'topic', 'twitter', 'undecided', 'unix', 'update', 'version', 'video', 'view', 'virus', 'vulnerability', 'wechseln', 'whats', 'white', 'window', 'wls', 'youtube', 'zum'] | |
479 | |
479 2017-03-01T00:30:44.199000Z https://arstechnica.com/security/2017/02/severe-vulnerability-in-wordpress-plugin-could-affect-1-million-sites/ | |
479 2017-03-01T12:30:43.893000Z http://securityaffairs.co/wordpress/56779/hacking/nextgen-gallery-plugin-flaw.html | |
479 2017-03-01T18:30:45.552000Z http://securityaffairs.co/wordpress/56784/digital-id/google-e2email.html | |
479 2017-03-01T18:30:58.802000Z https://isc.sans.edu/newssummary.html#1019741 | |
['critical', 'flaw', 'gallery', 'injection', 'installs', 'million', 'nextgen', 'plugin', 'sql', 'vulnerability', 'wordpress'] | |
480 | |
481 | |
482 | |
483 | |
483 2017-03-14T18:30:43.020000Z http://blog.checkpoint.com/2017/03/14/merry-x-mas-ransomware-decryption-tool/ | |
483 2017-03-30T00:31:03.800000Z https://blog.checkpoint.com/2017/03/14/merry-x-mas-ransomware-decryption-tool/ | |
['able', 'access', 'actually', 'additional', 'aim', 'also', 'appearance', 'arrive', 'associate', 'attack', 'attacker', 'attendance', 'available', 'back', 'based', 'begin', 'blog', 'botnet', 'box', 'button', 'came', 'campaign', 'capable', 'card', 'caused', 'changed', 'charge', 'check', 'claimed', 'clicked', 'commission', 'company', 'complete', 'conducted', 'confirm', 'confirmation', 'contact', 'contains', 'content', 'court', 'credential', 'credit', 'cybercrime', 'data', 'day', 'ddos', 'decrypt', 'decryption', 'demand', 'denial', 'design', 'develop', 'dialogue', 'diamondfox', 'disguised', 'distributed', 'document', 'download', 'downloaded', 'dropped', 'dropper', 'dubbed', 'email', 'enabled', 'encrypt', 'encrypted', 'encryption', 'encrypts', 'epidemic', 'every', 'extension', 'fails', 'federal', 'fight', 'file', 'finding', 'first', 'five', 'folder', 'following', 'form', 'free', 'group', 'hancitor', 'hardcoded', 'help', 'home', 'hta', 'http', 'infection', 'intelligence', 'investigation', 'itwas', 'key', 'larger', 'later', 'legitimate', 'leveraged', 'link', 'lost', 'macro', 'make', 'malicious', 'malware', 'merry', 'name', 'named', 'network', 'new', 'nmr', 'note', 'notice', 'one', 'part', 'partner', 'payment', 'pdf', 'point', 'post', 'posted', 'present', 'press', 'prevention', 'previous', 'process', 'project', 'public', 'ransom', 'ransomware', 'receive', 'recover', 'recovered', 'regain', 'research', 'resource', 'response', 'second', 'server', 'service', 'shared', 'similar', 'spam', 'spotted', 'spread', 'start', 'stealing', 'successful', 'synchronized', 'tag', 'team', 'threat', 'time', 'tool', 'top', 'trade', 'unique', 'upon', 'us', 'use', 'victim', 'wait', 'wave', 'wild', 'word', 'zipped'] | |
484 | |
485 | |
486 | |
487 | |
488 | |
488 2017-03-01T18:30:45.563000Z https://security.googleblog.com/2017/03/expanding-protection-for-chrome-users.html | |
488 2017-03-03T18:31:03.314000Z https://isc.sans.edu/newssummary.html#1020053 | |
['ad', 'browsing', 'change', 'chrome', 'effort', 'google', 'injection', 'macos', 'protect', 'protection', 'safe', 'setting', 'unwanted', 'user'] | |
489 | |
491 | |
493 | |
495 | |
495 2017-03-16T18:31:48.195000Z https://www.mimecast.com/blog/2014/05/mimecasts-email-security-highly-commended-by-sc-awards-/ | |
495 2017-03-18T12:33:47.348000Z http://www.mimecast.com/blog/2014/05/mimecasts-email-security-highly-commended-by-sc-awards-/ | |
['acceptable', 'acquired', 'across', 'act', 'africa', 'agent', 'america', 'apps', 'archive', 'archiving', 'articulating', 'asia', 'attack', 'australia', 'award', 'azure', 'bachelor', 'backup', 'based', 'become', 'better', 'blackberry', 'blog', 'bolted', 'build', 'building', 'built', 'bundle', 'business', 'career', 'category', 'center', 'central', 'ceremony', 'chat', 'cloud', 'coalition', 'commended', 'comment', 'company', 'compelling', 'competitor', 'compliance', 'comprehensive', 'consideration', 'contact', 'content', 'continuity', 'control', 'corporate', 'critical', 'customer', 'cyber', 'dan', 'data', 'defend', 'degree', 'delivering', 'demo', 'deploy', 'deployment', 'detail', 'director', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'documentation', 'drawn', 'dropbox', 'east', 'effective', 'email', 'enable', 'enjoyed', 'enterprise', 'established', 'europe', 'even', 'event', 'exchange', 'experience', 'expert', 'feel', 'file', 'filed', 'find', 'five', 'form', 'gartner', 'gateway', 'get', 'global', 'google', 'grade', 'hardware', 'held', 'help', 'highly', 'hold', 'home', 'hybrid', 'im', 'impartiality', 'improving', 'including', 'industry', 'information', 'integrated', 'introducing', 'investor', 'javascript', 'joined', 'joining', 'judge', 'knowledgebase', 'large', 'last', 'leadership', 'legacy', 'like', 'login', 'macro', 'magazine', 'magic', 'majority', 'make', 'making', 'malware', 'managed', 'management', 'manages', 'marketing', 'mean', 'mesaging', 'message', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'minimizing', 'mitigate', 'mobility', 'need', 'network', 'news', 'north', 'number', 'offering', 'office', 'online', 'option', 'organization', 'outage', 'overhead', 'overview', 'owns', 'pacific', 'partner', 'percent', 'platform', 'please', 'point', 'policy', 'post', 'posted', 'powered', 'press', 'prior', 'privacy', 'process', 'product', 'productivity', 'profession', 'professional', 'program', 'proposition', 'protect', 'protection', 'provides', 'purpose', 'quadrant', 'quote', 'rank', 'receive', 'recognition', 'recognized', 'registration', 'related', 'relation', 'release', 'reminder', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'rising', 'risk', 'role', 'sale', 'sc', 'schedule', 'secure', 'security', 'selected', 'send', 'senior', 'service', 'setup', 'share', 'signature', 'simple', 'sitemap', 'six', 'sla', 'sloshberg', 'software', 'solution', 'south', 'specifically', 'status', 'stop', 'straightforward', 'success', 'support', 'supporting', 'targeted', 'team', 'technical', 'technology', 'term', 'threat', 'thrilled', 'tide', 'today', 'together', 'training', 'transfer', 'trust', 'uk', 'unique', 'unprepared', 'use', 'user', 'valuable', 'value', 'variety', 'video', 'view', 'way', 'webinars', 'week', 'welcome', 'whaling', 'without', 'work', 'worked', 'year', 'yet'] | |
496 | |
497 | |
497 2017-03-24T12:34:04.556000Z http://www.itsecurityguru.org/2017/03/24/security-pros-network-operators-view-ddos-attacks-increased-concern-2017/ | |
497 2017-03-24T12:34:11.132000Z http://www.itsecurityguru.org/2017/03/24/phishing-email-not-phishing-email-taxonomy-malicious-emails/ | |
497 2017-03-24T12:34:24.091000Z http://www.itsecurityguru.org/2017/03/24/apple-tells-wikileaks-submit-cia-exploits-normal-process/ | |
497 2017-03-24T12:34:25.863000Z http://www.itsecurityguru.org/2017/03/24/cisco-patches-critical-iox-vulnerability/ | |
497 2017-03-24T12:34:28.124000Z http://www.itsecurityguru.org/2017/03/24/breach-dol-jobs-database-threat-10-states-far/ | |
497 2017-03-24T12:34:30.178000Z http://www.itsecurityguru.org/2017/03/24/wikileaks-reveals-cia-can-hack-macs-hidden-code/ | |
497 2017-03-24T12:34:32.813000Z http://www.itsecurityguru.org/2017/03/24/os-x-windows-targeted-malware-word/ | |
['ability', 'across', 'ad', 'administrator', 'advanced', 'affect', 'afraid', 'ago', 'also', 'american', 'amidst', 'anonabox', 'antivirus', 'apple', 'application', 'appriver', 'approves', 'around', 'article', 'ask', 'atm', 'attack', 'back', 'backlash', 'badly', 'baker', 'bank', 'banking', 'biggest', 'binary', 'biometrics', 'biz', 'blind', 'board', 'breach', 'broadly', 'build', 'business', 'campaign', 'change', 'chief', 'cia', 'cisco', 'citibank', 'cloud', 'cm', 'code', 'combat', 'come', 'comment', 'communication', 'community', 'concern', 'creating', 'criminal', 'critical', 'cyber', 'cybersecurity', 'data', 'database', 'date', 'ddos', 'development', 'dns', 'doe', 'dol', 'dtmf', 'due', 'ebay', 'editor', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'everyone', 'evil', 'experience', 'explain', 'exploit', 'exporting', 'exposed', 'express', 'facebook', 'family', 'far', 'find', 'finnish', 'flaw', 'follow', 'forum', 'fraud', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'good', 'goodbye', 'got', 'government', 'grip', 'gui', 'guru', 'guy', 'hack', 'hacked', 'hacker', 'hacking', 'hello', 'help', 'hidden', 'hitting', 'home', 'hospital', 'hour', 'http', 'icloud', 'id', 'impact', 'imposter', 'improve', 'incident', 'increased', 'information', 'infosec', 'infosecurity', 'inside', 'insight', 'iox', 'jakobsson', 'jay', 'job', 'jones', 'joyce', 'know', 'lack', 'landmark', 'law', 'leading', 'leave', 'lee', 'like', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'majority', 'making', 'malware', 'many', 'markus', 'million', 'min', 'mind', 'mitigation', 'mixed', 'netflix', 'network', 'new', 'news', 'next', 'normal', 'num', 'oiza', 'open', 'operation', 'operator', 'option', 'patch', 'paypal', 'pc', 'persistent', 'pervasive', 'phishing', 'platform', 'pm', 'polite', 'popular', 'posted', 'previous', 'primary', 'privacy', 'pro', 'process', 'professional', 'protecting', 'protection', 'quality', 'queen', 'ransomware', 'recent', 'regulation', 'related', 'relationship', 'reli', 'remains', 'responds', 'response', 'retailer', 'return', 'reveals', 'rich', 'rise', 'risk', 'round', 'run', 'sale', 'sap', 'say', 'scam', 'scientist', 'security', 'sensitive', 'service', 'share', 'shortage', 'sign', 'skill', 'software', 'sort', 'source', 'spam', 'spot', 'squad', 'state', 'stock', 'story', 'submit', 'supporter', 'tackle', 'tag', 'tagged', 'talking', 'tania', 'target', 'targeted', 'technology', 'tell', 'ten', 'term', 'themed', 'thing', 'threat', 'top', 'trading', 'trend', 'turn', 'turning', 'tweet', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'video', 'view', 'viral', 'vulnerability', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'wikileaks', 'window', 'within', 'word', 'working', 'worse', 'would', 'year'] | |
498 | |
499 | |
500 | |
501 | |
501 2017-03-09T18:31:49.320000Z http://www.welivesecurity.com/2013/07/22/hugely-significant-sim-card-vulnerability-leaves-millions-of-cellphones-at-risk/ | |
501 2017-03-27T12:33:08.342000Z https://www.welivesecurity.com/2013/07/22/hugely-significant-sim-card-vulnerability-leaves-millions-of-cellphones-at-risk/ | |
['acccording', 'access', 'according', 'active', 'adopt', 'allowed', 'allowing', 'allows', 'alone', 'already', 'also', 'among', 'app', 'applet', 'around', 'attack', 'attacker', 'author', 'billion', 'blackhat', 'break', 'call', 'capability', 'card', 'cellphone', 'change', 'changed', 'charge', 'cipher', 'claim', 'cloned', 'cloning', 'close', 'come', 'command', 'complex', 'computer', 'conference', 'could', 'credential', 'cryptographic', 'cryptography', 'currently', 'custom', 'cybercrime', 'cybersecurity', 'data', 'de', 'deal', 'defense', 'described', 'designed', 'disclose', 'email', 'encryption', 'enormous', 'finding', 'found', 'friend', 'function', 'general', 'german', 'gnerations', 'hacker', 'hacking', 'hamadoun', 'handset', 'heading', 'identity', 'implement', 'improperly', 'imsi', 'including', 'install', 'international', 'interview', 'itu', 'java', 'karsten', 'key', 'ki', 'know', 'la', 'lab', 'leaf', 'legacy', 'live', 'location', 'long', 'machine', 'many', 'mean', 'message', 'million', 'mobile', 'must', 'need', 'needed', 'network', 'new', 'nohl', 'number', 'objective', 'ota', 'outdated', 'page', 'payment', 'phone', 'plaintexts', 'plenty', 'pose', 'possibly', 'posted', 'potential', 'predefined', 'presented', 'print', 'problem', 'provide', 'query', 'read', 'realm', 'remote', 'remotely', 'replace', 'research', 'researcher', 'resist', 'resolved', 'respond', 'rest', 'reviewed', 'risk', 'rob', 'said', 'say', 'secretary', 'secure', 'security', 'send', 'sent', 'seven', 'show', 'signature', 'signed', 'sim', 'sims', 'six', 'sm', 'software', 'spy', 'spying', 'steal', 'still', 'stored', 'sufficiently', 'supplementary', 'telecommunication', 'term', 'tested', 'time', 'today', 'token', 'touré', 'two', 'union', 'update', 'us', 'use', 'used', 'using', 'vega', 'virtual', 'voicemail', 'vulnerability', 'vulnerable', 'warrant', 'waugh', 'well', 'whats', 'widely', 'worldwide', 'would', 'year', 'york'] | |
502 | |
503 | |
504 | |
506 | |
507 | |
508 | |
509 | |
509 2017-03-06T18:30:49.433000Z https://www.bleepingcomputer.com/news/government/proposed-bill-will-allow-victims-to-hack-their-attackers-to-stop-cyber-attacks/ | |
509 2017-03-08T18:30:55.336000Z http://thehackernews.com/2017/03/hacking-back-hackers.html | |
509 2017-03-13T18:30:51.552000Z https://nakedsecurity.sophos.com/2017/03/13/bill-proposes-letting-victims-of-cybercrime-hack-the-hackers/ | |
['abuse', 'access', 'acdc', 'act', 'active', 'activity', 'also', 'another', 'attack', 'attacker', 'attribution', 'authorization', 'back', 'behind', 'bill', 'certainty', 'company', 'computer', 'continued', 'could', 'cyber', 'ddos', 'defense', 'defensive', 'discussion', 'disrupt', 'draft', 'enforcement', 'fraud', 'gather', 'graf', 'hack', 'hacker', 'health', 'home', 'information', 'innocent', 'judge', 'law', 'legal', 'limited', 'make', 'malware', 'measure', 'network', 'news', 'order', 'person', 'physical', 'public', 'safety', 'said', 'security', 'share', 'stored', 'threat', 'tom', 'tool', 'unauthorized', 'use', 'victim', 'virus', 'without'] | |
510 | |
510 2017-03-10T18:30:58.083000Z https://securityintelligence.com/events/esg-research-top-mobility-trends-in-retail-for-2017/ | |
510 2017-03-27T06:30:57.718000Z https://securityintelligence.com/events/are-you-doing-enough-to-protect-yourself-from-insider-threats/ | |
['academic', 'accessibility', 'add', 'aerospace', 'afghanistan', 'africa', 'african', 'alabama', 'alaska', 'albania', 'algeria', 'america', 'american', 'analysis', 'andorra', 'angola', 'anguilla', 'antigua', 'antilles', 'applicable', 'arab', 'arabia', 'argentina', 'arizona', 'arkansas', 'armenia', 'article', 'aruba', 'attendee', 'australia', 'austria', 'author', 'automotive', 'azerbaijan', 'bahamas', 'bahrain', 'bangladesh', 'banking', 'barbados', 'barbuda', 'barthelemy', 'become', 'belarus', 'belgium', 'belize', 'benin', 'bermuda', 'bhutan', 'bolivia', 'bonaire', 'bosnia', 'botswana', 'brazil', 'brit', 'britain', 'british', 'brought', 'brunei', 'bulgaria', 'burkina', 'burundi', 'business', 'caicos', 'caledonia', 'calendar', 'california', 'cambodia', 'cameroon', 'canada', 'canary', 'cape', 'carolina', 'cayman', 'central', 'chad', 'channel', 'chemical', 'chile', 'china', 'christmas', 'city', 'close', 'coco', 'code', 'colombia', 'colorado', 'columbia', 'comoros', 'company', 'computer', 'congo', 'connecticut', 'consumer', 'contact', 'contributor', 'cook', 'costa', 'cote', 'country', 'croatia', 'cuba', 'curacao', 'cyprus', 'czech', 'dakota', 'data', 'defense', 'delaware', 'denmark', 'director', 'distribution', 'district', 'djibouti', 'dominica', 'dominican', 'east', 'ecuador', 'edt', 'education', 'egypt', 'el', 'electronics', 'email', 'emirate', 'employee', 'energy', 'entertainment', 'equatorial', 'eritrea', 'estonia', 'ethiopia', 'europe', 'eustatius', 'event', 'executive', 'expand', 'expressed', 'facebook', 'falkland', 'faroe', 'faso', 'featured', 'field', 'fiji', 'fill', 'financial', 'finland', 'first', 'florida', 'follow', 'form', 'france', 'french', 'futana', 'gabon', 'gambia', 'georgia', 'germany', 'ghana', 'gibraltar', 'government', 'great', 'greece', 'greenland', 'grenada', 'grenadine', 'group', 'guadeloupe', 'guam', 'guatemala', 'guiana', 'guinea', 'guyana', 'haiti', 'hampshire', 'hawaii', 'healthcare', 'helena', 'herzegovina', 'holland', 'home', 'honduras', 'hong', 'hungary', 'ibm', 'iceland', 'idaho', 'illinois', 'india', 'indian', 'indiana', 'indicates', 'indonesia', 'industrial', 'industry', 'information', 'informed', 'insight', 'insurance', 'intelligence', 'iowa', 'iran', 'iraq', 'ireland', 'island', 'isle', 'israel', 'italy', 'jamaica', 'japan', 'jersey', 'jordan', 'kansa', 'kazakhstan', 'keep', 'kentucky', 'kenya', 'kingdom', 'kiribati', 'kong', 'korea', 'kuwait', 'kyrgyzstan', 'lanka', 'lao', 'last', 'latvia', 'lebanon', 'leone', 'lesotho', 'liberia', 'libya', 'liechtenstein', 'life', 'linkedin', 'lithuania', 'louisiana', 'lucia', 'luxembourg', 'maarten', 'macau', 'macedonia', 'madagascar', 'maine', 'malawi', 'malaysia', 'maldives', 'mali', 'malta', 'man', 'marino', 'market', 'marketing', 'marshall', 'martinique', 'maryland', 'massachusetts', 'mauritania', 'mauritius', 'mayotte', 'medium', 'mexico', 'michigan', 'midway', 'minnesota', 'miquelon', 'mississippi', 'missouri', 'moldova', 'monaco', 'mongolia', 'montana', 'montenegro', 'montserrat', 'morocco', 'mozambique', 'myanmar', 'nambia', 'name', 'nauru', 'navigation', 'nebraska', 'necessarily', 'need', 'nepal', 'netherland', 'netherlands', 'nevada', 'nevis', 'new', 'news', 'nicaragua', 'niger', 'nigeria', 'niue', 'norfolk', 'north', 'norway', 'ocean', 'offering', 'official', 'ohio', 'oklahoma', 'oman', 'opinion', 'oregon', 'organization', 'pakistan', 'palau', 'palestine', 'panama', 'papua', 'paraguay', 'partner', 'pennsylvania', 'peru', 'petroleum', 'philippine', 'phone', 'pierre', 'pitcairn', 'please', 'pm', 'poland', 'policy', 'polynesia', 'portugal', 'position', 'postal', 'principe', 'privacy', 'product', 'professional', 'puerto', 'qatar', 'quora', 'reflect', 'register', 'registering', 'registration', 'republic', 'required', 'research', 'retail', 'reunion', 'rhode', 'rica', 'rico', 'romania', 'russia', 'rwanda', 'saipan', 'salvador', 'samoa', 'san', 'sao', 'saudi', 'science', 'search', 'security', 'select', 'senegal', 'serbia', 'service', 'seychelles', 'share', 'sierra', 'singapore', 'size', 'slideshare', 'slovakia', 'slovenia', 'solomon', 'somalia', 'south', 'southern', 'spain', 'speaker', 'sri', 'st', 'staff', 'state', 'subscribe', 'sudan', 'suriname', 'swaziland', 'sweden', 'switzerland', 'syria', 'tahiti', 'taiwan', 'tajikistan', 'tanzania', 'telecommunication', 'telephone', 'tennessee', 'ter', 'term', 'texas', 'thailand', 'thank', 'threat', 'timor', 'title', 'tobago', 'toggle', 'togo', 'tokelau', 'tome', 'tonga', 'top', 'topic', 'transportation', 'travel', 'trinidad', 'tunisia', 'turk', 'turkey', 'turkmenistan', 'tuvalu', 'twitter', 'type', 'uganda', 'ukraine', 'united', 'upcoming', 'upcomming', 'uruguay', 'usa', 'use', 'utah', 'utility', 'uzbekistan', 'vanuatu', 'vatican', 'vendor', 'venezuela', 'verde', 'vermont', 'vietnam', 'view', 'vincent', 'virgin', 'virginia', 'wake', 'wallis', 'washington', 'webinar', 'webinars', 'west', 'wholesale', 'wisconsin', 'work', 'worldwide', 'wyoming', 'yemen', 'york', 'youtube', 'zaire', 'zambia', 'zealand', 'zimbabwe'] | |
511 | |
511 2017-03-02T00:30:47.775000Z http://csoonline.com/article/3176095/security/us-surveillance-law-may-see-no-new-protections-for-foreign-targets.html | |
511 2017-03-14T18:30:55.713000Z http://csoonline.com/article/3180811/security/the-nsas-foreign-surveillance-5-things-to-know.html | |
511 2017-03-23T18:33:26.889000Z https://taosecurity.blogspot.de/2017/03/five-reasons-i-want-china-running-its.html | |
['agency', 'american', 'believe', 'collection', 'deal', 'foreign', 'friend', 'get', 'going', 'hacking', 'information', 'intel', 'intelligence', 'learn', 'like', 'likely', 'management', 'many', 'might', 'need', 'one', 'process', 'program', 'protect', 'resource', 'sale', 'say', 'secure', 'security', 'software', 'state', 'step', 'target', 'twitter', 'use', 'want', 'way', 'world', 'would', 'year'] | |
512 | |
512 2017-03-01T18:30:54.081000Z https://securityledger.com/2017/03/podcast-fraud-linked-to-stolen-w-2s-a-growing-problem-for-uncle-sam/ | |
512 2017-03-18T00:30:51.064000Z https://krebsonsecurity.com/2017/03/govt-cybersecurity-contractor-hit-in-w-2-phishing-scam/ | |
['agency', 'alone', 'also', 'american', 'around', 'attack', 'breach', 'claim', 'company', 'cyber', 'data', 'either', 'email', 'employee', 'federal', 'file', 'filed', 'firm', 'form', 'fraud', 'fraudsters', 'fraudulently', 'got', 'government', 'help', 'hundred', 'id', 'identity', 'incident', 'information', 'irs', 'latest', 'le', 'line', 'linkedin', 'major', 'million', 'new', 'number', 'one', 'online', 'open', 'phishing', 'policy', 'recently', 'refund', 'rejected', 'report', 'request', 'return', 'scam', 'scammer', 'security', 'sensitive', 'social', 'someone', 'sophisticated', 'sort', 'spear', 'spoof', 'still', 'suspicious', 'tag', 'take', 'tax', 'theft', 'training', 'via', 'victim', 'vulnerability', 'week', 'year'] | |
513 | |
514 | |
514 2017-03-14T12:30:59.318000Z http://securityaffairs.co/wordpress/57127/intelligence/facebook-survellance-ban.html | |
514 2017-03-14T18:30:51.883000Z http://securityaffairs.co/wordpress/57134/intelligence/ncsc-warns-russia-hacking.html | |
['action', 'activity', 'adopted', 'advertised', 'affair', 'affect', 'agency', 'allow', 'also', 'analyst', 'apache', 'apt', 'article', 'author', 'awareness', 'back', 'belief', 'best', 'blog', 'book', 'breach', 'capability', 'card', 'certified', 'chief', 'cisco', 'command', 'conducted', 'contact', 'content', 'cookie', 'copyright', 'council', 'crime', 'crook', 'currency', 'cyber', 'cybercrime', 'dark', 'data', 'deep', 'defense', 'department', 'developer', 'dhs', 'digital', 'doubt', 'ec', 'enisa', 'ethical', 'european', 'evangelist', 'execution', 'existing', 'experience', 'expert', 'extended', 'extension', 'facebook', 'federal', 'field', 'find', 'firm', 'flaw', 'founded', 'freelance', 'government', 'group', 'hacker', 'hacking', 'hacktivism', 'hijack', 'home', 'homeland', 'icttf', 'id', 'identity', 'incident', 'information', 'infosec', 'instagram', 'institute', 'intelligence', 'internet', 'island', 'kind', 'landscape', 'last', 'law', 'leader', 'led', 'letter', 'like', 'london', 'macos', 'magazine', 'magento', 'major', 'malware', 'management', 'many', 'mean', 'measure', 'medium', 'member', 'might', 'mobile', 'must', 'named', 'national', 'network', 'new', 'news', 'next', 'officer', 'paganini', 'passion', 'payment', 'personal', 'pierluigi', 'please', 'policy', 'previous', 'product', 'profile', 'promote', 'proton', 'provide', 'publication', 'published', 'rat', 'read', 'realex', 'recently', 'regulation', 'report', 'reserved', 'resource', 'right', 'russian', 'said', 'scanning', 'security', 'securityaffairs', 'service', 'share', 'sharing', 'social', 'solution', 'sponsored', 'stakeholder', 'state', 'steal', 'story', 'strong', 'strut', 'surveillance', 'team', 'terrorism', 'thing', 'threat', 'time', 'tool', 'top', 'treat', 'trying', 'underground', 'union', 'used', 'variant', 'virtual', 'war', 'warfare', 'web', 'writer', 'writing', 'year', 'zone'] | |
516 | |
517 | |
518 | |
519 | |
520 | |
521 | |
522 | |
523 | |
524 | |
524 2017-03-16T18:31:13.149000Z https://www.mimecast.com/blog/2016/04/for-cybersecurity-please-spend-wisely/ | |
524 2017-03-18T12:32:29.140000Z http://www.mimecast.com/blog/2016/04/for-cybersecurity-please-spend-wisely/ | |
['acted', 'added', 'additional', 'administration', 'advanced', 'affected', 'ago', 'already', 'anniversary', 'anthem', 'anything', 'archiving', 'around', 'ask', 'asking', 'asset', 'attack', 'award', 'badly', 'become', 'behind', 'best', 'big', 'bigger', 'blog', 'boss', 'breach', 'budget', 'build', 'burned', 'business', 'call', 'career', 'ceo', 'cfo', 'chance', 'changing', 'cisos', 'civic', 'classically', 'clearly', 'cloud', 'collaboration', 'combined', 'coming', 'comment', 'company', 'compliance', 'congress', 'constantly', 'consultancy', 'consumer', 'continuity', 'corporate', 'corporation', 'could', 'couple', 'course', 'credential', 'curve', 'cyber', 'cyberattacks', 'cybercrime', 'cybercriminals', 'cybersecurity', 'damaging', 'danger', 'date', 'day', 'decade', 'defence', 'defend', 'defending', 'delay', 'deliver', 'department', 'disqus', 'doa', 'done', 'dramatically', 'duty', 'east', 'economic', 'economy', 'educating', 'election', 'email', 'emergence', 'enable', 'end', 'enormity', 'enough', 'ensure', 'enterprise', 'entire', 'equipped', 'era', 'evangelism', 'even', 'event', 'every', 'evidence', 'excuse', 'executive', 'explaining', 'exploiting', 'face', 'fancy', 'fbi', 'fear', 'fifth', 'file', 'filed', 'find', 'fine', 'first', 'fit', 'five', 'focus', 'funding', 'gave', 'get', 'go', 'going', 'government', 'growing', 'hack', 'hacking', 'hard', 'hay', 'headline', 'healthcare', 'heard', 'hearing', 'highlight', 'hipaa', 'home', 'hope', 'hurt', 'impact', 'important', 'improving', 'includes', 'industry', 'influential', 'infrastructure', 'international', 'internet', 'invention', 'issue', 'javascript', 'joining', 'know', 'lan', 'landscape', 'large', 'last', 'letter', 'life', 'like', 'likely', 'linkedin', 'longer', 'look', 'macro', 'make', 'making', 'malware', 'manager', 'many', 'mean', 'microsoft', 'might', 'mimecast', 'modern', 'modernizing', 'money', 'month', 'motivate', 'move', 'nation', 'national', 'necessity', 'need', 'needed', 'nervous', 'network', 'new', 'next', 'night', 'office', 'one', 'opm', 'organization', 'organizationally', 'orgs', 'orlando', 'others', 'particular', 'particularly', 'partisan', 'partner', 'pattern', 'people', 'perimeter', 'personal', 'personally', 'please', 'point', 'political', 'politics', 'polymorphic', 'post', 'posted', 'powered', 'prepared', 'president', 'price', 'prior', 'prioritized', 'priority', 'private', 'pro', 'process', 'progress', 'project', 'promise', 'protecting', 'protection', 'public', 'publication', 'question', 'quickly', 'ransomware', 'rather', 'real', 'reason', 'reassuring', 'related', 'rely', 'remediation', 'representation', 'resellers', 'rethink', 'rising', 'robot', 'rsa', 'saas', 'sale', 'second', 'sector', 'security', 'see', 'seeing', 'sense', 'several', 'share', 'show', 'significant', 'solution', 'sony', 'speaking', 'spend', 'spending', 'stack', 'state', 'still', 'strategist', 'strategy', 'successor', 'target', 'technology', 'temptation', 'thought', 'threat', 'tide', 'today', 'top', 'topic', 'traditional', 'trojan', 'two', 'universal', 'unless', 'updated', 'updating', 'used', 'usually', 'variety', 'vendor', 'verified', 'veteran', 'victim', 'view', 'virus', 'voter', 'waking', 'wall', 'want', 'warfare', 'way', 'welcome', 'well', 'whatever', 'whitehouse', 'win', 'winner', 'wisely', 'worked', 'working', 'world', 'worry', 'writing', 'year', 'yet'] | |
526 | |
527 | |
528 | |
528 2017-03-06T18:30:47.747000Z https://owasp.blogspot.de/2017/03/owasp-operations-update-for-march-2017.html | |
528 2017-03-28T00:30:55.698000Z https://owasp.blogspot.de/2017/03/march-2017-connector.html | |
['accepted', 'across', 'activity', 'add', 'added', 'aka', 'also', 'appsec', 'available', 'blog', 'blogthis', 'broader', 'call', 'change', 'check', 'code', 'communication', 'community', 'company', 'complete', 'conference', 'content', 'corporate', 'create', 'cs', 'deploy', 'detail', 'donation', 'email', 'eu', 'event', 'facebook', 'feel', 'first', 'flagship', 'forward', 'foundation', 'free', 'github', 'global', 'go', 'goal', 'going', 'google', 'greater', 'handbook', 'happening', 'host', 'hosting', 'http', 'include', 'including', 'incubator', 'infrastructure', 'kelly', 'know', 'lab', 'leader', 'london', 'make', 'management', 'many', 'matt', 'meeting', 'member', 'membership', 'model', 'month', 'multiple', 'new', 'operation', 'organization', 'owasp', 'page', 'pinterest', 'post', 'posted', 'previous', 'process', 'program', 'progress', 'project', 'purpose', 'request', 'resource', 'review', 'running', 'selected', 'series', 'session', 'share', 'single', 'software', 'soon', 'staff', 'start', 'started', 'still', 'submitted', 'summit', 'system', 'target', 'tesauro', 'tiffany', 'time', 'topic', 'twitter', 'two', 'update', 'updating', 'use', 'using', 'version', 'via', 'web', 'website', 'week', 'welcome', 'work', 'world', 'year'] | |
529 | |
530 | |
531 | |
532 | |
532 2017-03-23T18:34:09.992000Z http://www.welivesecurity.com/2010/08/25/rise-of-the-machines-navy-uav-goes-awol-malware-or-skynet/ | |
532 2017-03-27T12:33:46.135000Z https://www.welivesecurity.com/2010/08/25/rise-of-the-machines-navy-uav-goes-awol-malware-or-skynet/ | |
['ability', 'able', 'abta', 'access', 'according', 'action', 'actually', 'adaptor', 'add', 'additionally', 'adiz', 'advanced', 'afterward', 'air', 'aircraft', 'airliner', 'airplane', 'airspace', 'al', 'alarm', 'alert', 'alive', 'allowed', 'also', 'android', 'announcement', 'anomaly', 'anonymizer', 'anonymous', 'another', 'anyone', 'app', 'appears', 'appropriate', 'archive', 'armament', 'armed', 'arsenal', 'article', 'assembled', 'attack', 'attempt', 'attempted', 'attempting', 'attribution', 'author', 'autogenerated', 'autorun', 'aviation', 'avoided', 'away', 'awol', 'back', 'background', 'become', 'becoming', 'begin', 'believe', 'bidder', 'blame', 'blamed', 'blog', 'blogger', 'bot', 'botnet', 'botnets', 'breach', 'breaking', 'building', 'call', 'came', 'capable', 'capt', 'carrying', 'cause', 'central', 'century', 'certain', 'charles', 'check', 'cheek', 'circumstance', 'civilian', 'clarified', 'clarity', 'classified', 'clearly', 'code', 'combat', 'command', 'comment', 'commercial', 'common', 'commonly', 'community', 'company', 'complete', 'compromised', 'computer', 'concern', 'conclusion', 'conference', 'confirmed', 'connected', 'considering', 'conspiracy', 'contact', 'content', 'context', 'contractor', 'contributed', 'contributing', 'control', 'copyright', 'corporation', 'crash', 'crazy', 'crew', 'criminal', 'cyber', 'cybercrime', 'cybermercenaries', 'cybersecurity', 'cyberwar', 'cyberwarfare', 'damage', 'data', 'david', 'dbir', 'dc', 'de', 'deactivate', 'dealing', 'debate', 'decorated', 'defeating', 'defend', 'defense', 'defensive', 'definitely', 'demonstrated', 'deputy', 'designed', 'destroy', 'detail', 'detect', 'deutsch', 'developed', 'deviation', 'diego', 'direct', 'direction', 'directly', 'disaster', 'distinction', 'div', 'diverted', 'documented', 'dod', 'doe', 'done', 'door', 'downing', 'drone', 'due', 'dunigan', 'economics', 'el', 'else', 'email', 'embed', 'en', 'english', 'enters', 'entire', 'equally', 'error', 'eset', 'español', 'essence', 'even', 'examine', 'experience', 'expert', 'extent', 'facebook', 'factor', 'failed', 'fatal', 'finding', 'finest', 'fire', 'firescout', 'first', 'flight', 'follow', 'force', 'forecast', 'foreign', 'found', 'friend', 'fu', 'future', 'gained', 'gateway', 'georgia', 'given', 'global', 'go', 'gone', 'government', 'ground', 'grounded', 'group', 'grumman', 'hacker', 'hacking', 'happening', 'hard', 'harley', 'headquarters', 'hear', 'helicopter', 'hellfire', 'highest', 'history', 'hit', 'hollywood', 'home', 'hot', 'hour', 'however', 'http', 'humanity', 'identified', 'idiot', 'important', 'inbox', 'incentive', 'incident', 'incline', 'include', 'includes', 'indeed', 'indicated', 'indication', 'individual', 'infected', 'information', 'insight', 'installed', 'intelligence', 'intentionally', 'interested', 'interfered', 'internal', 'interruption', 'involved', 'ip', 'ir', 'issue', 'jeter', 'junior', 'keeping', 'kill', 'kindly', 'kinetic', 'know', 'kung', 'language', 'last', 'late', 'latest', 'least', 'left', 'legal', 'level', 'line', 'link', 'linkedin', 'located', 'loss', 'lost', 'love', 'lynn', 'machine', 'made', 'madrid', 'magazine', 'mainframe', 'maintenance', 'mallorca', 'malware', 'manager', 'material', 'mean', 'measure', 'medium', 'might', 'mile', 'military', 'mishap', 'missile', 'modification', 'monetary', 'monitor', 'month', 'monumental', 'moss', 'motive', 'multimedia', 'music', 'must', 'national', 'naval', 'navigation', 'navy', 'need', 'network', 'news', 'newsletter', 'next', 'nmci', 'norfolk', 'northrop', 'note', 'official', 'often', 'onboard', 'one', 'onto', 'open', 'operated', 'operating', 'operator', 'opinion', 'order', 'organized', 'originally', 'originated', 'others', 'outline', 'outside', 'page', 'paired', 'pais', 'palma', 'panicking', 'paper', 'part', 'partially', 'particularly', 'partner', 'partnered', 'partnering', 'pathway', 'penetrate', 'penetrating', 'pentagon', 'people', 'perceived', 'perhaps', 'pilot', 'plane', 'playing', 'podcasts', 'point', 'pointed', 'policy', 'popular', 'post', 'posted', 'posting', 'potentially', 'pr', 'precaution', 'precision', 'prevent', 'previously', 'primary', 'print', 'privacy', 'problem', 'problematic', 'procedure', 'program', 'programmed', 'project', 'properly', 'proponent', 'provide', 'questioning', 'racked', 'radar', 'ransomware', 'rather', 'read', 'realize', 'realizing', 'really', 'reason', 'recent', 'related', 'relationship', 'released', 'remind', 'remotely', 'removable', 'remove', 'renting', 'report', 'research', 'reserved', 'resolved', 'response', 'responsible', 'restricted', 'restriction', 'result', 'reward', 'right', 'rise', 'robot', 'rogue', 'role', 'ruled', 'said', 'san', 'saved', 'say', 'sc', 'scada', 'scam', 'scout', 'script', 'seaman', 'search', 'secdef', 'security', 'see', 'select', 'selling', 'sentience', 'seriously', 'served', 'server', 'several', 'shipmate', 'shortly', 'shut', 'sign', 'significant', 'similar', 'simply', 'since', 'site', 'sitemap', 'skynet', 'sniping', 'softly', 'software', 'source', 'spanair', 'specifically', 'speculative', 'statement', 'stealing', 'still', 'storyline', 'stronger', 'structure', 'stuxnet', 'stylesheet', 'successful', 'successfully', 'syndicate', 'system', 'tactic', 'tactical', 'take', 'takeaway', 'takeoff', 'target', 'targeted', 'technical', 'tell', 'tend', 'tends', 'terminated', 'terminator', 'tertiary', 'theme', 'theory', 'thing', 'threat', 'threatblog', 'three', 'tim', 'time', 'today', 'toggle', 'tongue', 'topic', 'tow', 'tradition', 'transparency', 'triggered', 'trojan', 'trolling', 'truly', 'trust', 'twitter', 'two', 'type', 'uav', 'ultimate', 'umpteen', 'undecided', 'understand', 'universal', 'unless', 'unrelated', 'update', 'upwards', 'urge', 'usability', 'usb', 'use', 'used', 'using', 'vector', 'vehicle', 'video', 'view', 'virus', 'warfare', 'warning', 'washington', 'weapon', 'wechseln', 'well', 'whats', 'whether', 'white', 'wikipedia', 'without', 'wls', 'wondering', 'word', 'work', 'would', 'year', 'yet', 'youtube', 'zombie', 'zum'] | |
533 | |
533 2017-03-15T12:31:14.467000Z http://www.itsecurityguru.org/2017/03/15/9-10-security-pros-surveyed-favor-experience-qualifications-firemon/ | |
533 2017-03-15T12:31:19.468000Z http://www.itsecurityguru.org/2017/03/15/new-research-finds-uk-consumers-fear-data-theft-apps/ | |
533 2017-03-15T12:31:23.951000Z http://www.itsecurityguru.org/2017/03/15/cyber-threat-rise-uk-businesses-ncsc-nca-report/ | |
533 2017-03-15T12:31:49.014000Z http://www.itsecurityguru.org/2017/03/15/sap-rushes-patch-cyber-security-flaws-hana/ | |
533 2017-03-15T12:31:56.957000Z http://www.itsecurityguru.org/2017/03/15/machine-learning-can-also-aid-cyber-enemy-nsa-research-head/ | |
533 2017-03-15T18:31:24.566000Z http://www.itsecurityguru.org/2017/03/15/twitter-breach-forces-verified-accounts-send-nazi-propaganda/ | |
533 2017-03-15T18:31:13.469000Z http://www.itsecurityguru.org/2017/03/15/9-10-security-pros-surveyed-favour-experience-qualifications-firemon/ | |
['ability', 'ad', 'administrator', 'advanced', 'affect', 'afraid', 'ago', 'aid', 'air', 'also', 'american', 'amidst', 'anderson', 'android', 'anonabox', 'application', 'appreciate', 'appriver', 'approves', 'around', 'article', 'arturplavnik', 'ask', 'atm', 'attack', 'back', 'backlash', 'badly', 'ban', 'bank', 'banking', 'bid', 'biggest', 'binary', 'biometrics', 'blind', 'board', 'botnet', 'breach', 'broadly', 'build', 'bulletin', 'business', 'campaign', 'chamois', 'change', 'citibank', 'cm', 'combat', 'comment', 'communication', 'community', 'couple', 'creating', 'criminal', 'critical', 'cybe', 'cyber', 'cyberhacklords', 'cybersecurity', 'data', 'date', 'ddos', 'depot', 'detail', 'developer', 'development', 'doe', 'dtmf', 'ebay', 'editor', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enemy', 'enough', 'enterprise', 'environment', 'eset', 'eu', 'event', 'explain', 'expose', 'express', 'facebook', 'family', 'find', 'finnish', 'flaw', 'follow', 'force', 'ford', 'fraud', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'goodbye', 'google', 'got', 'government', 'grip', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'hana', 'head', 'hello', 'help', 'helped', 'hitting', 'hold', 'home', 'hospital', 'hour', 'http', 'huge', 'impact', 'imposter', 'improve', 'incident', 'including', 'information', 'infosec', 'infosecurity', 'inside', 'instagram', 'jay', 'jesse', 'know', 'landmark', 'latest', 'law', 'leak', 'learning', 'leave', 'lee', 'link', 'linkedin', 'literacy', 'lizard', 'look', 'lure', 'machine', 'making', 'malware', 'many', 'massive', 'met', 'microsoft', 'mind', 'mitigation', 'mixed', 'nazi', 'ne', 'need', 'netflix', 'new', 'news', 'next', 'nsa', 'num', 'officer', 'open', 'operation', 'option', 'password', 'patch', 'pay', 'paypal', 'persistent', 'pervasive', 'phishing', 'phone', 'platform', 'pm', 'popular', 'posted', 'postin', 'previous', 'primary', 'privacy', 'professional', 'propaganda', 'protecting', 'protection', 'quality', 'ramond', 'ransomware', 'really', 'recent', 'regulation', 'related', 'release', 'remains', 'research', 'response', 'retailer', 'return', 'rich', 'rise', 'risk', 'round', 'run', 'rush', 'sale', 'sap', 'scam', 'secret', 'security', 'sensitive', 'service', 'settlement', 'share', 'shortage', 'shuts', 'sign', 'skill', 'smart', 'software', 'sort', 'source', 'spam', 'spot', 'spread', 'squad', 'stock', 'story', 'supporter', 'surveillance', 'swastika', 'tackle', 'tag', 'tagged', 'talking', 'target', 'technology', 'ten', 'term', 'themed', 'thing', 'threat', 'time', 'today', 'top', 'trading', 'tremendous', 'trend', 'turning', 'tweet', 'twitter', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'video', 'viral', 'vulnerability', 'walcot', 'warns', 'weak', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'within', 'working', 'worse', 'year'] | |
535 | |
535 2017-03-18T18:30:47.817000Z https://www.bleepingcomputer.com/news/software/apples-swift-becomes-top-10-programming-language-for-the-first-time/ | |
535 2017-03-18T18:30:53.680000Z https://www.bleepingcomputer.com/news/security/polish-authorities-confirm-hack-of-bitcurex-bitcoin-exchange-launch-investigation/ | |
['abusive', 'accessing', 'account', 'accused', 'ad', 'admin', 'advertisement', 'advertising', 'adwcleaner', 'agreement', 'allowed', 'also', 'alureon', 'andromeda', 'anonymously', 'antivirus', 'apple', 'article', 'authority', 'back', 'backdoor', 'becomes', 'best', 'bitcoin', 'bitcurex', 'bleeping', 'bleepingcomputer', 'botnet', 'breach', 'bsod', 'captain', 'catalin', 'category', 'certification', 'changelog', 'chat', 'chrome', 'cimpanu', 'close', 'combofix', 'command', 'comment', 'communication', 'community', 'company', 'compromised', 'computer', 'confirm', 'contact', 'content', 'controller', 'copy', 'copyright', 'coupon', 'course', 'cover', 'crash', 'cryptodefense', 'cryptodevil', 'cryptolocker', 'cryptomix', 'crypton', 'cryptorbit', 'cryptosearch', 'dark', 'data', 'database', 'deal', 'decryptor', 'disable', 'downloaded', 'downloads', 'driver', 'elearning', 'emergency', 'emsisoft', 'english', 'entered', 'exchange', 'exploit', 'extension', 'facebook', 'failed', 'faq', 'featured', 'feed', 'file', 'find', 'first', 'folder', 'follow', 'form', 'former', 'forum', 'gadget', 'gear', 'glossary', 'going', 'good', 'google', 'guide', 'hack', 'hacking', 'hang', 'harmful', 'help', 'hidden', 'home', 'howdecrypt', 'hp', 'inappropriate', 'information', 'install', 'installed', 'instruction', 'investigation', 'irc', 'kirk', 'kit', 'language', 'latest', 'launch', 'launched', 'launcher', 'learn', 'leaving', 'license', 'like', 'llc', 'locker', 'locky', 'log', 'login', 'main', 'mainly', 'malware', 'manager', 'medium', 'member', 'mode', 'month', 'msevents', 'na', 'need', 'network', 'news', 'newsletter', 'offline', 'order', 'password', 'pci', 'periodic', 'petrwrap', 'platform', 'please', 'policy', 'polish', 'popular', 'post', 'posted', 'potplayer', 'prangster', 'previous', 'privacy', 'problem', 'product', 'program', 'programming', 'prompt', 'rakhnidecryptor', 'ransomware', 'receive', 'recognize', 'recover', 'redirects', 'register', 'remember', 'removal', 'remove', 'reporter', 'reserved', 'resource', 'revenge', 'right', 'rkill', 'rootkit', 'rule', 'safe', 'savenshare', 'screen', 'section', 'security', 'securitytool', 'see', 'shadow', 'show', 'sign', 'simple', 'sitemap', 'social', 'software', 'source', 'spam', 'spyware', 'start', 'started', 'startup', 'strong', 'submit', 'submitting', 'support', 'swift', 'task', 'tdss', 'tdsskiller', 'teacher', 'technology', 'time', 'tool', 'toolbar', 'top', 'topic', 'trojan', 'tutorial', 'twice', 'twitter', 'two', 'understand', 'uninstall', 'update', 'use', 'useful', 'user', 'username', 'using', 'various', 'version', 'viewed', 'virtumonde', 'virus', 'vista', 'volume', 'vulnerability', 'web', 'week', 'welcome', 'window', 'winfixer', 'within', 'wo', 'work', 'worm', 'write', 'written', 'yet'] | |
536 | |
536 2017-03-01T06:31:17.050000Z http://www.welivesecurity.com/2011/11/27/facebook-christmas-tree-virus-its-still-a-hoax/ | |
536 2017-03-09T18:31:28.720000Z http://www.welivesecurity.com/videos/spot-facebook-hoax/ | |
536 2017-03-27T12:32:24.094000Z https://www.welivesecurity.com/videos/spot-facebook-hoax/ | |
['app', 'code', 'email', 'eset', 'facebook', 'friend', 'hoax', 'information', 'know', 'message', 'page', 'posted', 'print', 'research', 'virus', 'whats'] | |
537 | |
537 2017-03-21T12:30:53.183000Z http://csoonline.com/article/3182879/security/report-says-smart-people-do-dumb-things-online.html | |
537 2017-03-21T12:30:52.535000Z http://csoonline.com/article/3183464/security/mozilla-beats-rivals-patches-firefoxs-pwn2own-bug.html | |
['additional', 'address', 'alert', 'alexa', 'already', 'amazon', 'analysis', 'app', 'appliance', 'array', 'article', 'available', 'boost', 'brandposts', 'breach', 'brochure', 'bundle', 'buyer', 'byod', 'carol', 'center', 'christmas', 'cloud', 'cloudy', 'code', 'comma', 'comment', 'company', 'concern', 'consider', 'considered', 'constantly', 'content', 'contest', 'controlling', 'cooking', 'cost', 'could', 'coverage', 'credit', 'cso', 'cybersecurity', 'cyberthreats', 'data', 'dead', 'deal', 'developing', 'digital', 'discount', 'discounted', 'download', 'dumb', 'dummy', 'easy', 'ebook', 'eliminate', 'email', 'emailing', 'employee', 'end', 'enjoy', 'enterprise', 'environment', 'error', 'escape', 'evaluate', 'everything', 'existing', 'expected', 'extender', 'facebook', 'featured', 'field', 'fire', 'fit', 'flash', 'follow', 'following', 'food', 'free', 'friend', 'gartner', 'george', 'get', 'go', 'going', 'guide', 'hack', 'hacked', 'hacking', 'headline', 'home', 'increasingly', 'industry', 'inhibit', 'inside', 'instant', 'instantly', 'intel', 'know', 'latest', 'lazy', 'leadership', 'learn', 'legal', 'let', 'life', 'light', 'like', 'link', 'machine', 'made', 'magic', 'management', 'master', 'meat', 'memory', 'message', 'might', 'mobility', 'move', 'much', 'multiple', 'need', 'netgear', 'network', 'new', 'news', 'newsletter', 'next', 'online', 'page', 'paper', 'participant', 'people', 'perfect', 'plug', 'policy', 'popular', 'price', 'privacy', 'protecting', 'protectwise', 'pt', 'quadrant', 'range', 'ransomware', 'read', 'related', 'reliable', 'religious', 'report', 'researcher', 'resource', 'right', 'roundtable', 'russian', 'say', 'secure', 'security', 'sent', 'sentinelone', 'separate', 'service', 'sign', 'sink', 'smart', 'sorry', 'spam', 'sponsored', 'standard', 'start', 'storage', 'story', 'stream', 'suite', 'switch', 'tablet', 'team', 'tech', 'terabyte', 'thank', 'thermometer', 'thermopro', 'thing', 'throughout', 'time', 'trend', 'twitter', 'two', 'update', 'use', 'using', 'vendor', 'video', 'virtual', 'visit', 'washington', 'wemo', 'wherever', 'white', 'wifi', 'work', 'yahoo', 'zone'] | |
538 | |
540 | |
541 | |
542 | |
542 2017-03-17T12:30:55.096000Z http://www.welivesecurity.com/2017/03/17/number-women-infosec-industry-remains-stagnant/ | |
542 2017-03-27T12:31:19.455000Z https://www.welivesecurity.com/2017/03/17/number-women-infosec-industry-remains-stagnant/ | |
['access', 'add', 'agrees', 'ahead', 'al', 'also', 'america', 'android', 'app', 'archive', 'article', 'author', 'authority', 'average', 'biennial', 'blog', 'breach', 'bridge', 'business', 'career', 'carry', 'center', 'ceo', 'challenging', 'claimed', 'clear', 'code', 'come', 'community', 'compared', 'conference', 'consumer', 'contact', 'continues', 'copyright', 'could', 'counterpart', 'currently', 'cyber', 'cybersecurity', 'cyberthreat', 'data', 'david', 'de', 'degree', 'depot', 'despite', 'deutsch', 'direct', 'discrimination', 'disparity', 'div', 'earn', 'education', 'email', 'embed', 'en', 'encourage', 'english', 'eset', 'español', 'even', 'exacerbating', 'examining', 'exciting', 'experienced', 'expert', 'facebook', 'fact', 'felt', 'female', 'field', 'finding', 'first', 'follow', 'form', 'found', 'friend', 'gap', 'global', 'go', 'google', 'grow', 'help', 'higher', 'hold', 'home', 'hot', 'however', 'http', 'inbox', 'industry', 'information', 'infosec', 'insight', 'interested', 'ir', 'isc', 'job', 'lack', 'language', 'large', 'latest', 'latin', 'launch', 'leadership', 'legal', 'level', 'likely', 'link', 'linkedin', 'live', 'lower', 'lucrative', 'magazine', 'main', 'male', 'malware', 'material', 'member', 'men', 'might', 'million', 'month', 'multimedia', 'must', 'narinder', 'navigation', 'new', 'news', 'newsletter', 'north', 'number', 'occupy', 'one', 'opinion', 'outlined', 'page', 'paper', 'play', 'podcasts', 'policy', 'popular', 'position', 'post', 'posted', 'potential', 'print', 'privacy', 'professional', 'program', 'purba', 'qualified', 'radar', 'ransomware', 'read', 'reason', 'related', 'remain', 'report', 'research', 'reserved', 'resource', 'right', 'role', 'safety', 'said', 'salary', 'search', 'security', 'see', 'seen', 'select', 'settlement', 'shearer', 'shortage', 'sign', 'significant', 'site', 'sitemap', 'skill', 'skilled', 'solution', 'sponsorship', 'standard', 'stylesheet', 'subsequently', 'successful', 'suggesting', 'time', 'toggle', 'topic', 'twitter', 'uk', 'untapped', 'valuable', 'valued', 'video', 'view', 'virus', 'wechseln', 'well', 'whats', 'white', 'within', 'wls', 'woman', 'worker', 'workforce', 'working', 'yet', 'young', 'youtube', 'zum'] | |
543 | |
544 | |
545 | |
545 2017-03-14T18:30:53.011000Z https://www.helpnetsecurity.com/2017/03/14/us-air-force-data-exposed-online/ | |
545 2017-03-22T18:30:58.145000Z https://securityledger.com/2017/03/nas-holes-air-force-data-leak-the-tip-of-very-large-iceberg/ | |
['air', 'data', 'exposed', 'force', 'found', 'sensitive'] | |
546 | |
548 | |
548 2017-03-14T18:30:45.827000Z https://veracode.com/blog/security-news/how-we-were-able-respond-struts-shock-our-customers | |
548 2017-03-18T00:30:55.243000Z http://www.veracode.com/blog/security-news/how-we-were-able-respond-struts-shock-our-customers | |
['able', 'accept', 'accomplished', 'active', 'addition', 'address', 'analysis', 'another', 'apache', 'application', 'approach', 'approximately', 'apps', 'around', 'astaro', 'attractive', 'available', 'back', 'began', 'blog', 'breach', 'business', 'calling', 'check', 'chris', 'code', 'combated', 'combined', 'comment', 'communication', 'company', 'component', 'composition', 'contained', 'content', 'corporate', 'create', 'created', 'creating', 'cried', 'critical', 'criticality', 'crucial', 'cto', 'customer', 'cybercriminal', 'cybercriminals', 'database', 'date', 'day', 'decade', 'delay', 'determine', 'development', 'devops', 'difficulty', 'disclosed', 'disclosure', 'educate', 'effect', 'effort', 'email', 'embrace', 'enables', 'engage', 'essence', 'exactly', 'executable', 'expect', 'exploit', 'exploitable', 'extremely', 'far', 'felt', 'field', 'find', 'finding', 'finished', 'fixed', 'form', 'found', 'get', 'go', 'happened', 'hard', 'heartbleed', 'held', 'help', 'highly', 'home', 'homepage', 'identify', 'incident', 'include', 'included', 'increase', 'industry', 'information', 'inspire', 'instance', 'instead', 'inventory', 'involvement', 'java', 'jessica', 'kept', 'knew', 'know', 'known', 'lack', 'lavery', 'leading', 'least', 'led', 'let', 'letting', 'like', 'make', 'many', 'marked', 'marketing', 'mean', 'missed', 'mollom', 'name', 'need', 'new', 'news', 'next', 'notified', 'number', 'occur', 'offer', 'one', 'open', 'original', 'page', 'part', 'partner', 'patching', 'penetrate', 'percent', 'place', 'plan', 'platform', 'please', 'policy', 'portfolio', 'post', 'potential', 'potentially', 'powerful', 'previous', 'priority', 'privacy', 'private', 'problem', 'product', 'professional', 'promote', 'provide', 'publicly', 'published', 'purchased', 'question', 'quickly', 'rapid', 'rapidly', 'reached', 'react', 'reason', 'rebuild', 'recent', 'recompile', 'reduce', 'regarding', 'regardless', 'remediate', 'remediated', 'remotely', 'report', 'required', 'requires', 'rescan', 'respond', 'response', 'responsibility', 'review', 'risk', 'risky', 'role', 'saas', 'said', 'sca', 'security', 'see', 'seen', 'share', 'shown', 'single', 'software', 'solution', 'sophos', 'source', 'specific', 'speed', 'spending', 'started', 'state', 'stay', 'strives', 'strut', 'submitted', 'submitting', 'systemic', 'take', 'target', 'team', 'technology', 'testing', 'thing', 'thousand', 'threat', 'time', 'tool', 'topic', 'type', 'update', 'updating', 'use', 'used', 'using', 'veracode', 'version', 'visibility', 'vulnerability', 'vulnerable', 'web', 'well', 'whether', 'within', 'work', 'wysopal', 'year', 'yet'] | |
549 | |
549 2017-03-05T00:41:48.625000Z http://thehackernews.com/2011/05/indian-server-hacked-by-077-hamdi.html | |
549 2017-03-05T00:43:21.765000Z http://thehackernews.com/2011/03/mafia-countryczcc-syriatourismorg.html | |
549 2017-03-05T00:45:00.929000Z http://thehackernews.com/2011/01/652-new-web-sites-hacked-by-hamdi.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'hamdi', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'tunisian', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
550 | |
551 | |
552 | |
553 | |
554 | |
555 | |
555 2017-03-28T18:30:56.536000Z https://digitalguardian.com/blog/top-10-biggest-healthcare-data-breaches-all-time | |
555 2017-03-30T18:31:01.735000Z https://digitalguardian.com/blog/ransomware-epidemic-healthcare-industry | |
['healthcare', 'industry', 'lord', 'nate', 'year'] | |
556 | |
557 | |
558 | |
559 | |
560 | |
561 | |
562 | |
562 2017-03-09T18:30:48.442000Z https://nakedsecurity.sophos.com/2017/03/09/honey-i-wiretapped-the-kids-chet-chat-podcast-259/ | |
562 2017-03-17T18:30:55.801000Z https://nakedsecurity.sophos.com/2017/03/17/if-fridays-an-0-day-what-about-the-weekend-chet-chat-podcast-260/ | |
['access', 'account', 'address', 'android', 'antivirus', 'apple', 'audio', 'author', 'breach', 'breathes', 'bug', 'bundle', 'cancel', 'change', 'chat', 'chester', 'chet', 'click', 'cloud', 'comment', 'commenting', 'computer', 'connecting', 'control', 'cooky', 'detail', 'directory', 'download', 'duckblog', 'ducklin', 'edition', 'email', 'encryption', 'endpoint', 'enduser', 'enjoy', 'enter', 'episode', 'evangelist', 'expert', 'facebook', 'feed', 'fill', 'firewall', 'follow', 'free', 'gateway', 'give', 'google', 'happy', 'home', 'honey', 'icon', 'interested', 'itunes', 'join', 'kid', 'latest', 'leave', 'legal', 'life', 'like', 'linkedin', 'linux', 'listen', 'log', 'mac', 'made', 'mobile', 'naked', 'nakedsecurity', 'name', 'navigation', 'network', 'never', 'passionate', 'paul', 'people', 'player', 'please', 'podcast', 'podcasting', 'post', 'powered', 'previous', 'privacy', 'proselytiser', 'protection', 'public', 'puremessage', 'read', 'recommended', 'reddit', 'regular', 'removal', 'reply', 'reserved', 'responsibly', 'right', 'safeguard', 'secure', 'security', 'send', 'server', 'share', 'sharepoint', 'sophos', 'soundcloud', 'sscc', 'storage', 'technology', 'tip', 'tool', 'turning', 'twitter', 'using', 'utm', 'via', 'vip', 'virtualization', 'virus', 'vote', 'web', 'website', 'window', 'wiretapped', 'wisniewski', 'working', 'would', 'xg'] | |
563 | |
563 2017-03-29T12:31:11.932000Z http://www.itsecurityguru.org/2017/03/29/timely-new-guide-arms-government-business-leaders-cybersecurity-tactics/ | |
563 2017-03-29T12:31:15.816000Z http://www.itsecurityguru.org/2017/03/29/iod-barclays-third-businesses-lack-formal-strategy-cyber-attack/ | |
563 2017-03-29T12:31:34.746000Z http://www.itsecurityguru.org/2017/03/29/apple-squashes-cert-handling-bug-affecting-macos-ios/ | |
563 2017-03-29T12:31:38.345000Z http://www.itsecurityguru.org/2017/03/29/ai-machine-learning-not-ready-prime-time/ | |
563 2017-03-29T12:31:40.104000Z http://www.itsecurityguru.org/2017/03/29/cyber-security-report-shows-increase-threat-servers/ | |
563 2017-03-29T12:31:41.844000Z http://www.itsecurityguru.org/2017/03/29/fbi-warns-healthcare-entities-threats-ftp-servers/ | |
563 2017-03-29T18:31:12.754000Z http://www.itsecurityguru.org/2017/03/29/firemons-intelligent-security-management-ism-platform-review/ | |
['ability', 'able', 'ad', 'administrator', 'advanced', 'affecting', 'afraid', 'ago', 'ai', 'american', 'amidst', 'anonabox', 'another', 'answer', 'apple', 'application', 'appriver', 'approves', 'around', 'article', 'ask', 'atm', 'attack', 'back', 'backlash', 'bank', 'banking', 'best', 'biggest', 'billion', 'binary', 'biometrics', 'blind', 'board', 'breach', 'broadly', 'bug', 'bugfinders', 'build', 'business', 'campaign', 'change', 'cheating', 'citibank', 'cm', 'combat', 'comment', 'community', 'creating', 'crimina', 'criminal', 'cyber', 'cybersecurity', 'data', 'date', 'ddos', 'development', 'doe', 'drone', 'ebay', 'editor', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'entity', 'environment', 'erase', 'eset', 'eu', 'even', 'event', 'evidence', 'experience', 'explain', 'express', 'facebook', 'family', 'fbi', 'find', 'finnish', 'fix', 'flaw', 'follow', 'fraud', 'ftp', 'fund', 'game', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'good', 'goodbye', 'got', 'government', 'grid', 'grip', 'guru', 'gushi', 'hack', 'hacked', 'hacker', 'hacking', 'harder', 'healthcare', 'help', 'hitting', 'home', 'hospital', 'hour', 'http', 'husband', 'impact', 'imposter', 'improve', 'incident', 'increase', 'information', 'infosec', 'infosecurity', 'inside', 'io', 'ithings', 'john', 'keep', 'king', 'know', 'korea', 'landmark', 'lastpass', 'law', 'learning', 'leave', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'macos', 'major', 'making', 'malware', 'many', 'mitigation', 'nato', 'netflix', 'new', 'news', 'next', 'num', 'one', 'open', 'operation', 'option', 'paypal', 'persistent', 'person', 'pervasive', 'peter', 'phishing', 'platform', 'pm', 'police', 'popular', 'posted', 'previous', 'primary', 'prime', 'privacy', 'probe', 'protecting', 'protection', 'ransomware', 'ready', 'recent', 'regime', 'regulation', 'related', 'remains', 'report', 'researcher', 'response', 'retailer', 'return', 'rich', 'rise', 'risk', 'rob', 'rocker', 'rocket', 'round', 'run', 'safe', 'sale', 'satellite', 'satnav', 'scam', 'scramble', 'security', 'sensitive', 'server', 'share', 'shortage', 'show', 'sign', 'skill', 'software', 'sort', 'source', 'spam', 'spend', 'spoofing', 'spot', 'spotted', 'squad', 'squash', 'stock', 'story', 'supporter', 'tackle', 'tag', 'tagged', 'talking', 'target', 'technology', 'ten', 'term', 'th', 'themed', 'thing', 'think', 'threat', 'time', 'today', 'top', 'trading', 'trend', 'trump', 'turning', 'tweet', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'verywell', 'video', 'viral', 'vulnerability', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'within', 'working', 'worse', 'year'] | |
564 | |
565 | |
567 | |
568 | |
569 | |
569 2017-03-10T00:30:55.174000Z https://www.root9b.com/newsroom/preventing-9-steps-domain-collapse | |
569 2017-03-10T06:30:53.835000Z https://www.root9b.com/newsroom/orkos-preventing-9-steps-domain-collapse | |
['able', 'access', 'account', 'across', 'admin', 'administrator', 'affected', 'aid', 'allow', 'also', 'analysis', 'analytic', 'another', 'appear', 'application', 'around', 'article', 'assessment', 'assume', 'attacker', 'authenticated', 'automatically', 'back', 'believe', 'biggest', 'blind', 'box', 'brainpower', 'browser', 'capability', 'card', 'change', 'clone', 'collapse', 'collected', 'collection', 'common', 'complete', 'compromise', 'compromised', 'configuration', 'control', 'controller', 'could', 'cracking', 'credential', 'da', 'day', 'dc', 'defender', 'depth', 'detect', 'detecting', 'difficult', 'disk', 'document', 'documented', 'domain', 'doubt', 'download', 'easy', 'either', 'eliminate', 'end', 'engine', 'entire', 'enumerate', 'enumeration', 'escalation', 'especially', 'evaluating', 'every', 'example', 'expand', 'explained', 'exploitation', 'feature', 'find', 'finding', 'fix', 'following', 'forgotten', 'front', 'full', 'get', 'getting', 'given', 'good', 'granting', 'graph', 'greatest', 'hash', 'help', 'high', 'http', 'identify', 'instead', 'internal', 'investigation', 'key', 'kind', 'large', 'le', 'least', 'like', 'line', 'link', 'local', 'log', 'logged', 'machine', 'making', 'managemen', 'manual', 'match', 'matt', 'matter', 'memory', 'misconfigured', 'nearly', 'neil', 'network', 'newsroom', 'nmap', 'node', 'normal', 'notably', 'nothing', 'obtain', 'one', 'organization', 'organizational', 'orkos', 'overly', 'password', 'path', 'pending', 'person', 'perspective', 'point', 'policy', 'port', 'pose', 'post', 'posted', 'preventing', 'primary', 'prioritize', 'privilege', 'privileged', 'problem', 'process', 'provides', 'quickly', 'reach', 'reading', 'recent', 'recommendation', 'remains', 'remediation', 'remote', 'remotely', 'required', 'result', 'reveal', 'right', 'risk', 'saved', 'scan', 'scanned', 'scanner', 'scripting', 'security', 'see', 'server', 'service', 'shared', 'showing', 'significant', 'simulated', 'since', 'single', 'smart', 'snowballing', 'software', 'specific', 'spot', 'ssh', 'stage', 'standard', 'state', 'step', 'straightforward', 'strength', 'strengthen', 'structure', 'system', 'take', 'target', 'team', 'technology', 'ten', 'test', 'testing', 'thorough', 'thousand', 'tied', 'tool', 'unaware', 'uncommon', 'uniqueness', 'use', 'used', 'user', 'using', 'usually', 'various', 'vuln', 'vulnerability', 'vulnerable', 'way', 'weak', 'weakness', 'week', 'well', 'workstation', 'yet'] | |
570 | |
572 | |
572 2017-03-09T18:31:38.033000Z http://www.welivesecurity.com/2014/05/15/hacked-kate-middleton-phone-155-times/ | |
572 2017-03-27T12:32:46.682000Z https://www.welivesecurity.com/2014/05/15/hacked-kate-middleton-phone-155-times/ | |
['access', 'accessed', 'admitted', 'aide', 'also', 'always', 'another', 'app', 'around', 'arrest', 'aside', 'ask', 'asked', 'associated', 'attacker', 'author', 'barrel', 'believing', 'boxing', 'breaking', 'cambridge', 'celebrity', 'chance', 'charge', 'chelsy', 'christmas', 'claimed', 'clive', 'cluley', 'collecting', 'completely', 'conducted', 'confident', 'continued', 'convenient', 'could', 'course', 'court', 'cressida', 'crown', 'day', 'default', 'defence', 'difficult', 'digit', 'disappeared', 'driven', 'duchess', 'editor', 'email', 'end', 'eve', 'even', 'extent', 'fake', 'family', 'festive', 'first', 'former', 'four', 'friend', 'fun', 'future', 'genuine', 'girlfriend', 'goodman', 'graham', 'greater', 'guess', 'hack', 'hacked', 'hacking', 'handset', 'harry', 'highest', 'house', 'however', 'hungry', 'inboxes', 'individual', 'inquiry', 'intercepting', 'jailed', 'journalist', 'journey', 'kate', 'kingdom', 'last', 'laugh', 'least', 'level', 'life', 'little', 'live', 'london', 'longer', 'made', 'make', 'making', 'many', 'maybe', 'mean', 'meanwhile', 'message', 'metropolitan', 'might', 'miss', 'mobile', 'month', 'needing', 'network', 'never', 'news', 'newspaper', 'nine', 'nuisance', 'number', 'occasion', 'operator', 'order', 'page', 'pain', 'phone', 'pin', 'place', 'police', 'possible', 'posted', 'presumably', 'previously', 'prince', 'print', 'privacy', 'private', 'problem', 'properly', 'prosecution', 'prosecutor', 'protected', 'provide', 'question', 'realise', 'recently', 'recognise', 'register', 'regularly', 'remained', 'remotely', 'reporter', 'request', 'resetting', 'revelation', 'ring', 'ringing', 'romantically', 'royal', 'said', 'scoop', 'search', 'secured', 'security', 'service', 'set', 'showed', 'simply', 'skirt', 'snoop', 'snooping', 'solitary', 'someone', 'staggering', 'stop', 'story', 'system', 'tabloid', 'thankfully', 'therefore', 'think', 'thirst', 'time', 'told', 'took', 'tricked', 'tricking', 'true', 'two', 'uk', 'united', 'unlawful', 'unlocked', 'upon', 'used', 'using', 'voicemail', 'vulnerable', 'way', 'whats', 'whenever', 'william', 'without', 'work', 'world', 'worth', 'yes'] | |
573 | |
573 2017-03-10T06:30:53.725000Z http://securityaffairs.co/wordpress/57023/deep-web/playstation-accounts-dark-web.html | |
573 2017-03-21T12:30:48.772000Z http://securityaffairs.co/wordpress/57300/deep-web/gmail-yahoo-accounts-dark-web.html | |
['account', 'added', 'affair', 'agency', 'ago', 'also', 'analyst', 'app', 'apt', 'archive', 'article', 'author', 'awareness', 'back', 'belief', 'best', 'blog', 'book', 'breach', 'btc', 'certified', 'chief', 'cia', 'clear', 'code', 'colleague', 'confirmed', 'contact', 'contain', 'content', 'cookie', 'copyright', 'council', 'credential', 'crime', 'currency', 'cyber', 'dark', 'data', 'day', 'deep', 'defense', 'digital', 'directly', 'dump', 'ec', 'email', 'enisa', 'ethical', 'european', 'evangelist', 'even', 'execution', 'experience', 'expert', 'extended', 'field', 'find', 'firm', 'first', 'flaw', 'forum', 'founded', 'freelance', 'gmail', 'go', 'group', 'hacker', 'hacking', 'hackread', 'hacktivism', 'home', 'icttf', 'id', 'identity', 'includes', 'including', 'information', 'infosec', 'institute', 'intelligence', 'internet', 'island', 'landscape', 'later', 'law', 'leader', 'led', 'like', 'login', 'london', 'magazine', 'major', 'malware', 'management', 'many', 'member', 'might', 'million', 'mobile', 'moniker', 'must', 'named', 'national', 'network', 'news', 'offering', 'officer', 'online', 'paganini', 'passion', 'password', 'personal', 'pierluigi', 'playstation', 'please', 'policy', 'previous', 'promote', 'publication', 'read', 'recently', 'regulation', 'remote', 'report', 'reported', 'researcher', 'reserved', 'resource', 'right', 'sale', 'security', 'securityaffairs', 'seller', 'selling', 'service', 'share', 'sharing', 'social', 'sold', 'solution', 'source', 'sponsored', 'stakeholder', 'started', 'stolen', 'story', 'strong', 'team', 'terrorism', 'thing', 'threat', 'top', 'treat', 'union', 'unique', 'usd', 'used', 'user', 'vendor', 'virtual', 'war', 'warfare', 'web', 'week', 'work', 'writer', 'writing', 'yahoo', 'year', 'zone'] | |
574 | |
575 | |
576 | |
576 2017-03-05T00:46:41.756000Z http://thehackernews.com/2010/11/cpe46com-hacked-by-tunisian-hacker-x.html | |
576 2017-03-05T00:46:45.978000Z http://thehackernews.com/2010/11/ecommercearmoanet-hacked-by-tunisian.html | |
576 2017-03-05T00:46:49.812000Z http://thehackernews.com/2010/11/greec-airforce-website-hacked-by.html | |
576 2017-03-05T00:46:57.896000Z http://thehackernews.com/2010/11/ciapeorg-hacked-by-tunisian-hacker-th3.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'link', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'tunisian', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
577 | |
577 2017-03-25T06:31:29.364000Z http://www.welivesecurity.com/2011/12/14/2012-predictions-online-data-brokers-come-under-fire/ | |
577 2017-03-27T12:33:19.407000Z https://www.welivesecurity.com/2011/12/14/2012-predictions-online-data-brokers-come-under-fire/ | |
['abta', 'according', 'accuracy', 'accurate', 'add', 'added', 'admit', 'aggregating', 'al', 'also', 'although', 'android', 'anonymized', 'anonymous', 'another', 'app', 'applicant', 'appointment', 'archive', 'argument', 'around', 'article', 'ask', 'attempt', 'attention', 'author', 'awful', 'bad', 'badly', 'based', 'become', 'becomes', 'behave', 'behind', 'big', 'blog', 'bound', 'breach', 'broker', 'brokerage', 'bundle', 'business', 'buying', 'cameron', 'camp', 'candidate', 'categorizing', 'center', 'civil', 'clearinghouse', 'code', 'come', 'coming', 'command', 'community', 'company', 'compiling', 'composite', 'concern', 'conference', 'confusing', 'consumer', 'contact', 'controlling', 'copyright', 'correlate', 'couch', 'counter', 'countered', 'credit', 'customer', 'customize', 'cybersecurity', 'danger', 'data', 'day', 'de', 'decision', 'deep', 'detail', 'deutsch', 'developing', 'diced', 'difficult', 'digital', 'dined', 'direct', 'disclosing', 'dislike', 'disposing', 'div', 'door', 'dossier', 'download', 'drawing', 'drink', 'drove', 'due', 'dustbin', 'easy', 'economics', 'email', 'embed', 'employer', 'employment', 'en', 'english', 'entirely', 'entry', 'epic', 'eset', 'español', 'especially', 'even', 'every', 'exactly', 'experience', 'expert', 'explainer', 'facebook', 'fact', 'fairly', 'far', 'feature', 'figured', 'financially', 'fire', 'follow', 'followed', 'forum', 'found', 'free', 'friend', 'front', 'future', 'game', 'gamers', 'gather', 'gathered', 'gathering', 'gdpr', 'generic', 'get', 'given', 'go', 'good', 'google', 'granularity', 'guise', 'hacked', 'half', 'happens', 'hard', 'headline', 'higher', 'hit', 'home', 'hot', 'house', 'http', 'impact', 'improvement', 'inaccurate', 'inbox', 'increase', 'increasingly', 'industry', 'information', 'input', 'inquiry', 'insight', 'intense', 'interested', 'internally', 'internet', 'invisible', 'involved', 'ir', 'kind', 'knocked', 'know', 'language', 'large', 'late', 'latest', 'law', 'leak', 'least', 'legal', 'level', 'life', 'like', 'link', 'linkedin', 'list', 'little', 'live', 'lot', 'love', 'machine', 'made', 'magazine', 'making', 'market', 'marketing', 'marketplace', 'mashups', 'material', 'meantime', 'might', 'minecraft', 'mined', 'misreported', 'mod', 'monetize', 'money', 'month', 'mostly', 'motivated', 'multimedia', 'name', 'navigation', 'networking', 'news', 'newsletter', 'night', 'normally', 'noticed', 'number', 'obtained', 'obviously', 'online', 'opinion', 'order', 'organization', 'otherwise', 'overstep', 'page', 'paper', 'part', 'party', 'people', 'personal', 'play', 'player', 'plus', 'podcasts', 'point', 'poked', 'policy', 'pool', 'popular', 'post', 'posted', 'prediction', 'prefer', 'preference', 'price', 'print', 'privacy', 'profile', 'prompting', 'protection', 'prove', 'provide', 'purchased', 'purchasing', 'put', 'qualified', 'quietly', 'radar', 'ransomware', 'reach', 'read', 'real', 'really', 'reason', 'recourse', 'related', 'relevant', 'remedy', 'remove', 'report', 'research', 'reserved', 'resolution', 'result', 'right', 'risk', 'rub', 'safely', 'saw', 'saying', 'scene', 'scrutiny', 'search', 'second', 'security', 'select', 'selling', 'sends', 'shadow', 'shared', 'shift', 'shopped', 'sign', 'signal', 'silo', 'similarly', 'simple', 'sit', 'site', 'sitemap', 'sits', 'situated', 'situation', 'sliced', 'small', 'smartphone', 'social', 'sold', 'sorting', 'source', 'specifically', 'spot', 'sprawl', 'steroid', 'still', 'strong', 'stylesheet', 'sure', 'sweat', 'tap', 'tempting', 'tentacle', 'theme', 'therefore', 'thin', 'thing', 'think', 'third', 'tidy', 'time', 'toggle', 'topic', 'town', 'trend', 'trending', 'twitter', 'undecided', 'user', 'using', 'value', 'variation', 'vehicle', 'vendor', 'video', 'view', 'violate', 'virus', 'visit', 'visited', 'waiting', 'walked', 'want', 'watch', 'way', 'weak', 'wechseln', 'well', 'west', 'whats', 'white', 'whole', 'wild', 'without', 'wls', 'worth', 'writing', 'youtube', 'zum'] | |
578 | |
579 | |
580 | |
581 | |
582 | |
583 | |
584 | |
585 | |
585 2017-03-05T00:41:12.190000Z http://thehackernews.com/2011/06/xss-attack-on-cia-central-itelligence.html | |
585 2017-03-05T00:41:15.799000Z http://thehackernews.com/2011/06/ani-shell-v11-back-connect-and-bind.html | |
585 2017-03-05T00:41:42.843000Z http://thehackernews.com/2011/05/government-directorate-pakistan-hacked.html | |
585 2017-03-05T00:41:54.972000Z http://thehackernews.com/2011/05/pakistan-telecommunication-company-ptcl.html | |
585 2017-03-05T00:41:59.363000Z http://thehackernews.com/2011/05/icse-guess-compromised-over-1-lakh-10.html | |
585 2017-03-05T00:42:33.657000Z http://thehackernews.com/2011/04/aviation-website-planespottersnet.html | |
585 2017-03-05T00:42:34.525000Z http://thehackernews.com/2011/04/sonycom2us-database-exploited-by.html | |
585 2017-03-05T00:42:42.531000Z http://thehackernews.com/2011/04/cmr-collage-bangalore-website-hacked-by.html | |
585 2017-03-05T00:42:52.135000Z http://thehackernews.com/2011/04/lahore-university-shail-vac-engineers.html | |
585 2017-03-05T00:42:55.865000Z http://thehackernews.com/2011/04/ducat-punjab-best-ethical-hacker_12.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'lionaneesh', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
586 | |
586 2017-03-09T18:30:59.733000Z https://www.helpnetsecurity.com/2017/03/09/west-african-cybercriminal-ecosystem-unlike/ | |
586 2017-03-17T18:30:59.052000Z https://securityintelligence.com/your-cybercriminal-has-an-image-problem/ | |
['cybercriminal'] | |
588 | |
588 2017-03-23T18:34:04.149000Z http://www.welivesecurity.com/2011/12/13/safety-online-with-a-bang-dodging-more-cyberbullets/ | |
588 2017-03-27T12:33:21.966000Z https://www.welivesecurity.com/2011/12/13/safety-online-with-a-bang-dodging-more-cyberbullets/ | |
['activity', 'addressing', 'anticipate', 'app', 'asked', 'author', 'available', 'back', 'bandolier', 'bang', 'blog', 'call', 'called', 'change', 'cissp', 'citp', 'copyright', 'cyberbullets', 'david', 'document', 'dodge', 'dodging', 'earlier', 'ecity', 'email', 'eset', 'expanded', 'fbcs', 'fellow', 'friend', 'global', 'going', 'good', 'great', 'gun', 'harley', 'hex', 'landscape', 'malicious', 'might', 'moment', 'online', 'originally', 'page', 'paper', 'partner', 'people', 'photo', 'plenty', 'posted', 'print', 'protect', 'put', 'question', 'reflect', 'refreshed', 'related', 'reloaded', 'remind', 'research', 'resource', 'safe', 'safety', 'securing', 'senior', 'series', 'since', 'small', 'soon', 'subsequently', 'suggestion', 'team', 'ten', 'thing', 'threat', 'title', 'together', 'top', 'update', 'used', 'way', 'whats', 'white', 'world', 'year'] | |
589 | |
590 | |
591 | |
591 2017-03-24T00:30:55.721000Z https://www.bleepingcomputer.com/news/security/google-reducing-trust-in-symantec-certificates-following-numerous-slip-ups/ | |
591 2017-03-24T00:30:56.020000Z https://arstechnica.com/security/2017/03/google-takes-symantec-to-the-woodshed-for-mis-issuing-30000-https-certs/ | |
591 2017-03-24T12:33:40.808000Z http://thehackernews.com/2017/03/google-invalidate-symantec-certs.html | |
591 2017-03-25T00:30:59.683000Z https://securityledger.com/2017/03/google-busts-symantec-issued-certificates-and-its-a-big-mess/ | |
591 2017-03-25T00:30:56.207000Z https://www.bleepingcomputer.com/news/security/14-766-lets-encrypt-ssl-certificates-issued-to-paypal-phishing-sites/ | |
591 2017-03-27T12:30:56.863000Z http://csoonline.com/article/3184897/security/api-flaws-said-to-have-left-symantec-ssl-certificates-vulnerable-to-compromise.html | |
591 2017-03-27T18:30:54.873000Z https://isc.sans.edu/forums/diary/Symantec+vs+Google+The+CA+Fight+Continues+What+do+you+need+to+know/22233/ | |
591 2017-03-28T00:31:01.261000Z https://www.bleepingcomputer.com/news/security/researcher-says-api-flaw-exposed-symantec-certificates-including-private-keys/ | |
591 2017-03-28T12:30:59.645000Z http://thehackernews.com/2017/03/symantec-ssl-certificates.html | |
['ca', 'certificate', 'company', 'google', 'new', 'security', 'symantec', 'user'] | |
592 | |
594 | |
595 | |
595 2017-03-29T18:30:57.373000Z https://www.bleepingcomputer.com/news/security/about-90-percent-of-smart-tvs-vulnerable-to-remote-hacking-via-rogue-tv-signals/ | |
595 2017-03-30T18:31:03.947000Z https://securityledger.com/2017/03/researcher-says-9-in-10-smart-tvs-vulnerable-to-broadcast-based-attacks/ | |
['access', 'action', 'allows', 'almost', 'also', 'angel', 'application', 'attack', 'attacker', 'audio', 'author', 'background', 'broadband', 'broadcast', 'broadcasting', 'browser', 'cable', 'camera', 'cia', 'classic', 'columbia', 'compromise', 'consortium', 'could', 'create', 'cyber', 'data', 'default', 'delivery', 'demonstration', 'design', 'developed', 'device', 'digital', 'ebu', 'email', 'embedded', 'european', 'even', 'exploit', 'facebook', 'fact', 'feature', 'find', 'first', 'form', 'hack', 'hacking', 'hbbtv', 'hidden', 'hybrid', 'industry', 'install', 'interaction', 'iptv', 'issue', 'last', 'le', 'lg', 'like', 'likely', 'load', 'make', 'maker', 'malicious', 'many', 'medium', 'method', 'microphone', 'model', 'much', 'need', 'network', 'new', 'one', 'oneconsult', 'operating', 'order', 'phone', 'physical', 'point', 'popular', 'possible', 'presented', 'privacy', 'problem', 'program', 'provider', 'rafael', 'range', 'ransomware', 'receive', 'relied', 'remote', 'reporter', 'researcher', 'rogue', 'run', 'said', 'samsung', 'say', 'scheel', 'second', 'security', 'see', 'seminar', 'send', 'set', 'show', 'similar', 'smart', 'software', 'sold', 'something', 'specific', 'spy', 'standard', 'support', 'supported', 'system', 'target', 'targeted', 'technology', 'ten', 'terrestrial', 'thing', 'tool', 'transmitter', 'tv', 'twitter', 'union', 'unique', 'university', 'usb', 'use', 'used', 'user', 'using', 'video', 'vulnerability', 'vulnerable', 'way', 'web', 'website', 'wide', 'wikileaks', 'window', 'without', 'work', 'would', 'year'] | |
596 | |
596 2017-03-02T18:30:48.935000Z http://www.veracode.com/blog/managing-appsec/veracode-program-managers-perspective-our-programmatic-approach-application | |
596 2017-03-14T00:30:51.052000Z http://www.veracode.com/blog/managing-appsec/few-my-lessons-learned-building-appsec-program | |
596 2017-03-30T18:30:57.109000Z http://www.veracode.com/blog/managing-appsec/veracode-program-managers-perspective-best-practices-scaling-appsec-program | |
['accept', 'address', 'application', 'approach', 'appsec', 'best', 'blog', 'comment', 'content', 'date', 'deliver', 'developer', 'email', 'field', 'finally', 'form', 'found', 'guide', 'home', 'homepage', 'information', 'internal', 'inventory', 'investment', 'joined', 'kept', 'lead', 'managing', 'mandate', 'marked', 'mature', 'mitigation', 'mollom', 'name', 'need', 'new', 'operation', 'organization', 'page', 'path', 'people', 'perspective', 'please', 'policy', 'post', 'previous', 'privacy', 'private', 'process', 'program', 'publicly', 'published', 'remediation', 'required', 'result', 'review', 'scan', 'scope', 'secure', 'security', 'service', 'share', 'shown', 'software', 'stakeholder', 'stay', 'step', 'submitting', 'take', 'team', 'technology', 'three', 'time', 'understanding', 'veracode', 'within', 'work', 'working'] | |
597 | |
598 | |
599 | |
599 2017-03-16T18:30:57.803000Z https://www.helpnetsecurity.com/2017/03/16/wishbone-data-breach/ | |
599 2017-03-17T12:30:55.685000Z https://hotforsecurity.bitdefender.com/blog/wishbone-hack-leaks-2-million-user-records-on-the-dark-web-mostly-of-underage-girls-17810.html | |
['million', 'user', 'wishbone'] | |
600 | |
600 2017-03-13T12:30:51.640000Z https://community.rapid7.com/community/infosec/blog/2017/03/13/r7-2017-01-multiple-vulnerabilities-in-double-robotics-telepresence-robot | |
600 2017-03-13T18:30:54.319000Z https://securityledger.com/2017/03/telepresence-robots-hackable/ | |
600 2017-03-14T12:31:13.908000Z https://www.helpnetsecurity.com/2017/03/14/double-robotics-telepresence-robot-can-hacked/ | |
['double', 'robot', 'robotics', 'telepresence'] | |
602 | |
604 | |
605 | |
606 | |
607 | |
608 | |
609 | |
609 2017-03-16T18:32:35.664000Z https://www.mimecast.com/blog/2012/05/crn-fight-night-has-cometh/ | |
609 2017-03-18T12:34:50.001000Z http://www.mimecast.com/blog/2013/05/mimecasts-own-ready-for-challenge-of-crn-fight-night-2013/ | |
609 2017-03-18T12:35:25.165000Z http://www.mimecast.com/blog/2012/05/crn-fight-night-has-cometh/ | |
609 2017-03-18T12:35:29.370000Z http://www.mimecast.com/blog/2012/05/crn-fight-night-final-preparations/ | |
['acceptable', 'africa', 'america', 'apps', 'archive', 'archiving', 'asia', 'attack', 'award', 'become', 'begin', 'blog', 'blurred', 'bundle', 'business', 'career', 'center', 'central', 'channel', 'chat', 'cloud', 'coalition', 'comment', 'company', 'compliance', 'contact', 'content', 'continuity', 'control', 'converge', 'crn', 'customer', 'cyber', 'data', 'dave', 'defend', 'demo', 'detail', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'east', 'email', 'enable', 'europe', 'event', 'exchange', 'expert', 'feel', 'fight', 'fighting', 'file', 'filed', 'final', 'get', 'going', 'google', 'home', 'hybrid', 'im', 'information', 'investor', 'javascript', 'knowledgebase', 'large', 'leadership', 'legacy', 'line', 'login', 'managed', 'management', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'network', 'news', 'night', 'north', 'office', 'operation', 'option', 'overview', 'pacific', 'partner', 'percent', 'personal', 'platform', 'please', 'policy', 'post', 'posted', 'powered', 'preparation', 'press', 'privacy', 'product', 'productivity', 'professional', 'program', 'protection', 'quote', 'registration', 'related', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'rodger', 'role', 'sale', 'schedule', 'secure', 'security', 'send', 'service', 'share', 'signature', 'sitemap', 'solution', 'south', 'success', 'support', 'targeted', 'team', 'technical', 'term', 'threat', 'training', 'trust', 'uk', 'ultimate', 'unprepared', 'use', 'view', 'webinars', 'win', 'winner', 'work'] | |
610 | |
610 2017-03-12T12:30:52.546000Z https://www.bleepingcomputer.com/news/hardware/-super-malware-steals-encryption-keys-from-intel-sgx-enclaves/ | |
610 2017-03-16T12:30:48.057000Z https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html | |
['article', 'attack', 'attacker', 'automated', 'cache', 'cloud', 'comment', 'computer', 'conceal', 'crucial', 'demonstrated', 'enclave', 'environment', 'even', 'extension', 'extract', 'first', 'full', 'guard', 'hardware', 'hide', 'however', 'intel', 'isolated', 'isolates', 'key', 'machine', 'malicious', 'malware', 'mechanism', 'memory', 'minute', 'multiple', 'news', 'operating', 'paper', 'posted', 'private', 'process', 'provides', 'researcher', 'rsa', 'sgx', 'single', 'software', 'steal', 'system', 'trace', 'us', 'user', 'using', 'within', 'work'] | |
611 | |
612 | |
613 | |
613 2017-03-21T00:31:12.272000Z http://www.welivesecurity.com/2014/05/20/miniduke-still-duking/ | |
613 2017-03-27T12:32:39.217000Z https://www.welivesecurity.com/2014/05/20/miniduke-still-duking/ | |
['abta', 'accept', 'account', 'actively', 'actually', 'ad', 'add', 'address', 'affect', 'affected', 'aggressive', 'al', 'algorithm', 'allusersprofile', 'along', 'alphabet', 'also', 'altered', 'alternate', 'although', 'always', 'analysis', 'analyzing', 'android', 'announced', 'api', 'app', 'appendix', 'applies', 'archive', 'article', 'assembler', 'assembly', 'assigned', 'assumes', 'attack', 'attribute', 'author', 'automated', 'av', 'avoided', 'backdoor', 'backup', 'based', 'belgium', 'belongs', 'binary', 'bitdefender', 'bland', 'block', 'blog', 'bot', 'breach', 'breakpoints', 'broken', 'byte', 'calculates', 'called', 'calling', 'came', 'case', 'caused', 'causing', 'cert', 'change', 'changed', 'character', 'characteristic', 'check', 'checked', 'code', 'collected', 'collision', 'com', 'come', 'command', 'communicate', 'communication', 'community', 'compare', 'compared', 'compilation', 'complete', 'component', 'computer', 'condition', 'conference', 'config', 'configuration', 'connection', 'consists', 'constant', 'contact', 'contacted', 'contain', 'contained', 'containing', 'contains', 'content', 'control', 'controller', 'copy', 'copyright', 'core', 'correctly', 'corresponding', 'country', 'cpu', 'cpuidinstruction', 'crafty', 'created', 'creates', 'creating', 'credential', 'current', 'cybersecurity', 'data', 'date', 'dated', 'day', 'de', 'debugger', 'decided', 'declare', 'decrypt', 'decrypted', 'decrypting', 'decrypts', 'deliver', 'derived', 'described', 'description', 'detect', 'deutsch', 'dga', 'difference', 'different', 'direct', 'directory', 'discover', 'discovered', 'discussed', 'disk', 'distribution', 'div', 'dll', 'dns', 'document', 'domain', 'done', 'download', 'downloaded', 'drawn', 'drive', 'drop', 'duking', 'ebp', 'edi', 'effect', 'effort', 'either', 'email', 'embed', 'embedded', 'embedding', 'en', 'encoded', 'encoding', 'encrypted', 'encryption', 'encrypts', 'end', 'engine', 'english', 'entry', 'eset', 'esp', 'español', 'eval', 'event', 'every', 'examining', 'example', 'executable', 'execute', 'executed', 'executes', 'executing', 'execution', 'exist', 'exists', 'expected', 'experience', 'expert', 'explanation', 'exploit', 'exploitation', 'exploited', 'export', 'exported', 'extension', 'extracted', 'facebook', 'fake', 'far', 'fdbywu', 'feasible', 'fetch', 'fetched', 'file', 'filename', 'final', 'finally', 'find', 'first', 'flashback', 'flow', 'floydlschwartz', 'folder', 'follow', 'following', 'follows', 'found', 'four', 'france', 'friend', 'function', 'functionality', 'gather', 'gathering', 'generated', 'generates', 'generation', 'getcomputernamea', 'getvolumeinformationa', 'gif', 'github', 'give', 'given', 'global', 'go', 'google', 'government', 'graph', 'group', 'hardcoded', 'hash', 'hashing', 'header', 'hidden', 'high', 'home', 'hook', 'host', 'hot', 'hp', 'http', 'hypothesis', 'illustrated', 'ilquenn', 'image', 'implementation', 'important', 'impossible', 'inbox', 'incorrectly', 'infected', 'infection', 'information', 'injecting', 'inside', 'insight', 'instagram', 'install', 'installation', 'installed', 'instantiates', 'instruction', 'integrity', 'interested', 'interesting', 'interface', 'internet', 'intriguing', 'introduction', 'ip', 'ir', 'ishelllinka', 'issue', 'javascript', 'jscript', 'jumping', 'kaspersky', 'kb', 'key', 'keyword', 'known', 'language', 'last', 'latest', 'leaf', 'leaving', 'legal', 'letter', 'light', 'like', 'likely', 'link', 'linkedin', 'list', 'listing', 'lnk', 'loaded', 'loadlibrarya', 'local', 'located', 'logic', 'long', 'look', 'lower', 'made', 'magazine', 'main', 'make', 'malware', 'manually', 'match', 'material', 'mechanism', 'mentioned', 'message', 'met', 'method', 'micro', 'microsoft', 'might', 'miniduke', 'modification', 'modified', 'module', 'moment', 'monitoring', 'month', 'mov', 'moved', 'much', 'multimedia', 'multiple', 'mystery', 'name', 'named', 'national', 'nature', 'navigation', 'new', 'news', 'newsletter', 'next', 'notable', 'noticed', 'notify', 'number', 'obfuscation', 'object', 'obtained', 'obtaining', 'obvious', 'occurred', 'one', 'onto', 'open', 'operation', 'opinion', 'order', 'original', 'output', 'page', 'paper', 'parameter', 'parsing', 'particularly', 'party', 'patched', 'payload', 'pdf', 'pe', 'persist', 'picked', 'play', 'podcasts', 'point', 'pointing', 'policy', 'political', 'popular', 'post', 'posted', 'potential', 'presence', 'present', 'previous', 'previously', 'print', 'prior', 'privacy', 'probably', 'problem', 'proceeds', 'process', 'product', 'profile', 'programming', 'prologue', 'proxy', 'public', 'purpose', 'push', 'python', 'query', 'quite', 'radar', 'randomly', 'ransomware', 'rather', 'rating', 'reach', 'read', 'real', 'reboots', 'received', 'receives', 'redirecting', 'refer', 'registered', 'related', 'remains', 'replaces', 'request', 'research', 'reserved', 'result', 'retrieve', 'retrieved', 'retrieves', 'returned', 'retweets', 'right', 'rolling', 'roughly', 'round', 'rtf', 'run', 'sample', 'scan', 'scope', 'screenshots', 'script', 'search', 'searching', 'second', 'secondary', 'section', 'security', 'see', 'seen', 'select', 'sent', 'separate', 'serial', 'server', 'set', 'seven', 'shellcode', 'short', 'shortly', 'show', 'shown', 'sign', 'similar', 'simple', 'since', 'single', 'site', 'sitemap', 'size', 'skip', 'small', 'software', 'something', 'special', 'spy', 'start', 'starting', 'startup', 'stealer', 'step', 'still', 'store', 'stored', 'straightforward', 'stream', 'string', 'stylesheet', 'subsequently', 'successful', 'system', 'table', 'tag', 'takeaway', 'tale', 'temp', 'term', 'thing', 'thorough', 'threat', 'three', 'thwart', 'time', 'toggle', 'token', 'tool', 'topic', 'transferring', 'treated', 'trick', 'triggering', 'try', 'tweet', 'twitter', 'twitterjs', 'two', 'uk', 'ultimately', 'unable', 'unintentional', 'uri', 'url', 'urldownloadtofilea', 'urlmon', 'us', 'use', 'used', 'user', 'username', 'userprofile', 'using', 'value', 'var', 'variable', 'variant', 'verifies', 'verify', 'version', 'via', 'victim', 'video', 'view', 'virus', 'virusradar', 'visit', 'volume', 'vulnerability', 'watermarking', 'way', 'wechseln', 'week', 'whats', 'whether', 'white', 'whole', 'windigo', 'window', 'without', 'wls', 'word', 'working', 'would', 'written', 'xor', 'year', 'youtube', 'zum'] | |
614 | |
616 | |
616 2017-03-14T18:30:55.920000Z http://www.welivesecurity.com/2016/01/07/stay-go-windows-10/ | |
616 2017-03-27T12:31:50.566000Z https://www.welivesecurity.com/2016/01/07/stay-go-windows-10/ | |
['acting', 'add', 'additional', 'administrator', 'al', 'almost', 'also', 'android', 'app', 'archive', 'article', 'aryeh', 'author', 'benefit', 'blog', 'branch', 'brighttalk', 'browsing', 'build', 'channel', 'code', 'collection', 'comment', 'community', 'compatibility', 'computer', 'conference', 'contact', 'contains', 'continuous', 'copyright', 'course', 'cybersecurity', 'data', 'de', 'decision', 'deck', 'deep', 'delivered', 'desktop', 'deutsch', 'direct', 'discovered', 'div', 'dive', 'download', 'drawback', 'edition', 'email', 'embed', 'en', 'english', 'enough', 'enterprise', 'eset', 'español', 'every', 'expert', 'facebook', 'feature', 'feel', 'fellow', 'fiction', 'find', 'flagship', 'follow', 'found', 'free', 'friend', 'ftc', 'getting', 'go', 'going', 'google', 'goretsky', 'half', 'helpful', 'hole', 'home', 'hope', 'hot', 'hour', 'http', 'inbox', 'information', 'insight', 'interested', 'interesting', 'introduction', 'iot', 'ir', 'issue', 'knowledgebase', 'language', 'latest', 'leave', 'legal', 'link', 'linkedin', 'live', 'looked', 'looking', 'magazine', 'malware', 'many', 'material', 'mean', 'message', 'microsoft', 'might', 'migrate', 'mind', 'model', 'month', 'multimedia', 'navigation', 'netgear', 'new', 'news', 'newsletter', 'note', 'online', 'operating', 'opinion', 'others', 'page', 'paper', 'play', 'please', 'podcasts', 'policy', 'popular', 'post', 'posted', 'potential', 'presence', 'presentation', 'presented', 'print', 'privacy', 'private', 'question', 'radar', 'range', 'ransomware', 'read', 'ready', 'recently', 'recorded', 'registration', 'related', 'release', 'released', 'releasing', 'required', 'research', 'researcher', 'reserved', 'right', 'router', 'search', 'section', 'security', 'select', 'sharing', 'shift', 'sign', 'since', 'site', 'sitemap', 'slide', 'smart', 'spare', 'stay', 'stranger', 'stylesheet', 'surrounding', 'system', 'three', 'titled', 'toggle', 'topic', 'toy', 'tv', 'twitter', 'two', 'update', 'version', 'video', 'view', 'virus', 'vizio', 'vulnerable', 'waas', 'webinar', 'wechseln', 'well', 'whats', 'whether', 'white', 'window', 'wls', 'work', 'worrying', 'year', 'youtube', 'zum'] | |
617 | |
618 | |
619 | |
620 | |
621 | |
622 | |
623 | |
624 | |
625 | |
626 | |
627 | |
627 2017-03-14T18:31:02.425000Z http://www.welivesecurity.com/2014/05/16/think-cybercriminals-evil-geniuses-wrong-5-idiots-show/ | |
627 2017-03-27T12:32:42.077000Z https://www.welivesecurity.com/2014/05/16/think-cybercriminals-evil-geniuses-wrong-5-idiots-show/ | |
['able', 'accept', 'account', 'actually', 'aforementioned', 'ago', 'alleged', 'also', 'among', 'another', 'app', 'appeared', 'attack', 'author', 'award', 'awarded', 'awesome', 'bad', 'bahler', 'bait', 'bank', 'become', 'body', 'bond', 'break', 'carefully', 'certainly', 'change', 'charged', 'check', 'chopper', 'clever', 'clothes', 'columbo', 'company', 'complex', 'convincing', 'crack', 'crime', 'criminal', 'cybercrime', 'cybercriminal', 'cybercriminals', 'darwin', 'david', 'day', 'deal', 'diamond', 'different', 'disagree', 'dubbed', 'earned', 'eight', 'email', 'employ', 'eset', 'even', 'everyone', 'exactly', 'facebook', 'facecrooks', 'fact', 'faintly', 'favourite', 'fbi', 'feeling', 'fellow', 'filling', 'film', 'first', 'fooling', 'forget', 'form', 'friend', 'full', 'genius', 'georgia', 'getting', 'god', 'grey', 'gun', 'hacker', 'happen', 'hard', 'harley', 'henchman', 'hey', 'hollywood', 'house', 'however', 'human', 'id', 'identity', 'idiot', 'immediately', 'iq', 'issue', 'item', 'jewel', 'jones', 'jules', 'laptop', 'latest', 'le', 'least', 'left', 'level', 'like', 'line', 'listed', 'little', 'live', 'living', 'logged', 'lol', 'lost', 'low', 'machine', 'made', 'magazine', 'malware', 'many', 'master', 'match', 'matching', 'material', 'matter', 'michigan', 'might', 'military', 'million', 'mistake', 'model', 'mr', 'music', 'ned', 'need', 'needle', 'network', 'one', 'others', 'page', 'partner', 'password', 'past', 'peanut', 'phishers', 'phishing', 'photo', 'planned', 'policeman', 'political', 'posted', 'print', 'privacy', 'professional', 'real', 'reality', 'recently', 'record', 'reminder', 'report', 'reported', 'require', 'research', 'ring', 'rise', 'rob', 'robbed', 'robber', 'robbery', 'sadly', 'said', 'sane', 'say', 'sc', 'scam', 'second', 'security', 'see', 'seen', 'selfie', 'senior', 'sent', 'setting', 'shell', 'shorter', 'show', 'simply', 'site', 'solve', 'spree', 'stealing', 'stole', 'stolen', 'stopped', 'stupidity', 'sub', 'subject', 'submachine', 'sum', 'sure', 'switched', 'tempting', 'term', 'text', 'theft', 'thief', 'think', 'three', 'time', 'totally', 'trouble', 'two', 'used', 'value', 'victim', 'villain', 'waiting', 'walking', 'watch', 'waugh', 'wearing', 'went', 'whats', 'willing', 'witnessed', 'worth', 'would', 'wouldnt', 'wrong', 'year'] | |
628 | |
629 | |
629 2017-03-23T18:34:16.557000Z http://www.welivesecurity.com/podcasts/does-the-us-military-need-a-central-cyber-command/ | |
629 2017-03-27T12:34:12.219000Z https://www.welivesecurity.com/podcasts/does-the-us-military-need-a-central-cyber-command/ | |
['add', 'al', 'audio', 'blog', 'central', 'code', 'community', 'conference', 'contact', 'copyright', 'currently', 'de', 'deutsch', 'direct', 'div', 'doe', 'download', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'facebook', 'follow', 'friend', 'go', 'home', 'http', 'inbox', 'information', 'insight', 'ir', 'language', 'latest', 'legal', 'length', 'link', 'linkedin', 'magazine', 'material', 'message', 'military', 'multimedia', 'navigation', 'need', 'news', 'newsletter', 'opinion', 'page', 'paper', 'pause', 'play', 'podcast', 'podcasts', 'policy', 'post', 'posted', 'print', 'privacy', 'radar', 'research', 'reserved', 'right', 'rob', 'search', 'security', 'sent', 'sign', 'site', 'sitemap', 'stylesheet', 'toggle', 'total', 'twitter', 'video', 'view', 'virus', 'waugh', 'wechseln', 'white', 'wls', 'youtube', 'zum'] | |
630 | |
631 | |
632 | |
634 | |
634 2017-03-15T18:30:47.536000Z https://blog.cloudflare.com/introducing-0-rtt/ | |
634 2017-03-17T00:31:34.007000Z https://blog.cloudflare.com/killing-rc4/ | |
['also', 'analytics', 'api', 'apps', 'attack', 'back', 'block', 'blog', 'browser', 'caller', 'career', 'case', 'cdn', 'center', 'cloudflare', 'comment', 'connect', 'connection', 'contact', 'content', 'could', 'crypto', 'cryptography', 'customer', 'disqus', 'dns', 'download', 'either', 'enable', 'facebook', 'feature', 'following', 'forward', 'full', 'get', 'ghost', 'guide', 'hardware', 'help', 'home', 'integration', 'international', 'internet', 'javascript', 'key', 'learn', 'level', 'like', 'linkedin', 'list', 'login', 'lower', 'make', 'map', 'mean', 'million', 'minute', 'modern', 'network', 'optimizer', 'order', 'overview', 'paper', 'partner', 'performance', 'plan', 'please', 'popular', 'powered', 'press', 'privacy', 'protect', 'protocol', 'proudly', 'provides', 'published', 'reliability', 'resource', 'safety', 'secure', 'security', 'server', 'service', 'sign', 'site', 'size', 'software', 'status', 'still', 'study', 'summit', 'support', 'system', 'tagged', 'take', 'team', 'term', 'time', 'tl', 'trust', 'tweet', 'twitter', 'type', 'uk', 'use', 'used', 'user', 'using', 'version', 'video', 'view', 'visit', 'want', 'web', 'website', 'white', 'work', 'year', 'youtube'] | |
635 | |
636 | |
637 | |
637 2017-03-07T12:31:52.805000Z http://www.itsecurityguru.org/2017/03/07/ca-technologies-acquire-veracode-leading-saas-based-secure-devops-platform-provider/ | |
637 2017-03-07T12:31:05.071000Z https://www.helpnetsecurity.com/2017/03/07/ca-technologies-acquires-veracode/ | |
['accelerated', 'accelerates', 'acquire', 'acquisition', 'add', 'addition', 'address', 'agreement', 'also', 'application', 'approval', 'approximately', 'ast', 'automated', 'automation', 'automic', 'ayman', 'book', 'bridge', 'broad', 'build', 'business', 'ca', 'cash', 'change', 'chief', 'close', 'closing', 'code', 'combination', 'component', 'concern', 'condition', 'custom', 'customary', 'customer', 'defect', 'definitive', 'deploy', 'detect', 'develop', 'development', 'devops', 'dynamic', 'earlier', 'earliest', 'eclipse', 'eliminate', 'enables', 'enterprise', 'establish', 'expect', 'expected', 'extends', 'faster', 'fewer', 'first', 'fiscal', 'fix', 'gartner', 'get', 'global', 'good', 'growing', 'growth', 'help', 'holistically', 'improve', 'including', 'integrates', 'large', 'larger', 'leader', 'lifecycle', 'looking', 'magic', 'market', 'mature', 'midsize', 'million', 'named', 'net', 'new', 'officer', 'part', 'party', 'perform', 'phase', 'platform', 'portfolio', 'potential', 'president', 'process', 'product', 'production', 'profile', 'protection', 'quadrant', 'quarter', 'reach', 'regulatory', 'risk', 'saas', 'said', 'sayed', 'scaling', 'seamlessly', 'secure', 'security', 'set', 'signed', 'size', 'software', 'solution', 'speed', 'start', 'starting', 'static', 'strategy', 'subject', 'tag', 'technology', 'testing', 'third', 'today', 'tool', 'transaction', 'trend', 'unify', 'using', 'veracode', 'vulnerability', 'within', 'year'] | |
638 | |
639 | |
640 | |
641 | |
641 2017-03-07T00:30:45.398000Z https://secureworks.com/blog/ransomware-tactics-and-mind-games | |
641 2017-03-21T18:30:57.824000Z https://digitalguardian.com/blog/history-ransomware-attacks-biggest-and-worst-ransomware-attacks-all-time | |
641 2017-03-22T18:30:43.712000Z http://blog.checkpoint.com/2017/03/22/ransomware-not-file-encryption/ | |
641 2017-03-30T00:30:57.138000Z https://blog.checkpoint.com/2017/03/22/ransomware-not-file-encryption/ | |
['backup', 'bitcoin', 'campaign', 'computer', 'continue', 'control', 'data', 'decryption', 'demand', 'document', 'even', 'file', 'future', 'increase', 'infection', 'known', 'malware', 'many', 'method', 'number', 'offering', 'option', 'others', 'paid', 'pay', 'payment', 'prevent', 'profit', 'ransom', 'ransomware', 'rather', 'researcher', 'security', 'service', 'system', 'technique', 'threat', 'use', 'using', 'victim', 'way'] | |
642 | |
643 | |
643 2017-03-11T12:31:16.847000Z http://www.welivesecurity.com/2013/07/23/passwords-are-dangerous-and-should-be-replaced-says-new-pressure-group/ | |
643 2017-03-27T12:33:05.813000Z https://www.welivesecurity.com/2013/07/23/passwords-are-dangerous-and-should-be-replaced-says-new-pressure-group/ | |
['accessed', 'according', 'advocacy', 'aim', 'alliance', 'also', 'among', 'app', 'attack', 'authentication', 'author', 'backed', 'banned', 'best', 'biometrics', 'blog', 'brainwave', 'breach', 'brennen', 'byrne', 'central', 'ceo', 'cheap', 'choice', 'clef', 'come', 'commonly', 'communication', 'company', 'compromised', 'conceptually', 'consumer', 'cost', 'creating', 'customer', 'cybercrime', 'cybercriminals', 'daily', 'data', 'david', 'deal', 'difficult', 'digital', 'dollar', 'drastically', 'easy', 'email', 'encourage', 'eset', 'especially', 'even', 'eventually', 'evernote', 'existing', 'facial', 'fact', 'fall', 'fast', 'fellow', 'fido', 'field', 'fingerprint', 'friend', 'group', 'hand', 'hardware', 'harley', 'identity', 'impact', 'implemented', 'including', 'insecure', 'integrated', 'investigating', 'lab', 'launch', 'launchkey', 'linkedin', 'live', 'livingsocial', 'management', 'million', 'move', 'movement', 'much', 'must', 'near', 'new', 'nfc', 'nok', 'number', 'offer', 'one', 'oneid', 'online', 'onslaught', 'otp', 'outdated', 'page', 'password', 'pc', 'persistent', 'petition', 'pill', 'post', 'posted', 'pressure', 'print', 'problem', 'protected', 'protecting', 'protocol', 'provider', 'published', 'recognition', 'remain', 'replace', 'report', 'research', 'result', 'rob', 'sad', 'say', 'scanner', 'scientist', 'secure', 'security', 'senior', 'server', 'service', 'site', 'solution', 'sony', 'startup', 'static', 'stored', 'suggested', 'superficially', 'supplementary', 'system', 'tasked', 'tattoo', 'technique', 'technology', 'time', 'token', 'towards', 'trust', 'ubisoft', 'unsatisfactory', 'use', 'used', 'using', 'view', 'voice', 'wake', 'waugh', 'well', 'whats', 'wilder', 'world', 'zappos'] | |
644 | |
645 | |
645 2017-03-09T18:31:08.729000Z http://www.welivesecurity.com/2016/01/06/uk-police-force-hire-britains-greatest-fraudster-help-tackle-cybercrime/ | |
645 2017-03-27T12:31:54.855000Z https://www.welivesecurity.com/2016/01/06/uk-police-force-hire-britains-greatest-fraudster-help-tackle-cybercrime/ | |
['abagnale', 'according', 'act', 'acted', 'actively', 'add', 'added', 'age', 'al', 'also', 'analysis', 'android', 'annual', 'anticipate', 'app', 'archive', 'area', 'around', 'article', 'artist', 'author', 'back', 'banking', 'bbc', 'behavior', 'best', 'big', 'biggest', 'birmingham', 'blog', 'board', 'breach', 'breaking', 'breathless', 'broadcaster', 'bulletproof', 'business', 'came', 'career', 'case', 'ceo', 'chance', 'choose', 'cobb', 'code', 'come', 'commissioner', 'community', 'company', 'completely', 'con', 'condoning', 'conference', 'consider', 'contact', 'continued', 'copyright', 'corporate', 'crime', 'criminal', 'cyber', 'cybercrime', 'cybersecurity', 'data', 'david', 'day', 'de', 'decision', 'described', 'deserves', 'despite', 'deutsch', 'direct', 'dismiss', 'div', 'downside', 'dropped', 'either', 'email', 'embed', 'en', 'end', 'enforcement', 'england', 'english', 'enterprise', 'eset', 'español', 'especially', 'even', 'every', 'expert', 'explained', 'explains', 'eye', 'facebook', 'famously', 'felon', 'figure', 'follow', 'force', 'found', 'frank', 'fraud', 'fraudster', 'friend', 'give', 'given', 'go', 'going', 'google', 'greatest', 'grew', 'head', 'help', 'highlighted', 'hire', 'hired', 'home', 'hot', 'however', 'http', 'identified', 'impossible', 'improve', 'inbox', 'including', 'information', 'insight', 'insurance', 'interested', 'interview', 'invited', 'ir', 'jamieson', 'jaw', 'job', 'karl', 'keynote', 'knowledge', 'known', 'language', 'large', 'larger', 'largest', 'last', 'latest', 'law', 'leading', 'legal', 'life', 'link', 'linkedin', 'long', 'loss', 'lot', 'magazine', 'make', 'many', 'material', 'midland', 'might', 'million', 'month', 'move', 'multimedia', 'name', 'navigation', 'network', 'never', 'news', 'newsletter', 'next', 'nobody', 'number', 'obvious', 'office', 'officer', 'often', 'online', 'onto', 'opinion', 'outline', 'page', 'paper', 'path', 'people', 'perhaps', 'period', 'play', 'podcasts', 'police', 'policy', 'popular', 'post', 'posted', 'presentation', 'prevention', 'previously', 'print', 'prison', 'privacy', 'private', 'professional', 'public', 'pursue', 'put', 'radar', 'ransomware', 'read', 'realize', 'recently', 'reformed', 'related', 'research', 'researcher', 'reserved', 'respected', 'response', 'retail', 'right', 'road', 'room', 'safeguard', 'sale', 'saw', 'say', 'saying', 'scammer', 'search', 'second', 'sector', 'security', 'see', 'seek', 'select', 'senior', 'sentence', 'serf', 'serve', 'serving', 'shortcoming', 'shot', 'show', 'sign', 'since', 'site', 'sitemap', 'smart', 'specialize', 'speech', 'started', 'stating', 'stephen', 'stole', 'stylesheet', 'summit', 'system', 'table', 'tackle', 'th', 'think', 'thomas', 'throughout', 'time', 'toggle', 'told', 'tony', 'topic', 'touch', 'trusted', 'turnaround', 'turned', 'twitter', 'uk', 'underground', 'unfortunate', 'unprecedented', 'utilize', 'victim', 'video', 'view', 'virus', 'way', 'weakness', 'wechseln', 'week', 'well', 'west', 'whats', 'white', 'within', 'wls', 'work', 'world', 'year', 'young', 'youtube', 'zum'] | |
646 | |
646 2017-03-29T12:30:56.462000Z http://thehackernews.com/2017/03/linux-botnet-ebury.html | |
646 2017-03-29T12:30:59.409000Z https://www.bleepingcomputer.com/news/security/russian-hacker-pleads-guilty-for-role-in-infamous-linux-ebury-malware/ | |
['abuse', 'also', 'antivirus', 'api', 'apple', 'article', 'attack', 'backdoor', 'botnet', 'breach', 'browsing', 'called', 'certificate', 'chrome', 'comment', 'computer', 'connection', 'criminal', 'data', 'deal', 'delivered', 'department', 'detained', 'ebury', 'email', 'exploit', 'extradition', 'finland', 'flaw', 'florida', 'freebsd', 'going', 'google', 'guilty', 'hacker', 'hacking', 'home', 'including', 'infamous', 'infected', 'installed', 'justice', 'key', 'kit', 'latest', 'like', 'linux', 'malware', 'man', 'manager', 'maxim', 'multiple', 'new', 'news', 'newsletter', 'novgorod', 'online', 'operating', 'password', 'pleaded', 'pleads', 'popular', 'private', 'ransomware', 'redirect', 'role', 'russia', 'russian', 'scheduled', 'security', 'senakh', 'send', 'sentencing', 'server', 'solaris', 'spam', 'ssh', 'steal', 'symantec', 'system', 'tool', 'traffic', 'trojan', 'use', 'used', 'user', 'using', 'various', 'velikii', 'version', 'web', 'window', 'without', 'year'] | |
647 | |
648 | |
648 2017-03-14T06:31:09.838000Z http://www.welivesecurity.com/2013/07/24/tango-messaging-app-hacked-millions-of-user-details-leaked/ | |
648 2017-03-27T12:33:03.665000Z https://www.welivesecurity.com/2013/07/24/tango-messaging-app-hacked-millions-of-user-details-leaked/ | |
['access', 'accessed', 'according', 'addition', 'administration', 'administrator', 'affected', 'allowed', 'also', 'although', 'apologise', 'apologized', 'app', 'army', 'attack', 'author', 'breach', 'caused', 'chat', 'claim', 'claimed', 'clear', 'company', 'confirmed', 'contact', 'content', 'customer', 'cyber', 'cybercrime', 'data', 'database', 'defaced', 'delivered', 'detail', 'downloaded', 'downloading', 'due', 'electronic', 'email', 'emailsmore', 'employee', 'experienced', 'feed', 'fell', 'friend', 'gain', 'gained', 'government', 'group', 'hacked', 'hacker', 'hacking', 'including', 'inconvenience', 'increasing', 'information', 'intrusion', 'leaked', 'list', 'live', 'messaging', 'million', 'minor', 'network', 'news', 'number', 'official', 'one', 'outdated', 'page', 'panel', 'people', 'personal', 'phishing', 'phone', 'popular', 'post', 'posted', 'print', 'private', 'propuse', 'reportedly', 'resulted', 'rob', 'said', 'saying', 'screenshots', 'sea', 'security', 'server', 'sincerely', 'site', 'spying', 'statement', 'support', 'syrian', 'system', 'tango', 'targeted', 'tb', 'terabyte', 'today', 'tracking', 'twitter', 'two', 'unauthorized', 'unfortunately', 'uploaded', 'use', 'used', 'user', 'version', 'via', 'viber', 'victim', 'waugh', 'website', 'week', 'whats', 'wordpress', 'working'] | |
649 | |
650 | |
652 | |
653 | |
655 | |
655 2017-03-11T12:31:27.103000Z http://www.welivesecurity.com/2010/08/06/how-to-screw-up-and-skew-a-test/ | |
655 2017-03-27T12:33:55.095000Z https://www.welivesecurity.com/2010/08/06/how-to-screw-up-and-skew-a-test/ | |
['able', 'abrams', 'access', 'accuracy', 'accurate', 'acknowledges', 'across', 'actual', 'actually', 'add', 'added', 'adding', 'addition', 'additionally', 'advice', 'agenda', 'agree', 'al', 'algorithm', 'alone', 'also', 'amateur', 'amtso', 'analysis', 'android', 'another', 'antimalware', 'antivirus', 'anything', 'anywhere', 'app', 'appear', 'approach', 'appropriate', 'archive', 'around', 'arsenal', 'article', 'aspect', 'ass', 'attack', 'attacked', 'attacking', 'attempt', 'attempting', 'author', 'av', 'available', 'average', 'avoid', 'background', 'bad', 'based', 'bdj', 'begin', 'behavioral', 'believe', 'best', 'better', 'big', 'blog', 'board', 'book', 'bring', 'carefully', 'case', 'catch', 'center', 'chance', 'changed', 'claim', 'clearly', 'close', 'clue', 'code', 'collection', 'combined', 'common', 'community', 'company', 'comparative', 'competent', 'competitor', 'completely', 'component', 'comprehensive', 'computer', 'concerning', 'concluding', 'conclusion', 'conduct', 'conference', 'confidence', 'confirm', 'confirmed', 'confront', 'confusion', 'consider', 'considered', 'contact', 'contribute', 'copyright', 'correct', 'correctly', 'could', 'credibility', 'critic', 'critical', 'current', 'currently', 'cyber', 'cybersecurity', 'cyveillance', 'data', 'david', 'day', 'de', 'defense', 'definitely', 'demand', 'derek', 'describe', 'despite', 'detect', 'detected', 'detection', 'determine', 'determining', 'deutsch', 'difference', 'direct', 'direction', 'directly', 'director', 'discarded', 'discarding', 'discovering', 'div', 'documentation', 'doe', 'dozen', 'driven', 'due', 'dynamic', 'eagerly', 'education', 'effectiveness', 'eicar', 'email', 'embed', 'employee', 'en', 'encrypted', 'english', 'enormous', 'enough', 'ensure', 'error', 'eset', 'español', 'essence', 'establish', 'establishment', 'estimate', 'even', 'ever', 'examining', 'example', 'excellent', 'except', 'excluded', 'exclusively', 'executive', 'expect', 'experience', 'expert', 'expertise', 'expose', 'extrapolation', 'facebook', 'fact', 'fall', 'false', 'far', 'favorable', 'figure', 'file', 'filtering', 'find', 'finite', 'first', 'flaw', 'flawed', 'follow', 'former', 'foster', 'found', 'friend', 'fundamentally', 'gap', 'generally', 'getting', 'give', 'given', 'go', 'good', 'google', 'great', 'guidance', 'guideline', 'guy', 'happens', 'hardly', 'harley', 'harmless', 'heard', 'help', 'heuristic', 'higher', 'highly', 'home', 'honestly', 'host', 'hot', 'http', 'identified', 'identify', 'illustrated', 'illustration', 'imagine', 'immense', 'implication', 'important', 'improvement', 'inaccuracy', 'inbox', 'include', 'includes', 'inclusion', 'incompetent', 'incorrect', 'incorrectly', 'independent', 'individual', 'industry', 'infected', 'infection', 'information', 'infosecurity', 'innuendo', 'insight', 'intelligence', 'interested', 'interesting', 'intrusion', 'invalidity', 'invent', 'involved', 'ir', 'item', 'joined', 'keeping', 'kevin', 'knock', 'know', 'knowledge', 'lab', 'lack', 'lament', 'language', 'later', 'latest', 'le', 'least', 'left', 'legal', 'level', 'lie', 'light', 'like', 'link', 'linkedin', 'llc', 'lower', 'made', 'magazine', 'make', 'malicious', 'malware', 'many', 'margin', 'marketing', 'material', 'mean', 'membership', 'method', 'methodology', 'metric', 'microcosm', 'might', 'million', 'missed', 'mistake', 'mistaken', 'mitigate', 'modeling', 'moment', 'money', 'month', 'mostly', 'moy', 'much', 'multilayer', 'multimedia', 'navigation', 'naïve', 'need', 'new', 'news', 'newsletter', 'none', 'norm', 'novice', 'number', 'numerous', 'observation', 'obvious', 'obviously', 'offer', 'often', 'oh', 'one', 'onetime', 'onto', 'onward', 'opinion', 'organization', 'otherwise', 'output', 'owned', 'owner', 'page', 'paper', 'paragraph', 'paranoia', 'part', 'party', 'pedegree', 'penalized', 'people', 'percent', 'performance', 'performed', 'period', 'person', 'picture', 'place', 'play', 'podcasts', 'point', 'policy', 'polling', 'popular', 'population', 'positive', 'possible', 'post', 'posted', 'practically', 'preceding', 'presume', 'pretty', 'prevented', 'prevention', 'print', 'privacy', 'problem', 'product', 'prof', 'professional', 'profitable', 'proof', 'proprietary', 'protection', 'provided', 'provides', 'publishes', 'publishing', 'qualified', 'quality', 'question', 'radar', 'ragan', 'randy', 'range', 'ransomware', 'rarely', 'rate', 'rather', 'reach', 'read', 'real', 'really', 'refer', 'reference', 'referenced', 'regarding', 'related', 'release', 'reliability', 'reliable', 'rely', 'remember', 'replicate', 'report', 'reported', 'required', 'research', 'reserved', 'resource', 'rest', 'result', 'review', 'rewarded', 'rick', 'right', 'risk', 'rock', 'room', 'said', 'sample', 'sandboxing', 'say', 'scan', 'scanner', 'scanning', 'science', 'scientific', 'scientifically', 'screw', 'scrutiny', 'search', 'section', 'securater', 'security', 'see', 'seen', 'select', 'sentence', 'seriously', 'set', 'setting', 'share', 'show', 'showing', 'shuns', 'sign', 'signature', 'significant', 'similar', 'simply', 'since', 'site', 'sitemap', 'situation', 'size', 'skew', 'skewed', 'small', 'smart', 'snapshot', 'software', 'solution', 'something', 'somewhat', 'sound', 'speaking', 'speed', 'spot', 'squid', 'standard', 'state', 'statement', 'statistic', 'statistical', 'statistically', 'statistician', 'steve', 'still', 'story', 'struck', 'stylesheet', 'support', 'sure', 'surrounding', 'system', 'take', 'taking', 'technical', 'technique', 'technology', 'test', 'tester', 'testing', 'text', 'therein', 'thing', 'think', 'thinking', 'thirty', 'though', 'threat', 'three', 'throughout', 'time', 'toggle', 'told', 'tool', 'top', 'topic', 'townsend', 'traffic', 'transparent', 'true', 'truth', 'tua', 'twitter', 'two', 'type', 'unconfirmed', 'undetected', 'undisputed', 'unique', 'unrecognized', 'unreliable', 'update', 'upon', 'us', 'use', 'used', 'user', 'using', 'valid', 'validated', 'validity', 'vendor', 'versus', 'video', 'view', 'virus', 'virustotal', 'want', 'warrant', 'waste', 'way', 'weak', 'wechseln', 'well', 'whats', 'white', 'whitelisting', 'whole', 'wls', 'word', 'work', 'world', 'would', 'writer', 'wrong', 'wrote', 'yes', 'yet', 'youtube', 'zum'] | |
657 | |
657 2017-03-14T18:30:47.840000Z https://www.alienvault.com/blogs/labs-research/apache-struts-vulnerability-being-exploited-by-attackers | |
657 2017-03-22T18:30:48.922000Z https://www.alienvault.com/blogs/security-essentials/intermediate-mitigation-measures-may-be-required-for-apache-struts-vulnerabilities | |
['access', 'alienvault', 'apache', 'application', 'attacker', 'back', 'blog', 'data', 'deeper', 'delivered', 'detect', 'event', 'example', 'exchange', 'execute', 'exploit', 'exploitation', 'facebook', 'go', 'google', 'high', 'host', 'however', 'important', 'learn', 'linkedin', 'malicious', 'monitoring', 'new', 'number', 'one', 'open', 'organization', 'otx', 'payload', 'plus', 'pulse', 'reddit', 'risk', 'server', 'signature', 'simple', 'soon', 'strut', 'system', 'tag', 'team', 'threat', 'twitter', 'update', 'usm', 'version', 'vulnerability', 'watch', 'webcast', 'webserver', 'wild'] | |
658 | |
658 2017-03-02T18:30:55.544000Z https://isc.sans.edu/newssummary.html#1019911 | |
658 2017-03-02T18:30:57.069000Z https://isc.sans.edu/newssummary.html#1019869 | |
['ago', 'attack', 'bonus', 'breach', 'breachesyahoo', 'cash', 'ceo', 'company', 'comprehend', 'executive', 'failed', 'find', 'found', 'fully', 'giant', 'hour', 'independent', 'inforisktoday', 'investigate', 'investigation', 'lapse', 'legal', 'lose', 'loses', 'marissa', 'mayer', 'probe', 'properly', 'search', 'security', 'senior', 'severity', 'synopsis', 'team', 'understand', 'view', 'yahoo'] | |
659 | |
659 2017-03-01T00:30:44.701000Z https://www.bleepingcomputer.com/news/security/dridex-becomes-first-malware-family-to-integrate-atombombing-technique/ | |
659 2017-03-01T12:30:50.434000Z http://securityaffairs.co/wordpress/56768/breaking-news/dridex-v4.html | |
659 2017-03-01T18:30:44.590000Z http://thehackernews.com/2017/03/dridex-atombombing-malware.html | |
659 2017-03-02T00:30:52.868000Z http://darkreading.com/attacks-breaches/new-version-of-dridex-banking-trojan-uses-atombombing-to-infect-systems/d/d-id/1328299 | |
['allow', 'api', 'application', 'atom', 'atombombing', 'attack', 'attacker', 'banking', 'breach', 'call', 'called', 'code', 'data', 'detect', 'detection', 'different', 'discovered', 'dridex', 'encryption', 'ensilo', 'first', 'ibm', 'information', 'injection', 'malicious', 'malware', 'memory', 'microsoft', 'new', 'one', 'online', 'operating', 'previous', 'process', 'product', 'researcher', 'security', 'software', 'store', 'system', 'table', 'technique', 'trojan', 'us', 'use', 'used', 'using', 'version', 'web', 'window', 'year'] | |
660 | |
661 | |
662 | |
663 | |
665 | |
666 | |
667 | |
667 2017-03-02T12:31:59.400000Z http://www.itsecurityguru.org/2017/03/02/email-security-must-priority-businesses-urges-expert/ | |
667 2017-03-02T12:32:05.259000Z http://www.itsecurityguru.org/2017/03/02/luxembourg-state-servers-attacked-industry-reaction/ | |
667 2017-03-02T12:32:07.648000Z http://www.itsecurityguru.org/2017/03/02/hacked-robots-attack-humans-burgle-peoples-homes-kill-pets-experts-warn/ | |
667 2017-03-02T12:31:48.126000Z http://www.itsecurityguru.org/2017/03/02/online-shops-plundered-bank-card-stealing-malware-bungling-backend-aptos-hacked/ | |
667 2017-03-02T12:31:50.115000Z http://www.itsecurityguru.org/2017/03/02/mastercard-nearly-half-consumers-interested-biometrics/ | |
667 2017-03-02T12:31:53.130000Z http://www.itsecurityguru.org/2017/03/02/boeing-data-breach-traced-employee-needed-help-spouse/ | |
667 2017-03-02T12:31:55.190000Z http://www.itsecurityguru.org/2017/03/02/yahoo-dysfunction-meant-security-warnings-ignored/ | |
['ability', 'abysmal', 'action', 'ad', 'administrator', 'advanced', 'afraid', 'american', 'amidst', 'anonabox', 'application', 'appriver', 'approves', 'aptos', 'around', 'article', 'ask', 'atm', 'atombombing', 'attack', 'attacked', 'audio', 'back', 'backend', 'backlash', 'bank', 'banking', 'becomes', 'behind', 'biggest', 'binary', 'biometrics', 'blind', 'board', 'boeing', 'book', 'breach', 'broadly', 'build', 'bungling', 'burgle', 'business', 'campaign', 'change', 'citibank', 'cloudpets', 'cm', 'collective', 'combat', 'come', 'comment', 'community', 'consumer', 'could', 'creating', 'criminal', 'cyber', 'cybersecurity', 'data', 'date', 'ddos', 'development', 'disposal', 'doe', 'dridex', 'dysfunction', 'ebay', 'editor', 'email', 'embracing', 'employee', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'expert', 'explain', 'express', 'facebook', 'family', 'fed', 'find', 'fine', 'finnish', 'firm', 'first', 'flaw', 'follow', 'fraud', 'gdpr', 'general', 'generation', 'genuine', 'get', 'getting', 'globally', 'goodbye', 'got', 'government', 'greg', 'grip', 'group', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'half', 'health', 'help', 'hidemyweb', 'hitting', 'home', 'hospital', 'http', 'human', 'ico', 'ignored', 'impact', 'imposter', 'improve', 'incident', 'increase', 'industrial', 'industry', 'information', 'infosec', 'infosecurity', 'inside', 'integrate', 'interested', 'joe', 'kill', 'knew', 'know', 'korean', 'landmark', 'laura', 'law', 'lazarus', 'leave', 'likely', 'link', 'literacy', 'lizard', 'look', 'looking', 'lure', 'luxembourg', 'machine', 'making', 'malvertising', 'malware', 'manager', 'many', 'mastercard', 'meant', 'mitigation', 'must', 'nearly', 'needed', 'netflix', 'never', 'new', 'news', 'next', 'num', 'one', 'online', 'open', 'operation', 'option', 'password', 'paypal', 'persistent', 'personal', 'pervasive', 'pet', 'phishing', 'phone', 'platform', 'plundered', 'pm', 'popular', 'posted', 'previous', 'primary', 'priority', 'privacy', 'protecting', 'protection', 'public', 'purpose', 'ransomware', 'ratankba', 'reaction', 'recent', 'record', 'recording', 'reduce', 'regulation', 'related', 'remains', 'research', 'response', 'retailer', 'return', 'rich', 'rise', 'rising', 'risk', 'robot', 'round', 'run', 'sale', 'scam', 'searching', 'sector', 'security', 'sensitive', 'server', 'severe', 'share', 'shop', 'shortage', 'show', 'sign', 'skill', 'slap', 'software', 'sort', 'source', 'south', 'spam', 'spot', 'spouse', 'squad', 'state', 'stock', 'story', 'supporter', 'surprising', 'tackle', 'tag', 'talking', 'target', 'technique', 'ten', 'term', 'themed', 'thing', 'threat', 'top', 'traced', 'track', 'trading', 'trend', 'turning', 'tweet', 'uk', 'uncovers', 'understanding', 'underway', 'urge', 'used', 'user', 'using', 'usps', 'vector', 'video', 'viral', 'vulnerability', 'warn', 'warning', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'wilson', 'within', 'working', 'worse', 'yahoo', 'year'] | |
668 | |
669 | |
671 | |
671 2017-03-06T18:30:48.382000Z http://thehackernews.com/2017/03/email-marketing-database.html | |
671 2017-03-07T00:30:52.821000Z https://securityledger.com/2017/03/spam-operation-laid-open-exposing-data-on-1-4-billion/ | |
671 2017-03-08T18:30:57.120000Z https://nakedsecurity.sophos.com/2017/03/08/alleged-spammer-leaks-1-37bn-email-addresses-after-backup-catastrophe/ | |
['address', 'also', 'anyone', 'apple', 'attack', 'backup', 'biggest', 'city', 'company', 'data', 'discovered', 'email', 'exposed', 'file', 'hacking', 'illegal', 'including', 'ip', 'legitimate', 'mackeeper', 'many', 'marketing', 'medium', 'microsoft', 'name', 'often', 'one', 'operation', 'others', 'password', 'rcm', 'repository', 'researcher', 'river', 'script', 'security', 'server', 'slowloris', 'spam', 'spammer', 'spamming', 'technique', 'using', 'vickery'] | |
672 | |
673 | |
674 | |
675 | |
675 2017-03-28T12:31:08.078000Z http://www.itsecurityguru.org/2017/03/28/tech-savvy-generation-demands-high-street-game/ | |
675 2017-03-28T12:31:16.434000Z http://www.itsecurityguru.org/2017/03/28/ddos-attacks-rise-enterprises-pointing-fingers-wrong-direction/ | |
675 2017-03-28T12:31:29.216000Z http://www.itsecurityguru.org/2017/03/28/lastpass-scrambles-fix-another-major-flaw-spotted-googles-bugfinders/ | |
675 2017-03-28T12:31:33.818000Z http://www.itsecurityguru.org/2017/03/28/satnav-spoofing-attacks-researchers-think-answer/ | |
675 2017-03-28T12:31:36.797000Z http://www.itsecurityguru.org/2017/03/28/n-korea-using-hackers-rob-banks-fund-regime/ | |
['ability', 'account', 'across', 'ad', 'administrator', 'advanced', 'afraid', 'ago', 'ai', 'also', 'american', 'amidst', 'anonabox', 'another', 'answer', 'apple', 'application', 'appriver', 'approves', 'around', 'article', 'ask', 'assurance', 'atm', 'attack', 'back', 'backlash', 'baker', 'bank', 'banking', 'biggest', 'billion', 'binary', 'biometrics', 'blake', 'blind', 'board', 'breach', 'broadly', 'bugfinders', 'build', 'business', 'buy', 'campaign', 'cash', 'centre', 'change', 'citibank', 'cm', 'cognitive', 'combat', 'come', 'comment', 'community', 'consoleconnect', 'creating', 'crimina', 'criminal', 'cyber', 'cybersecurity', 'data', 'date', 'ddos', 'defence', 'despite', 'detail', 'development', 'director', 'doe', 'drone', 'earthquake', 'ebay', 'editor', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'erase', 'eset', 'eu', 'even', 'event', 'everyone', 'experience', 'explain', 'explains', 'express', 'facebook', 'family', 'find', 'finnish', 'firm', 'fix', 'flaw', 'follow', 'forum', 'fraud', 'fund', 'future', 'gaping', 'gdpr', 'general', 'generation', 'get', 'getting', 'giftghostbot', 'gillman', 'globally', 'good', 'goodbye', 'got', 'government', 'grip', 'guru', 'gushi', 'guy', 'hack', 'hacked', 'hacker', 'hacking', 'harder', 'hello', 'help', 'hitting', 'holding', 'hole', 'home', 'hospital', 'hour', 'http', 'hurricane', 'icloud', 'impact', 'imposter', 'improve', 'incident', 'information', 'infosec', 'infosecurity', 'inside', 'intelligence', 'ithings', 'jonathon', 'jones', 'joyce', 'king', 'know', 'korea', 'landmark', 'lastpass', 'law', 'leave', 'like', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'major', 'making', 'malware', 'many', 'million', 'mitigation', 'nato', 'navy', 'netflix', 'new', 'news', 'next', 'num', 'oiza', 'open', 'operation', 'ops', 'option', 'paypal', 'persistent', 'person', 'pervasive', 'phishing', 'plan', 'planning', 'platform', 'pm', 'police', 'polite', 'popular', 'posted', 'prepare', 'previous', 'price', 'primary', 'privacy', 'probe', 'problem', 'professional', 'protect', 'protecting', 'protection', 'queen', 'raise', 'ransom', 'ransomware', 'recent', 'regime', 'regulation', 'related', 'relationship', 'reli', 'remains', 'researcher', 'response', 'retailer', 'return', 'rich', 'rise', 'risk', 'rob', 'round', 'run', 'sale', 'satellite', 'satnav', 'scam', 'scare', 'scramble', 'security', 'sensitive', 'service', 'share', 'shortage', 'sign', 'skill', 'software', 'sort', 'source', 'spam', 'spend', 'spoofing', 'spot', 'spotted', 'squad', 'stock', 'story', 'supporter', 'switzerland', 'tackle', 'tag', 'tagged', 'talking', 'tania', 'target', 'tech', 'technology', 'ten', 'term', 'themed', 'thing', 'think', 'threat', 'threatquotient', 'today', 'top', 'trading', 'trend', 'turning', 'tweet', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'video', 'viral', 'vulnerability', 'warns', 'warship', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'within', 'working', 'worse', 'would', 'year'] | |
676 | |
677 | |
677 2017-03-09T00:31:03.989000Z http://csoonline.com/article/3178645/security/leaked-docs-suggest-nsa-and-cia-behind-equation-cyberespionage-group.html | |
677 2017-03-09T12:30:51.361000Z http://csoonline.com/article/3178655/security/wikileaks-looks-at-helping-tech-vendors-disarm-cia-hacking-tools.html | |
677 2017-03-09T18:30:59.378000Z http://csoonline.com/article/3179152/security/assange-cia-had-lost-control-of-its-cyberweapon-documents.html | |
677 2017-03-10T00:30:51.764000Z http://csoonline.com/article/3179094/privacy/after-wikileaks-cia-dump-china-tells-us-to-stop-spying.html | |
677 2017-03-10T18:30:59.582000Z http://csoonline.com/article/3179449/security/wikileaks-will-share-cia-hacking-details-with-companies-but-can-they-use-it.html | |
677 2017-03-14T00:30:50.479000Z http://csoonline.com/article/3180288/security/wikileaks-dump-brings-cia-spying-powers-into-the-spotlight.html | |
['address', 'alert', 'analysis', 'antivirus', 'article', 'backup', 'brandposts', 'breach', 'brochure', 'carol', 'christmas', 'cia', 'cloud', 'cloudy', 'comma', 'comment', 'computer', 'concern', 'content', 'cost', 'credit', 'cso', 'cybersecurity', 'data', 'deal', 'document', 'download', 'easy', 'email', 'emailing', 'enterprise', 'error', 'facebook', 'featured', 'federal', 'find', 'fit', 'five', 'follow', 'friend', 'george', 'get', 'go', 'going', 'hacking', 'hash', 'headline', 'home', 'information', 'inhibit', 'instantly', 'intel', 'latest', 'learn', 'let', 'life', 'like', 'link', 'made', 'major', 'malware', 'master', 'message', 'might', 'model', 'move', 'much', 'multiple', 'new', 'news', 'newsletter', 'next', 'online', 'page', 'policy', 'popular', 'privacy', 'protectwise', 'pt', 'ransomware', 'related', 'resource', 'right', 'roundtable', 'said', 'salted', 'secure', 'securing', 'security', 'sent', 'sentinelone', 'separate', 'service', 'sign', 'sorry', 'spam', 'sponsored', 'story', 'stream', 'terabyte', 'thank', 'time', 'tool', 'twitter', 'update', 'use', 'utility', 'vendor', 'video', 'visit', 'washington', 'wherever', 'wikileaks'] | |
678 | |
679 | |
679 2017-03-22T12:30:48.461000Z https://letstalk.globalservices.bt.com/en/2017/03/spinning-plates-data-analytics-drive-digital-store/ | |
679 2017-03-30T12:30:52.717000Z https://letstalk.globalservices.bt.com/en/2017/03/using-data-analytics-drive-business-insight/ | |
['abel', 'advanced', 'agile', 'analytics', 'asked', 'behaviour', 'better', 'big', 'blog', 'brings', 'bt', 'business', 'byod', 'choice', 'cloud', 'collaboration', 'collection', 'communication', 'computing', 'conferencing', 'confused', 'connect', 'connecting', 'contact', 'crime', 'crm', 'customer', 'cyber', 'data', 'deliver', 'device', 'digital', 'drive', 'economy', 'ecosystem', 'even', 'experience', 'featured', 'feed', 'filed', 'finance', 'find', 'flexible', 'future', 'giving', 'global', 'health', 'home', 'identify', 'independent', 'infrastructure', 'innovation', 'insight', 'intelligent', 'internet', 'inventory', 'john', 'know', 'let', 'medium', 'millard', 'mobile', 'multiplier', 'must', 'need', 'network', 'nh', 'nicola', 'office', 'oracle', 'partner', 'party', 'personalisation', 'possible', 'post', 'psn', 'public', 'read', 'realise', 'reshaping', 'retail', 'retailer', 'sale', 'search', 'sector', 'security', 'service', 'shopping', 'smartphones', 'social', 'solution', 'store', 'subscribe', 'successful', 'survey', 'sustainability', 'tag', 'tagged', 'talk', 'technology', 'thing', 'third', 'transformation', 'ucc', 'unified', 'video', 'vital', 'want', 'way', 'worker', 'working', 'would'] | |
680 | |
681 | |
683 | |
683 2017-03-02T06:31:31.481000Z http://www.welivesecurity.com/2010/01/20/r-i-p-ie-6/ | |
683 2017-03-25T06:31:01.282000Z http://www.welivesecurity.com/2016/01/12/microsoft-ends-support-for-old-internet-explorer-versions/ | |
683 2017-03-27T12:31:41.614000Z https://www.welivesecurity.com/2016/01/12/microsoft-ends-support-for-old-internet-explorer-versions/ | |
['access', 'activex', 'add', 'adobe', 'al', 'also', 'although', 'android', 'app', 'application', 'archive', 'article', 'author', 'available', 'blog', 'breach', 'browser', 'chrome', 'code', 'community', 'company', 'computer', 'conference', 'contact', 'continue', 'control', 'copyright', 'data', 'de', 'deutsch', 'direct', 'div', 'effort', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'exploited', 'explorer', 'facebook', 'feature', 'financial', 'firefox', 'follow', 'following', 'found', 'friend', 'give', 'go', 'google', 'home', 'hot', 'http', 'inbox', 'information', 'insight', 'interested', 'internet', 'ir', 'language', 'latest', 'legal', 'like', 'link', 'linkedin', 'lot', 'magazine', 'malicious', 'malware', 'many', 'material', 'microsoft', 'might', 'million', 'modern', 'month', 'mozilla', 'multimedia', 'navigation', 'need', 'new', 'news', 'newsletter', 'operating', 'opinion', 'others', 'page', 'paper', 'patch', 'play', 'podcasts', 'policy', 'popular', 'post', 'posted', 'print', 'privacy', 'question', 'radar', 'ransomware', 'read', 'recommending', 'related', 'released', 'replacement', 'require', 'required', 'research', 'researcher', 'reserved', 'right', 'search', 'security', 'select', 'server', 'sign', 'site', 'sitemap', 'standard', 'stylesheet', 'system', 'testing', 'toggle', 'topic', 'try', 'twitter', 'update', 'upgraded', 'use', 'used', 'user', 'using', 'version', 'video', 'view', 'virus', 'vista', 'vulnerability', 'want', 'web', 'wechseln', 'whats', 'white', 'window', 'wls', 'would', 'xp', 'youtube', 'zum'] | |
684 | |
686 | |
687 | |
687 2017-03-16T18:32:07.040000Z https://www.mimecast.com/blog/2013/08/lifting-the-lid-on-large-file-sending/ | |
687 2017-03-18T12:34:24.381000Z http://www.mimecast.com/blog/2013/08/lifting-the-lid-on-large-file-sending/ | |
['able', 'acceptable', 'according', 'addition', 'administrator', 'advanced', 'aes', 'africa', 'allowance', 'allows', 'also', 'always', 'america', 'announced', 'appreciated', 'apps', 'archive', 'archiving', 'asia', 'asked', 'attachment', 'attack', 'audit', 'award', 'aware', 'become', 'benefit', 'big', 'blog', 'bond', 'breach', 'brings', 'bundle', 'bypass', 'capsticks', 'career', 'center', 'central', 'centrally', 'challenge', 'chamber', 'chance', 'chat', 'client', 'cloud', 'coalition', 'comment', 'company', 'compliance', 'constraint', 'consumer', 'contact', 'content', 'continuity', 'control', 'copy', 'counter', 'cry', 'custom', 'customer', 'cyber', 'data', 'date', 'defend', 'defined', 'delivered', 'demand', 'demo', 'department', 'detail', 'determine', 'directory', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'download', 'duplication', 'east', 'easy', 'eliminates', 'email', 'enable', 'encrypted', 'encryption', 'end', 'enough', 'ensuring', 'equally', 'europe', 'event', 'exchange', 'exciting', 'existing', 'expect', 'experience', 'expert', 'expiration', 'exploring', 'external', 'face', 'feature', 'feel', 'file', 'filed', 'firm', 'first', 'forward', 'get', 'going', 'google', 'governance', 'guest', 'harder', 'head', 'healthcare', 'help', 'hogging', 'home', 'hybrid', 'im', 'impact', 'important', 'improve', 'improved', 'inbox', 'information', 'infrastructure', 'instead', 'intercept', 'internal', 'investor', 'javascript', 'jumped', 'knowledgebase', 'large', 'last', 'law', 'leadership', 'leak', 'legacy', 'legal', 'lid', 'lifting', 'like', 'log', 'login', 'longer', 'looking', 'mail', 'mailbox', 'make', 'managed', 'management', 'meet', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'modern', 'month', 'network', 'new', 'news', 'next', 'north', 'notified', 'number', 'obviously', 'offer', 'office', 'one', 'option', 'organization', 'outlook', 'overview', 'pacific', 'partner', 'people', 'percent', 'personally', 'persuade', 'piece', 'platform', 'please', 'plus', 'policy', 'post', 'posted', 'powered', 'press', 'prevention', 'privacy', 'product', 'productivity', 'professional', 'program', 'protected', 'protection', 'provided', 'puzzle', 'quote', 'ranked', 'really', 'received', 'recipient', 'registration', 'related', 'relation', 'release', 'removed', 'reporting', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'rolled', 'running', 'sale', 'scanned', 'schedule', 'secure', 'securely', 'security', 'see', 'send', 'sender', 'sending', 'sensitive', 'sent', 'server', 'service', 'set', 'share', 'sharing', 'side', 'signature', 'sitemap', 'sits', 'sitting', 'size', 'solution', 'something', 'south', 'specialist', 'ssl', 'started', 'step', 'stop', 'storage', 'store', 'stored', 'struck', 'success', 'support', 'switch', 'targeted', 'team', 'technical', 'technology', 'term', 'thing', 'threat', 'tighten', 'tim', 'today', 'training', 'trust', 'tweet', 'unprepared', 'uploaded', 'uploads', 'use', 'useful', 'user', 'using', 'view', 'visibility', 'wait', 'want', 'way', 'webinars', 'well', 'whaling', 'whilst', 'within', 'without', 'work'] | |
688 | |
689 | |
690 | |
692 | |
693 | |
694 | |
695 | |
696 | |
696 2017-03-09T18:31:19.410000Z https://www.pwnieexpress.com/blog/october-newsletter | |
696 2017-03-28T00:31:00.481000Z https://www.pwnieexpress.com/blog/when-the-meat-scale-betrays-you | |
['accessory', 'apparel', 'assessment', 'attack', 'blog', 'bluetooth', 'boston', 'building', 'byod', 'career', 'category', 'community', 'conference', 'customer', 'detection', 'device', 'distributed', 'edition', 'email', 'enforcement', 'event', 'experience', 'express', 'floor', 'getting', 'iot', 'karma', 'last', 'lot', 'making', 'many', 'mobile', 'month', 'network', 'news', 'office', 'pad', 'peek', 'penetration', 'pentesting', 'policy', 'post', 'press', 'privacy', 'product', 'pulse', 'pwn', 'pwnie', 'question', 'real', 'related', 'release', 'reserved', 'resource', 'right', 'rogue', 'security', 'see', 'sensor', 'service', 'share', 'sneak', 'solution', 'store', 'street', 'subscribe', 'summer', 'support', 'take', 'team', 'term', 'testing', 'thing', 'update', 'vega', 'vulnerability', 'wireless', 'work'] | |
697 | |
698 | |
699 | |
700 | |
701 | |
701 2017-03-08T00:30:46.127000Z https://veracode.com/blog/secure-development/its-time-stop-blaming-developers-insecure-software | |
701 2017-03-09T00:30:56.827000Z http://www.veracode.com/blog/secure-development/its-time-stop-blaming-developers-insecure-software | |
['accept', 'actively', 'address', 'adversary', 'almost', 'alone', 'also', 'analysis', 'application', 'architect', 'around', 'arya', 'attack', 'avoid', 'awareness', 'background', 'become', 'becomes', 'beginning', 'best', 'beyond', 'biggest', 'blaming', 'blog', 'broken', 'bug', 'build', 'building', 'business', 'call', 'career', 'carolina', 'case', 'cause', 'challenge', 'coding', 'colleague', 'comment', 'commercial', 'computer', 'concept', 'conducting', 'conference', 'consultant', 'consultation', 'consulting', 'content', 'contractor', 'control', 'countless', 'create', 'creating', 'customer', 'cybersecurity', 'darpa', 'date', 'defect', 'defense', 'defensive', 'deployed', 'design', 'designed', 'designing', 'detectably', 'developer', 'development', 'devops', 'dog', 'effective', 'email', 'embarrassing', 'empathy', 'engineer', 'ensure', 'entire', 'environment', 'even', 'ever', 'everyone', 'exist', 'experience', 'extends', 'extensive', 'face', 'facilitates', 'fact', 'feature', 'field', 'find', 'finger', 'form', 'freelance', 'functionality', 'get', 'group', 'guide', 'hand', 'happens', 'heard', 'help', 'helping', 'hold', 'home', 'homepage', 'hot', 'implementation', 'implementing', 'important', 'importantly', 'incentive', 'including', 'incorporate', 'input', 'insecure', 'institute', 'interact', 'involved', 'issue', 'kept', 'keyboard', 'knowledge', 'leadership', 'letting', 'leverage', 'lifecycle', 'logical', 'lot', 'maintenance', 'make', 'manager', 'many', 'marked', 'matt', 'measure', 'mediator', 'member', 'might', 'mindset', 'mollom', 'move', 'multiple', 'must', 'name', 'nationally', 'need', 'network', 'new', 'next', 'number', 'offering', 'one', 'operation', 'order', 'organization', 'organizational', 'others', 'output', 'outside', 'owner', 'page', 'part', 'path', 'penetration', 'people', 'perspective', 'phrase', 'picture', 'playing', 'please', 'point', 'policy', 'polytechnic', 'post', 'potato', 'practice', 'prevent', 'previous', 'prior', 'prioritize', 'priority', 'privacy', 'private', 'problem', 'process', 'product', 'production', 'program', 'publicly', 'published', 'purposefully', 'put', 'qa', 'reach', 'required', 'requirement', 'research', 'researcher', 'responsibility', 'responsible', 'result', 'review', 'role', 'runkle', 'running', 'science', 'script', 'sdlc', 'secure', 'securing', 'security', 'share', 'shared', 'showing', 'shown', 'situation', 'small', 'software', 'solve', 'solved', 'sometimes', 'space', 'stage', 'start', 'stay', 'stop', 'student', 'submitting', 'sure', 'survival', 'take', 'teach', 'team', 'technique', 'test', 'testing', 'think', 'though', 'three', 'throughout', 'time', 'towards', 'traditional', 'training', 'trump', 'turned', 'university', 'use', 'validation', 'various', 'veracode', 'way', 'worcester', 'work', 'worked', 'write', 'written', 'xena', 'year', 'yes', 'york'] | |
702 | |
702 2017-03-05T00:39:53.747000Z http://thehackernews.com/2011/09/united-nations-sub-domain-of-swaziland.html | |
702 2017-03-05T00:40:03.287000Z http://thehackernews.com/2011/08/egyptian-consulate-in-united-kingdom.html | |
702 2017-03-05T00:40:18.307000Z http://thehackernews.com/2011/08/nerc-national-syrian-energy-research.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'cocain', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defaced', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mirror', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
703 | |
704 | |
704 2017-03-01T12:32:40.937000Z http://www.itsecurityguru.org/2017/03/01/security-slip-ups-1password-password-managers-extremely-worrying/ | |
704 2017-03-01T12:32:04.893000Z http://www.itsecurityguru.org/2017/03/01/ico-slaps-health-firm-200k-fine-audio-recording-data-breach-boo-boo/ | |
704 2017-03-01T12:32:10.959000Z http://www.itsecurityguru.org/2017/03/01/lazarus-hacking-group-likely-behind-ratankba-ransomware-attacks/ | |
['ability', 'abysmal', 'action', 'ad', 'administrator', 'advanced', 'advertising', 'afraid', 'ago', 'american', 'amidst', 'anonabox', 'application', 'appriver', 'approves', 'around', 'article', 'ask', 'atm', 'atombombing', 'attack', 'audio', 'back', 'backlash', 'bank', 'banking', 'bear', 'became', 'becomes', 'behind', 'biggest', 'billion', 'binary', 'biometrics', 'blind', 'board', 'book', 'breach', 'broadly', 'build', 'business', 'campaign', 'change', 'citibank', 'cloudpets', 'cm', 'collective', 'combat', 'come', 'comment', 'community', 'consumer', 'contentious', 'convenience', 'cost', 'creating', 'criminal', 'cyber', 'cyberattacks', 'cybersecurity', 'data', 'date', 'ddos', 'development', 'disposal', 'doe', 'dridex', 'ebay', 'editor', 'editorial', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'explain', 'exploiting', 'expo', 'express', 'facebook', 'family', 'famous', 'fed', 'find', 'fine', 'finnish', 'firm', 'first', 'flaw', 'follow', 'fraud', 'full', 'gdpr', 'general', 'generation', 'genuine', 'get', 'getting', 'globally', 'goodbye', 'got', 'government', 'greg', 'grip', 'group', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'harm', 'head', 'health', 'help', 'hidemyweb', 'hitting', 'home', 'hospital', 'hour', 'http', 'ico', 'impact', 'imposter', 'improve', 'incident', 'industry', 'information', 'infosec', 'infosecurity', 'inside', 'integrate', 'internet', 'involved', 'ip', 'jackson', 'japonica', 'joe', 'knew', 'know', 'korean', 'landmark', 'laura', 'law', 'lazarus', 'least', 'leave', 'lending', 'like', 'likely', 'link', 'literacy', 'lizard', 'look', 'looking', 'loss', 'lure', 'machine', 'making', 'malvertising', 'malware', 'manager', 'manchester', 'many', 'million', 'mindef', 'mitigation', 'mobile', 'netflix', 'never', 'new', 'news', 'next', 'nh', 'num', 'offline', 'one', 'online', 'open', 'operation', 'option', 'original', 'password', 'patient', 'paypal', 'persistent', 'personal', 'personnel', 'pervasive', 'phishing', 'platform', 'please', 'pm', 'popular', 'posted', 'potential', 'previous', 'primary', 'privacy', 'protecting', 'protection', 'public', 'purpose', 'ransomware', 'ratankba', 'reaction', 'real', 'recent', 'record', 'recording', 'reduce', 'regulation', 'related', 'remains', 'response', 'retailer', 'return', 'rich', 'right', 'rise', 'rising', 'risk', 'round', 'run', 'sale', 'scam', 'sector', 'security', 'sensitive', 'serious', 'share', 'shortage', 'sign', 'skill', 'slap', 'smart', 'software', 'sort', 'source', 'south', 'spam', 'spot', 'squad', 'stock', 'stolen', 'story', 'suffered', 'supporter', 'surprising', 'system', 'tackle', 'tag', 'take', 'talking', 'target', 'technique', 'teddy', 'ten', 'term', 'themed', 'thing', 'think', 'threat', 'top', 'touch', 'track', 'trading', 'transaction', 'trend', 'trojan', 'turning', 'tweet', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'victim', 'video', 'view', 'viral', 'vital', 'vulnerability', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'wilson', 'within', 'working', 'worldwide', 'worse', 'year'] | |
705 | |
707 | |
708 | |
708 2017-03-27T12:30:54.217000Z http://securityaffairs.co/wordpress/57448/security/terrorists-secure-messaging.html | |
708 2017-03-27T18:30:57.223000Z http://thehackernews.com/2017/03/london-terror-attack-whatsapp.html | |
708 2017-03-27T18:30:58.610000Z https://hotforsecurity.bitdefender.com/blog/uk-government-demands-backdoors-in-end-to-end-encryption-17847.html | |
708 2017-03-27T18:30:59.564000Z https://nakedsecurity.sophos.com/2017/03/27/politicians-call-again-for-backdoors-into-encrypted-messages/ | |
['amber', 'attack', 'backdoor', 'communicate', 'company', 'encrypted', 'encryption', 'find', 'firm', 'government', 'like', 'london', 'make', 'message', 'messaging', 'need', 'news', 'others', 'place', 'plenty', 'provide', 'rudd', 'secret', 'sure', 'terrorist', 'time', 'used', 'whatsapp', 'would'] | |
709 | |
709 2017-03-09T00:31:06.088000Z https://www.scmagazine.com/comey-says-encryption-stymies-law-enforcement-calls-for-hard-conversation/article/642915/ | |
709 2017-03-15T18:30:51.507000Z https://www.scmagazine.com/nunes-says-no-evidence-trump-tapped-all-eyes-on-comey/article/644391/ | |
709 2017-03-22T00:31:02.133000Z https://www.scmagazine.com/no-one-wants-to-be-fbi-director-james-comey-right-now/article/645609/ | |
709 2017-03-24T18:33:33.194000Z https://www.scmagazine.com/fbi-director-comey-advocates-for-weakening-of-security/article/646411/ | |
709 2017-03-30T06:30:51.426000Z https://www.scmagazine.com/nunes-accused-of-violating-espionage-act-refuses-to-recuse-himself/article/647323/ | |
['acceptance', 'advertise', 'advisory', 'afghanistan', 'africa', 'african', 'albania', 'algeria', 'american', 'andorra', 'angola', 'anguilla', 'antarctica', 'antigua', 'antilles', 'arab', 'arabia', 'archive', 'argentina', 'arm', 'armenia', 'article', 'aruba', 'australia', 'austria', 'authorization', 'award', 'azerbaijan', 'bahamas', 'bahrain', 'bangladesh', 'bar', 'barbados', 'barbuda', 'belarus', 'belgium', 'belize', 'benin', 'bermuda', 'bhutan', 'blog', 'board', 'bolivia', 'bosnia', 'botswana', 'bouvet', 'brazil', 'breach', 'british', 'broadcast', 'brunei', 'bulgaria', 'burkina', 'burundi', 'business', 'buzz', 'caicos', 'caledonia', 'call', 'cambodia', 'cameroon', 'canada', 'cape', 'cayman', 'center', 'central', 'chad', 'challenge', 'chile', 'china', 'christmas', 'city', 'click', 'cloud', 'coco', 'colombia', 'comey', 'comment', 'comoros', 'compliance', 'condition', 'conference', 'congo', 'constitutes', 'contact', 'cook', 'copyright', 'costa', 'countless', 'croatia', 'cuba', 'cybercrime', 'cybersecurity', 'cyprus', 'czech', 'côte', 'darussalam', 'data', 'day', 'delivered', 'denmark', 'depth', 'director', 'djibouti', 'dominica', 'dominican', 'drc', 'ecuador', 'egypt', 'el', 'email', 'emirate', 'equatorial', 'eritrea', 'establish', 'estonia', 'ethiopia', 'event', 'face', 'fact', 'falkland', 'faq', 'faroe', 'faso', 'fast', 'fbi', 'feature', 'featured', 'fiji', 'finland', 'first', 'follow', 'form', 'france', 'french', 'futuna', 'gabon', 'gambia', 'georgia', 'germany', 'get', 'ghana', 'gibraltar', 'government', 'greece', 'greenland', 'greg', 'grenada', 'grenadine', 'group', 'guadeloupe', 'guam', 'guatemala', 'guiana', 'guinea', 'guyana', 'haiti', 'haymarket', 'heard', 'helena', 'herzegovina', 'honduras', 'hong', 'hungary', 'iceland', 'inbox', 'india', 'indian', 'indonesia', 'information', 'insider', 'iot', 'iran', 'iraq', 'ireland', 'island', 'israel', 'italy', 'jamaica', 'james', 'japan', 'jordan', 'kazakhstan', 'keeling', 'kenya', 'kingdom', 'kiribati', 'kitts', 'kong', 'korea', 'kuwait', 'kyrgyzstan', 'lanka', 'lao', 'latvia', 'lebanon', 'leone', 'lesotho', 'liberia', 'library', 'libya', 'liechtenstein', 'like', 'lithuania', 'log', 'login', 'look', 'lucia', 'luxembourg', 'macao', 'macedonia', 'madagascar', 'magazine', 'malawi', 'malaysia', 'maldives', 'mali', 'malta', 'malvinas', 'malware', 'management', 'mariana', 'marino', 'marshall', 'martin', 'martinique', 'master', 'material', 'mauritania', 'mauritius', 'mayen', 'mayotte', 'mcdonald', 'medium', 'meet', 'member', 'menu', 'mexico', 'micronesia', 'miquelon', 'mobile', 'moldova', 'monaco', 'mongolia', 'montenegro', 'montserrat', 'morocco', 'mozambique', 'must', 'myanmar', 'namibia', 'nauru', 'need', 'nepal', 'netherlands', 'network', 'nevis', 'new', 'news', 'newswire', 'nicaragua', 'niger', 'nigeria', 'niue', 'norfolk', 'north', 'northern', 'norway', 'ny', 'ocean', 'oman', 'one', 'online', 'opinion', 'overall', 'pakistan', 'palau', 'panama', 'paper', 'papua', 'paraguay', 'peru', 'philippine', 'phishing', 'pierre', 'pitcairn', 'poland', 'policy', 'polynesia', 'portugal', 'post', 'posture', 'press', 'principe', 'prior', 'privacy', 'product', 'professional', 'published', 'puerto', 'qatar', 'ransomware', 'read', 'reboot', 'receive', 'redistributed', 'register', 'registered', 'related', 'release', 'relevant', 'report', 'reprint', 'republic', 'reserved', 'resource', 'reunion', 'review', 'rewritten', 'rica', 'rico', 'right', 'risk', 'risksec', 'robinson', 'romania', 'rsa', 'russia', 'rwanda', 'said', 'saint', 'salvador', 'samoa', 'san', 'sao', 'saudi', 'say', 'sc', 'search', 'security', 'senegal', 'seychelles', 'show', 'sierra', 'singapore', 'site', 'slovakia', 'slovenia', 'solomon', 'somalia', 'source', 'south', 'southern', 'spain', 'sri', 'state', 'strategy', 'subscribe', 'sudan', 'suriname', 'svalbard', 'swaziland', 'sweden', 'switzerland', 'syria', 'tackle', 'taiwan', 'tajikistan', 'tanzania', 'team', 'technical', 'teri', 'term', 'territory', 'test', 'thailand', 'threat', 'tobago', 'togo', 'tokelau', 'tome', 'tonga', 'topic', 'toronto', 'trinidad', 'tunisia', 'turk', 'turkey', 'turkmenistan', 'tuvalu', 'uganda', 'uk', 'ukraine', 'unbiased', 'underpin', 'united', 'uruguay', 'use', 'user', 'uzbekistan', 'vanuatu', 'vatican', 'venezuela', 'verde', 'via', 'video', 'vietnam', 'vincent', 'virgin', 'virtual', 'vulnerability', 'wallis', 'webcasts', 'website', 'western', 'white', 'whitepaper', 'whitepapers', 'without', 'would', 'yemen', 'yugoslavia', 'zambia', 'zealand', 'zimbabwe'] | |
710 | |
712 | |
714 | |
715 | |
716 | |
717 | |
718 | |
719 | |
720 | |
722 | |
723 | |
724 | |
725 | |
725 2017-03-07T12:30:50.547000Z http://www.welivesecurity.com/2017/03/07/wordpress-webmasters-urged-upgrade-version-4-73-patch-six-security-holes/ | |
725 2017-03-07T18:30:49.583000Z https://www.scmagazine.com/upgrade-to-v473-wordpress-users-advised/article/642436/ | |
['account', 'admin', 'administrator', 'although', 'application', 'archive', 'article', 'attack', 'attacker', 'automatically', 'block', 'blog', 'bug', 'business', 'chance', 'character', 'cluley', 'conference', 'contact', 'control', 'copyright', 'core', 'could', 'critical', 'csrf', 'day', 'deleted', 'deletion', 'detail', 'disclosure', 'email', 'embeds', 'excessive', 'exploit', 'exploited', 'fact', 'fend', 'file', 'filter', 'firewall', 'first', 'fix', 'flaw', 'follow', 'following', 'forgery', 'fortunately', 'functionality', 'go', 'graham', 'http', 'inbox', 'information', 'latest', 'le', 'leading', 'live', 'look', 'magazine', 'malicious', 'many', 'material', 'medium', 'metadata', 'might', 'million', 'minute', 'must', 'name', 'need', 'new', 'news', 'newsletter', 'online', 'opinion', 'opted', 'page', 'paper', 'patch', 'plugin', 'plugins', 'policy', 'popular', 'post', 'press', 'privacy', 'public', 'ransomware', 'read', 'redirect', 'related', 'request', 'researcher', 'reserved', 'resource', 'responsible', 'right', 'risk', 'running', 'scripting', 'search', 'security', 'server', 'sign', 'site', 'six', 'staging', 'strategy', 'taxonomy', 'team', 'term', 'test', 'threat', 'topic', 'traffic', 'trick', 'try', 'uk', 'unintended', 'update', 'updated', 'upgrade', 'url', 'use', 'user', 'using', 'validation', 'version', 'via', 'video', 'vulnerability', 'web', 'website', 'white', 'window', 'without', 'wordpress', 'youtube'] | |
727 | |
728 | |
728 2017-03-05T00:40:24Z http://thehackernews.com/2011/08/italian-police-website-sappe-defaced-by.html | |
728 2017-03-05T00:40:31.146000Z http://thehackernews.com/2011/07/italys-police-it-network-vitrocisetit.html | |
728 2017-03-05T00:40:35.352000Z http://thehackernews.com/2011/07/changegov-donor-list-2010-leaked-by.html | |
728 2017-03-05T00:40:37.376000Z http://thehackernews.com/2011/07/philippine-congress-hacked-by-bashcrew.html | |
728 2017-03-05T00:40:39.773000Z http://thehackernews.com/2011/07/10-peru-government-sites-database-dump.html | |
728 2017-03-05T00:40:57.273000Z http://thehackernews.com/2011/07/pepper-dating-site-hacked-by-anonymous.html | |
728 2017-03-05T00:41:04.196000Z http://thehackernews.com/2011/06/black-and-berg-cybersecurity-consulting.html | |
['ability', 'amazon', 'anonymity', 'anonymous', 'antisec', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'lulzsec', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
729 | |
730 | |
731 | |
731 2017-03-11T12:31:00.115000Z http://www.welivesecurity.com/2015/02/11/cyber-threat-intelligence-integration-center-cticc/ | |
731 2017-03-27T12:32:19.119000Z https://www.welivesecurity.com/2015/02/11/cyber-threat-intelligence-integration-center-cticc/ | |
['actor', 'actually', 'adapt', 'add', 'added', 'adding', 'advance', 'advocate', 'agency', 'ago', 'aide', 'al', 'alarm', 'allows', 'already', 'also', 'analysis', 'android', 'announcing', 'anthem', 'anything', 'apology', 'app', 'apparently', 'appreciated', 'archive', 'argued', 'article', 'assumption', 'attack', 'attempting', 'author', 'awareness', 'bad', 'banking', 'become', 'becoming', 'belongs', 'ben', 'better', 'big', 'birth', 'blame', 'blog', 'breach', 'broad', 'called', 'car', 'center', 'centerpiece', 'change', 'changer', 'chase', 'chief', 'circle', 'civilian', 'clearly', 'closely', 'clue', 'cobb', 'code', 'commercial', 'commit', 'communication', 'community', 'company', 'comprehensive', 'concern', 'conference', 'connected', 'contact', 'contain', 'contributing', 'cooperation', 'copyright', 'correct', 'correction', 'could', 'counter', 'counterterrorism', 'course', 'created', 'criticized', 'ctiic', 'current', 'cyber', 'cyberbreaches', 'cybercrime', 'cybercriminals', 'cybersecurity', 'dangerous', 'data', 'de', 'department', 'deputy', 'destructive', 'deter', 'deterrence', 'deutsch', 'dhs', 'different', 'direct', 'director', 'directorate', 'discussed', 'disseminate', 'div', 'diverse', 'domain', 'done', 'earlier', 'effect', 'email', 'embed', 'en', 'english', 'entity', 'erroneous', 'eset', 'español', 'established', 'evidence', 'example', 'exists', 'expert', 'expressed', 'facebook', 'fact', 'failure', 'faster', 'favor', 'fear', 'federal', 'firstly', 'flowing', 'follow', 'foreign', 'frankly', 'friend', 'front', 'future', 'game', 'gave', 'get', 'getting', 'given', 'giving', 'go', 'goal', 'going', 'google', 'got', 'government', 'greater', 'greatly', 'group', 'hacked', 'hacking', 'home', 'homeland', 'hope', 'hot', 'house', 'http', 'idea', 'identification', 'identify', 'immediacy', 'immunity', 'inbox', 'incident', 'include', 'increasingly', 'indeed', 'individual', 'information', 'initiative', 'input', 'insight', 'integration', 'intelligence', 'interested', 'ir', 'ironically', 'irony', 'issue', 'johnson', 'jpmorgan', 'keeping', 'kind', 'lady', 'language', 'larger', 'latest', 'law', 'le', 'leaked', 'led', 'legal', 'legislation', 'like', 'link', 'linkedin', 'lisa', 'look', 'lot', 'magazine', 'malicious', 'management', 'many', 'marketplace', 'material', 'meltonkt', 'merely', 'might', 'mission', 'monaco', 'month', 'multimedia', 'national', 'naturally', 'navigation', 'nccic', 'nctc', 'need', 'new', 'news', 'newsletter', 'nexus', 'norm', 'nppd', 'npr', 'numerous', 'odni', 'office', 'official', 'operation', 'opinion', 'page', 'paper', 'particularly', 'past', 'people', 'perspective', 'pete', 'photo', 'phyllis', 'picture', 'play', 'podcasts', 'pointed', 'policy', 'pool', 'popular', 'post', 'posted', 'precision', 'prevent', 'primary', 'print', 'privacy', 'private', 'problem', 'process', 'program', 'proposed', 'protection', 'public', 'pursue', 'push', 'quickly', 'radar', 'ransomware', 'rapidly', 'rationale', 'read', 'reader', 'reason', 'recently', 'red', 'related', 'remain', 'remit', 'remote', 'report', 'research', 'resembles', 'reserved', 'response', 'right', 'role', 'rtm', 'said', 'sanction', 'scenario', 'schneck', 'search', 'secretary', 'sector', 'security', 'seen', 'select', 'several', 'share', 'sharing', 'sign', 'similar', 'sincere', 'site', 'sitemap', 'situation', 'situational', 'slow', 'small', 'smartphones', 'solved', 'something', 'sony', 'sophisticated', 'sound', 'souza', 'space', 'spoke', 'start', 'stated', 'statement', 'stealthy', 'stem', 'stephen', 'stop', 'stressed', 'stronger', 'stylesheet', 'succeed', 'swifter', 'swiftly', 'system', 'take', 'taken', 'talk', 'talked', 'target', 'targeting', 'terrorist', 'thanks', 'think', 'threat', 'tide', 'time', 'toggle', 'top', 'topic', 'twitter', 'undersecretary', 'unless', 'urged', 'using', 'variety', 'video', 'view', 'violate', 'virus', 'wake', 'watching', 'way', 'wechseln', 'whats', 'white', 'within', 'without', 'wls', 'woman', 'worry', 'would', 'wrong', 'wsj', 'year', 'yes', 'yesterday', 'yet', 'youtube', 'zum'] | |
732 | |
733 | |
733 2017-03-09T18:32:07.842000Z http://www.welivesecurity.com/2010/08/06/support-scams-on-the-rise-1/ | |
733 2017-03-27T12:33:57.485000Z https://www.welivesecurity.com/2010/08/06/support-scams-on-the-rise-1/ | |
['able', 'abn', 'accent', 'accented', 'access', 'across', 'action', 'activity', 'actually', 'add', 'additional', 'administered', 'admit', 'advice', 'affected', 'affiliated', 'afraid', 'afterwards', 'agency', 'ago', 'agreed', 'al', 'alan', 'alive', 'almost', 'along', 'already', 'also', 'analyst', 'anderson', 'android', 'another', 'antivirus', 'anyhow', 'anyone', 'anything', 'app', 'apparently', 'approached', 'approximately', 'archive', 'argue', 'ari', 'around', 'article', 'aryeh', 'asked', 'assistance', 'assumed', 'attention', 'australia', 'australian', 'author', 'authority', 'av', 'available', 'avast', 'avg', 'aware', 'away', 'back', 'backed', 'bait', 'based', 'became', 'behalf', 'believable', 'believe', 'believing', 'belong', 'better', 'beyond', 'big', 'bit', 'blake', 'blog', 'bogus', 'brisbane', 'bully', 'bunch', 'burn', 'business', 'buy', 'ca', 'california', 'call', 'called', 'caller', 'calling', 'came', 'capell', 'card', 'care', 'carolyn', 'carried', 'case', 'centre', 'certain', 'certified', 'chance', 'chat', 'check', 'checked', 'chien', 'cisco', 'claimed', 'claiming', 'clean', 'cleaning', 'clicked', 'close', 'code', 'cold', 'colleague', 'come', 'coming', 'community', 'company', 'complete', 'component', 'comprehension', 'compromised', 'computer', 'conference', 'confident', 'consultation', 'contact', 'contacted', 'context', 'contributed', 'control', 'conversation', 'convincing', 'cookie', 'copy', 'copyright', 'could', 'country', 'course', 'crack', 'cracked', 'cranky', 'credit', 'crimefighting', 'criminal', 'currently', 'customer', 'cybercrime', 'cybersecurity', 'danger', 'data', 'david', 'day', 'de', 'decade', 'deleted', 'deliberate', 'demand', 'denver', 'department', 'desk', 'detail', 'deutsch', 'development', 'different', 'direct', 'dirro', 'disconnect', 'div', 'doctor', 'done', 'dont', 'download', 'downloaded', 'draw', 'drawing', 'drive', 'drop', 'dying', 'ear', 'easy', 'edition', 'effective', 'else', 'email', 'embed', 'employee', 'en', 'end', 'ended', 'enforcement', 'engineer', 'english', 'enough', 'entail', 'eric', 'error', 'eset', 'español', 'essential', 'establishing', 'etc', 'ethic', 'even', 'event', 'eventually', 'ever', 'every', 'everything', 'evidently', 'exactly', 'exchange', 'exclamation', 'expert', 'exploit', 'explorer', 'extended', 'extension', 'facebook', 'failed', 'fake', 'fee', 'fell', 'fellow', 'fifteen', 'figured', 'file', 'finally', 'financial', 'financially', 'find', 'first', 'fix', 'flag', 'flood', 'folder', 'follow', 'foolishly', 'foolishness', 'forensic', 'forum', 'found', 'free', 'frequent', 'friend', 'front', 'full', 'fun', 'gave', 'general', 'generating', 'generic', 'george', 'gerry', 'get', 'getting', 'give', 'given', 'giving', 'global', 'go', 'going', 'good', 'google', 'goretsky', 'got', 'grand', 'great', 'guarantee', 'guess', 'guy', 'hand', 'happen', 'happened', 'hard', 'hardly', 'harley', 'head', 'heated', 'hello', 'help', 'hesitant', 'hit', 'home', 'hope', 'hot', 'however', 'http', 'hundred', 'hung', 'husband', 'iceberg', 'illegitimate', 'immediately', 'imu', 'inbox', 'incoherent', 'income', 'independent', 'india', 'indian', 'infected', 'infection', 'inform', 'information', 'informed', 'initiated', 'injury', 'innovative', 'insight', 'install', 'installed', 'installing', 'institution', 'instructed', 'instruction', 'insult', 'intention', 'interested', 'interesting', 'internet', 'introducing', 'investigation', 'ir', 'ireland', 'issue', 'john', 'know', 'knowing', 'knowledge', 'kohm', 'kolkata', 'language', 'laptop', 'larry', 'last', 'latest', 'law', 'le', 'learn', 'least', 'led', 'legal', 'legitimate', 'legitimately', 'lend', 'let', 'lie', 'like', 'likely', 'linda', 'link', 'linkedin', 'list', 'local', 'locally', 'long', 'look', 'looked', 'looking', 'lord', 'luckily', 'lying', 'magazine', 'magical', 'main', 'make', 'making', 'malicious', 'malware', 'manager', 'many', 'marketing', 'material', 'matt', 'matter', 'mc', 'mcafee', 'meant', 'melbourne', 'microsoft', 'might', 'mighty', 'minimum', 'minute', 'money', 'month', 'mostly', 'mouth', 'much', 'mukherjee', 'mulligan', 'multimedia', 'mypccare', 'mysore', 'name', 'navigation', 'nearly', 'necessary', 'need', 'needed', 'neighbour', 'new', 'news', 'newsletter', 'nothing', 'notorious', 'number', 'objection', 'obviously', 'occasion', 'offer', 'offered', 'offering', 'one', 'online', 'open', 'opened', 'operation', 'opinion', 'optimise', 'oregon', 'organization', 'others', 'page', 'paid', 'panel', 'paper', 'parent', 'part', 'pas', 'passed', 'pay', 'pc', 'people', 'perhaps', 'permission', 'person', 'personalisation', 'personnel', 'pheeding', 'phishing', 'phone', 'phrenzy', 'pirated', 'pitch', 'placed', 'play', 'podcasts', 'point', 'pointing', 'police', 'policy', 'popular', 'post', 'posted', 'practical', 'preet', 'premise', 'pretty', 'price', 'print', 'privacy', 'probably', 'problem', 'proceded', 'procedure', 'proceeded', 'process', 'product', 'professional', 'program', 'promo', 'proper', 'prospective', 'prove', 'provide', 'provider', 'proving', 'public', 'pulled', 'purchase', 'purchasing', 'purveyor', 'putting', 'query', 'quietly', 'radar', 'raised', 'ran', 'ransomware', 'rather', 'reach', 'read', 'reading', 'ready', 'real', 'realize', 'really', 'reasoning', 'received', 'receiving', 'recording', 'red', 'refer', 'refused', 'registered', 'related', 'remote', 'remotely', 'remove', 'removing', 'repair', 'reply', 'report', 'reported', 'reporting', 'represent', 'reproducing', 'request', 'research', 'researcher', 'resented', 'reserved', 'result', 'reversed', 'riddled', 'right', 'rise', 'rose', 'rude', 'ryan', 'said', 'sale', 'sally', 'say', 'saying', 'scam', 'scammed', 'scammer', 'scan', 'scanner', 'scareware', 'schrott', 'screen', 'screwed', 'search', 'security', 'see', 'seeing', 'seems', 'select', 'sent', 'serious', 'seriously', 'server', 'service', 'set', 'seven', 'several', 'share', 'shopping', 'show', 'shrill', 'shut', 'shutting', 'sign', 'similar', 'simple', 'since', 'site', 'sitemap', 'sitting', 'smart', 'socalbrew', 'software', 'solution', 'someone', 'something', 'sometimes', 'son', 'sort', 'sound', 'source', 'southern', 'speak', 'speaking', 'spent', 'spyware', 'staff', 'start', 'started', 'starting', 'state', 'step', 'steve', 'still', 'stong', 'story', 'strange', 'stranger', 'stuart', 'stupid', 'stylesheet', 'suggestion', 'suite', 'supervisor', 'support', 'supportonecare', 'supposedly', 'sure', 'surely', 'suspicious', 'sydney', 'symantec', 'system', 'tab', 'take', 'taken', 'talk', 'talked', 'talking', 'targeted', 'tech', 'technical', 'technology', 'tell', 'telling', 'thake', 'thanks', 'therefore', 'thick', 'thing', 'think', 'though', 'thought', 'threat', 'threatsense', 'three', 'thrown', 'time', 'tip', 'today', 'toggle', 'told', 'took', 'tool', 'topic', 'toralv', 'traced', 'transferred', 'trick', 'trust', 'try', 'trying', 'turned', 'twitter', 'two', 'uk', 'ukraine', 'unavailable', 'understand', 'unfortunately', 'union', 'unlike', 'unnamed', 'unusual', 'upon', 'urban', 'urbane', 'usa', 'use', 'used', 'usually', 'utility', 'various', 'vastly', 'verify', 'version', 'victim', 'video', 'view', 'viewer', 'virus', 'voice', 'wa', 'waiting', 'wanted', 'warning', 'warrantee', 'warranty', 'watched', 'watching', 'way', 'wayne', 'web', 'website', 'webster', 'wechseln', 'well', 'western', 'whatever', 'whats', 'white', 'william', 'window', 'without', 'wls', 'work', 'working', 'world', 'worm', 'worried', 'worst', 'worth', 'would', 'write', 'wrong', 'wtith', 'year', 'yellow', 'yep', 'yet', 'youtube', 'zanna', 'zeal', 'zero', 'zum'] | |
734 | |
735 | |
735 2017-03-05T00:41:40.365000Z http://thehackernews.com/2011/05/indian-congress-party-ebay-nepal.html | |
735 2017-03-05T00:43:03.513000Z http://thehackernews.com/2011/04/amuls-site-is-vulnerable-to-sql.html | |
735 2017-03-05T00:43:04.535000Z http://thehackernews.com/2011/04/pizza-hut-sql-vulnerability-by-srinivas.html | |
735 2017-03-05T00:45:31.558000Z http://thehackernews.com/2011/01/sql-injection-vulnerability-in-italian.html | |
735 2017-03-05T00:47:01.644000Z http://thehackernews.com/2010/11/commonsense-cms-sql-injection.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'sql', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'vulnerability', 'walking', 'want', 'without', 'york'] | |
736 | |
736 2017-03-23T18:33:34.139000Z https://corero.com/blog/806-affordable-ddos-protection.html | |
736 2017-03-26T00:30:51.413000Z https://corero.com/blog/806-is-ddos-protection-worth-the-investment.html | |
['activity', 'affected', 'afford', 'affordable', 'already', 'also', 'always', 'analytics', 'ancillary', 'answer', 'anytime', 'approach', 'ask', 'assign', 'assume', 'atomic', 'attack', 'awareness', 'away', 'best', 'brand', 'breach', 'business', 'comment', 'common', 'company', 'conduct', 'contact', 'content', 'corero', 'cost', 'costly', 'critical', 'customer', 'damage', 'data', 'ddos', 'ddpaas', 'deal', 'defend', 'defense', 'denial', 'depends', 'deploy', 'despite', 'detection', 'development', 'difficult', 'disqus', 'distribute', 'distributed', 'downtime', 'dunnit', 'enable', 'enterprise', 'even', 'event', 'every', 'evolved', 'example', 'experience', 'fallout', 'fight', 'financially', 'fuel', 'funnel', 'generation', 'going', 'hacker', 'help', 'hosting', 'implement', 'improved', 'increase', 'increased', 'individual', 'infecting', 'information', 'interested', 'internet', 'iot', 'isps', 'javascript', 'joy', 'lack', 'launch', 'launched', 'lead', 'legacy', 'legal', 'level', 'likely', 'lost', 'lot', 'make', 'making', 'malware', 'many', 'market', 'marketing', 'mask', 'mass', 'million', 'mirai', 'money', 'monitor', 'month', 'must', 'myth', 'network', 'nurturing', 'offering', 'offline', 'often', 'onsite', 'organization', 'part', 'please', 'post', 'posted', 'powered', 'practice', 'problem', 'program', 'protected', 'protection', 'provider', 'quantity', 'question', 'ransomware', 'reached', 'receiving', 'recent', 'recently', 'reliance', 'remember', 'reo', 'reporting', 'reputation', 'requires', 'resource', 'revenue', 'risk', 'rolled', 'scrubbing', 'security', 'see', 'sense', 'service', 'share', 'size', 'smokescreen', 'software', 'solution', 'soon', 'sophistication', 'staff', 'standard', 'steep', 'system', 'take', 'taking', 'technology', 'telecommunication', 'tenant', 'terabit', 'term', 'threat', 'time', 'tool', 'top', 'trend', 'turn', 'uptime', 'used', 'value', 'view', 'weigh', 'window', 'without', 'would', 'wrongly', 'year'] | |
737 | |
737 2017-03-18T06:31:23.531000Z http://www.welivesecurity.com/2011/12/12/win32flooder-ramagedos-botnet-participating-in-ddos-related-to-elections-in-russia/ | |
737 2017-03-27T12:33:25.529000Z https://www.welivesecurity.com/2011/12/12/win32flooder-ramagedos-botnet-participating-in-ddos-related-to-elections-in-russia/ | |
['access', 'add', 'aim', 'al', 'alleged', 'also', 'android', 'another', 'app', 'appearing', 'archive', 'article', 'associated', 'attack', 'attempt', 'author', 'available', 'bandwidth', 'based', 'blog', 'bot', 'botnet', 'breach', 'car', 'case', 'censorship', 'cert', 'chance', 'charlatan', 'close', 'code', 'collected', 'community', 'computer', 'conference', 'connected', 'contact', 'contains', 'copyright', 'currently', 'cybersecurity', 'ddos', 'de', 'demonstrated', 'denial', 'detected', 'deutsch', 'direct', 'discussion', 'displeased', 'disrupt', 'distributed', 'div', 'duquette', 'easily', 'easy', 'election', 'email', 'embed', 'en', 'english', 'enlighten', 'erratum', 'error', 'eset', 'español', 'event', 'everything', 'evidence', 'expert', 'exploited', 'facebook', 'flood', 'follow', 'forum', 'friend', 'general', 'go', 'good', 'group', 'hackable', 'hashtags', 'heart', 'held', 'hole', 'home', 'hot', 'http', 'illustration', 'implant', 'inbox', 'incident', 'individual', 'industry', 'information', 'insight', 'interested', 'internet', 'ir', 'irregularity', 'keep', 'language', 'last', 'latest', 'legal', 'letter', 'lie', 'limited', 'link', 'linkedin', 'made', 'magazine', 'malware', 'material', 'message', 'might', 'mirror', 'month', 'multimedia', 'multiple', 'name', 'named', 'navigation', 'netgear', 'network', 'news', 'newsletter', 'notice', 'noticed', 'number', 'omission', 'ongoing', 'opinion', 'opposition', 'owner', 'page', 'paper', 'participating', 'patch', 'person', 'piece', 'plagiarism', 'podcasts', 'policy', 'political', 'politics', 'popular', 'post', 'posted', 'print', 'privacy', 'protection', 'protest', 'protester', 'public', 'purpose', 'radar', 'ransomware', 'read', 'reader', 'recent', 'regarding', 'related', 'relatively', 'report', 'requesting', 'research', 'reserved', 'right', 'router', 'russia', 'scare', 'search', 'section', 'security', 'see', 'select', 'service', 'sign', 'silence', 'site', 'sitemap', 'six', 'small', 'social', 'specific', 'stating', 'steal', 'street', 'stylesheet', 'sufficient', 'sébastien', 'taking', 'targeted', 'targeting', 'thank', 'thousand', 'toggle', 'topic', 'turn', 'twitter', 'unknown', 'upgrade', 'urged', 'use', 'used', 'using', 'version', 'video', 'view', 'virus', 'vkontakte', 'warns', 'webmaster', 'website', 'wechseln', 'week', 'whats', 'white', 'wls', 'wordpress', 'working', 'youtube', 'zum'] | |
739 | |
740 | |
741 | |
742 | |
742 2017-03-02T18:30:53.662000Z https://isc.sans.edu/forums/abnormal+DNS+queries+mostly+from+AWS/1707 | |
742 2017-03-26T18:30:52.126000Z https://isc.sans.edu/forums/Abnormal+DNS+Volumes/1733 | |
742 2017-03-28T06:30:54.647000Z https://isc.sans.edu/forums/Very+High+DNS+traffic/1735 | |
['ago', 'anonymous', 'appears', 'day', 'dns', 'help', 'log', 'query', 'quote', 'reply', 'server', 'started', 'subscribe', 'unique'] | |
743 | |
745 | |
747 | |
747 2017-03-05T00:40:13.249000Z http://thehackernews.com/2011/08/6542-websites-mass-defaced-by-077-hamdi.html | |
747 2017-03-05T00:43:28.828000Z http://thehackernews.com/2011/03/70-wordpress-blogs-hacked-by-077-hamdi.html | |
747 2017-03-05T00:43:30.486000Z http://thehackernews.com/2011/03/10-argentina-website-hacked-by-077.html | |
747 2017-03-05T00:43:54.235000Z http://thehackernews.com/2011/03/70-websites-rooted-by-077-hamdi-hacker.html | |
747 2017-03-05T00:44:33.998000Z http://thehackernews.com/2011/02/300-website-rooted-by-077-hamdi-hacker.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'hamdi', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'tunisian', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
748 | |
750 | |
751 | |
752 | |
753 | |
754 | |
755 | |
756 | |
758 | |
758 2017-03-05T00:40:29.529000Z http://thehackernews.com/2011/08/30-china-government-sites-hacked-by.html | |
758 2017-03-05T00:41:54.546000Z http://thehackernews.com/2011/05/lums-university-database-hacked-by.html | |
758 2017-03-05T00:42:15.190000Z http://thehackernews.com/2011/05/xss-attack-on-francecom-by-hitcher.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'hitcher', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
759 | |
760 | |
761 | |
761 2017-03-02T12:30:39.676000Z http://thehackernews.com/2017/03/google-mad-gadget-flaw.html | |
761 2017-03-02T18:31:16.206000Z https://www.bleepingcomputer.com/news/security/50-google-engineers-volunteered-to-patch-thousands-of-java-open-source-projects/ | |
['according', 'action', 'address', 'adobe', 'advisory', 'also', 'apache', 'application', 'apps', 'article', 'asking', 'back', 'behind', 'best', 'big', 'blog', 'breach', 'browser', 'business', 'called', 'certification', 'cisco', 'code', 'collection', 'comment', 'common', 'community', 'computer', 'content', 'could', 'data', 'deal', 'depending', 'deployed', 'employee', 'engineer', 'everyone', 'exploit', 'failed', 'first', 'flaw', 'force', 'formed', 'found', 'francisco', 'gadget', 'github', 'google', 'hack', 'hacker', 'hacking', 'hat', 'help', 'home', 'hp', 'ibm', 'impacted', 'industry', 'initiative', 'intel', 'java', 'jenkins', 'justine', 'keep', 'latest', 'library', 'mad', 'malware', 'manager', 'many', 'month', 'municipal', 'need', 'needed', 'network', 'new', 'news', 'newsletter', 'noticed', 'one', 'open', 'operation', 'oracle', 'password', 'patch', 'patched', 'people', 'popular', 'posting', 'practice', 'project', 'prominent', 'public', 'ransomware', 'rather', 'recognized', 'red', 'remember', 'rosehub', 'safe', 'san', 'security', 'several', 'show', 'simply', 'software', 'solarwinds', 'source', 'still', 'submit', 'system', 'take', 'task', 'technology', 'tensorflow', 'thousand', 'time', 'took', 'tool', 'transport', 'transportation', 'trojan', 'tunney', 'update', 'used', 'using', 'version', 'vmware', 'volunteered', 'vulnerability', 'vulnerable', 'want', 'work', 'year'] | |
762 | |
762 2017-03-15T18:30:56.820000Z http://csoonline.com/article/3181327/data-breach/four-charged-including-russian-govt-agents-for-massive-yahoo-hack.html | |
762 2017-03-16T12:30:54.391000Z http://csoonline.com/article/3180762/data-breach/inside-the-russian-hack-of-yahoo-how-they-did-it.html | |
['account', 'address', 'agent', 'alert', 'analysis', 'angel', 'app', 'apps', 'article', 'assistant', 'attack', 'avoid', 'back', 'baratov', 'based', 'battle', 'belan', 'better', 'block', 'blood', 'bluetooth', 'brandposts', 'breach', 'brochure', 'bureau', 'business', 'carol', 'challenge', 'charged', 'christmas', 'cloud', 'cloudy', 'comma', 'comment', 'company', 'concern', 'connect', 'content', 'contributor', 'cooler', 'cope', 'correspondent', 'cost', 'cover', 'cso', 'cybersecurity', 'cyberthreats', 'dashboard', 'data', 'deal', 'destroy', 'develop', 'developer', 'development', 'digital', 'dmitry', 'dokuchaev', 'download', 'easy', 'ecm', 'email', 'emailing', 'enterprise', 'error', 'evolve', 'exploded', 'exploit', 'facebook', 'fbi', 'featured', 'federal', 'fight', 'fit', 'flashpoint', 'follow', 'four', 'francisco', 'friend', 'gain', 'general', 'george', 'get', 'go', 'going', 'government', 'hack', 'hacked', 'hacker', 'hacking', 'headline', 'home', 'hopper', 'identified', 'idg', 'igor', 'included', 'including', 'infographic', 'information', 'inhibit', 'innovative', 'instantly', 'intel', 'intelligence', 'internet', 'investigation', 'involvement', 'iot', 'journalist', 'karim', 'late', 'latest', 'learn', 'let', 'life', 'like', 'line', 'link', 'made', 'martyn', 'massive', 'master', 'message', 'might', 'million', 'mobile', 'model', 'monitor', 'mountain', 'move', 'much', 'multiple', 'name', 'navigate', 'network', 'new', 'news', 'newsletter', 'next', 'number', 'official', 'often', 'omron', 'one', 'online', 'onto', 'page', 'password', 'pc', 'people', 'plan', 'policy', 'popular', 'portable', 'pressure', 'previously', 'privacy', 'professional', 'progress', 'protection', 'protectwise', 'pt', 'ransomware', 'realize', 'record', 'related', 'remove', 'requested', 'researcher', 'resource', 'right', 'risk', 'rogue', 'roi', 'roundtable', 'russia', 'russian', 'san', 'say', 'scale', 'secure', 'securing', 'security', 'senior', 'sent', 'sentinelone', 'separate', 'series', 'server', 'service', 'shift', 'show', 'sign', 'smart', 'sorry', 'spam', 'sponsored', 'state', 'step', 'stolen', 'story', 'strategy', 'stream', 'sushchin', 'targeted', 'technology', 'terabyte', 'thank', 'thermo', 'thermometer', 'thing', 'threat', 'time', 'today', 'tokyo', 'tool', 'turning', 'twitter', 'two', 'unauthorized', 'unit', 'update', 'use', 'used', 'user', 'utility', 'value', 'video', 'visit', 'washington', 'wherever', 'williams', 'wireless', 'wirelessly', 'withings', 'wrong', 'yahoo', 'yeti'] | |
763 | |
763 2017-03-05T00:31:32.374000Z http://www.spgedwards.com/2012/09/sophos-anti-virus-kills-own-updater.html | |
763 2017-03-09T18:32:01.560000Z http://www.welivesecurity.com/2011/06/10/fake-windows-updates-are-easy-to-avoid/ | |
['account', 'advice', 'affected', 'already', 'also', 'attempt', 'banking', 'computer', 'could', 'disabled', 'fix', 'google', 'hard', 'malicious', 'malware', 'microsoft', 'one', 'posted', 'problem', 'security', 'see', 'site', 'software', 'solution', 'sophos', 'though', 'update', 'updating', 'using', 'website', 'window'] | |
764 | |
766 | |
769 | |
769 2017-03-11T00:30:55.612000Z https://www.bleepingcomputer.com/news/security/android-adware-and-ransomware-found-preinstalled-on-high-end-smartphones/ | |
769 2017-03-11T12:30:46.549000Z http://thehackernews.com/2017/03/android-malware-apps.html | |
769 2017-03-11T18:30:55.885000Z http://securityaffairs.co/wordpress/57050/mobile-2/pre-installed-malware-android.html | |
769 2017-03-13T18:30:50.181000Z https://www.grahamcluley.com/malware-found-pre-installed-dozens-different-android-devices/ | |
769 2017-03-13T18:30:53.668000Z https://nakedsecurity.sophos.com/2017/03/13/researchers-find-38-android-devices-shipping-with-pre-installed-malware/ | |
['android', 'apps', 'asus', 'check', 'company', 'device', 'edge', 'found', 'galaxy', 'hacker', 'hacking', 'home', 'infected', 'lenovo', 'lg', 'list', 'loki', 'malicious', 'malware', 'mi', 'mobile', 'model', 'network', 'nexus', 'note', 'oppo', 'phone', 'plus', 'point', 'post', 'privilege', 'ransomware', 'redmi', 'researcher', 'security', 'slocker', 'software', 'system', 'tab', 'top', 'user', 'using', 'xiaomi', 'zenfone', 'zte'] | |
770 | |
771 | |
771 2017-03-16T18:32:21.842000Z https://www.mimecast.com/blog/2013/05/have-cloud-data-will-can-travel/ | |
771 2017-03-18T12:34:55.230000Z http://www.mimecast.com/blog/2013/05/have-cloud-data-will-can-travel/ | |
['acceptable', 'access', 'account', 'africa', 'ahead', 'airport', 'allow', 'also', 'always', 'america', 'antiquated', 'anything', 'applies', 'apps', 'archive', 'archiving', 'asia', 'assessment', 'attack', 'attempt', 'award', 'away', 'become', 'becomes', 'belt', 'benchmarking', 'beyond', 'black', 'blog', 'border', 'bundle', 'business', 'calmed', 'career', 'carried', 'case', 'center', 'central', 'chat', 'check', 'cio', 'circumstance', 'cisos', 'clarification', 'clean', 'click', 'cloud', 'coalition', 'comment', 'company', 'completely', 'compliance', 'consultancy', 'contact', 'content', 'continuity', 'control', 'country', 'course', 'credential', 'crossing', 'customer', 'cyber', 'cybercrime', 'cybersecurity', 'data', 'dawn', 'day', 'defend', 'deleting', 'demo', 'department', 'destination', 'detail', 'device', 'disabling', 'disclaimer', 'disclosure', 'discover', 'disqus', 'dlp', 'downloaded', 'draw', 'drive', 'duqu', 'east', 'educate', 'electronic', 'email', 'emergence', 'empty', 'enable', 'ensure', 'enterprise', 'entire', 'environment', 'equipment', 'equipped', 'especially', 'essential', 'europe', 'evangelism', 'event', 'ever', 'every', 'examination', 'examine', 'exchange', 'expert', 'factory', 'feel', 'file', 'filed', 'five', 'flame', 'flight', 'force', 'forgetting', 'frequently', 'gain', 'get', 'give', 'given', 'go', 'good', 'google', 'government', 'hack', 'hacking', 'handle', 'hard', 'help', 'highlight', 'home', 'hybrid', 'im', 'image', 'important', 'imposed', 'inbound', 'inboxes', 'incident', 'includes', 'industry', 'influential', 'information', 'initial', 'international', 'internet', 'investor', 'israeli', 'javascript', 'joining', 'keep', 'keeping', 'knowledgebase', 'known', 'laptop', 'large', 'last', 'latest', 'leadership', 'least', 'leave', 'legacy', 'linkedin', 'local', 'locally', 'login', 'london', 'longer', 'macro', 'made', 'maintained', 'malicious', 'malware', 'manage', 'managed', 'management', 'many', 'maybe', 'mean', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'money', 'month', 'native', 'necessity', 'nervous', 'network', 'never', 'news', 'north', 'occasionally', 'occur', 'office', 'online', 'option', 'orlando', 'outbound', 'outside', 'overview', 'pacific', 'panic', 'paranoid', 'particular', 'partner', 'password', 'percent', 'perspective', 'phishing', 'platform', 'please', 'point', 'policy', 'post', 'posted', 'powered', 'precaution', 'press', 'prevent', 'previously', 'price', 'prior', 'privacy', 'private', 'pro', 'problem', 'product', 'productivity', 'professional', 'program', 'protection', 'publication', 'quite', 'quote', 'ransomware', 'reach', 'real', 'reason', 'recent', 'registration', 'related', 'relation', 'release', 'remain', 'remember', 'remote', 'remove', 'replaced', 'reseller', 'resellers', 'reserved', 'resilience', 'resource', 'responsible', 'restored', 'returning', 'right', 'rising', 'risk', 'robot', 'role', 'saas', 'safe', 'safely', 'said', 'sale', 'schedule', 'screening', 'search', 'secure', 'securely', 'security', 'seems', 'send', 'sense', 'sensible', 'service', 'set', 'share', 'sign', 'signature', 'sitemap', 'smartphone', 'sock', 'solution', 'someone', 'south', 'speaking', 'specific', 'spend', 'sponsored', 'state', 'stating', 'sterile', 'stolen', 'stop', 'store', 'stored', 'strategist', 'stripped', 'stuxnet', 'subpoena', 'success', 'support', 'suspicion', 'system', 'tablet', 'taking', 'talk', 'targeted', 'team', 'technical', 'technology', 'temptation', 'term', 'think', 'threat', 'tide', 'today', 'topic', 'training', 'travel', 'traveller', 'travelling', 'trip', 'trust', 'trusted', 'ubiquity', 'united', 'unless', 'unprepared', 'use', 'used', 'user', 'variety', 'vendor', 'veteran', 'view', 'wa', 'warrant', 'way', 'webinars', 'whaling', 'wipe', 'wiped', 'wisely', 'without', 'wondering', 'work', 'worked', 'working', 'worried', 'worry', 'would', 'writing', 'wrongdoing'] | |
772 | |
773 | |
775 | |
775 2017-03-28T18:30:56.839000Z http://csoonline.com/article/3184663/security/how-to-respond-to-device-and-software-backdoors-inserted-or-left-by-vendors.html | |
775 2017-03-28T18:30:58.494000Z http://csoonline.com/article/3184223/security/if-you-think-ransomware-is-a-user-failure-you-re-a-failure.html | |
['account', 'address', 'api', 'apple', 'article', 'atm', 'attacking', 'audit', 'backdoor', 'bitcoin', 'block', 'bot', 'breach', 'brochure', 'budget', 'call', 'card', 'certificate', 'cloud', 'combat', 'comma', 'computer', 'concern', 'content', 'continuous', 'crime', 'cso', 'currently', 'cyber', 'cybersecurity', 'data', 'demand', 'device', 'download', 'effective', 'effort', 'email', 'emailing', 'engineering', 'enterprise', 'error', 'failure', 'fit', 'flaw', 'free', 'friend', 'fuel', 'george', 'get', 'gift', 'greatest', 'hacker', 'headline', 'home', 'incident', 'information', 'inhibit', 'inserted', 'inside', 'instantly', 'internet', 'leadership', 'learn', 'left', 'let', 'life', 'like', 'link', 'look', 'lot', 'management', 'master', 'medium', 'message', 'might', 'million', 'move', 'multiple', 'needed', 'network', 'next', 'online', 'page', 'people', 'place', 'plan', 'policy', 'previous', 'privacy', 'problem', 'program', 'protect', 'provider', 'pt', 'ransomware', 'reading', 'related', 'respond', 'response', 'right', 'rise', 'risk', 'said', 'sample', 'scam', 'sdn', 'secure', 'security', 'see', 'sent', 'separate', 'sign', 'social', 'software', 'solves', 'sorry', 'sponsored', 'ssl', 'story', 'support', 'symantec', 'system', 'technique', 'template', 'terabyte', 'thank', 'think', 'threaten', 'three', 'today', 'tool', 'top', 'usage', 'use', 'user', 'washington', 'wherever', 'wipe', 'write'] | |
777 | |
778 | |
779 | |
780 | |
780 2017-03-16T18:31:07.980000Z https://www.mimecast.com/blog/2016/05/5-phases-of-a-whaling-assualt/ | |
780 2017-03-18T12:32:13.274000Z http://www.mimecast.com/blog/2016/05/5-phases-of-a-whaling-assualt/ | |
['able', 'according', 'account', 'action', 'actual', 'anatomy', 'appears', 'armed', 'asking', 'assault', 'assessment', 'assistance', 'attack', 'attacker', 'authentic', 'bank', 'benchmarking', 'billion', 'bruzzese', 'bureau', 'business', 'called', 'ceo', 'colossal', 'comment', 'company', 'compromise', 'conference', 'cost', 'crosshairs', 'cybercriminals', 'cybersecurity', 'data', 'deceptive', 'defend', 'defense', 'detail', 'disqus', 'domain', 'download', 'educate', 'email', 'employee', 'enable', 'engineering', 'enough', 'example', 'executive', 'fact', 'familiar', 'federal', 'filed', 'financial', 'first', 'five', 'follows', 'form', 'fraud', 'fraudsters', 'fraudulent', 'fund', 'game', 'gather', 'get', 'gone', 'good', 'grown', 'including', 'increase', 'information', 'initiate', 'intel', 'investigation', 'javascript', 'know', 'larger', 'last', 'learn', 'led', 'legally', 'like', 'loss', 'mean', 'medium', 'million', 'mimecast', 'moment', 'money', 'move', 'must', 'network', 'new', 'next', 'notice', 'nuisance', 'number', 'organization', 'otherwise', 'payroll', 'perhaps', 'phase', 'phishing', 'please', 'posing', 'post', 'posted', 'powered', 'practice', 'problem', 'program', 'protect', 'pull', 'question', 'ready', 'receives', 'recent', 'register', 'related', 'requiring', 'resolution', 'risk', 'rsa', 'scam', 'secret', 'security', 'send', 'sending', 'sensitive', 'share', 'sign', 'similar', 'social', 'someone', 'spoofing', 'stage', 'subtle', 'system', 'take', 'target', 'technology', 'thing', 'three', 'time', 'top', 'transfer', 'unsuspecting', 'use', 'used', 'view', 'warning', 'way', 'whaling', 'wire', 'work', 'year'] | |
781 | |
782 | |
783 | |
785 | |
786 | |
787 | |
788 | |
789 | |
790 | |
793 | |
793 2017-03-23T18:33:53.939000Z http://www.welivesecurity.com/2014/05/21/rubber-anti-id-mask-foils-spy-cams-turning-us-clones/ | |
793 2017-03-27T12:32:36.545000Z https://www.welivesecurity.com/2014/05/21/rubber-anti-id-mask-foils-spy-cams-turning-us-clones/ | |
['ability', 'able', 'according', 'accuracy', 'action', 'afford', 'age', 'ai', 'already', 'also', 'alternative', 'app', 'artificial', 'artist', 'author', 'back', 'becoming', 'believe', 'biometric', 'bought', 'camera', 'cheap', 'chicago', 'clone', 'cnet', 'company', 'concept', 'concern', 'copy', 'cost', 'created', 'creator', 'data', 'described', 'describes', 'device', 'eat', 'edward', 'effective', 'either', 'email', 'encryption', 'everyone', 'example', 'face', 'facebook', 'facial', 'fight', 'figure', 'filled', 'foil', 'fooled', 'found', 'friend', 'funding', 'golden', 'growing', 'grown', 'heavily', 'hide', 'hub', 'human', 'identify', 'identity', 'image', 'increasingly', 'indiegogo', 'instead', 'intelligence', 'inventor', 'invested', 'issue', 'last', 'leo', 'libertarian', 'limited', 'live', 'living', 'look', 'made', 'make', 'making', 'mask', 'matrix', 'mean', 'mesh', 'networked', 'one', 'outside', 'overwhelming', 'page', 'people', 'person', 'pgp', 'phil', 'photograph', 'popular', 'posted', 'present', 'print', 'privacy', 'proceeds', 'product', 'profit', 'profusion', 'protect', 'protection', 'provide', 'public', 'range', 'recognition', 'recognize', 'relating', 'report', 'represents', 'right', 'rob', 'rubber', 'said', 'say', 'scan', 'security', 'seeking', 'seems', 'sell', 'selling', 'selvaggio', 'service', 'share', 'simply', 'single', 'snowden', 'software', 'sold', 'speaking', 'specialises', 'street', 'surveillance', 'surveilled', 'sustain', 'thinking', 'together', 'tracked', 'turning', 'two', 'unable', 'urge', 'urme', 'use', 'used', 'via', 'vicarious', 'view', 'walk', 'walking', 'want', 'waugh', 'way', 'wear', 'week', 'whats', 'whose', 'wider', 'work', 'world', 'zimmermann'] | |
794 | |
794 2017-03-23T00:31:07.278000Z http://www.welivesecurity.com/2014/05/20/samsung-raises-apple-eyeball-ultra-secure-iris-scan-smartphones/ | |
794 2017-03-27T12:32:37.763000Z https://www.welivesecurity.com/2014/05/20/samsung-raises-apple-eyeball-ultra-secure-iris-scan-smartphones/ | |
['abta', 'account', 'accuracy', 'add', 'al', 'also', 'analyzing', 'android', 'app', 'appear', 'appeared', 'apple', 'archive', 'article', 'author', 'best', 'biometric', 'biometrics', 'blog', 'boasted', 'boththe', 'boy', 'breach', 'bulky', 'button', 'ce', 'claim', 'claimed', 'code', 'commented', 'common', 'community', 'company', 'comparable', 'conference', 'contact', 'copyright', 'could', 'credential', 'cybersecurity', 'data', 'day', 'de', 'demonstrated', 'designed', 'detection', 'deutsch', 'device', 'digit', 'direct', 'discovered', 'div', 'dongle', 'earth', 'economics', 'email', 'embed', 'en', 'english', 'enthusiasm', 'equivalent', 'eset', 'español', 'establishment', 'everybody', 'evolves', 'expensive', 'experience', 'expert', 'eyeball', 'facebook', 'fake', 'far', 'faster', 'feature', 'fingerprint', 'first', 'flagship', 'follow', 'following', 'fool', 'four', 'frame', 'friend', 'galaxy', 'generally', 'genius', 'glue', 'go', 'good', 'government', 'grab', 'hacked', 'hacker', 'handle', 'hence', 'higher', 'hole', 'home', 'hot', 'http', 'hygiene', 'id', 'identifier', 'inbox', 'including', 'information', 'insight', 'institution', 'interested', 'investigating', 'investor', 'iphone', 'ir', 'iris', 'kid', 'know', 'language', 'latest', 'launch', 'launched', 'leader', 'least', 'legal', 'level', 'link', 'linkedin', 'live', 'looking', 'lure', 'made', 'magazine', 'maker', 'many', 'market', 'material', 'might', 'military', 'million', 'month', 'much', 'multimedia', 'multiple', 'myris', 'navigation', 'netgear', 'new', 'news', 'newsletter', 'odds', 'offer', 'offered', 'one', 'operate', 'opinion', 'opposed', 'page', 'paper', 'password', 'phone', 'podcasts', 'point', 'policy', 'popular', 'population', 'post', 'posted', 'print', 'privacy', 'put', 'radar', 'raise', 'ransomware', 'rate', 'read', 'register', 'related', 'report', 'reported', 'required', 'research', 'reserved', 'revealed', 'rhee', 'riding', 'right', 'rob', 'router', 'rule', 'rumored', 'said', 'samsung', 'say', 'scan', 'scanner', 'scanning', 'search', 'secure', 'security', 'seen', 'select', 'senior', 'sensor', 'shade', 'ship', 'sign', 'site', 'sitemap', 'smartphones', 'smishing', 'soon', 'speed', 'standard', 'street', 'stylesheet', 'technology', 'terribly', 'thing', 'thousand', 'toggle', 'topic', 'tougher', 'trend', 'trillion', 'trouble', 'twitter', 'type', 'undecided', 'unique', 'use', 'used', 'using', 'various', 'victim', 'video', 'view', 'virus', 'vp', 'wa', 'wall', 'waugh', 'wave', 'way', 'wechseln', 'whats', 'white', 'within', 'wls', 'wood', 'work', 'would', 'year', 'youtube', 'zum'] | |
796 | |
797 | |
797 2017-03-01T18:30:53.525000Z https://www.bleepingcomputer.com/news/gaming/net-neutrality-looks-dead-as-fcc-chairman-calls-it-a-mistake-/ | |
797 2017-03-02T18:30:41.126000Z http://thehackernews.com/2017/03/fcc-ajit-pai-net-neutrality.html | |
797 2017-03-07T00:30:47.314000Z http://securityaffairs.co/wordpress/56911/laws-and-regulations/fcc-isps-rules.html | |
797 2017-03-07T18:31:03.094000Z https://nakedsecurity.sophos.com/2017/03/07/say-goodbye-to-enhanced-data-privacy-us-web-surfers/ | |
797 2017-03-09T06:30:51.216000Z https://www.bleepingcomputer.com/news/government/fcc-blocks-privacy-rules-that-prevented-isps-from-selling-user-data/ | |
797 2017-03-24T12:33:45.602000Z http://thehackernews.com/2017/03/isp-to-sell-browsing-data.html | |
797 2017-03-25T00:30:50.889000Z http://packetpushers.net/hey-isps-customers-products/ | |
['data', 'fcc', 'internet', 'isps', 'like', 'privacy', 'provider', 'rule', 'service', 'user', 'using', 'would'] | |
798 | |
799 | |
800 | |
801 | |
802 | |
803 | |
803 2017-03-07T18:31:03.824000Z https://www.scmagazine.com/wikileaks-releases-document-trove-allegedly-containing-cia-hacking-tools/article/642591/ | |
803 2017-03-09T00:30:54.337000Z https://www.scmagazine.com/experts-not-surprised-by-cias-leaked-cyber-weapons-but-stunned-agency-failed-to-protect-them/article/642924/ | |
803 2017-03-09T18:30:48.761000Z https://www.scmagazine.com/wikileaks-promises-to-leak-vault-7-code-archive-to-tech-firms-first/article/643046/ | |
803 2017-03-10T06:30:53.957000Z https://www.scmagazine.com/wikileaks-reveal-not-a-hack-contains-superb-technical-training-modules/article/643218/ | |
803 2017-03-10T18:30:51.091000Z https://www.scmagazine.com/wikileaks-revelations-on-cia-capabilities-worry-china/article/643327/ | |
803 2017-03-13T18:30:54.190000Z https://www.scmagazine.com/sasse-sees-uptick-in-hack-attempts-after-criticism-of-wikileaks/article/643624/ | |
['acceptance', 'account', 'advertise', 'advisory', 'afghanistan', 'africa', 'african', 'agree', 'albania', 'algeria', 'american', 'andorra', 'angola', 'anguilla', 'antarctica', 'antigua', 'antilles', 'arab', 'arabia', 'archive', 'argentina', 'arm', 'armenia', 'article', 'aruba', 'australia', 'austria', 'authorization', 'award', 'azerbaijan', 'bahamas', 'bahrain', 'bangladesh', 'bar', 'barbados', 'barbuda', 'barth', 'belarus', 'belgium', 'belize', 'benin', 'bermuda', 'bhutan', 'blog', 'board', 'bolivia', 'bosnia', 'botswana', 'bouvet', 'bradley', 'brazil', 'breach', 'british', 'broadcast', 'brunei', 'bulgaria', 'burkina', 'burundi', 'business', 'buzz', 'caicos', 'caledonia', 'cambodia', 'cameroon', 'canada', 'cape', 'cayman', 'center', 'central', 'chad', 'challenge', 'chile', 'china', 'christmas', 'cia', 'city', 'click', 'close', 'cloud', 'coco', 'code', 'colombia', 'comment', 'comoros', 'compliance', 'condition', 'conference', 'congo', 'constitutes', 'contact', 'cook', 'copyright', 'costa', 'countless', 'croatia', 'cuba', 'cybercrime', 'cybersecurity', 'cyprus', 'czech', 'côte', 'dark', 'darussalam', 'data', 'day', 'delivered', 'denmark', 'depth', 'djibouti', 'document', 'dominica', 'dominican', 'drc', 'ecuador', 'egypt', 'el', 'email', 'emirate', 'equatorial', 'eritrea', 'error', 'establish', 'estonia', 'ethiopia', 'event', 'face', 'fact', 'falkland', 'faq', 'faroe', 'faso', 'fast', 'feature', 'featured', 'fiji', 'finland', 'first', 'follow', 'form', 'france', 'free', 'french', 'futuna', 'gabon', 'gambia', 'georgia', 'germany', 'get', 'ghana', 'gibraltar', 'gmail', 'government', 'greece', 'greenland', 'grenada', 'grenadine', 'group', 'guadeloupe', 'guam', 'guatemala', 'guiana', 'guinea', 'guyana', 'hacking', 'haiti', 'haymarket', 'heard', 'helena', 'herzegovina', 'honduras', 'hong', 'hungary', 'iceland', 'inbox', 'india', 'indian', 'indonesia', 'information', 'insider', 'iot', 'iran', 'iraq', 'ireland', 'island', 'israel', 'italy', 'jamaica', 'japan', 'jordan', 'kazakhstan', 'keeling', 'kenya', 'kingdom', 'kiribati', 'kitts', 'kong', 'korea', 'kuwait', 'kyrgyzstan', 'lanka', 'lao', 'latvia', 'leak', 'lebanon', 'leone', 'lesotho', 'liberia', 'library', 'libya', 'liechtenstein', 'like', 'lithuania', 'log', 'login', 'look', 'lucia', 'luxembourg', 'macao', 'macedonia', 'madagascar', 'magazine', 'malawi', 'malaysia', 'maldives', 'mali', 'malta', 'malvinas', 'malware', 'management', 'mariana', 'marino', 'marshall', 'martin', 'martinique', 'material', 'mauritania', 'mauritius', 'mayen', 'mayotte', 'mcdonald', 'medium', 'meet', 'member', 'menu', 'mexico', 'micronesia', 'million', 'miquelon', 'mobile', 'moldova', 'monaco', 'mongolia', 'montenegro', 'montserrat', 'morocco', 'mozambique', 'must', 'myanmar', 'namibia', 'nauru', 'need', 'nepal', 'netherlands', 'network', 'nevis', 'new', 'news', 'newsletter', 'newswire', 'nicaragua', 'niger', 'nigeria', 'niue', 'norfolk', 'north', 'northern', 'norway', 'ny', 'ocean', 'oman', 'one', 'online', 'opinion', 'overall', 'pakistan', 'palau', 'panama', 'paper', 'papua', 'paraguay', 'password', 'peru', 'philippine', 'phishing', 'pierre', 'pitcairn', 'poland', 'policy', 'polynesia', 'portugal', 'post', 'posture', 'press', 'principe', 'prior', 'privacy', 'product', 'professional', 'published', 'puerto', 'qatar', 'ransomware', 'read', 'reboot', 'receive', 'redistributed', 'register', 'registered', 'registering', 'release', 'relevant', 'reprint', 'republic', 'reserved', 'resource', 'reunion', 'review', 'rewritten', 'rica', 'rico', 'right', 'risk', 'risksec', 'romania', 'rsa', 'russia', 'rwanda', 'said', 'saint', 'sale', 'salvador', 'samoa', 'san', 'sao', 'saudi', 'sc', 'search', 'security', 'senegal', 'seychelles', 'show', 'sierra', 'sign', 'singapore', 'site', 'slovakia', 'slovenia', 'solomon', 'somalia', 'source', 'south', 'southern', 'spain', 'sri', 'state', 'strategy', 'subscribe', 'sudan', 'suriname', 'svalbard', 'swaziland', 'sweden', 'switzerland', 'syria', 'tackle', 'taiwan', 'tajikistan', 'tanzania', 'team', 'technical', 'term', 'territory', 'test', 'thailand', 'threat', 'tobago', 'togo', 'tokelau', 'tome', 'tonga', 'tool', 'toronto', 'trinidad', 'tunisia', 'turk', 'turkey', 'turkmenistan', 'tuvalu', 'uganda', 'uk', 'ukraine', 'unbiased', 'underpin', 'united', 'uruguay', 'use', 'user', 'uzbekistan', 'vanuatu', 'vatican', 'vault', 'venezuela', 'verde', 'via', 'video', 'vietnam', 'vincent', 'virgin', 'virtual', 'vulnerability', 'wallis', 'web', 'webcasts', 'website', 'western', 'white', 'whitepaper', 'whitepapers', 'wikileaks', 'without', 'would', 'yahoo', 'yemen', 'yugoslavia', 'zambia', 'zealand', 'zimbabwe'] | |
804 | |
805 | |
806 | |
806 2017-03-19T00:31:00.716000Z http://www.hackingarticles.in/command-shell-to-meterpreter/ | |
806 2017-03-20T18:31:00.053000Z http://www.hackingarticles.in/shell-meterpreter-using-session-command/ | |
['aarti', 'access', 'address', 'also', 'article', 'author', 'auxiliary', 'backdoor', 'backtrack', 'batch', 'best', 'blog', 'book', 'browser', 'called', 'cancel', 'capture', 'category', 'challenge', 'chandel', 'command', 'consultant', 'contact', 'content', 'course', 'cryptography', 'ctf', 'cyber', 'database', 'dll', 'domain', 'email', 'engineering', 'especially', 'ethical', 'experience', 'expert', 'face', 'facebook', 'file', 'following', 'footprinting', 'forensics', 'gadget', 'gmail', 'google', 'guest', 'hacker', 'hacking', 'industry', 'information', 'internet', 'kali', 'leave', 'linux', 'lover', 'medium', 'metasploit', 'meterpreter', 'msf', 'msfvenom', 'name', 'others', 'page', 'partner', 'passionate', 'password', 'pc', 'penetration', 'perceive', 'post', 'posted', 'present', 'previous', 'professional', 'quality', 'raj', 'registry', 'related', 'remote', 'reply', 'researcher', 'screenshot', 'search', 'security', 'session', 'share', 'shell', 'showing', 'singh', 'skilled', 'social', 'software', 'specialized', 'stegnography', 'subscribe', 'system', 'table', 'technical', 'tester', 'testing', 'tool', 'toolkit', 'trick', 'trojan', 'tube', 'tutorial', 'tweet', 'type', 'uncategorized', 'upgrade', 'use', 'used', 'using', 'via', 'vnc', 'web', 'website', 'window', 'wireless', 'writer', 'year', 'youtube'] | |
807 | |
807 2017-03-15T18:30:57.765000Z https://nakedsecurity.sophos.com/2017/03/15/lip-reading-biometrics-you-can-reset-just-like-passwords/ | |
807 2017-03-16T12:31:13.021000Z https://www.helpnetsecurity.com/2017/03/16/lip-movement-authentication/ | |
807 2017-03-20T18:30:59.023000Z https://www.bleepingcomputer.com/news/security/new-technology-combines-lip-motion-and-passwords-to-authenticate-users/ | |
['authentication', 'biometrics', 'change', 'lip'] | |
808 | |
809 | |
810 | |
810 2017-03-17T06:30:51.911000Z https://www.bleepingcomputer.com/news/security/star-trek-themed-kirk-ransomware-brings-us-monero-and-a-spock-decryptor/ | |
810 2017-03-20T06:30:50.527000Z http://securityaffairs.co/wordpress/57261/malware/kirk-ransomware-star-trek.html | |
810 2017-03-22T12:30:56.657000Z https://blog.avira.com/trekkie-ransomware/ | |
810 2017-03-24T12:33:45.329000Z https://nakedsecurity.sophos.com/2017/03/24/spock-will-unlock-kirk-ransomware-after-you-beam-up-a-bunch-of-monero/ | |
['aes', 'article', 'bitcoin', 'called', 'cannon', 'encrypt', 'encrypted', 'encryption', 'file', 'find', 'first', 'ion', 'key', 'low', 'malware', 'monero', 'network', 'orbital', 'payment', 'pwd', 'python', 'ransom', 'ransomware', 'researcher', 'saved', 'security', 'star', 'tool', 'trek', 'written'] | |
811 | |
812 | |
813 | |
813 2017-03-22T12:30:47.590000Z http://thehackernews.com/2017/03/hacking-windows-dll-injection.html | |
813 2017-03-22T18:31:01.267000Z https://www.helpnetsecurity.com/2017/03/22/windows-doubleagent-attack/ | |
['application', 'attack', 'doubleagent', 'hijack', 'tool', 'window'] | |
815 | |
816 | |
819 | |
819 2017-03-01T06:30:48.590000Z http://www.welivesecurity.com/2015/12/23/eset-predictions-for-cybercrime-trends-in-2016/ | |
819 2017-03-01T06:31:08.598000Z http://www.welivesecurity.com/2013/07/15/warning-fatigue-means-browser-users-ignore-up-to-70-of-security-alerts/ | |
819 2017-03-01T06:31:24.114000Z http://www.welivesecurity.com/2010/08/03/spyware-in-your-underwear/ | |
819 2017-03-01T06:31:26.967000Z http://www.welivesecurity.com/2010/01/20/apple-patches-snow-leopard-security-vulnerabilities/ | |
819 2017-03-02T06:30:52.936000Z http://www.welivesecurity.com/2015/12/24/google-testing-password-free-account-sign/ | |
819 2017-03-02T06:31:21.598000Z http://www.welivesecurity.com/2011/11/28/cyber-shopping-safety-tips-a-handy-video-guide/ | |
819 2017-03-03T00:30:56.169000Z http://www.welivesecurity.com/2015/12/24/online-gaming-new-frontier-cybercriminals/ | |
819 2017-03-03T00:31:39.997000Z http://www.welivesecurity.com/2010/01/20/disinfecting-files/ | |
819 2017-03-03T00:31:45.433000Z http://www.welivesecurity.com/2009/06/09/data-protection-not-a-priority/ | |
819 2017-03-03T00:31:47.926000Z http://www.welivesecurity.com/2006/09/15/eset-warns-of-new-vulnerability-affecting-internet-explorer/ | |
819 2017-03-03T18:30:56.365000Z http://www.welivesecurity.com/2017/03/03/internet-of-things-security-privacy-iot-update/ | |
819 2017-03-03T18:31:03.903000Z http://www.welivesecurity.com/2015/12/28/cybercriminals-targeting-banks-ransomware/ | |
819 2017-03-03T18:31:08.499000Z http://www.welivesecurity.com/2015/02/09/anthem-hack-victims-hit-phishing-scams/ | |
819 2017-03-03T18:31:13.410000Z http://www.welivesecurity.com/2014/05/12/ransomware-android-keep-calm-get-protected/ | |
819 2017-03-03T18:31:20.749000Z http://www.welivesecurity.com/2013/07/17/tumblr-warns-users-over-iphone-app-password-danger/ | |
819 2017-03-03T18:31:29.149000Z http://www.welivesecurity.com/2011/06/07/a-nice-pair-of-breaches/ | |
819 2017-03-06T18:31:03.244000Z http://www.welivesecurity.com/2016/01/04/microsoft-alert-users-state-sanctioned-cyberattacks/ | |
819 2017-03-06T18:31:18.688000Z http://www.welivesecurity.com/2013/07/18/black-swan-warning-as-cybercrime-hits-half-of-world-stock-exchanges/ | |
819 2017-03-06T18:31:23.650000Z http://www.welivesecurity.com/2011/12/01/facebook-worm-zeus-is-not-your-fb-friend/ | |
819 2017-03-06T18:31:25.023000Z http://www.welivesecurity.com/2011/06/07/sometimes-marketing-looks-like-a-dog-biting-his-tail/ | |
819 2017-03-06T18:31:34.532000Z http://www.welivesecurity.com/2006/10/20/a-busy-night-at-the-stration/ | |
819 2017-03-07T12:31:04.415000Z http://www.welivesecurity.com/2014/04/05/the-future-of-security-microsoft-rewards-5-year-old-who-found-critical-password-flaw/ | |
819 2017-03-07T12:31:07.393000Z http://www.welivesecurity.com/2013/07/18/children-are-the-enemy-of-good-it-security-microsoft-researcher-claims/ | |
819 2017-03-07T12:31:12.046000Z http://www.welivesecurity.com/2011/12/01/carrieriq-keylogging-and-mobile-payment-systems/ | |
819 2017-03-07T18:30:50.781000Z http://www.welivesecurity.com/podcasts/good-weather-app-radio-interview-with-alexis-dorais-joncas-and-marc-saltzman/ | |
819 2017-03-07T18:30:59.874000Z http://www.welivesecurity.com/2016/01/05/consumers-cautious-iot-device-security/ | |
819 2017-03-07T18:31:24.139000Z http://www.welivesecurity.com/2011/12/01/lawyers-go-back-to-school-for-cybercrime/ | |
819 2017-03-07T18:31:34.352000Z http://www.welivesecurity.com/podcasts/40000-websites-infected-is-yours/ | |
819 2017-03-09T18:32:18.562000Z http://www.welivesecurity.com/2006/12/12/the-spirit-of-cooperation/ | |
819 2017-03-11T12:31:18.219000Z http://www.welivesecurity.com/2013/04/16/beware-scammers-preying-on-boston-marathon-tragedy/ | |
819 2017-03-11T12:31:22.316000Z http://www.welivesecurity.com/2011/12/06/carberp-white-paper-now-with-added-pictures/ | |
819 2017-03-14T06:31:07.904000Z http://www.welivesecurity.com/2014/04/09/new-weapon-against-malware-intrusion-designed-by-american-student/ | |
819 2017-03-14T06:31:17.187000Z http://www.welivesecurity.com/podcasts/will-android-replace-windows-mobile/ | |
819 2017-03-14T06:31:18.065000Z http://www.welivesecurity.com/2010/01/27/amazing-what/ | |
819 2017-03-14T06:31:19.935000Z http://www.welivesecurity.com/2009/06/23/microsoft-beta-better-than-eset/ | |
819 2017-03-14T06:31:20.606000Z http://www.welivesecurity.com/2006/12/28/the-irs-is-not-offering-you-money/ | |
819 2017-03-14T18:30:50.484000Z http://www.welivesecurity.com/2017/03/14/significant-cyberthreat-uk-businesses-continues-grow/ | |
819 2017-03-14T18:31:03.584000Z http://www.welivesecurity.com/2014/04/09/heartbleed-encryption-flaw-leaves-millions-of-sites-at-risk/ | |
819 2017-03-14T18:31:17.813000Z http://www.welivesecurity.com/2007/01/22/storm-worm/ | |
819 2017-03-16T18:31:12.118000Z http://www.welivesecurity.com/2013/04/17/win32kelihos-botnet-keeps-on-phishing-now-exploiting-boston-bombing/ | |
819 2017-03-18T06:31:20.067000Z http://www.welivesecurity.com/2013/04/18/online-pc-support-scam-from-cold-calling-to-malware/ | |
819 2017-03-18T06:31:25.552000Z http://www.welivesecurity.com/podcasts/could-scada-attacks-disrupt-water-power-and-other-critical-infrastructure/ | |
819 2017-03-18T06:31:34.467000Z http://www.welivesecurity.com/2010/01/29/anti-extortion-101/ | |
819 2017-03-21T00:31:17.377000Z http://www.welivesecurity.com/2013/04/19/cybersecurity-bill-passed-by-house-despite-privacy-concerns/ | |
819 2017-03-21T00:31:28.099000Z http://www.welivesecurity.com/podcasts/microsoft-re-enters-the-anti-virus-space/ | |
819 2017-03-23T00:31:10.647000Z http://www.welivesecurity.com/2013/07/26/avoid-droid-rage-five-tips-to-keep-your-android-secure/ | |
819 2017-03-23T18:34:05.525000Z http://www.welivesecurity.com/2011/12/12/2012-predictions-east-of-java/ | |
819 2017-03-23T18:34:06.758000Z http://www.welivesecurity.com/2011/06/17/anti-phishing-day/ | |
819 2017-03-25T06:31:46.983000Z http://www.welivesecurity.com/2007/02/08/beware-of-anna-nicole-smith-malware/ | |
819 2017-03-27T12:31:21.173000Z https://www.welivesecurity.com/2017/03/14/significant-cyberthreat-uk-businesses-continues-grow/ | |
819 2017-03-27T12:32:53.915000Z https://www.welivesecurity.com/2013/07/31/hackers-frame-security-blogger-with-silk-road-heroin-delivery/ | |
819 2017-03-27T12:32:58.006000Z https://www.welivesecurity.com/2013/07/26/avoid-droid-rage-five-tips-to-keep-your-android-secure/ | |
819 2017-03-27T12:33:09.669000Z https://www.welivesecurity.com/2013/04/26/american-banks-need-to-plan-for-further-cyber-attacks-financial-group-warns/ | |
819 2017-03-27T12:33:16.826000Z https://www.welivesecurity.com/podcasts/malware-predictions-for-2012/ | |
819 2017-03-27T12:33:22.966000Z https://www.welivesecurity.com/2011/12/12/2012-predictions-east-of-java/ | |
819 2017-03-27T12:33:26.152000Z https://www.welivesecurity.com/podcasts/could-scada-attacks-disrupt-water-power-and-other-critical-infrastructure/ | |
819 2017-03-27T12:33:31.269000Z https://www.welivesecurity.com/2011/12/06/carberp-white-paper-now-with-added-pictures/ | |
819 2017-03-27T12:33:42.193000Z https://www.welivesecurity.com/podcasts/eset-launches-new-iphone-app/ | |
819 2017-03-27T12:33:53.502000Z https://www.welivesecurity.com/podcasts/will-android-replace-windows-mobile/ | |
819 2017-03-27T12:34:14.656000Z https://www.welivesecurity.com/podcasts/microsoft-re-enters-the-anti-virus-space/ | |
819 2017-03-27T12:34:18.939000Z https://www.welivesecurity.com/2009/06/23/microsoft-beta-better-than-eset/ | |
819 2017-03-28T12:30:59.477000Z https://www.welivesecurity.com/2017/03/28/close-1-4-billion-data-records-compromised-2016/ | |
819 2017-03-29T18:31:06.393000Z https://www.welivesecurity.com/2015/02/19/jamie-oliver-website-serves-side-malware/ | |
819 2017-03-29T18:31:12.171000Z https://www.welivesecurity.com/2014/04/16/facebook-webinject-leads-to-ibanking-mobile-bot/ | |
819 2017-03-29T18:31:14.694000Z https://www.welivesecurity.com/podcasts/creating-zombie-computer-armies-anonymously/ | |
819 2017-03-29T18:31:19.035000Z https://www.welivesecurity.com/2011/12/16/facebook-credit-score/ | |
819 2017-03-29T18:31:22.107000Z https://www.welivesecurity.com/2010/08/26/share-your-password-spam-your-friends/ | |
819 2017-03-30T18:31:01.489000Z https://www.welivesecurity.com/2017/03/30/malware-campaign-targets-open-source-developers-github/ | |
['add', 'al', 'blog', 'code', 'community', 'conference', 'contact', 'copyright', 'de', 'deutsch', 'direct', 'div', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'facebook', 'follow', 'friend', 'go', 'home', 'http', 'inbox', 'information', 'insight', 'ir', 'language', 'latest', 'legal', 'link', 'linkedin', 'magazine', 'material', 'multimedia', 'navigation', 'news', 'newsletter', 'opinion', 'page', 'paper', 'podcasts', 'policy', 'post', 'posted', 'print', 'privacy', 'radar', 'research', 'reserved', 'right', 'search', 'security', 'sign', 'site', 'sitemap', 'stylesheet', 'toggle', 'twitter', 'video', 'view', 'virus', 'wechseln', 'white', 'wls', 'youtube', 'zum'] | |
820 | |
821 | |
822 | |
823 | |
824 | |
826 | |
826 2017-03-23T18:33:29.053000Z https://isc.sans.edu/newssummary.html#1023257 | |
826 2017-03-23T18:33:36.202000Z https://isc.sans.edu/newssummary.html#1023235 | |
['accessed', 'adopt', 'advice', 'ago', 'already', 'american', 'android', 'appears', 'around', 'authentication', 'base', 'bazaar', 'carrier', 'caught', 'china', 'chinese', 'company', 'control', 'day', 'deploying', 'deprecation', 'device', 'dongle', 'dump', 'ebay', 'fake', 'fed', 'forbes', 'found', 'get', 'helped', 'hour', 'inauguration', 'information', 'insecure', 'iphone', 'iphones', 'la', 'locked', 'logging', 'malware', 'mechanism', 'message', 'might', 'mobile', 'move', 'news', 'oblivious', 'otherwise', 'phishing', 'phone', 'popular', 'practice', 'protestors', 'push', 'reader', 'ream', 'register', 'russia', 'russian', 'say', 'scum', 'search', 'seized', 'service', 'sm', 'spread', 'spreading', 'spy', 'station', 'suggesting', 'surveillance', 'synopsis', 'tat', 'text', 'tool', 'trojan', 'trump', 'unparalleled', 'user', 'vega', 'view', 'way', 'web'] | |
827 | |
828 | |
830 | |
831 | |
831 2017-03-16T00:30:42.991000Z http://www.threatgeek.com/2017/03/phind-the-phish-reducing-phishing-detection-from-months-to-minutes.html | |
831 2017-03-30T18:30:55.768000Z http://www.threatgeek.com/2017/03/going-back-in-time-investigating-threats-retroactively.html | |
['action', 'alert', 'allows', 'already', 'also', 'analysis', 'answer', 'applying', 'around', 'attachment', 'attack', 'attacker', 'automates', 'blog', 'call', 'capture', 'clear', 'click', 'collection', 'coming', 'compromised', 'contact', 'context', 'create', 'credential', 'cut', 'cybersecurity', 'darkest', 'data', 'day', 'decode', 'deepest', 'detail', 'detect', 'detection', 'determine', 'dirty', 'easy', 'email', 'environment', 'even', 'event', 'every', 'executable', 'exploit', 'facilitates', 'fidelis', 'figure', 'file', 'go', 'going', 'identify', 'immediately', 'impossible', 'incident', 'intel', 'investigate', 'investigation', 'jar', 'java', 'javascript', 'know', 'left', 'look', 'make', 'malware', 'matter', 'metadata', 'minute', 'month', 'multiple', 'network', 'new', 'next', 'one', 'paper', 'part', 'past', 'perform', 'permalink', 'phishing', 'plus', 'possible', 'posted', 'process', 'question', 'quick', 'quickly', 'read', 'ready', 'reduce', 'reducing', 'response', 'result', 'rich', 'safe', 'search', 'second', 'secret', 'see', 'series', 'session', 'simple', 'storage', 'store', 'suspected', 'tactic', 'take', 'talk', 'threat', 'threatgeek', 'three', 'time', 'today', 'two', 'type', 'uncovered', 'understand', 'using', 'way', 'whether', 'white', 'without', 'word'] | |
833 | |
833 2017-03-15T18:30:48.029000Z https://psilvas.wordpress.com/2017/03/15/lightboard-lessons-what-is-a-proxy/ | |
833 2017-03-20T12:30:50.569000Z https://isc.sans.edu/forums/diary/What+is+really+being+proxied/22165/ | |
833 2017-03-29T00:31:00.779000Z https://psilvas.wordpress.com/2017/03/28/what-is-a-proxy/ | |
['client', 'encrypted', 'like', 'many', 'proxy', 'term', 'traffic', 'word'] | |
834 | |
835 | |
836 | |
838 | |
839 | |
839 2017-03-09T06:30:48.892000Z https://blogs.technet.microsoft.com/mmpc/2017/03/08/uncovering-cross-process-injection-with-windows-defender-atp/ | |
839 2017-03-13T18:30:47.008000Z https://blogs.microsoft.com/microsoftsecure/2017/03/13/whats-new-in-the-windows-defender-atp-creators-update-preview/ | |
839 2017-03-27T18:30:57.659000Z https://blogs.technet.microsoft.com/mmpc/2017/03/27/detecting-and-mitigating-elevation-of-privilege-exploit-for-cve-2017-0005/ | |
['address', 'advanced', 'alert', 'also', 'atp', 'attack', 'attacker', 'behavior', 'case', 'continue', 'creator', 'defender', 'detect', 'detecting', 'detection', 'device', 'enhancement', 'feature', 'figure', 'file', 'free', 'kernel', 'large', 'like', 'memory', 'microsoft', 'package', 'page', 'preview', 'process', 'protect', 'provide', 'register', 'running', 'secops', 'security', 'share', 'show', 'sophisticated', 'space', 'stack', 'team', 'time', 'tool', 'update', 'user', 'using', 'window'] | |
840 | |
841 | |
842 | |
844 | |
845 | |
845 2017-03-28T12:31:15.062000Z http://www.itsecurityguru.org/2017/03/28/hurricanes-earthquakes-threat-intelligence/ | |
845 2017-03-28T12:31:27.505000Z http://www.itsecurityguru.org/2017/03/28/today-ithings-even-harder-police-probe/ | |
['ability', 'account', 'across', 'ad', 'administrator', 'advanced', 'afraid', 'ago', 'ai', 'also', 'american', 'amidst', 'anonabox', 'another', 'answer', 'apple', 'application', 'appriver', 'approves', 'around', 'article', 'ask', 'assurance', 'atm', 'attack', 'back', 'backlash', 'baker', 'bank', 'banking', 'biggest', 'billion', 'binary', 'biometrics', 'blake', 'blind', 'board', 'breach', 'broadly', 'bugfinders', 'build', 'business', 'buy', 'campaign', 'cash', 'centre', 'change', 'citibank', 'cm', 'cognitive', 'combat', 'come', 'comment', 'community', 'consoleconnect', 'creating', 'crimina', 'criminal', 'cyber', 'cybersecurity', 'data', 'date', 'ddos', 'defence', 'despite', 'detail', 'development', 'director', 'doe', 'drone', 'earthquake', 'ebay', 'editor', 'editorial', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'erase', 'eset', 'eu', 'even', 'event', 'everyone', 'experience', 'explain', 'explains', 'express', 'facebook', 'family', 'file', 'find', 'finnish', 'firm', 'fix', 'flaw', 'follow', 'forum', 'fraud', 'fund', 'future', 'gaping', 'gdpr', 'general', 'generation', 'get', 'getting', 'giftghostbot', 'gillman', 'globally', 'good', 'goodbye', 'got', 'government', 'grip', 'guru', 'gushi', 'guy', 'hack', 'hacked', 'hacker', 'hacking', 'harder', 'head', 'hello', 'help', 'hitting', 'holding', 'hole', 'home', 'hospital', 'hour', 'http', 'hurricane', 'icloud', 'impact', 'imposter', 'improve', 'incident', 'information', 'infosec', 'infosecurity', 'inside', 'intelligence', 'ithings', 'jackson', 'japonica', 'jonathon', 'jones', 'joyce', 'king', 'know', 'korea', 'landmark', 'lastpass', 'law', 'leave', 'like', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'major', 'making', 'malware', 'many', 'mention', 'million', 'mitigation', 'nato', 'navy', 'netflix', 'new', 'news', 'next', 'num', 'oiza', 'open', 'operation', 'ops', 'option', 'paypal', 'persistent', 'person', 'pervasive', 'phishing', 'plan', 'planning', 'platform', 'please', 'pm', 'police', 'polite', 'popular', 'posted', 'prepare', 'previous', 'price', 'primary', 'privacy', 'probe', 'problem', 'professional', 'protect', 'protecting', 'protection', 'queen', 'raise', 'ransom', 'ransomware', 'recent', 'regime', 'regulation', 'related', 'relationship', 'reli', 'remains', 'researcher', 'response', 'retailer', 'return', 'rich', 'rise', 'risk', 'rob', 'round', 'run', 'sale', 'satellite', 'satnav', 'scam', 'scare', 'scramble', 'security', 'sensitive', 'service', 'share', 'shortage', 'sign', 'skill', 'software', 'sort', 'source', 'spam', 'spend', 'spoofing', 'spot', 'spotted', 'squad', 'stock', 'story', 'supporter', 'switzerland', 'system', 'tackle', 'tag', 'tagged', 'talking', 'tania', 'target', 'tech', 'technology', 'ten', 'term', 'themed', 'thing', 'think', 'threat', 'threatquotient', 'today', 'top', 'touch', 'trading', 'trend', 'turning', 'tweet', 'two', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'video', 'viral', 'vulnerability', 'warns', 'warship', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'within', 'working', 'worse', 'would', 'year'] | |
846 | |
846 2017-03-02T00:30:50.631000Z https://www.root9b.com/newsroom/root9b-remains-1-cybersecurity-500-5th-consecutive-quarter | |
846 2017-03-02T18:30:44.187000Z https://www.root9b.com/newsroom/root9b-holdings-participate-29th-annual-roth-conference | |
['ability', 'across', 'active', 'advanced', 'adversary', 'agency', 'analysis', 'application', 'attacking', 'back', 'background', 'broad', 'business', 'client', 'colorado', 'combine', 'community', 'company', 'conduct', 'consecutive', 'control', 'cybersecurity', 'deep', 'defiance', 'delivers', 'developed', 'development', 'digital', 'engagement', 'engineering', 'entry', 'experience', 'extensive', 'five', 'forensics', 'fortune', 'gain', 'generation', 'government', 'holding', 'human', 'hunt', 'ic', 'improve', 'incident', 'including', 'industrial', 'industry', 'information', 'intelligence', 'international', 'ipsa', 'leading', 'leverage', 'local', 'maximize', 'mission', 'mitigate', 'mitigation', 'nasdaq', 'network', 'newsroom', 'next', 'owned', 'penetration', 'personnel', 'posted', 'presence', 'productivity', 'profit', 'provider', 'pursuit', 'quarter', 'range', 'ranked', 'refined', 'regulatory', 'relevant', 'remain', 'response', 'result', 'revolutionary', 'risk', 'root', 'rtnb', 'security', 'service', 'size', 'specialty', 'spring', 'stand', 'state', 'subsidiary', 'system', 'tactic', 'technology', 'testing', 'tool', 'training', 'undetected', 'unwanted', 'venture', 'visit', 'vulnerability', 'wholly', 'within', 'worldwide'] | |
847 | |
848 | |
849 | |
849 2017-03-13T18:30:49.503000Z https://www.scmagazine.com/stingray-bill-passes-new-hampshire-house-unanimously/article/643649/ | |
849 2017-03-24T00:31:07.347000Z https://www.scmagazine.com/tacoma-wash-ordered-to-pay-fine-for-withholding-stingray-info/article/646034/ | |
849 2017-03-29T00:31:00.784000Z https://www.scmagazine.com/stingray-use-still-shrouded-in-secrecy-and-lack-regulation-despite-progress/article/647001/ | |
['abel', 'acceptance', 'account', 'advertise', 'advisory', 'also', 'american', 'approve', 'archive', 'arm', 'article', 'authorization', 'award', 'bar', 'barth', 'blog', 'board', 'bradley', 'breach', 'broadcast', 'business', 'center', 'chad', 'challenge', 'civil', 'click', 'cloud', 'comment', 'compliance', 'condition', 'conference', 'constitutes', 'contact', 'content', 'copyright', 'countless', 'court', 'cybercrime', 'cybersecurity', 'data', 'day', 'depth', 'device', 'email', 'establish', 'event', 'face', 'fact', 'faq', 'fast', 'feature', 'first', 'follow', 'form', 'group', 'hampshire', 'haymarket', 'house', 'information', 'insider', 'iot', 'leaked', 'legislation', 'library', 'like', 'log', 'login', 'look', 'magazine', 'malware', 'management', 'martin', 'material', 'medium', 'meet', 'member', 'menu', 'mexico', 'million', 'mobile', 'month', 'must', 'need', 'network', 'new', 'news', 'nude', 'ny', 'online', 'opinion', 'overall', 'phishing', 'policy', 'post', 'posture', 'press', 'prior', 'privacy', 'product', 'professional', 'published', 'ransomware', 'read', 'reboot', 'redistributed', 'register', 'registered', 'related', 'release', 'relevant', 'reprint', 'reserved', 'resource', 'review', 'rewritten', 'right', 'risk', 'risksec', 'robert', 'rsa', 'sc', 'search', 'security', 'show', 'site', 'source', 'state', 'stingray', 'strategy', 'subscribe', 'tackle', 'team', 'technical', 'term', 'test', 'threat', 'topic', 'toronto', 'uk', 'unbiased', 'underpin', 'use', 'user', 'video', 'virtual', 'vulnerability', 'warrant', 'webcasts', 'website', 'whitepaper', 'whitepapers', 'without', 'would'] | |
850 | |
850 2017-03-05T00:44:59.230000Z http://thehackernews.com/2011/02/poll-results-prefer-way-bw-whitehats.html | |
850 2017-03-05T00:46:27.501000Z http://thehackernews.com/2010/12/albania-hackers-won-voting-poll-who-are.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'day', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'finally', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'friend', 'gain', 'general', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'open', 'operating', 'pas', 'password', 'payouts', 'people', 'poll', 'popular', 'private', 'professional', 'public', 'question', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'total', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'vote', 'voting', 'walking', 'want', 'without', 'york'] | |
851 | |
851 2017-03-05T00:31:16.393000Z http://www.spgedwards.com/2013/02/dtl-anti-virus-protection-tests-2012-q4.html | |
851 2017-03-05T00:31:29.254000Z http://www.spgedwards.com/2012/10/new-anti-virus-test-results-launched.html | |
['ability', 'across', 'attack', 'business', 'category', 'consumer', 'dennis', 'different', 'dtl', 'edward', 'effectively', 'enterprise', 'examine', 'expose', 'independent', 'infected', 'internet', 'lab', 'monitor', 'neil', 'pc', 'pg', 'product', 'program', 'protect', 'real', 'released', 'report', 'result', 'rubenking', 'security', 'simon', 'small', 'software', 'system', 'technology', 'test', 'tester', 'testing', 'threat', 'unsponsored', 'using', 'website', 'world'] | |
852 | |
854 | |
854 2017-03-20T12:31:01.436000Z http://csoonline.com/article/3182327/security/cisco-to-patch-300-devices-against-flaw-found-in-cia-archives.html | |
854 2017-03-20T18:30:52.996000Z http://csoonline.com/article/3182874/security/cisco-issues-critical-warning-after-cia-wikileaks-dump-bares-ios-security-weakness.html | |
['accept', 'access', 'additional', 'address', 'advisory', 'affected', 'alert', 'alexa', 'allow', 'allowed', 'amazon', 'amount', 'analysis', 'archive', 'article', 'attack', 'attacker', 'available', 'boost', 'brandposts', 'breach', 'brochure', 'business', 'camera', 'carol', 'catalyst', 'cause', 'christmas', 'cia', 'cisco', 'cloud', 'cloudy', 'cluster', 'code', 'combination', 'comma', 'command', 'comment', 'communication', 'company', 'concern', 'connection', 'content', 'control', 'cost', 'could', 'coverage', 'credit', 'critical', 'cso', 'customer', 'cyber', 'cybersecurity', 'data', 'dead', 'deal', 'detail', 'device', 'digital', 'disable', 'disabling', 'download', 'due', 'easy', 'eliminate', 'email', 'emailing', 'enjoy', 'error', 'etherswitch', 'execute', 'existing', 'exists', 'exploit', 'extender', 'facebook', 'factor', 'failure', 'fall', 'featured', 'fit', 'flaw', 'follow', 'found', 'friend', 'george', 'get', 'go', 'going', 'hack', 'hacking', 'headline', 'home', 'http', 'iacls', 'implementing', 'inadvertently', 'incoming', 'information', 'infrastructure', 'inhibit', 'inside', 'inspect', 'inspection', 'instantly', 'instead', 'intel', 'io', 'issue', 'latest', 'layer', 'leadership', 'learn', 'let', 'life', 'like', 'link', 'list', 'local', 'made', 'make', 'malformed', 'management', 'master', 'member', 'memory', 'message', 'might', 'mobile', 'model', 'module', 'move', 'much', 'multiple', 'netgear', 'network', 'networking', 'new', 'news', 'newsletter', 'next', 'online', 'option', 'page', 'paper', 'patch', 'perfect', 'plug', 'policy', 'popular', 'privacy', 'process', 'processing', 'product', 'protectwise', 'protocol', 'provide', 'pt', 'range', 'ransomware', 'recommended', 'related', 'release', 'released', 'reliable', 'reload', 'remote', 'researcher', 'resource', 'restrict', 'review', 'right', 'roundtable', 'russian', 'say', 'secure', 'security', 'sent', 'sentinelone', 'separate', 'service', 'short', 'sign', 'smart', 'software', 'sorry', 'spam', 'spent', 'sponsored', 'ssh', 'story', 'stream', 'surface', 'switch', 'take', 'telnet', 'terabyte', 'thank', 'throughout', 'time', 'tool', 'traffic', 'twitter', 'two', 'update', 'use', 'user', 'using', 'vector', 'video', 'visit', 'vulnerability', 'washington', 'weaken', 'wemo', 'wherever', 'white', 'wifi', 'wikileaks', 'work', 'world', 'xe', 'yahoo', 'zone'] | |
855 | |
856 | |
858 | |
859 | |
859 2017-03-09T18:31:36.440000Z http://www.welivesecurity.com/2014/05/15/virus-bulletin-article-reviews-two-ebooks-offering-security-guidance/ | |
859 2017-03-27T12:32:45.964000Z https://www.welivesecurity.com/2014/05/15/virus-bulletin-article-reviews-two-ebooks-offering-security-guidance/ | |
['accordance', 'actual', 'actually', 'aim', 'also', 'another', 'anscombe', 'app', 'article', 'author', 'available', 'avoid', 'book', 'brief', 'bulletin', 'cambridge', 'charge', 'college', 'considering', 'consumer', 'copyright', 'david', 'different', 'ebooks', 'email', 'eset', 'fairly', 'fellow', 'forget', 'free', 'friend', 'good', 'guidance', 'harley', 'held', 'hold', 'hosted', 'illustration', 'improve', 'intent', 'issue', 'kind', 'live', 'long', 'longer', 'looking', 'lot', 'ltd', 'made', 'malware', 'mustaca', 'notice', 'offering', 'one', 'originally', 'page', 'paper', 'parent', 'people', 'permission', 'personal', 'policy', 'posted', 'print', 'provide', 'publication', 'published', 'question', 'quite', 'reached', 'recently', 'record', 'requirement', 'research', 'review', 'scope', 'security', 'see', 'senior', 'site', 'small', 'sorin', 'summaryof', 'threat', 'tony', 'track', 'two', 'uk', 'use', 'version', 'via', 'virus', 'well', 'whats', 'white', 'world', 'worth', 'write', 'writing'] | |
860 | |
861 | |
862 | |
863 | |
864 | |
865 | |
866 | |
868 | |
869 | |
870 | |
870 2017-03-27T00:30:50.077000Z http://blog.noticebored.com/2017/03/nblog-march-27.html | |
870 2017-03-29T00:30:57.498000Z http://blog.noticebored.com/2017/03/nblog-march-29.html | |
['although', 'approach', 'awareness', 'blogthis', 'brief', 'business', 'colleague', 'completed', 'core', 'creativity', 'email', 'end', 'facebook', 'gary', 'get', 'information', 'innovation', 'manager', 'module', 'month', 'nblog', 'objective', 'piece', 'pinterest', 'place', 'rate', 'regard', 'security', 'set', 'share', 'stimulate', 'talking', 'thinking', 'time', 'today', 'topic', 'twitter'] | |
871 | |
872 | |
873 | |
873 2017-03-06T18:30:49.678000Z https://corero.com/blog/802-what-is-the-benefit-of-real-time-ddos-mitigation-let-a-corero-customer-tell-you.html | |
873 2017-03-09T18:30:52.746000Z https://corero.com/blog/803-mirai-iot-malware-now-infecting-windows-systems.html | |
['accelerate', 'advisory', 'agreement', 'alliance', 'allowing', 'allows', 'already', 'also', 'analytics', 'anthony', 'anton', 'architected', 'archive', 'attack', 'automatic', 'award', 'banking', 'barvick', 'benefit', 'bipin', 'blog', 'breach', 'brian', 'brings', 'business', 'buy', 'bypass', 'capacity', 'career', 'carrier', 'case', 'category', 'cedar', 'comment', 'committee', 'communication', 'community', 'company', 'conference', 'conformation', 'contact', 'contributor', 'copyright', 'corero', 'corporate', 'could', 'course', 'creator', 'customer', 'data', 'datacenters', 'datasheets', 'dave', 'ddos', 'defense', 'dependent', 'detect', 'director', 'disqus', 'document', 'edition', 'email', 'enable', 'end', 'enterprise', 'entity', 'establishing', 'event', 'executive', 'experience', 'fact', 'faq', 'feed', 'ferreira', 'filtering', 'flood', 'fouant', 'freed', 'gaming', 'gate', 'glossary', 'governance', 'handle', 'headquarters', 'hill', 'hosting', 'hostingcon', 'ians', 'importance', 'including', 'increase', 'info', 'information', 'informationweek', 'infosecurity', 'instrumental', 'interested', 'internet', 'investor', 'isp', 'javascript', 'joy', 'kevin', 'lack', 'large', 'larson', 'let', 'linda', 'line', 'live', 'magazine', 'maintain', 'make', 'managed', 'management', 'many', 'market', 'marketing', 'marlborough', 'meet', 'method', 'mistry', 'mitigate', 'mitigation', 'musthaler', 'nearly', 'need', 'network', 'new', 'newman', 'news', 'newsletter', 'nirav', 'office', 'online', 'organization', 'paper', 'partner', 'penetration', 'per', 'please', 'policy', 'portal', 'portfolio', 'possible', 'post', 'posted', 'potential', 'powered', 'president', 'press', 'previously', 'price', 'privacy', 'problem', 'product', 'protection', 'provider', 'really', 'receive', 'regulatory', 'relation', 'release', 'reo', 'report', 'reserved', 'resource', 'response', 'result', 'right', 'roll', 'room', 'rsa', 'sans', 'sc', 'scalable', 'schneier', 'scott', 'sean', 'securewatch', 'security', 'service', 'shah', 'share', 'shareholder', 'shortly', 'size', 'skill', 'smartwall', 'smith', 'solution', 'speed', 'stefan', 'stephanie', 'stephen', 'strategic', 'strategy', 'street', 'strives', 'study', 'subscribe', 'subscribing', 'suite', 'support', 'system', 'team', 'technology', 'tel', 'tell', 'thank', 'threat', 'toby', 'townsend', 'traffic', 'training', 'trend', 'tweet', 'user', 'using', 'via', 'vice', 'video', 'view', 'virtual', 'visibility', 'way', 'weagle', 'webinars', 'white', 'whitepapers', 'winning', 'would', 'year'] | |
874 | |
875 | |
878 | |
879 | |
880 | |
881 | |
882 | |
882 2017-03-17T12:31:30.901000Z http://www.itsecurityguru.org/2017/03/17/youtube-uk-government-suspends-ads-amid-extremism-concerns/ | |
882 2017-03-17T12:31:33.693000Z http://www.itsecurityguru.org/2017/03/17/mcdonalds-twitter-account-gets-hacked-posts-offensive-tweets-targeting-trump/ | |
882 2017-03-17T12:31:35.594000Z http://www.itsecurityguru.org/2017/03/17/bad-bots-running-wild-online/ | |
882 2017-03-17T12:31:37.511000Z http://www.itsecurityguru.org/2017/03/17/mike-flynn-paid-russias-top-cybersecurity-firm-still-top-secret-level-security-clearance/ | |
['ability', 'account', 'action', 'ad', 'administrator', 'advanced', 'affect', 'afraid', 'ago', 'american', 'amid', 'amidst', 'anderson', 'anonabox', 'app', 'application', 'appreciate', 'appriver', 'approves', 'around', 'article', 'arturplavnik', 'ask', 'atm', 'attack', 'axialsystems', 'back', 'backlash', 'bad', 'badly', 'baker', 'bank', 'banking', 'biggest', 'binary', 'biometrics', 'blind', 'board', 'bot', 'breach', 'broadly', 'build', 'business', 'campaign', 'change', 'chief', 'citibank', 'clearance', 'cm', 'combat', 'comment', 'communication', 'community', 'concern', 'couple', 'creating', 'crime', 'criminal', 'cyber', 'cybersecurity', 'dangerous', 'data', 'date', 'ddos', 'development', 'doe', 'dtmf', 'ebay', 'editor', 'email', 'embracing', 'emma', 'employee', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'even', 'event', 'expelling', 'experience', 'explain', 'explains', 'exposed', 'exposing', 'express', 'extremism', 'facebook', 'family', 'find', 'finnish', 'firm', 'flaw', 'flynn', 'follow', 'ford', 'fraud', 'full', 'gchq', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'goodbye', 'got', 'government', 'grip', 'guru', 'ha', 'hack', 'hacked', 'hacker', 'hacking', 'help', 'helped', 'hitting', 'home', 'hospital', 'hour', 'http', 'impact', 'imposter', 'improve', 'incident', 'including', 'information', 'infosec', 'infosecurity', 'inside', 'jay', 'jesse', 'joyce', 'know', 'landmark', 'law', 'leave', 'lee', 'legal', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'making', 'malware', 'many', 'met', 'mike', 'military', 'million', 'mind', 'mitigation', 'mixed', 'myth', 'nathaniel', 'ne', 'need', 'netflix', 'new', 'news', 'next', 'num', 'offensive', 'online', 'open', 'operation', 'option', 'original', 'paid', 'paypal', 'persistent', 'personnel', 'pervasive', 'phishing', 'photo', 'platform', 'pm', 'polite', 'popular', 'post', 'posted', 'postin', 'previous', 'primary', 'privacy', 'private', 'professional', 'protecting', 'protection', 'quality', 'quiz', 'ramond', 'ransomware', 'really', 'recent', 'regulation', 'related', 'remains', 'response', 'retailer', 'return', 'rich', 'rise', 'risk', 'round', 'run', 'running', 'sale', 'scam', 'security', 'sensitive', 'share', 'shortage', 'sign', 'skill', 'software', 'sort', 'source', 'spam', 'spot', 'squad', 'stick', 'still', 'stock', 'stolen', 'story', 'supporter', 'suspends', 'tackle', 'tag', 'tagged', 'taking', 'talking', 'target', 'targeting', 'teen', 'ten', 'term', 'themed', 'thing', 'threat', 'time', 'ton', 'top', 'trading', 'tremendous', 'trend', 'trump', 'turning', 'tweet', 'twitter', 'uk', 'uncovers', 'understanding', 'underway', 'usb', 'used', 'user', 'using', 'usps', 'vector', 'video', 'view', 'viral', 'vulnerability', 'walcot', 'warns', 'watson', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'whatsapp', 'wild', 'wishbone', 'within', 'woman', 'working', 'worse', 'year', 'youtube'] | |
885 | |
885 2017-03-18T18:30:43.677000Z http://packetpushers.net/future-wan/ | |
885 2017-03-29T18:31:00.039000Z http://packetpushers.net/future-wan-part-2/ | |
['access', 'also', 'appliance', 'application', 'back', 'backbone', 'backup', 'bandwidth', 'based', 'branch', 'cable', 'center', 'charge', 'circuit', 'client', 'cloud', 'colocation', 'communication', 'company', 'connect', 'connecting', 'cost', 'data', 'dedicated', 'defined', 'different', 'dispersed', 'effective', 'enterprise', 'equipment', 'etc', 'even', 'exchange', 'facility', 'fiber', 'firewall', 'future', 'gateway', 'geographically', 'hub', 'infrastructure', 'integration', 'internet', 'john', 'larger', 'last', 'level', 'like', 'located', 'managed', 'merline', 'might', 'mpls', 'multiple', 'network', 'office', 'often', 'pas', 'peering', 'private', 'provider', 'provides', 'public', 'recent', 'redundant', 'region', 'regional', 'remotely', 'required', 'router', 'scale', 'service', 'set', 'share', 'software', 'tape', 'telecom', 'together', 'traffic', 'used', 'virtual', 'vpn', 'vpns', 'wan', 'year'] | |
886 | |
888 | |
889 | |
889 2017-03-10T12:31:52.884000Z http://www.itsecurityguru.org/2017/03/10/google-chrome-57-released-webassembly-support-36-security-fixes/ | |
889 2017-03-10T12:31:27.561000Z http://www.itsecurityguru.org/2017/03/10/cia-leak-intel-security-releases-detection-tool-efi-rootkits/ | |
889 2017-03-10T12:31:32.751000Z http://www.itsecurityguru.org/2017/03/10/attacking-nexus-9-malicious-headphones/ | |
889 2017-03-10T12:31:35.104000Z http://www.itsecurityguru.org/2017/03/10/googles-captcha-service-now-goes-invisible-human-users/ | |
['ability', 'ad', 'administrator', 'advanced', 'affare', 'afraid', 'ago', 'allow', 'american', 'amidst', 'anderson', 'android', 'anonabox', 'anyone', 'apache', 'application', 'appreciate', 'appriver', 'approves', 'around', 'article', 'arturplavnik', 'ask', 'atm', 'attack', 'attacking', 'avente', 'back', 'backlash', 'bank', 'banking', 'barare', 'betty', 'biggest', 'bill', 'binary', 'biometrics', 'blank', 'blind', 'board', 'bought', 'breach', 'broadly', 'build', 'business', 'ca', 'campaign', 'captcha', 'card', 'cash', 'change', 'chrome', 'cia', 'cisco', 'citibank', 'cm', 'collective', 'combat', 'comment', 'community', 'confident', 'confirms', 'cool', 'creating', 'credential', 'criminal', 'cybe', 'cyber', 'cyberhacklords', 'cybersecurity', 'dahua', 'data', 'date', 'ddos', 'dead', 'detection', 'development', 'device', 'di', 'doe', 'ebay', 'editor', 'editorial', 'efi', 'email', 'embedded', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'expert', 'explain', 'exposed', 'express', 'facebook', 'failure', 'family', 'fight', 'find', 'finnish', 'firemon', 'firewall', 'fix', 'flaw', 'follow', 'foundation', 'fraud', 'full', 'gap', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'go', 'good', 'goodbye', 'google', 'got', 'government', 'grip', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'happened', 'head', 'headphone', 'hello', 'help', 'helped', 'higher', 'hitting', 'home', 'hospital', 'http', 'human', 'il', 'impact', 'imposter', 'improve', 'incident', 'industry', 'information', 'infosec', 'infosecurity', 'inside', 'intel', 'internet', 'invisible', 'iphones', 'issue', 'jackson', 'japonica', 'know', 'knowing', 'landmark', 'law', 'leaf', 'leak', 'leave', 'left', 'like', 'link', 'literacy', 'live', 'lizard', 'look', 'lure', 'mac', 'machine', 'making', 'malicious', 'malware', 'many', 'marito', 'massive', 'min', 'mind', 'mirchandani', 'mitigation', 'mobes', 'moglie', 'need', 'netflix', 'new', 'news', 'next', 'nexus', 'num', 'oh', 'ongoing', 'open', 'operation', 'option', 'organisation', 'original', 'paypal', 'persistent', 'pervasive', 'phishing', 'platform', 'please', 'pm', 'popular', 'posted', 'postin', 'previous', 'primary', 'privacy', 'profile', 'programmed', 'protecting', 'protection', 'prpl', 'ramond', 'rand', 'randomization', 'ransomware', 'reaction', 'really', 'recent', 'regulation', 'related', 'release', 'released', 'remain', 'remains', 'research', 'respond', 'response', 'retailer', 'return', 'revelation', 'rich', 'rise', 'risk', 'rootkits', 'round', 'run', 'sailpoint', 'sale', 'sarah', 'satin', 'scam', 'secure', 'security', 'see', 'sensitive', 'service', 'share', 'shortage', 'sign', 'skill', 'software', 'sort', 'source', 'spam', 'spend', 'spider', 'spot', 'squad', 'stock', 'story', 'su', 'support', 'supporter', 'survey', 'tackle', 'tag', 'talking', 'target', 'targeted', 'ten', 'term', 'themed', 'thing', 'threat', 'tool', 'top', 'touch', 'tracking', 'trading', 'tremendous', 'trend', 'tua', 'tuo', 'turning', 'tweet', 'uk', 'un', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'veracode', 'victim', 'video', 'view', 'viral', 'vulnerability', 'walcot', 'warning', 'warns', 'weakest', 'web', 'webassembly', 'webinar', 'webinars', 'week', 'well', 'wild', 'within', 'working', 'world', 'worse', 'would', 'wow', 'year', 'yokehew'] | |
890 | |
891 | |
891 2017-03-05T00:39:46.530000Z http://thehackernews.com/2011/09/top100-arena-gaming-sites-network.html | |
891 2017-03-05T00:42:41.490000Z http://thehackernews.com/2011/04/albanian-ministry-of-justice-exploited.html | |
891 2017-03-05T00:44:17.524000Z http://thehackernews.com/2011/03/albanian-cyber-army-hack-into.html | |
['ability', 'albania', 'albanian', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
892 | |
893 | |
895 | |
897 | |
897 2017-03-05T00:41:10.713000Z http://thehackernews.com/2011/06/pakhackerzcom-hacked-by-indishell-and.html | |
897 2017-03-05T00:41:23.797000Z http://thehackernews.com/2011/05/pakistani-hackers-site-got-hacked-by.html | |
897 2017-03-05T00:41:56.335000Z http://thehackernews.com/2011/05/pakistan-cyber-army-got-hacked-by.html | |
897 2017-03-05T00:42:10.904000Z http://thehackernews.com/2011/05/dar-al-salam-hajj-and-umrah-services.html | |
897 2017-03-05T00:42:48.683000Z http://thehackernews.com/2011/04/atul-dwivedi-indishell-hack-into-kaizen.html | |
897 2017-03-05T00:44:25.797000Z http://thehackernews.com/2011/02/indishell-indian-hacking-group-got.html | |
897 2017-03-05T00:46:23.988000Z http://thehackernews.com/2010/12/cambodian-govt-website-hacked-by.html | |
897 2017-03-05T00:46:25.411000Z http://thehackernews.com/2010/12/bahriaedupk-hacked-by-indishell.html | |
897 2017-03-05T00:46:34.617000Z http://thehackernews.com/2010/11/terrorist-group-hizb-ulmuzahidin.html | |
897 2017-03-05T00:46:36.234000Z http://thehackernews.com/2010/11/project-jai-hind-2611-revenge.html | |
897 2017-03-05T00:47:12.569000Z http://thehackernews.com/2010/10/100-brazilian-website-hacked-by.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'indian', 'indishell', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
898 | |
899 | |
900 | |
900 2017-03-20T18:30:58.803000Z http://www.welivesecurity.com/2017/03/20/abta-experiences-data-breach/ | |
900 2017-03-27T12:31:17.054000Z https://www.welivesecurity.com/2017/03/20/abta-experiences-data-breach/ | |
['abide', 'abta', 'access', 'account', 'actively', 'admitting', 'affecting', 'agent', 'alert', 'announced', 'apologizing', 'app', 'around', 'assessment', 'association', 'attack', 'author', 'bank', 'body', 'breach', 'british', 'came', 'ceo', 'come', 'company', 'complaint', 'comply', 'compromised', 'consent', 'contact', 'customer', 'cybercriminals', 'data', 'day', 'detail', 'detection', 'developer', 'discovered', 'email', 'every', 'experience', 'expose', 'face', 'filled', 'fine', 'fixed', 'flaw', 'following', 'form', 'fraud', 'friend', 'gave', 'gdpr', 'general', 'harsher', 'heavy', 'help', 'holiday', 'hosting', 'identity', 'impact', 'impacted', 'imposed', 'include', 'including', 'information', 'largest', 'live', 'major', 'majority', 'managed', 'mandatory', 'many', 'mark', 'meantime', 'medium', 'member', 'monitor', 'narinder', 'new', 'news', 'notification', 'notified', 'observed', 'online', 'page', 'penalty', 'people', 'personal', 'place', 'play', 'possible', 'posted', 'print', 'privacy', 'protection', 'provider', 'purba', 'regarding', 'registered', 'regulation', 'remained', 'revealing', 'rule', 'said', 'secure', 'security', 'server', 'social', 'statement', 'step', 'store', 'submitted', 'subsequently', 'suffered', 'suggested', 'supplier', 'system', 'tanzer', 'thousand', 'took', 'travel', 'urgently', 'vigilant', 'vulnerability', 'web', 'website', 'whats'] | |
901 | |
901 2017-03-21T12:30:48.179000Z https://www.grahamcluley.com/laptops-tablets-gadgets-banned-cabin-us-bound-flights/ | |
901 2017-03-21T18:30:53.073000Z https://www.grahamcluley.com/threes-website-exposes-mobile-phone-customers-details-strangers/ | |
901 2017-03-23T12:31:53.698000Z https://www.grahamcluley.com/smashing-security-013-assaulted-deadly-tweet/ | |
['account', 'adobe', 'advice', 'also', 'among', 'analyst', 'android', 'appearance', 'apple', 'application', 'article', 'ask', 'associate', 'attack', 'audio', 'author', 'award', 'backup', 'bad', 'banned', 'best', 'billion', 'bisson', 'blackberry', 'blog', 'blox', 'bob', 'botnet', 'brilliant', 'browser', 'btc', 'buffer', 'cabin', 'cancel', 'carole', 'category', 'celebrity', 'channel', 'check', 'chrome', 'click', 'clickjacking', 'cluley', 'comment', 'company', 'computer', 'condition', 'contact', 'content', 'contributor', 'cooky', 'copyright', 'covello', 'criminal', 'cyber', 'daily', 'data', 'david', 'day', 'ddos', 'decryptor', 'defence', 'deliver', 'denial', 'detail', 'device', 'different', 'discovered', 'dr', 'drop', 'early', 'email', 'encryption', 'episode', 'event', 'ever', 'every', 'exploit', 'explorer', 'facebook', 'fake', 'feed', 'filed', 'firefox', 'firm', 'first', 'flash', 'flight', 'focused', 'follow', 'free', 'fun', 'future', 'gadget', 'gaining', 'game', 'gchq', 'gcluley', 'gear', 'get', 'give', 'google', 'graham', 'guest', 'guideline', 'hack', 'hacked', 'hacker', 'hand', 'happened', 'hire', 'home', 'hosted', 'humbug', 'idea', 'incapsula', 'independent', 'industry', 'info', 'informed', 'internet', 'io', 'jacaranda', 'java', 'jim', 'keylogger', 'kirk', 'laptop', 'latest', 'law', 'le', 'leave', 'like', 'limited', 'link', 'linkedin', 'linux', 'list', 'listen', 'live', 'login', 'loss', 'macos', 'make', 'malicious', 'malware', 'medium', 'menu', 'microsoft', 'might', 'mobile', 'momentum', 'naked', 'name', 'navigation', 'nazi', 'network', 'new', 'news', 'newsletter', 'nude', 'number', 'often', 'one', 'online', 'operating', 'opinion', 'oracle', 'order', 'pdf', 'people', 'philip', 'phishing', 'phone', 'plus', 'podcast', 'podcasts', 'policy', 'popular', 'post', 'powered', 'preparers', 'presentation', 'pressidium', 'privacy', 'protected', 'public', 'published', 'put', 'ransomware', 'recent', 'recorded', 'reddit', 'register', 'regularly', 'reply', 'required', 'reserved', 'return', 'review', 'riche', 'right', 'risk', 'rogue', 'safari', 'say', 'scammer', 'security', 'send', 'service', 'share', 'since', 'site', 'smashing', 'social', 'soliman', 'solomon', 'sorry', 'spam', 'speak', 'speaking', 'sponsor', 'sponsorship', 'sport', 'star', 'stay', 'story', 'stream', 'subscribe', 'support', 'surprise', 'svajcer', 'system', 'tablet', 'tag', 'target', 'tax', 'tech', 'term', 'testimonial', 'theriault', 'threat', 'three', 'tip', 'toolbar', 'toolkit', 'top', 'topic', 'trending', 'twitter', 'uncategorized', 'unloved', 'user', 'vanja', 'version', 'veteran', 'video', 'view', 'visit', 'vulnerability', 'want', 'way', 'web', 'website', 'week', 'weekly', 'whatsapp', 'wibbling', 'wikileaks', 'wilf', 'window', 'wo', 'wordpress', 'worked', 'write', 'wrote', 'yahoo', 'yasin', 'yet', 'youtube'] | |
902 | |
903 | |
904 | |
905 | |
906 | |
907 | |
907 2017-03-18T12:30:53.569000Z http://securityaffairs.co/wordpress/57226/apt/symantec-lazarus-apt-banks.html | |
907 2017-03-18T18:30:47.148000Z http://securityaffairs.co/wordpress/57242/intelligence/vault-7-conditions-disclosure.html | |
907 2017-03-20T12:30:53.099000Z http://securityaffairs.co/wordpress/57275/hacking/user-account-control-bypass.html | |
['affair', 'agency', 'also', 'analyst', 'apt', 'article', 'attack', 'author', 'awareness', 'back', 'bank', 'belief', 'best', 'blame', 'blog', 'book', 'breach', 'campaign', 'certified', 'chief', 'contact', 'content', 'cookie', 'copyright', 'council', 'crime', 'currency', 'cyber', 'dark', 'data', 'deep', 'defense', 'digital', 'ec', 'enisa', 'ethical', 'european', 'evangelist', 'experience', 'expert', 'exploit', 'extended', 'field', 'find', 'firm', 'founded', 'freelance', 'group', 'hacker', 'hacking', 'hacktivism', 'home', 'icttf', 'id', 'identity', 'information', 'infosec', 'institute', 'intelligence', 'internet', 'investigation', 'island', 'korean', 'landscape', 'law', 'lazarus', 'leader', 'led', 'like', 'london', 'magazine', 'major', 'malicious', 'malware', 'management', 'many', 'member', 'might', 'mobile', 'must', 'named', 'national', 'network', 'new', 'news', 'north', 'officer', 'paganini', 'passion', 'personal', 'pierluigi', 'please', 'policy', 'previous', 'previously', 'promote', 'publication', 'published', 'read', 'recent', 'recently', 'regulation', 'report', 'researcher', 'reserved', 'resource', 'right', 'security', 'securityaffairs', 'share', 'sharing', 'social', 'solution', 'specific', 'sponsored', 'stakeholder', 'story', 'strong', 'symantec', 'team', 'terrorism', 'thing', 'threat', 'top', 'treat', 'union', 'virtual', 'war', 'warfare', 'web', 'writer', 'writing', 'year', 'zone'] | |
908 | |
909 | |
910 | |
911 | |
911 2017-03-05T00:39:59.765000Z http://thehackernews.com/2011/08/xss-vulnerability-in-msncom.html | |
911 2017-03-05T00:42:31.820000Z http://thehackernews.com/2011/04/cross-site-scripting-xss-vulnerability.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cross', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'link', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'scripting', 'search', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'vulnerability', 'vulnerable', 'walking', 'want', 'without', 'york'] | |
912 | |
913 | |
913 2017-03-07T18:30:56.226000Z https://blog.elearnsecurity.com/brute-force-attacks-in-mobile-apps.html | |
913 2017-03-09T18:30:50.671000Z https://blog.elearnsecurity.com/mobile-security-mistakes.html | |
['able', 'app', 'application', 'apps', 'aspect', 'assessment', 'attack', 'attacker', 'author', 'based', 'blog', 'brute', 'client', 'code', 'coding', 'comment', 'common', 'conducted', 'contributed', 'correct', 'course', 'design', 'develop', 'developer', 'developing', 'device', 'different', 'dubai', 'easy', 'edcel', 'el', 'elearnsecurity', 'every', 'experience', 'force', 'francesco', 'free', 'freelance', 'get', 'hacker', 'happens', 'http', 'information', 'instructor', 'joomla', 'keep', 'keeping', 'learn', 'linkedin', 'make', 'many', 'marketing', 'maspt', 'mean', 'million', 'mind', 'mistake', 'mobile', 'network', 'number', 'online', 'part', 'penetration', 'phone', 'prevent', 'project', 'really', 'researcher', 'secure', 'security', 'senior', 'server', 'something', 'span', 'started', 'stillavato', 'sunny', 'suyo', 'tag', 'team', 'technique', 'testing', 'think', 'thought', 'trial', 'twitter', 'use', 'user', 'vulnerability', 'want', 'web', 'week', 'year'] | |
914 | |
915 | |
915 2017-03-05T00:45:14.164000Z http://thehackernews.com/2011/01/areuhotinfo-hacked-by-mack-team-nuts.html | |
915 2017-03-05T00:45:56.766000Z http://thehackernews.com/2010/12/kadencecom-hacked-by-team-nuts.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'indian', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'link', 'mack', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'nut', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'team', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
919 | |
920 | |
921 | |
922 | |
923 | |
924 | |
925 | |
927 | |
928 | |
928 2017-03-01T06:32:17.123000Z https://www.mimecast.com/blog/2013/10/protect-your-email-from-disaster-in-seven-easy-steps/ | |
928 2017-03-18T12:34:16.001000Z http://www.mimecast.com/blog/2013/10/protect-your-email-from-disaster-in-seven-easy-steps/ | |
['able', 'acceptable', 'action', 'activate', 'administration', 'advance', 'affect', 'africa', 'agree', 'agreed', 'allocate', 'america', 'american', 'analysis', 'apps', 'archive', 'archiving', 'asia', 'assigned', 'available', 'avoid', 'award', 'back', 'basis', 'become', 'bia', 'blog', 'boost', 'budget', 'bundle', 'business', 'capability', 'career', 'case', 'center', 'central', 'chat', 'cio', 'classification', 'classified', 'classify', 'cloud', 'coalition', 'comment', 'communication', 'company', 'compliance', 'confident', 'console', 'contact', 'content', 'continue', 'continuity', 'control', 'core', 'cost', 'could', 'countermeasure', 'create', 'critical', 'criticality', 'crm', 'cross', 'customer', 'cyber', 'damaging', 'data', 'day', 'demo', 'detail', 'determine', 'devised', 'diligence', 'disaster', 'disclaimer', 'disclosure', 'disqus', 'disrupting', 'dlp', 'downtime', 'due', 'east', 'easy', 'efficient', 'email', 'enable', 'encounter', 'enforced', 'enforcement', 'error', 'europe', 'even', 'event', 'every', 'example', 'exchange', 'experience', 'extreme', 'fail', 'failure', 'fast', 'fear', 'file', 'filed', 'finance', 'financial', 'finger', 'fire', 'flood', 'follow', 'forum', 'frontier', 'get', 'given', 'go', 'goal', 'gold', 'good', 'google', 'great', 'half', 'happens', 'hardware', 'head', 'healthcare', 'hipaa', 'home', 'hope', 'hour', 'human', 'hurricane', 'hybrid', 'ignore', 'im', 'impact', 'implement', 'implemented', 'improvement', 'industry', 'information', 'infosecurity', 'instant', 'investor', 'javascript', 'know', 'knowledgebase', 'large', 'last', 'leadership', 'legacy', 'level', 'like', 'live', 'login', 'lose', 'lost', 'managed', 'management', 'many', 'match', 'measured', 'meet', 'mesaging', 'messaging', 'microsoft', 'middle', 'midmarket', 'migration', 'mimecast', 'mimecaster', 'mistake', 'mobility', 'mode', 'moment', 'morning', 'mounil', 'must', 'natural', 'need', 'network', 'new', 'news', 'next', 'normal', 'north', 'northern', 'objective', 'office', 'often', 'one', 'operation', 'opportune', 'option', 'organization', 'orgs', 'outage', 'overview', 'pacific', 'partner', 'patel', 'people', 'perform', 'plan', 'planned', 'platform', 'please', 'policy', 'post', 'posted', 'power', 'powered', 'preparedness', 'press', 'primary', 'prioritized', 'privacy', 'procedure', 'process', 'product', 'production', 'productivity', 'professional', 'program', 'property', 'protect', 'protection', 'provider', 'qualitative', 'quantitative', 'quickly', 'quote', 'recovered', 'recovery', 'registration', 'regular', 'regulatory', 'related', 'relation', 'relationship', 'release', 'requirement', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'revenue', 'right', 'ripping', 'risk', 'role', 'rto', 'rule', 'safely', 'sale', 'schedule', 'season', 'secure', 'security', 'see', 'send', 'service', 'set', 'seven', 'share', 'shared', 'sight', 'signature', 'sitemap', 'six', 'solution', 'south', 'start', 'step', 'still', 'stop', 'storm', 'strained', 'strike', 'success', 'support', 'system', 'take', 'targeted', 'team', 'technical', 'technology', 'term', 'test', 'testing', 'thing', 'threat', 'three', 'time', 'today', 'training', 'transportation', 'tree', 'trust', 'try', 'tweet', 'uk', 'unexpected', 'unplanned', 'use', 'valuable', 'verified', 'view', 'wait', 'way', 'weather', 'webinars', 'week', 'without', 'work', 'working', 'worrying', 'worse', 'wrong', 'year'] | |
929 | |
930 | |
931 | |
933 | |
933 2017-03-21T00:31:08.498000Z http://www.welivesecurity.com/2015/02/13/7-unromantic-valentines-gifts-cybercriminal/ | |
933 2017-03-27T12:32:14.099000Z https://www.welivesecurity.com/2015/02/13/7-unromantic-valentines-gifts-cybercriminal/ | |
['abta', 'accept', 'access', 'accompanied', 'actually', 'add', 'address', 'al', 'alarming', 'albors', 'alert', 'allowing', 'already', 'also', 'always', 'amidst', 'analyst', 'android', 'annoying', 'another', 'app', 'appear', 'appliance', 'application', 'archive', 'around', 'article', 'attack', 'attacker', 'attempting', 'attention', 'attentive', 'attribute', 'author', 'aware', 'bear', 'become', 'better', 'blog', 'bon', 'bouquet', 'box', 'breach', 'bryan', 'bug', 'bulletin', 'camera', 'campaign', 'capable', 'card', 'care', 'careful', 'case', 'cassette', 'cause', 'caused', 'cd', 'change', 'chocolate', 'chosen', 'classic', 'click', 'code', 'collect', 'come', 'coming', 'comment', 'common', 'commonplace', 'community', 'company', 'compilation', 'compromised', 'computer', 'conference', 'connect', 'connecting', 'console', 'contact', 'control', 'copy', 'copyright', 'could', 'creative', 'creature', 'credential', 'crouching', 'customer', 'cybercriminal', 'cybercriminals', 'cybersecurity', 'cyberthreats', 'daily', 'damage', 'dangerous', 'data', 'dating', 'day', 'de', 'deceit', 'deceive', 'declaration', 'defenseless', 'deutsch', 'device', 'diego', 'difference', 'direct', 'div', 'dns', 'doll', 'drive', 'ease', 'eavesdrop', 'email', 'embed', 'en', 'enamored', 'end', 'english', 'enjoy', 'enough', 'enter', 'error', 'eset', 'español', 'especially', 'even', 'every', 'everything', 'exact', 'excuse', 'experience', 'expert', 'explains', 'exploit', 'extending', 'facebook', 'fake', 'fall', 'far', 'fear', 'festive', 'fiasco', 'file', 'filter', 'find', 'fix', 'flower', 'follow', 'form', 'forum', 'frequency', 'friend', 'full', 'functionality', 'game', 'gap', 'gave', 'generally', 'geolocation', 'gift', 'girl', 'given', 'go', 'good', 'gremlin', 'grew', 'growing', 'guarantee', 'guest', 'ha', 'hacking', 'happy', 'heard', 'heart', 'hidden', 'hiding', 'highly', 'home', 'hot', 'household', 'http', 'hundred', 'ideal', 'implying', 'inattentive', 'inbox', 'incorporated', 'indirect', 'infected', 'infection', 'information', 'insert', 'inside', 'insight', 'intended', 'interested', 'invade', 'invaded', 'ir', 'java', 'jewelry', 'josep', 'joy', 'junk', 'keep', 'kept', 'key', 'know', 'language', 'last', 'latest', 'lead', 'leading', 'learned', 'legal', 'legitimate', 'letter', 'like', 'likely', 'link', 'linkedin', 'loaded', 'location', 'looked', 'love', 'magazine', 'mail', 'make', 'malicious', 'malware', 'many', 'masquerading', 'master', 'material', 'maybe', 'medium', 'meet', 'mentioned', 'message', 'might', 'million', 'mixtape', 'mobile', 'month', 'multimedia', 'must', 'nasty', 'navigation', 'never', 'new', 'news', 'newsletter', 'nice', 'nowadays', 'nuclear', 'number', 'objective', 'observes', 'one', 'online', 'opinion', 'package', 'page', 'pagnotta', 'paper', 'particularly', 'password', 'pay', 'pendrive', 'people', 'perfect', 'performs', 'personal', 'phishing', 'phone', 'piece', 'place', 'plan', 'plush', 'podcasts', 'policy', 'popular', 'popularity', 'position', 'post', 'postcard', 'posted', 'potential', 'prepared', 'pretending', 'print', 'privacy', 'private', 'program', 'promised', 'propagate', 'protect', 'provided', 'provider', 'providing', 'publicly', 'purpose', 'pérez', 'quickly', 'radar', 'ransomware', 'rate', 'read', 'really', 'reason', 'receive', 'received', 'receiving', 'recording', 'registry', 'related', 'remember', 'remote', 'removable', 'reporting', 'represent', 'reproducing', 'research', 'reserved', 'right', 'risk', 'romantic', 'run', 'sabrina', 'safe', 'safeguarding', 'saint', 'scam', 'se', 'search', 'security', 'see', 'seemingly', 'select', 'send', 'sending', 'sent', 'service', 'shape', 'shared', 'shortcut', 'show', 'showing', 'sign', 'silently', 'since', 'single', 'site', 'sitemap', 'smart', 'software', 'solution', 'someone', 'sometimes', 'song', 'spa', 'spam', 'spare', 'special', 'start', 'stealthy', 'step', 'stick', 'still', 'streaming', 'stylesheet', 'sure', 'surprised', 'surprising', 'sweetheart', 'symbolize', 'system', 'tablet', 'take', 'taking', 'target', 'task', 'teddy', 'text', 'theft', 'think', 'thnx', 'though', 'threat', 'throughout', 'thus', 'tiger', 'time', 'toggle', 'topic', 'toy', 'track', 'traditional', 'trick', 'trident', 'trojan', 'try', 'tv', 'twitter', 'two', 'type', 'unavoidable', 'unfailingly', 'uninvited', 'unless', 'unromantic', 'updated', 'upon', 'usb', 'use', 'used', 'user', 'using', 'usual', 'valentine', 'vector', 'vibe', 'victim', 'video', 'view', 'virus', 'voucher', 'want', 'way', 'wearable', 'webcam', 'wechseln', 'welcome', 'whats', 'white', 'whitney', 'without', 'witnessed', 'wls', 'woman', 'world', 'worm', 'worry', 'would', 'year', 'yorumcu', 'youtube', 'zum'] | |
934 | |
934 2017-03-29T00:31:01.105000Z http://www.bankinfosecurity.com/blogs/great-crypto-diversion-p-2435 | |
934 2017-03-30T00:30:55.785000Z http://www.bankinfosecurity.com/interviews/rise-secure-technology-alliance-i-3535 | |
934 2017-03-30T18:30:58.279000Z http://www.bankinfosecurity.com/blogs/your-ftp-server-waiting-for-hacker-p-2436 | |
['access', 'ach', 'achieving', 'administration', 'advanced', 'agency', 'agenda', 'aml', 'application', 'approach', 'article', 'asia', 'assessment', 'atlanta', 'atm', 'attack', 'austin', 'authentication', 'awareness', 'bangalore', 'bankinfosecurity', 'banking', 'become', 'beyond', 'big', 'biometrics', 'bitcoin', 'black', 'blankenship', 'blind', 'blockchain', 'blog', 'board', 'botnets', 'breach', 'brian', 'britain', 'bryce', 'bsa', 'business', 'byod', 'calendar', 'careersinfosecurity', 'center', 'chabrow', 'chan', 'checkbox', 'chicago', 'christopher', 'cisa', 'cisco', 'cissp', 'city', 'cloud', 'compliance', 'compromise', 'computing', 'conference', 'congress', 'continuous', 'could', 'course', 'crime', 'crypto', 'cuinfosecurity', 'customer', 'cyber', 'cybercrime', 'cybersec', 'cybersecurity', 'cyberthreat', 'data', 'databreachtoday', 'daugherty', 'ddos', 'debate', 'deception', 'defense', 'delivering', 'detection', 'device', 'dhs', 'digital', 'disrupting', 'distributed', 'diversion', 'effective', 'elvis', 'email', 'encryption', 'endpoint', 'enforcement', 'engineering', 'engle', 'enterprise', 'enters', 'eric', 'essential', 'europe', 'event', 'experience', 'extortion', 'fbi', 'ffiec', 'financial', 'forensics', 'fraud', 'frontier', 'future', 'gartner', 'gdpr', 'glba', 'global', 'go', 'governance', 'government', 'govinfosecurity', 'grc', 'great', 'group', 'handbook', 'haran', 'hat', 'health', 'healthcare', 'healthcareinfosecurity', 'hint', 'hipaa', 'home', 'id', 'impact', 'incident', 'india', 'influencers', 'info', 'infographics', 'inforisktoday', 'information', 'infosec', 'infosecurity', 'inside', 'insider', 'insight', 'interview', 'investigating', 'investment', 'ismg', 'jeremy', 'job', 'joseph', 'kim', 'kingdom', 'kirk', 'know', 'late', 'launch', 'law', 'leader', 'learn', 'liability', 'library', 'limiting', 'loss', 'major', 'management', 'mathew', 'matter', 'measurement', 'medium', 'mega', 'member', 'messaging', 'mike', 'mirai', 'missing', 'mobile', 'mobility', 'model', 'move', 'navy', 'need', 'network', 'new', 'news', 'ng', 'notification', 'ocr', 'omnibus', 'optimal', 'panorama', 'paper', 'parry', 'payment', 'pci', 'perspective', 'phishing', 'physical', 'platform', 'post', 'premium', 'prepping', 'preserving', 'prevention', 'privacy', 'protection', 'ransomware', 'reacting', 'recovery', 'reducing', 'resilience', 'resource', 'response', 'retail', 'richard', 'risk', 'rsa', 'schwartz', 'secretary', 'secure', 'security', 'see', 'seen', 'sharing', 'sheffer', 'shifting', 'showdown', 'social', 'speaker', 'spot', 'ssl', 'state', 'storage', 'strand', 'strategic', 'strategy', 'study', 'stuxnet', 'submitting', 'summit', 'survey', 'tal', 'tech', 'technology', 'testing', 'theft', 'thing', 'timing', 'tool', 'top', 'topic', 'trace', 'tracking', 'training', 'transforming', 'trump', 'two', 'united', 'update', 'varun', 'vendor', 'verizon', 'video', 'virtualization', 'vulnerability', 'washington', 'weapon', 'white', 'william', 'work', 'world', 'worry', 'wrong', 'york', 'zetter'] | |
935 | |
935 2017-03-21T12:30:44.041000Z https://community.rapid7.com/community/metasploit/blog/2017/03/21/metasploits-rf-transceiver-capabilities | |
935 2017-03-22T12:30:48.391000Z http://securityaffairs.co/wordpress/57329/hacking/metasploit-rftransceiver-iot.html | |
['able', 'access', 'alarm', 'already', 'also', 'api', 'area', 'attached', 'attack', 'attacker', 'bad', 'behind', 'believe', 'best', 'better', 'blog', 'bridge', 'brought', 'capability', 'common', 'communication', 'community', 'company', 'compatible', 'component', 'connect', 'content', 'continue', 'control', 'could', 'craig', 'created', 'criticism', 'currently', 'demonstrate', 'device', 'door', 'download', 'driver', 'ecosystem', 'effectively', 'escalate', 'example', 'execution', 'exploiting', 'exposure', 'extension', 'failing', 'find', 'foreign', 'framework', 'frequency', 'guy', 'hacker', 'hardware', 'home', 'http', 'hvac', 'id', 'impact', 'importance', 'important', 'included', 'including', 'incredibly', 'information', 'insulin', 'interference', 'internet', 'iot', 'kind', 'latest', 'learn', 'like', 'major', 'management', 'many', 'metasploit', 'monitoring', 'necessary', 'network', 'new', 'often', 'one', 'onto', 'organization', 'outside', 'overlooked', 'patient', 'penetration', 'people', 'physical', 'potential', 'product', 'protocol', 'pump', 'purpose', 'put', 'radio', 'reader', 'reason', 'relay', 'remote', 'replicate', 'research', 'researcher', 'resource', 'response', 'rf', 'rfcat', 'rfid', 'rftransceiver', 'right', 'risk', 'room', 'run', 'security', 'server', 'smith', 'software', 'step', 'stick', 'stop', 'strongly', 'sunlight', 'surface', 'surveillance', 'system', 'take', 'team', 'technical', 'technology', 'test', 'testing', 'thing', 'though', 'time', 'tool', 'understand', 'usage', 'use', 'using', 'vulnerability', 'wireless', 'yard', 'zigbee'] | |
936 | |
937 | |
938 | |
939 | |
939 2017-03-01T06:31:24.098000Z https://www.mimecast.com/blog/2016/01/ciso-of-2016-balancing-prevention-and-remediation/ | |
939 2017-03-18T12:32:48.368000Z http://www.mimecast.com/blog/2016/01/ciso-of-2016-balancing-prevention-and-remediation/ | |
['able', 'acceptable', 'account', 'across', 'act', 'action', 'addition', 'advance', 'also', 'always', 'another', 'anything', 'architecture', 'archiving', 'ass', 'asset', 'assuring', 'attack', 'available', 'balancing', 'best', 'biggest', 'blog', 'breach', 'business', 'career', 'case', 'ceo', 'charge', 'checklist', 'chief', 'cio', 'ciso', 'cisos', 'closing', 'cloud', 'come', 'comfortable', 'comment', 'company', 'compliance', 'concerning', 'confirms', 'constantly', 'consultancy', 'continuity', 'created', 'credential', 'critical', 'cut', 'cyber', 'cybercriminals', 'cybersecurity', 'danger', 'data', 'date', 'day', 'decisively', 'defend', 'defending', 'desk', 'detected', 'developed', 'difference', 'disaster', 'disqus', 'educate', 'education', 'element', 'email', 'emergence', 'emergency', 'employee', 'enable', 'enough', 'entire', 'equipped', 'equivalent', 'especially', 'etc', 'evangelism', 'event', 'ever', 'exploitable', 'exploited', 'facility', 'factor', 'filed', 'finally', 'first', 'five', 'focus', 'fortune', 'found', 'frequently', 'get', 'global', 'government', 'great', 'hack', 'happen', 'heavily', 'highlight', 'hiring', 'home', 'hotspot', 'however', 'immediately', 'incident', 'include', 'includes', 'industry', 'influential', 'information', 'infrastructure', 'invest', 'javascript', 'joining', 'key', 'last', 'leak', 'linkedin', 'local', 'longer', 'loss', 'lucky', 'macro', 'made', 'mail', 'majority', 'make', 'malware', 'management', 'many', 'master', 'matter', 'member', 'mentality', 'microsoft', 'mimecast', 'name', 'necessary', 'nervous', 'network', 'note', 'number', 'office', 'officer', 'often', 'one', 'onward', 'organization', 'orlando', 'outage', 'paper', 'parent', 'part', 'particular', 'password', 'patched', 'people', 'per', 'personal', 'phishing', 'piece', 'place', 'plan', 'planning', 'play', 'please', 'point', 'possible', 'post', 'posted', 'powered', 'practiced', 'preparation', 'prevention', 'price', 'prior', 'priority', 'pro', 'problem', 'process', 'product', 'program', 'promise', 'protect', 'protected', 'protecting', 'protection', 'provide', 'public', 'publication', 'published', 'purchase', 'pwc', 'quickly', 'ransomware', 'rather', 'real', 'really', 'reason', 'reassess', 'recent', 'recognizing', 'reflecting', 'relief', 'remediation', 'report', 'research', 'resellers', 'responds', 'response', 'revealed', 'rise', 'rising', 'robot', 'saas', 'sale', 'save', 'security', 'service', 'share', 'sharp', 'show', 'smartly', 'software', 'speaking', 'spear', 'spend', 'staff', 'state', 'step', 'strategist', 'suffering', 'survey', 'swiftly', 'system', 'task', 'taught', 'technology', 'temptation', 'term', 'therefore', 'tide', 'time', 'tool', 'toolkit', 'top', 'topic', 'total', 'towards', 'training', 'undoubtedly', 'use', 'useful', 'using', 'variety', 'vendor', 'veteran', 'view', 'way', 'weak', 'weakness', 'weighted', 'whether', 'wholly', 'wider', 'wise', 'wisely', 'work', 'worked', 'working', 'worst', 'worth', 'writing', 'year'] | |
940 | |
941 | |
941 2017-03-25T06:31:37.458000Z http://www.welivesecurity.com/2010/08/25/the-strange-case-of-the-droid-2-password-lock/ | |
941 2017-03-27T12:33:44.381000Z https://www.welivesecurity.com/2010/08/25/the-strange-case-of-the-droid-2-password-lock/ | |
['ability', 'able', 'abrams', 'abta', 'access', 'activate', 'activated', 'actual', 'actually', 'add', 'aggree', 'ago', 'al', 'allowed', 'also', 'always', 'android', 'annoyance', 'another', 'answer', 'antivirus', 'anyone', 'anyway', 'app', 'appears', 'apps', 'archive', 'article', 'attention', 'author', 'automatically', 'avoid', 'aware', 'away', 'back', 'bar', 'based', 'behavior', 'believe', 'best', 'bit', 'black', 'blackberry', 'blog', 'breach', 'brian', 'briefly', 'bring', 'bringing', 'bug', 'bundled', 'button', 'call', 'carrier', 'case', 'certainly', 'change', 'changed', 'charge', 'choice', 'choose', 'chris', 'click', 'close', 'code', 'come', 'comment', 'community', 'conference', 'confusing', 'connect', 'consider', 'contact', 'copyright', 'could', 'customer', 'cyanogenmod', 'cybersecurity', 'dangerous', 'data', 'day', 'de', 'default', 'definitely', 'delay', 'delivering', 'desire', 'deutsch', 'deviation', 'device', 'different', 'dims', 'direct', 'directly', 'director', 'disappear', 'disappears', 'discussed', 'display', 'div', 'documented', 'doe', 'dot', 'double', 'download', 'dream', 'droid', 'economics', 'eduardo', 'education', 'effect', 'eliminate', 'else', 'email', 'embed', 'employee', 'en', 'enabled', 'end', 'english', 'enhance', 'eset', 'español', 'even', 'exchange', 'exists', 'expect', 'expected', 'experience', 'experienced', 'expert', 'explain', 'exploit', 'facebook', 'fake', 'far', 'fast', 'feature', 'find', 'first', 'five', 'follow', 'follower', 'found', 'friend', 'froyo', 'function', 'get', 'giuliana', 'give', 'glitch', 'go', 'golden', 'good', 'google', 'googled', 'got', 'happy', 'hate', 'hefty', 'home', 'hot', 'however', 'htc', 'http', 'hurt', 'icon', 'illogical', 'immediately', 'inactivity', 'inbox', 'include', 'incur', 'indication', 'information', 'initially', 'initiated', 'insight', 'instead', 'interested', 'interval', 'introducing', 'ir', 'issue', 'jim', 'johan', 'johnny', 'know', 'language', 'latest', 'leave', 'left', 'legal', 'let', 'like', 'link', 'linkedin', 'llc', 'lock', 'locked', 'locking', 'long', 'longer', 'look', 'looking', 'love', 'machine', 'magazine', 'malware', 'manufacturer', 'material', 'maximum', 'mean', 'mechanism', 'mention', 'metaphor', 'might', 'mimic', 'minecraft', 'minute', 'mobile', 'mod', 'model', 'moment', 'month', 'motorola', 'multimedia', 'navigation', 'need', 'neither', 'new', 'newer', 'news', 'newsletter', 'next', 'nice', 'noticed', 'nuisance', 'numeric', 'one', 'operating', 'operator', 'opinion', 'option', 'original', 'overrode', 'page', 'paper', 'part', 'password', 'pattern', 'paying', 'per', 'perform', 'person', 'phone', 'pin', 'placed', 'play', 'please', 'plus', 'podcasts', 'point', 'policy', 'popular', 'post', 'posted', 'power', 'practice', 'press', 'pressed', 'pressing', 'print', 'prisma', 'privacy', 'probably', 'problem', 'product', 'promised', 'prompt', 'properly', 'protection', 'proud', 'provider', 'public', 'radar', 'randy', 'ransomware', 'rather', 'read', 'recently', 'regard', 'regarding', 'reissued', 'related', 'remains', 'repeat', 'repeated', 'replicate', 'reply', 'require', 'required', 'requires', 'research', 'reserved', 'result', 'resulting', 'right', 'rooted', 'running', 'russell', 'ryberg', 'said', 'samborsky', 'saver', 'scenario', 'screen', 'scrollbar', 'scrolled', 'search', 'second', 'security', 'see', 'seems', 'select', 'serious', 'server', 'set', 'setting', 'setup', 'several', 'shipped', 'short', 'sic', 'side', 'sign', 'simply', 'since', 'site', 'sitemap', 'slide', 'slider', 'smith', 'solution', 'something', 'soon', 'speaker', 'stagefright', 'step', 'still', 'stock', 'stolen', 'strange', 'strongly', 'stylesheet', 'superior', 'sure', 'swipe', 'system', 'take', 'talked', 'tech', 'technical', 'test', 'tested', 'thanks', 'thing', 'thinking', 'three', 'tied', 'time', 'timed', 'timeout', 'timer', 'toggle', 'told', 'took', 'top', 'topic', 'totally', 'tricked', 'tried', 'trojan', 'try', 'turn', 'turned', 'turning', 'twist', 'twitter', 'two', 'unaware', 'undecided', 'unlock', 'update', 'updated', 'upgrade', 'use', 'used', 'user', 'using', 'value', 'variety', 'verizon', 'version', 'video', 'view', 'virus', 'wa', 'wake', 'want', 'way', 'wechseln', 'well', 'went', 'whatever', 'whats', 'white', 'window', 'within', 'without', 'wls', 'wonder', 'work', 'worked', 'world', 'worth', 'would', 'wtf', 'yes', 'youtube', 'zum'] | |
942 | |
942 2017-03-23T18:33:44.762000Z https://www.helpnetsecurity.com/2017/03/23/malware-siemens-plc-software/ | |
942 2017-03-24T06:33:35.879000Z https://isc.sans.edu/newssummary.html#1023301 | |
942 2017-03-29T18:31:09.465000Z https://www.helpnetsecurity.com/2017/03/29/siemens-ruggedcom-vulnerabilities/ | |
['industrial', 'siemens'] | |
943 | |
944 | |
945 | |
946 | |
947 | |
947 2017-03-25T06:31:28.346000Z http://www.welivesecurity.com/2011/12/15/spam-campaign-uses-blackhole-exploit-kit-to-install-spyeye/ | |
947 2017-03-27T12:33:18.811000Z https://www.welivesecurity.com/2011/12/15/spam-campaign-uses-blackhole-exploit-kit-to-install-spyeye/ | |
['ability', 'according', 'account', 'added', 'advise', 'already', 'also', 'always', 'antivirus', 'app', 'applet', 'article', 'attack', 'attempt', 'austria', 'author', 'azerbaijan', 'balance', 'bank', 'banking', 'bawag', 'blackhole', 'botnet', 'boutin', 'campaign', 'change', 'click', 'client', 'code', 'collaboration', 'colleague', 'compromised', 'computer', 'configured', 'contact', 'content', 'cutwail', 'cybercriminal', 'date', 'decompiled', 'delivery', 'detected', 'done', 'dropped', 'duquette', 'ebanking', 'email', 'eset', 'etc', 'exploit', 'exploited', 'exploiting', 'facebook', 'fake', 'file', 'finally', 'flaw', 'following', 'fourth', 'free', 'french', 'friend', 'get', 'hash', 'hide', 'history', 'hosted', 'infected', 'infection', 'information', 'inserted', 'install', 'installed', 'jar', 'java', 'javascript', 'keep', 'kit', 'known', 'largest', 'leaving', 'license', 'link', 'linkedin', 'log', 'login', 'lot', 'malekal', 'malware', 'massive', 'message', 'modify', 'modifying', 'money', 'multitude', 'notification', 'notified', 'obfuscated', 'occurred', 'occurs', 'one', 'online', 'operation', 'order', 'page', 'panel', 'part', 'patched', 'personal', 'phishing', 'pointing', 'posted', 'print', 'psk', 'published', 'reader', 'recently', 'removed', 'researcher', 'risk', 'rus', 'sample', 'screenshot', 'screenshots', 'script', 'security', 'seen', 'send', 'sent', 'server', 'service', 'show', 'showing', 'snippet', 'software', 'spam', 'spyeye', 'status', 'steal', 'still', 'stored', 'succesful', 'successful', 'suspicious', 'system', 'sébastien', 'targeted', 'tracker', 'transfer', 'trojan', 'unpatched', 'us', 'use', 'used', 'user', 'via', 'visiting', 'vulnerability', 'warning', 'webpage', 'well', 'whats', 'wigon', 'window', 'written', 'xylitol', 'yet'] | |
948 | |
948 2017-03-05T00:46:52.501000Z http://thehackernews.com/2010/11/mkhan-swati-again-hack-indian-website.html | |
948 2017-03-05T00:46:59.761000Z http://thehackernews.com/2010/11/sanconcomcn-hacked-by-mkhan-swati.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'link', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mkhan', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pakistan', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'swati', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
949 | |
949 2017-03-25T06:31:07.664000Z http://www.welivesecurity.com/2015/02/17/gchq-illegally-spy/ | |
949 2017-03-27T12:32:08.606000Z https://www.welivesecurity.com/2015/02/17/gchq-illegally-spy/ | |
['able', 'access', 'accessed', 'accessible', 'accessing', 'accordance', 'according', 'accountable', 'acted', 'acting', 'activity', 'add', 'agency', 'already', 'alternatively', 'amongst', 'anyone', 'app', 'ask', 'author', 'authorised', 'authority', 'brave', 'breaching', 'british', 'call', 'campaign', 'carried', 'censuring', 'challenge', 'chance', 'clean', 'clear', 'cluley', 'collected', 'come', 'commentator', 'communication', 'complaint', 'could', 'course', 'court', 'covertly', 'dark', 'data', 'dealing', 'decade', 'default', 'demand', 'deputy', 'detail', 'determine', 'determining', 'directly', 'director', 'discover', 'duration', 'earlier', 'email', 'enforcement', 'enough', 'ensures', 'enter', 'entering', 'eric', 'even', 'ever', 'every', 'far', 'feel', 'file', 'finally', 'find', 'first', 'found', 'framework', 'friend', 'gchq', 'get', 'go', 'gone', 'governing', 'graham', 'granting', 'guardian', 'help', 'higher', 'historic', 'hold', 'hope', 'human', 'illegal', 'illegally', 'improperly', 'individual', 'information', 'initiative', 'intelligence', 'interception', 'international', 'internet', 'investigation', 'investigatory', 'ipt', 'irony', 'kept', 'king', 'know', 'launched', 'law', 'legal', 'lie', 'live', 'loud', 'made', 'make', 'medium', 'member', 'message', 'million', 'month', 'must', 'national', 'necessary', 'never', 'normally', 'nsa', 'number', 'occurred', 'one', 'online', 'opportunity', 'orchestrating', 'outfit', 'page', 'past', 'people', 'period', 'permission', 'personal', 'phone', 'place', 'point', 'policy', 'posted', 'power', 'print', 'prior', 'prism', 'privacy', 'private', 'program', 'public', 'purpose', 'put', 'question', 'rather', 'received', 'recent', 'record', 'regularly', 'request', 'reveal', 'right', 'rubber', 'rule', 'ruling', 'said', 'say', 'secret', 'secretly', 'security', 'seemingly', 'send', 'sent', 'service', 'share', 'shared', 'sharing', 'short', 'slapped', 'spied', 'spy', 'spying', 'stamp', 'standard', 'state', 'statement', 'store', 'strict', 'submitted', 'surveillance', 'swept', 'thousand', 'tribunal', 'trot', 'two', 'uk', 'unlawful', 'unlawfully', 'unrestrained', 'upon', 'upstream', 'usa', 'used', 'violated', 'visit', 'voice', 'want', 'watchdog', 'website', 'whats', 'whether', 'whose', 'within', 'work', 'wrist'] | |
950 | |
951 | |
952 | |
952 2017-03-28T12:30:55.248000Z https://blog.elearnsecurity.com/masptv2-refreshed.html | |
952 2017-03-28T12:30:58.866000Z https://blog.elearnsecurity.com/masptv2-refresh-students.html | |
['adding', 'additional', 'admin', 'ahead', 'along', 'already', 'also', 'analysis', 'android', 'anything', 'api', 'app', 'appear', 'application', 'apps', 'architecture', 'area', 'author', 'awesome', 'awkward', 'believe', 'blog', 'brand', 'bypass', 'bypassing', 'certificate', 'challenge', 'class', 'code', 'come', 'coming', 'comma', 'comment', 'company', 'configuration', 'containing', 'content', 'corn', 'course', 'cover', 'covering', 'create', 'cybersecurity', 'day', 'defending', 'device', 'duty', 'dynamic', 'easier', 'elearnsecurity', 'else', 'entry', 'even', 'everything', 'exam', 'existing', 'expanding', 'exploit', 'file', 'first', 'follow', 'full', 'get', 'give', 'go', 'good', 'got', 'guide', 'homebrewing', 'hyphen', 'include', 'includes', 'inside', 'interest', 'introduces', 'io', 'keychain', 'know', 'kristoffer', 'lab', 'latest', 'left', 'level', 'linkedin', 'lotta', 'make', 'management', 'manual', 'manually', 'maspt', 'mobile', 'network', 'new', 'news', 'next', 'notch', 'nut', 'one', 'order', 'oxford', 'packed', 'patching', 'patchme', 'penetration', 'pinning', 'play', 'poc', 'popping', 'post', 'ready', 'refresh', 'refreshed', 'reporting', 'restriction', 'santiago', 'scale', 'security', 'skill', 'source', 'sport', 'ssl', 'started', 'still', 'student', 'tag', 'take', 'tank', 'technique', 'term', 'testing', 'topic', 'training', 'transport', 'tutorial', 'unlocked', 'update', 'upgraded', 'using', 'version', 'via', 'video', 'waiting', 'whole', 'without', 'word', 'world'] | |
953 | |
954 | |
956 | |
956 2017-03-09T18:31:58.525000Z http://www.welivesecurity.com/podcasts/facebook-update-you-have-been-scammed/ | |
956 2017-03-27T12:33:33.609000Z https://www.welivesecurity.com/podcasts/facebook-update-you-have-been-scammed/ | |
['add', 'al', 'audio', 'blog', 'code', 'community', 'conference', 'contact', 'copyright', 'currently', 'de', 'deutsch', 'direct', 'div', 'download', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'facebook', 'follow', 'friend', 'go', 'home', 'http', 'inbox', 'information', 'insight', 'ir', 'language', 'latest', 'legal', 'length', 'link', 'linkedin', 'magazine', 'material', 'message', 'multimedia', 'navigation', 'news', 'newsletter', 'opinion', 'page', 'paper', 'pause', 'play', 'podcast', 'podcasts', 'policy', 'post', 'posted', 'print', 'privacy', 'radar', 'research', 'reserved', 'right', 'rob', 'scammed', 'search', 'security', 'sent', 'sign', 'site', 'sitemap', 'stylesheet', 'toggle', 'total', 'twitter', 'update', 'video', 'view', 'virus', 'waugh', 'wechseln', 'white', 'wls', 'youtube', 'zum'] | |
957 | |
958 | |
958 2017-03-21T00:31:03.794000Z https://www.scmagazine.com/cisco-vault-7-investigation-reveals-flaws-in-cisco-ios-and-ios-xe/article/645366/ | |
958 2017-03-22T18:30:50.132000Z https://www.scmagazine.com/cisco-issues-patches-for-flaws-stockpiled-by-cia-exposed-by-wikileaks/article/645768/ | |
['accept', 'acceptance', 'advertise', 'advisory', 'affected', 'afghanistan', 'africa', 'african', 'albania', 'algeria', 'allow', 'american', 'andorra', 'angola', 'anguilla', 'antarctica', 'antigua', 'antilles', 'apple', 'arab', 'arabia', 'arbitrary', 'archive', 'argentina', 'arm', 'armenia', 'article', 'aruba', 'assure', 'attacker', 'attempt', 'australia', 'austria', 'authorization', 'available', 'award', 'azerbaijan', 'bace', 'bahamas', 'bahrain', 'bangladesh', 'bar', 'barbados', 'barbuda', 'becky', 'belarus', 'belgium', 'belize', 'benin', 'bermuda', 'beware', 'bhutan', 'blog', 'board', 'bolivia', 'bosnia', 'botswana', 'bouvet', 'bradstreet', 'brazil', 'breach', 'breached', 'british', 'broadcast', 'brunei', 'bulgaria', 'burkina', 'burundi', 'business', 'buzz', 'caicos', 'caledonia', 'cambodia', 'cameroon', 'canada', 'capability', 'cape', 'cause', 'cayman', 'celebgate', 'center', 'central', 'chad', 'challenge', 'chile', 'china', 'christmas', 'cia', 'cisco', 'city', 'click', 'cloud', 'cluster', 'coco', 'code', 'colombia', 'comment', 'communication', 'community', 'comoros', 'company', 'compliance', 'condition', 'conference', 'congo', 'connection', 'constitutes', 'contact', 'contains', 'control', 'cook', 'copyright', 'costa', 'could', 'countless', 'critical', 'criticism', 'croatia', 'cuba', 'currently', 'cybercrime', 'cybersecurity', 'cyprus', 'czech', 'côte', 'darussalam', 'data', 'database', 'day', 'delivered', 'denmark', 'depth', 'device', 'djibouti', 'dominica', 'dominican', 'doug', 'drc', 'dump', 'dun', 'ecuador', 'editor', 'egypt', 'el', 'elevated', 'email', 'emirate', 'emma', 'equatorial', 'eritrea', 'establish', 'estonia', 'ethiopia', 'event', 'execute', 'exploit', 'face', 'fact', 'failure', 'falkland', 'faq', 'faroe', 'faso', 'fast', 'fbi', 'feature', 'featured', 'fiji', 'file', 'finland', 'first', 'fix', 'flaw', 'follow', 'form', 'france', 'french', 'full', 'futuna', 'gabon', 'gambia', 'georgia', 'germany', 'get', 'ghana', 'gibraltar', 'google', 'greece', 'greenland', 'grenada', 'grenadine', 'group', 'guadeloupe', 'guam', 'guatemala', 'guiana', 'guinea', 'guyana', 'hack', 'haiti', 'hard', 'haymarket', 'heard', 'helena', 'herzegovina', 'hit', 'honduras', 'hong', 'hungary', 'iceland', 'image', 'inbox', 'incorrect', 'india', 'indian', 'indonesia', 'information', 'insider', 'instead', 'internal', 'io', 'iot', 'iran', 'iraq', 'ireland', 'island', 'israel', 'issue', 'italy', 'jamaica', 'japan', 'jordan', 'kazakhstan', 'keeling', 'kenya', 'kingdom', 'kiribati', 'kitts', 'kong', 'korea', 'kuwait', 'kyrgyzstan', 'lanka', 'lao', 'latvia', 'launch', 'leaked', 'lebanon', 'leone', 'lesotho', 'liberia', 'library', 'libya', 'liechtenstein', 'like', 'lithuania', 'local', 'log', 'login', 'look', 'lucia', 'luxembourg', 'macao', 'macedonia', 'madagascar', 'magazine', 'malawi', 'malaysia', 'maldives', 'malformed', 'mali', 'malta', 'malvinas', 'malware', 'management', 'mariana', 'marino', 'marshall', 'martin', 'martinique', 'material', 'mauritania', 'mauritius', 'mayen', 'mayotte', 'mcdonald', 'medium', 'meet', 'member', 'menu', 'mexico', 'micronesia', 'might', 'miquelon', 'mobile', 'module', 'moldova', 'monaco', 'mongolia', 'montenegro', 'montserrat', 'morocco', 'mozambique', 'must', 'myanmar', 'namibia', 'nauru', 'need', 'nepal', 'netherlands', 'network', 'nevis', 'new', 'news', 'newswire', 'nicaragua', 'niger', 'nigeria', 'niue', 'norfolk', 'north', 'northern', 'norway', 'ny', 'ocean', 'olenick', 'oman', 'online', 'opinion', 'option', 'others', 'overall', 'pakistan', 'palau', 'panama', 'paper', 'papua', 'paraguay', 'passing', 'patch', 'peru', 'philippine', 'phishing', 'pierre', 'pitcairn', 'poland', 'police', 'policy', 'polynesia', 'portugal', 'post', 'posture', 'press', 'principe', 'prior', 'privacy', 'private', 'privilege', 'probe', 'process', 'processing', 'product', 'professional', 'protocol', 'published', 'puerto', 'qatar', 'ransomware', 'read', 'reboot', 'receive', 'redistributed', 'register', 'registered', 'related', 'release', 'relevant', 'reload', 'remote', 'remotely', 'repeat', 'reprint', 'republic', 'reserved', 'resource', 'restrict', 'reunion', 'reveal', 'revelation', 'review', 'rewritten', 'rica', 'rico', 'right', 'risk', 'risksec', 'robinson', 'romania', 'rsa', 'russia', 'rwanda', 'saint', 'salvador', 'samoa', 'san', 'sao', 'sasse', 'saudi', 'sc', 'search', 'searcher', 'searching', 'security', 'see', 'senegal', 'seychelles', 'show', 'sierra', 'singapore', 'site', 'slovakia', 'slovenia', 'software', 'solomon', 'somalia', 'soon', 'source', 'south', 'southern', 'spain', 'sri', 'state', 'strategy', 'subscribe', 'sudan', 'superb', 'suriname', 'svalbard', 'swaziland', 'sweden', 'switzerland', 'syria', 'tackle', 'taiwan', 'tajikistan', 'tanzania', 'team', 'technical', 'telnet', 'teri', 'term', 'territory', 'test', 'thailand', 'threat', 'tobago', 'togo', 'tokelau', 'tome', 'tonga', 'topic', 'toronto', 'training', 'trinidad', 'tunisia', 'turk', 'turkey', 'turkmenistan', 'tuvalu', 'uganda', 'uk', 'ukraine', 'unauthenticated', 'unbiased', 'underpin', 'united', 'update', 'uptick', 'uruguay', 'use', 'user', 'uzbekistan', 'vanuatu', 'vatican', 'vault', 'venezuela', 'verde', 'via', 'video', 'vietnam', 'vincent', 'virgin', 'virtual', 'vulnerability', 'vulnerable', 'wallis', 'watson', 'webcasts', 'website', 'western', 'white', 'whitepaper', 'whitepapers', 'wikileaks', 'without', 'worry', 'would', 'xe', 'yemen', 'yugoslavia', 'zambia', 'zealand', 'zimbabwe'] | |
959 | |
960 | |
961 | |
961 2017-03-22T18:30:54.430000Z https://www.bleepingcomputer.com/news/business/sneaky-lithuanian-crook-stole-100-million-from-two-us-tech-companies/ | |
961 2017-03-22T18:30:57.486000Z https://www.bleepingcomputer.com/news/security/malvertising-campaign-on-adult-sites-spreads-ramnit-trojan/ | |
['abusive', 'accident', 'according', 'account', 'ad', 'adult', 'advertisement', 'advertising', 'adwcleaner', 'agreement', 'allow', 'allowed', 'also', 'alureon', 'android', 'anonymously', 'antimalware', 'antivirus', 'apple', 'application', 'article', 'attack', 'bank', 'bar', 'bleeping', 'bleepingcomputer', 'breach', 'browser', 'bug', 'business', 'campaign', 'catalin', 'category', 'cellular', 'certification', 'changelog', 'chat', 'chinese', 'cimpanu', 'cleaner', 'close', 'combofix', 'command', 'comment', 'community', 'company', 'computer', 'contact', 'content', 'control', 'copy', 'copyright', 'country', 'course', 'cover', 'crook', 'cryptocoin', 'cryptodefense', 'cryptolocker', 'cryptomix', 'crypton', 'cryptorbit', 'cryptosearch', 'dark', 'data', 'database', 'deal', 'decryptor', 'downloaded', 'downloads', 'elearning', 'emergency', 'emsisoft', 'exploit', 'facebook', 'fake', 'faq', 'featured', 'feed', 'file', 'find', 'folder', 'follow', 'form', 'forum', 'found', 'function', 'gadget', 'gear', 'get', 'glossary', 'going', 'google', 'guide', 'hacking', 'harmful', 'heavily', 'help', 'hidden', 'hijack', 'home', 'howdecrypt', 'inappropriate', 'industrial', 'infected', 'information', 'installed', 'instruction', 'irc', 'isminer', 'item', 'itsjudd', 'julie', 'key', 'kit', 'language', 'lastpass', 'latest', 'launch', 'learn', 'license', 'like', 'lithuanian', 'llc', 'locky', 'login', 'main', 'malicious', 'malvertising', 'malware', 'manager', 'mbam', 'medium', 'member', 'microsoft', 'million', 'miner', 'mode', 'money', 'msevents', 'na', 'need', 'new', 'news', 'newsletter', 'next', 'odd', 'offline', 'one', 'online', 'opera', 'order', 'outlook', 'password', 'pc', 'periodic', 'please', 'policy', 'popular', 'post', 'posted', 'potplayer', 'previous', 'privacy', 'problem', 'product', 'program', 'programming', 'prompt', 'pup', 'rakhnidecryptor', 'ramnit', 'ransomware', 'receive', 'recover', 'redirects', 'register', 'registry', 'released', 'remember', 'removal', 'remove', 'reporter', 'reserved', 'resource', 'right', 'rkill', 'rootkit', 'rule', 'safe', 'said', 'search', 'section', 'secure', 'security', 'securitytool', 'see', 'shadow', 'shop', 'show', 'sign', 'site', 'sitemap', 'sneaky', 'social', 'software', 'spam', 'spread', 'start', 'startup', 'steal', 'stole', 'strong', 'submit', 'submitting', 'support', 'system', 'task', 'tdss', 'tdsskiller', 'tech', 'technology', 'telephony', 'tinywallet', 'tool', 'topic', 'touch', 'tower', 'trojan', 'tutorial', 'twitter', 'two', 'understand', 'uninstall', 'update', 'us', 'use', 'useful', 'user', 'username', 'using', 'various', 'verifier', 'version', 'viewed', 'virtumonde', 'virus', 'volume', 'vulnerability', 'web', 'website', 'welcome', 'window', 'winfixer', 'working', 'worm', 'write', 'yet', 'zemana'] | |
962 | |
962 2017-03-25T00:30:53.743000Z http://csoonline.com/article/3184771/fraud/bot-attacking-gift-card-accounts.html | |
962 2017-03-25T18:30:51.019000Z http://thehackernews.com/2017/03/GiftGhostBot-gift-cards.html | |
['according', 'account', 'across', 'address', 'allow', 'anonymous', 'apple', 'article', 'ask', 'attack', 'attacking', 'balance', 'beauty', 'best', 'bot', 'breach', 'card', 'cash', 'center', 'ceo', 'certificate', 'check', 'cia', 'cisco', 'coffee', 'comment', 'company', 'consumer', 'contact', 'correctly', 'could', 'credit', 'customer', 'cyber', 'damage', 'dark', 'data', 'deal', 'detection', 'distil', 'distributed', 'distributor', 'distrust', 'drained', 'dubbed', 'essaid', 'ev', 'evade', 'executing', 'exposing', 'fake', 'fraud', 'fraudsters', 'get', 'gift', 'giftghostbot', 'giftghostbots', 'good', 'google', 'government', 'hacker', 'hacking', 'home', 'hosting', 'hour', 'identify', 'individual', 'information', 'internet', 'javascript', 'know', 'latest', 'like', 'link', 'loaded', 'luxury', 'major', 'many', 'million', 'moment', 'money', 'moving', 'must', 'network', 'new', 'news', 'newsletter', 'number', 'offer', 'one', 'online', 'operator', 'page', 'pay', 'per', 'personal', 'popular', 'potential', 'prevent', 'provided', 'provider', 'purchase', 'quickly', 'ramus', 'ransom', 'ransomware', 'rate', 'regularly', 'remain', 'request', 'resell', 'resource', 'retailer', 'said', 'security', 'service', 'sophisticated', 'stealing', 'stolen', 'story', 'supermarket', 'symantec', 'take', 'targeted', 'threaten', 'together', 'tool', 'traffic', 'typically', 'untraceable', 'update', 'use', 'using', 'vigilant', 'web', 'website', 'wikileaks', 'wipe', 'work', 'worldwide'] | |
964 | |
964 2017-03-21T00:31:15.923000Z http://www.welivesecurity.com/2013/07/26/car-hackers-to-show-off-how-they-can-control-vehicles-with-a-laptop/ | |
964 2017-03-27T12:32:58.547000Z https://www.welivesecurity.com/2013/07/26/car-hackers-to-show-off-how-they-can-control-vehicles-with-a-laptop/ | |
['able', 'actuator', 'aim', 'allows', 'although', 'app', 'attack', 'author', 'automobile', 'automotive', 'awareness', 'bad', 'bbc', 'believe', 'brake', 'car', 'certain', 'charlie', 'chris', 'claim', 'code', 'command', 'common', 'control', 'covering', 'created', 'cybercrime', 'data', 'defcon', 'demonstrate', 'diagnose', 'diagnostics', 'discussion', 'documentation', 'driver', 'driving', 'ecus', 'electronic', 'email', 'entitled', 'escape', 'everyone', 'forbes', 'ford', 'friend', 'going', 'hack', 'hacking', 'highway', 'important', 'improve', 'including', 'interview', 'know', 'knowledge', 'laptop', 'least', 'listen', 'little', 'live', 'love', 'macbook', 'maintenance', 'manufacturer', 'meant', 'mechanic', 'mechanism', 'message', 'miller', 'model', 'moment', 'mr', 'much', 'network', 'next', 'oncoming', 'others', 'override', 'overriding', 'page', 'people', 'physically', 'plugging', 'port', 'posted', 'presentation', 'print', 'prius', 'problem', 'raise', 'recreate', 'releasing', 'remote', 'research', 'researcher', 'result', 'right', 'rob', 'said', 'sample', 'say', 'saying', 'security', 'sensor', 'sent', 'show', 'shown', 'software', 'start', 'steering', 'stress', 'system', 'tool', 'toyota', 'traffic', 'two', 'type', 'unit', 'used', 'usually', 'valasek', 'vehicle', 'vulnerability', 'waugh', 'whats', 'within', 'work', 'would'] | |
965 | |
967 | |
967 2017-03-25T00:30:53.285000Z http://darkreading.com/vulnerabilities---threats/google-slams-symantec-for-failures-in-ssl-tls-certificate-process/d/d-id/1328483 | |
967 2017-03-27T18:30:57.423000Z http://darkreading.com/endpoint/authentication/symantec-seeks-to-quell-ca-customer-concerns-over-google-warning/d/d-id/1328495 | |
['access', 'account', 'acquisition', 'adapter', 'addition', 'advanced', 'advertise', 'advertising', 'afp', 'aix', 'aka', 'allows', 'analytics', 'anomali', 'apic', 'app', 'application', 'arbitrary', 'archive', 'archived', 'ask', 'attack', 'attacker', 'authentication', 'author', 'authority', 'automated', 'av', 'back', 'bae', 'best', 'bio', 'black', 'blog', 'box', 'breach', 'bug', 'build', 'button', 'ca', 'calendar', 'car', 'career', 'cartoon', 'cause', 'certificate', 'challenge', 'channel', 'cisco', 'click', 'close', 'cloud', 'code', 'combining', 'coming', 'comment', 'communication', 'community', 'company', 'compliance', 'computing', 'conference', 'connect', 'consideration', 'consolidation', 'consumption', 'contact', 'content', 'controller', 'coolest', 'copyright', 'create', 'creative', 'csrf', 'current', 'cyber', 'cybersecurity', 'cylance', 'dark', 'darkreading', 'data', 'database', 'defense', 'deloitte', 'demonstrated', 'denial', 'development', 'device', 'devops', 'devsecops', 'difference', 'digital', 'direct', 'directory', 'discovered', 'discus', 'download', 'dr', 'drm', 'editor', 'effective', 'email', 'emerging', 'enabled', 'endpoint', 'enterprise', 'evaluating', 'event', 'evolution', 'execute', 'execution', 'executive', 'exhibitor', 'extplorer', 'facebook', 'favorite', 'feed', 'fibre', 'file', 'find', 'first', 'flash', 'follow', 'foreground', 'forgery', 'found', 'free', 'full', 'fusion', 'future', 'gain', 'gamasutra', 'game', 'gdc', 'gem', 'gen', 'google', 'graphic', 'group', 'guest', 'guide', 'gundert', 'hack', 'hacker', 'handle', 'hat', 'hdi', 'higgins', 'hijack', 'hit', 'host', 'ibm', 'icmi', 'id', 'identity', 'impact', 'independent', 'info', 'information', 'informationweek', 'infrastructure', 'insider', 'insight', 'institute', 'insurance', 'intelligence', 'interesting', 'interop', 'intro', 'involving', 'iot', 'issue', 'issued', 'item', 'itx', 'jackson', 'jitter', 'juniper', 'kamkar', 'kelly', 'kernel', 'key', 'killing', 'lab', 'later', 'latest', 'leader', 'learn', 'leveraging', 'levi', 'library', 'licensing', 'link', 'linkedin', 'linux', 'list', 'live', 'local', 'login', 'machine', 'make', 'malware', 'management', 'manager', 'many', 'marketing', 'mean', 'medical', 'memory', 'method', 'might', 'mimecast', 'mishandles', 'mobile', 'monitor', 'monitoring', 'move', 'must', 'national', 'necessary', 'need', 'netstat', 'network', 'new', 'newest', 'news', 'newsletter', 'next', 'nges', 'nice', 'object', 'oldest', 'operation', 'operationalizing', 'opportunity', 'pace', 'page', 'paper', 'past', 'people', 'perimeter', 'period', 'perspective', 'php', 'plan', 'please', 'pm', 'policy', 'poll', 'post', 'practice', 'president', 'prevention', 'print', 'privacy', 'privilege', 'process', 'profile', 'promise', 'provided', 'published', 'qnap', 'qts', 'question', 'quick', 'radio', 'rate', 'rating', 'raytheon', 'read', 'reader', 'reading', 'recorded', 'regarding', 'remote', 'rendering', 'replacement', 'report', 'reprint', 'request', 'researcher', 'reserved', 'responding', 'right', 'risk', 'rockstar', 'said', 'samy', 'save', 'schedule', 'sec', 'secdevops', 'secure', 'security', 'served', 'service', 'share', 'show', 'signal', 'sitemap', 'slideshows', 'solution', 'spotlight', 'ssh', 'start', 'statement', 'step', 'stop', 'story', 'strategic', 'streaming', 'study', 'subscribe', 'subsystem', 'support', 'survival', 'symantec', 'system', 'tackle', 'talk', 'target', 'team', 'tech', 'technology', 'teller', 'term', 'testing', 'thanks', 'thought', 'threaded', 'threat', 'tip', 'tool', 'top', 'toward', 'transforming', 'transition', 'traversal', 'trend', 'trendreports', 'tweet', 'twitter', 'ubm', 'university', 'unspecified', 'unusual', 'use', 'used', 'useful', 'user', 'validated', 'validity', 'vector', 'veracode', 'via', 'vice', 'video', 'view', 'vios', 'virtual', 'vrdc', 'vulnerability', 'vulns', 'watch', 'wave', 'way', 'webcasts', 'webinar', 'webinars', 'website', 'week', 'white', 'working', 'world', 'write', 'year'] | |
968 | |
969 | |
970 | |
971 | |
971 2017-03-09T18:32:14.288000Z http://www.welivesecurity.com/2009/06/22/go-phishing-with-the-city-of-bozeman-montana/ | |
971 2017-03-27T12:34:22.226000Z https://www.welivesecurity.com/2009/06/22/go-phishing-with-the-city-of-bozeman-montana/ | |
['abrams', 'abuse', 'access', 'account', 'act', 'add', 'additionally', 'affected', 'al', 'ali', 'also', 'amount', 'android', 'app', 'applicant', 'archive', 'article', 'ask', 'asked', 'asking', 'assume', 'author', 'automobile', 'backup', 'begin', 'belongs', 'blog', 'bozeman', 'breach', 'candidate', 'change', 'city', 'civic', 'code', 'collected', 'collecting', 'community', 'completely', 'compromised', 'conference', 'confidential', 'considerable', 'contact', 'copyright', 'criminal', 'cybersecurity', 'data', 'de', 'demonstrated', 'deutsch', 'direct', 'director', 'div', 'duty', 'education', 'effectively', 'email', 'embed', 'employee', 'en', 'english', 'eset', 'español', 'even', 'evidently', 'exceptionally', 'expert', 'expertise', 'facebook', 'fall', 'first', 'follow', 'force', 'friend', 'go', 'going', 'google', 'government', 'home', 'honda', 'hot', 'http', 'ignorant', 'immediately', 'import', 'inbox', 'inform', 'information', 'insider', 'insight', 'interested', 'ir', 'job', 'joined', 'keep', 'kept', 'language', 'latest', 'leakage', 'legal', 'level', 'link', 'linkedin', 'llc', 'lose', 'lost', 'low', 'magazine', 'massive', 'material', 'might', 'mile', 'million', 'mindless', 'montana', 'month', 'multimedia', 'must', 'navigation', 'need', 'networking', 'news', 'newsletter', 'notifying', 'number', 'opinion', 'organization', 'outcry', 'page', 'paid', 'paper', 'password', 'people', 'phishers', 'phishing', 'place', 'play', 'podcasts', 'policy', 'poor', 'popular', 'post', 'posted', 'practice', 'print', 'privacy', 'private', 'proactively', 'promoting', 'provided', 'purge', 'radar', 'randy', 'rank', 'ransomware', 'read', 'related', 'report', 'require', 'rescinded', 'rescinding', 'research', 'reserved', 'reset', 'responsibly', 'right', 'risk', 'search', 'security', 'select', 'service', 'short', 'sign', 'simply', 'site', 'sitemap', 'social', 'stylesheet', 'system', 'tax', 'technical', 'term', 'thanks', 'thing', 'think', 'toggle', 'topic', 'twitter', 'uk', 'unacceptable', 'unheard', 'upon', 'user', 'username', 'usernames', 'victim', 'video', 'view', 'virus', 'wechseln', 'went', 'whats', 'white', 'whose', 'wls', 'youtube', 'zum'] | |
972 | |
974 | |
974 2017-03-07T12:30:45.606000Z http://csoonline.com/article/3177704/internet-of-things/consumers-are-wary-of-smart-homes-that-know-too-much.html | |
974 2017-03-07T12:30:50.572000Z http://csoonline.com/article/3177412/software/ca-to-acquire-security-testing-firm-veracode-for-614m.html | |
['acquire', 'acquiring', 'address', 'alert', 'analysis', 'application', 'applied', 'article', 'automation', 'avaya', 'backup', 'bad', 'best', 'bill', 'blame', 'bluetooth', 'boardroom', 'brandposts', 'breach', 'brochure', 'build', 'business', 'buying', 'ca', 'carol', 'case', 'cash', 'center', 'checking', 'chris', 'christmas', 'cloud', 'cloudy', 'comma', 'comment', 'company', 'concern', 'consumer', 'contacted', 'content', 'correspondent', 'cost', 'credit', 'critical', 'cso', 'customer', 'cyberattacks', 'cybersecurity', 'data', 'deal', 'deluxe', 'department', 'digital', 'discount', 'discounted', 'discovery', 'download', 'easy', 'email', 'emailing', 'engage', 'enterprise', 'entire', 'error', 'essential', 'event', 'everything', 'exec', 'experience', 'expose', 'facebook', 'featured', 'federal', 'find', 'firm', 'fit', 'follow', 'friend', 'future', 'game', 'gartner', 'gathered', 'george', 'get', 'gift', 'go', 'going', 'hacking', 'hash', 'headline', 'hell', 'home', 'idg', 'inhibit', 'instantly', 'integration', 'intel', 'interesting', 'keyboard', 'last', 'latest', 'learn', 'let', 'life', 'like', 'limited', 'link', 'logitech', 'mackeeper', 'made', 'magic', 'making', 'master', 'message', 'might', 'million', 'move', 'much', 'multiple', 'network', 'new', 'news', 'newsletter', 'next', 'nordvpn', 'online', 'operation', 'page', 'paper', 'path', 'paying', 'people', 'platform', 'policy', 'popular', 'posting', 'privacy', 'private', 'pro', 'product', 'protect', 'protection', 'pt', 'put', 'quadrant', 'quarter', 'ransomware', 'reddits', 'related', 'researcher', 'resource', 'responsible', 'retail', 'right', 'ring', 'roundtable', 'said', 'salted', 'second', 'secure', 'security', 'see', 'sent', 'sentinelone', 'separate', 'service', 'sign', 'software', 'someone', 'sorry', 'spam', 'spammer', 'sponsored', 'state', 'story', 'stream', 'strengthen', 'study', 'survey', 'system', 'target', 'tax', 'technology', 'terabyte', 'testing', 'thank', 'think', 'time', 'tip', 'today', 'transformation', 'turbotax', 'twitter', 'union', 'update', 'use', 'veracode', 'vickery', 'video', 'virtual', 'vision', 'visit', 'vpn', 'washington', 'waste', 'wherever', 'white', 'year'] | |
975 | |
976 | |
977 | |
977 2017-03-10T00:30:54.017000Z https://www.bleepingcomputer.com/news/security/over-a-third-of-websites-use-outdated-and-vulnerable-javascript-libraries/ | |
977 2017-03-14T18:30:53.701000Z https://isc.sans.edu/newssummary.html#1021993 | |
['ago', 'built', 'code', 'dependency', 'javascript', 'least', 'library', 'one', 'problem', 'register', 'security', 'top', 'view', 'vulnerable', 'web', 'website'] | |
979 | |
981 | |
981 2017-03-02T00:30:48.605000Z https://blog.tanium.com/track-critical-compliance-metrics-4-part-blog-series/ | |
981 2017-03-15T18:30:47.151000Z https://blog.tanium.com/track-mean-time-patch-4-part-blog-series/ | |
['able', 'accurate', 'across', 'actual', 'also', 'answer', 'asks', 'average', 'based', 'blog', 'case', 'check', 'compliance', 'computer', 'count', 'create', 'created', 'critical', 'describe', 'engineer', 'ensure', 'enterprise', 'even', 'exploring', 'first', 'go', 'greg', 'including', 'installment', 'know', 'last', 'latest', 'listed', 'look', 'machine', 'management', 'mean', 'metric', 'minute', 'monitor', 'name', 'network', 'next', 'note', 'number', 'one', 'open', 'operating', 'organization', 'part', 'patch', 'per', 'percentage', 'platform', 'posted', 'pothier', 'process', 'provides', 'question', 'report', 'result', 'run', 'running', 'secops', 'security', 'see', 'series', 'set', 'severity', 'share', 'simple', 'state', 'step', 'system', 'tanium', 'time', 'title', 'total', 'track', 'two', 'use', 'used', 'useful', 'using', 'vulnerability', 'well'] | |
982 | |
982 2017-03-05T00:43:35.072000Z http://thehackernews.com/2011/03/1337hax-windowsforums-hacked-by-team.html | |
982 2017-03-05T00:47:04.045000Z http://thehackernews.com/2010/11/diwali-gift-by-indishell-team.html | |
982 2017-03-05T00:47:11.083000Z http://thehackernews.com/2010/11/rediffcom-hacked-by-indishell-team.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'indian', 'indishell', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'team', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
983 | |
984 | |
985 | |
986 | |
987 | |
988 | |
989 | |
990 | |
991 | |
992 | |
993 | |
993 2017-03-27T18:31:03.173000Z https://www.helpnetsecurity.com/2017/03/27/healthcare-ftp-servers/ | |
993 2017-03-27T18:31:03.213000Z https://securityledger.com/2017/03/fbi-warns-medical-offices-exposed-ftp-servers-are-a-target/ | |
993 2017-03-28T12:30:56.490000Z http://securityaffairs.co/wordpress/57476/cyber-crime/ftp-attacks-fbi.html | |
993 2017-03-28T12:30:59.471000Z https://www.bleepingcomputer.com/news/security/fbi-alert-urges-companies-to-secure-ftp-servers/ | |
993 2017-03-29T12:30:56.678000Z http://csoonline.com/article/3185951/security/fbi-warns-of-attacks-on-anonymous-ftp-servers.html | |
993 2017-03-29T12:30:58.734000Z https://hotforsecurity.bitdefender.com/blog/cybercriminals-target-healthcare-anonymous-ftp-servers-says-fbi-17859.html | |
['ftp', 'server'] | |
994 | |
995 | |
996 | |
996 2017-03-10T12:30:44.015000Z http://thehackernews.com/2017/03/decrypt-pgp-encryption.html | |
996 2017-03-11T00:30:53.269000Z http://securityaffairs.co/wordpress/57036/cyber-crime/blackberry-pgp-messages.html | |
['access', 'also', 'analyst', 'announced', 'anonymity', 'armed', 'arrested', 'article', 'assassination', 'attack', 'attempted', 'authority', 'available', 'belong', 'billion', 'blackberry', 'came', 'canada', 'canadian', 'central', 'cia', 'commercially', 'communication', 'company', 'contains', 'content', 'could', 'court', 'crime', 'criminal', 'customer', 'cyber', 'danny', 'dark', 'data', 'decrypt', 'decrypted', 'decrypting', 'device', 'discovered', 'disk', 'document', 'done', 'dozen', 'drug', 'dutch', 'email', 'encrypted', 'encryption', 'ennetcom', 'enterprise', 'ethical', 'even', 'evidence', 'false', 'feature', 'file', 'filing', 'found', 'generated', 'group', 'hacker', 'including', 'infrastructure', 'investigation', 'investigator', 'key', 'large', 'laundering', 'leak', 'man', 'manupassa', 'message', 'million', 'ministerie', 'money', 'murder', 'network', 'news', 'number', 'open', 'openbaar', 'operating', 'organized', 'owned', 'partition', 'pgp', 'phone', 'police', 'possession', 'possible', 'preloaded', 'press', 'pretense', 'prosecution', 'protect', 'protected', 'public', 'rather', 'read', 'receive', 'related', 'release', 'response', 'result', 'robbery', 'routed', 'said', 'secure', 'security', 'seized', 'seizure', 'selling', 'sent', 'server', 'service', 'sign', 'sold', 'source', 'standard', 'stored', 'suspicion', 'system', 'time', 'tool', 'total', 'trafficking', 'used', 'user', 'using', 'web', 'wikileaks', 'would', 'writer', 'year'] | |
997 | |
997 2017-03-23T18:33:40.336000Z https://blog.elearnsecurity.com/elearnsecurity-all-access-pass.html | |
997 2017-03-23T18:33:42.593000Z https://blog.elearnsecurity.com/heres-to-jumpstart-andor-strengthen-your-core-it-security-skills.html | |
['access', 'author', 'comment', 'company', 'course', 'dubai', 'el', 'elearnsecurity', 'fee', 'lab', 'learn', 'lifetime', 'marketing', 'news', 'offer', 'penetration', 'professional', 'pt', 'security', 'skill', 'student', 'tag', 'testing', 'training'] | |
998 | |
998 2017-03-19T00:30:57.566000Z http://www.hackingarticles.in/capture-vnc-session-remote-pc-using-msfvenom/ | |
998 2017-03-29T18:31:02.432000Z http://www.hackingarticles.in/capture-vnc-session-remote-pc-using-settoolkit/ | |
['aarti', 'achieve', 'address', 'also', 'article', 'attack', 'attacker', 'author', 'backdoor', 'backtrack', 'batch', 'best', 'blog', 'book', 'browser', 'called', 'cancel', 'capture', 'category', 'challenge', 'chandel', 'compromise', 'consultant', 'contact', 'content', 'course', 'create', 'cryptography', 'ctf', 'cyber', 'database', 'dll', 'domain', 'email', 'engineering', 'especially', 'ethical', 'experience', 'expert', 'face', 'facebook', 'file', 'following', 'footprinting', 'forensics', 'framework', 'gadget', 'gmail', 'google', 'guest', 'hacker', 'hacking', 'handler', 'industry', 'information', 'internet', 'kali', 'learn', 'leave', 'linux', 'lover', 'medium', 'metasploit', 'multi', 'name', 'need', 'others', 'page', 'partner', 'passionate', 'password', 'payload', 'pc', 'penetration', 'post', 'posted', 'present', 'previous', 'professional', 'quality', 'raj', 'registry', 'related', 'remote', 'reply', 'researcher', 'search', 'security', 'send', 'session', 'set', 'share', 'shell', 'singh', 'skilled', 'social', 'software', 'specialized', 'start', 'stegnography', 'subscribe', 'table', 'target', 'technical', 'terminal', 'tester', 'testing', 'today', 'tool', 'toolkit', 'trick', 'trojan', 'try', 'tube', 'tutorial', 'tweet', 'type', 'uncategorized', 'using', 'via', 'vnc', 'web', 'website', 'window', 'wireless', 'writer', 'year', 'youtube'] | |
999 | |
999 2017-03-20T06:30:54.328000Z http://blog.uncommonsensesecurity.com/2017/03/on-loss-and-responsibility.html | |
999 2017-03-22T00:30:55.170000Z http://csoonline.com/article/3183459/security/goodbye-becky-bace-the-cybersecurity-community-will-miss-you.html | |
['analysis', 'bace', 'becky', 'become', 'career', 'community', 'could', 'cybersecurity', 'friend', 'great', 'history', 'howard', 'industry', 'infosec', 'knew', 'know', 'life', 'like', 'long', 'loss', 'lost', 'many', 'meeting', 'mentor', 'met', 'must', 'network', 'nsa', 'others', 'people', 'personal', 'pm', 'posted', 'role', 'schmidt', 'story', 'take', 'time', 'work', 'world', 'year', 'young'] | |
1000 | |
1000 2017-03-25T06:31:36.666000Z http://www.welivesecurity.com/2010/08/26/amtsos-next-meeting/ | |
1000 2017-03-27T12:33:43.252000Z https://www.welivesecurity.com/2010/08/26/amtsos-next-meeting/ | |
['agenda', 'aim', 'also', 'amtso', 'app', 'appearance', 'ask', 'author', 'available', 'cause', 'cissp', 'citp', 'come', 'coming', 'concern', 'conficker', 'could', 'course', 'david', 'day', 'deceptive', 'defensively', 'detail', 'dry', 'email', 'eset', 'fbcs', 'fellow', 'find', 'friend', 'harley', 'held', 'hostile', 'however', 'inevitable', 'issue', 'last', 'le', 'like', 'look', 'lot', 'medium', 'meeting', 'month', 'munich', 'nervous', 'next', 'obviously', 'organization', 'outside', 'page', 'police', 'posted', 'preliminary', 'print', 'probably', 'profile', 'publicity', 'published', 'quite', 'raised', 'react', 'registration', 'related', 'research', 'senior', 'seriously', 'sight', 'sort', 'space', 'standard', 'surprising', 'test', 'tester', 'testing', 'think', 'though', 'unremittingly', 'venue', 'watch', 'way', 'web', 'whats', 'work', 'yawn'] | |
1001 | |
1001 2017-03-25T06:30:55.064000Z http://www.welivesecurity.com/2016/01/13/operational-technology-susceptible-remote-attacks/ | |
1001 2017-03-27T12:31:39.201000Z https://www.welivesecurity.com/2016/01/13/operational-technology-susceptible-remote-attacks/ | |
['abta', 'according', 'achieved', 'add', 'agrees', 'al', 'also', 'always', 'analyzed', 'android', 'app', 'application', 'archive', 'article', 'ask', 'attacked', 'attacker', 'authentication', 'author', 'basic', 'blackenergy', 'blog', 'bond', 'boundary', 'breach', 'business', 'came', 'capability', 'certain', 'change', 'changing', 'code', 'commented', 'common', 'community', 'compromised', 'conference', 'connected', 'connecting', 'contact', 'context', 'continues', 'control', 'copyright', 'customized', 'cybercriminal', 'cybercriminals', 'cybersecurity', 'cyberthreat', 'damaged', 'data', 'de', 'defense', 'depot', 'detail', 'deutsch', 'developer', 'device', 'digital', 'direct', 'discussing', 'discussion', 'div', 'download', 'drive', 'ease', 'easily', 'economics', 'effort', 'email', 'embed', 'en', 'english', 'ensure', 'eset', 'español', 'ever', 'example', 'experience', 'expert', 'expose', 'exposing', 'face', 'facebook', 'falling', 'fan', 'feature', 'fewer', 'flaw', 'follow', 'found', 'friend', 'functionality', 'fundamentally', 'get', 'getting', 'go', 'good', 'google', 'grow', 'heavily', 'hold', 'home', 'hot', 'http', 'inbox', 'industrial', 'industry', 'information', 'infosec', 'insight', 'interconnection', 'interested', 'internet', 'interview', 'introduce', 'investigation', 'ir', 'lab', 'lack', 'language', 'latest', 'legal', 'link', 'linkedin', 'lipovsky', 'little', 'live', 'machinery', 'made', 'magazine', 'major', 'make', 'malware', 'material', 'might', 'million', 'minecraft', 'mining', 'mod', 'modified', 'month', 'moreover', 'motor', 'much', 'multimedia', 'narinder', 'navigation', 'need', 'network', 'new', 'news', 'newsletter', 'noted', 'number', 'often', 'one', 'operating', 'operational', 'operator', 'opinion', 'option', 'page', 'paper', 'part', 'patching', 'pc', 'play', 'podcasts', 'policy', 'popular', 'possible', 'post', 'posted', 'print', 'privacy', 'problematic', 'proper', 'protocol', 'publication', 'pump', 'purba', 'queried', 'radar', 'ransomware', 'read', 'recently', 'reid', 'related', 'relative', 'remote', 'remotely', 'reported', 'required', 'research', 'researcher', 'reserved', 'right', 'risk', 'robert', 'running', 'safe', 'said', 'search', 'security', 'select', 'senior', 'setting', 'settlement', 'sign', 'significant', 'site', 'sitemap', 'software', 'somebody', 'something', 'speed', 'stay', 'study', 'stylesheet', 'swap', 'system', 'technology', 'tend', 'thought', 'threat', 'toggle', 'top', 'topic', 'trojan', 'twitter', 'uk', 'undecided', 'used', 'vfds', 'victim', 'video', 'view', 'virus', 'visible', 'website', 'wechseln', 'well', 'whats', 'white', 'wightman', 'wired', 'within', 'wls', 'woman', 'worryingly', 'would', 'write', 'writeable', 'youtube', 'zum'] | |
1002 | |
1003 | |
1003 2017-03-02T00:30:56.707000Z https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15046-introduces-application-installation-control/ | |
1003 2017-03-04T00:30:54.636000Z https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15048-released-as-a-bug-fix-with-no-new-features/ | |
1003 2017-03-11T00:31:00.377000Z https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15055-released-for-pc-and-mobile/ | |
1003 2017-03-15T00:30:56.835000Z https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15058-released-for-pc/ | |
['abrams', 'abusive', 'administration', 'advertising', 'adwcleaner', 'affect', 'agreement', 'allowed', 'also', 'alureon', 'anonymously', 'antivirus', 'app', 'appear', 'apps', 'area', 'article', 'back', 'background', 'bar', 'bleeping', 'bleepingcomputer', 'broadcast', 'broadcaster', 'broadcasting', 'bug', 'build', 'category', 'cause', 'certain', 'certification', 'change', 'changelog', 'chat', 'chrome', 'close', 'combofix', 'command', 'comment', 'community', 'company', 'computer', 'configuration', 'contact', 'content', 'copy', 'copyright', 'could', 'course', 'creator', 'cryptodefense', 'cryptolocker', 'cryptorbit', 'database', 'deal', 'defragmentation', 'developer', 'device', 'downloaded', 'downloads', 'dummy', 'edge', 'editor', 'elearning', 'error', 'expertise', 'extension', 'facebook', 'fail', 'faq', 'fast', 'feature', 'featured', 'feed', 'field', 'file', 'find', 'fix', 'fixed', 'flash', 'focus', 'folder', 'follow', 'forensics', 'form', 'forum', 'gadget', 'game', 'gaming', 'gear', 'get', 'glossary', 'going', 'google', 'green', 'guide', 'hardware', 'harmful', 'help', 'hidden', 'home', 'howdecrypt', 'improvement', 'inappropriate', 'includes', 'information', 'insider', 'installed', 'instruction', 'irc', 'issue', 'key', 'known', 'language', 'latest', 'launch', 'lawrence', 'learn', 'license', 'like', 'live', 'llc', 'locky', 'login', 'main', 'malware', 'manager', 'member', 'microsoft', 'mode', 'mouse', 'msevents', 'name', 'need', 'new', 'news', 'newsletter', 'open', 'opening', 'opposed', 'order', 'owner', 'package', 'page', 'password', 'pc', 'periodic', 'please', 'pm', 'policy', 'popular', 'post', 'posted', 'potplayer', 'preview', 'previous', 'privacy', 'problem', 'program', 'prompt', 'quality', 'ransomware', 'receive', 'recent', 'recover', 'recovery', 'redirects', 'register', 'registry', 'release', 'released', 'remember', 'removal', 'remove', 'reporter', 'reserved', 'reset', 'resource', 'result', 'resulting', 'review', 'right', 'ring', 'rkill', 'rootkit', 'rootkits', 'rule', 'safe', 'screen', 'section', 'security', 'securitytool', 'see', 'set', 'setting', 'shadow', 'show', 'sign', 'sitemap', 'social', 'sometimes', 'spam', 'start', 'startup', 'strong', 'submit', 'submitting', 'tab', 'task', 'tdss', 'tdsskiller', 'technical', 'title', 'tool', 'topic', 'trojan', 'tutorial', 'twitter', 'understand', 'unexpected', 'unexpectedly', 'uninstall', 'update', 'use', 'useful', 'user', 'username', 'using', 'uwp', 'version', 'via', 'viewed', 'virtumonde', 'virus', 'visible', 'volume', 'welcome', 'window', 'winfixer', 'winternals', 'worm', 'would', 'write', 'yet'] | |
1004 | |
1004 2017-03-09T18:32:08.675000Z http://www.welivesecurity.com/podcasts/securing-our-ecity-awarded-by-obama-white-house/ | |
1004 2017-03-27T12:33:57.893000Z https://www.welivesecurity.com/podcasts/securing-our-ecity-awarded-by-obama-white-house/ | |
['add', 'al', 'audio', 'awarded', 'blog', 'code', 'community', 'conference', 'contact', 'copyright', 'currently', 'de', 'deutsch', 'direct', 'div', 'download', 'ecity', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'facebook', 'follow', 'friend', 'go', 'home', 'house', 'http', 'inbox', 'information', 'insight', 'ir', 'language', 'latest', 'legal', 'length', 'link', 'linkedin', 'magazine', 'material', 'message', 'multimedia', 'navigation', 'news', 'newsletter', 'obama', 'opinion', 'page', 'paper', 'pause', 'play', 'podcast', 'podcasts', 'policy', 'post', 'posted', 'print', 'privacy', 'radar', 'research', 'reserved', 'right', 'rob', 'search', 'securing', 'security', 'sent', 'sign', 'site', 'sitemap', 'stylesheet', 'toggle', 'total', 'twitter', 'video', 'view', 'virus', 'waugh', 'wechseln', 'white', 'wls', 'youtube', 'zum'] | |
1005 | |
1006 | |
1006 2017-03-09T00:30:51.606000Z https://veracode.com/blog/managing-appsec/technologies-designed-or-transformed-devsecops-enablement | |
1006 2017-03-14T18:30:56.191000Z http://www.veracode.com/blog/managing-appsec/technologies-designed-or-transformed-devsecops-enablement | |
['accept', 'accuracy', 'accurate', 'address', 'addressed', 'adequately', 'advanced', 'agent', 'also', 'analysis', 'analyzing', 'app', 'application', 'applied', 'appsec', 'assembly', 'attack', 'attention', 'away', 'back', 'backbone', 'begun', 'benefit', 'besides', 'blog', 'button', 'capable', 'cease', 'central', 'chief', 'choose', 'class', 'closest', 'code', 'coding', 'combination', 'come', 'comment', 'committed', 'committing', 'complete', 'compliance', 'composition', 'content', 'continue', 'continuously', 'contrary', 'couple', 'creating', 'criterion', 'dast', 'data', 'date', 'deliver', 'designed', 'detect', 'detected', 'detection', 'dev', 'developer', 'development', 'devops', 'devsecops', 'different', 'distribution', 'drive', 'email', 'emerged', 'emerging', 'enables', 'ensuring', 'essential', 'evolving', 'existing', 'experience', 'feiman', 'field', 'file', 'firewall', 'first', 'fixed', 'flow', 'follow', 'form', 'fully', 'gartner', 'get', 'go', 'high', 'highly', 'home', 'homepage', 'iast', 'ideal', 'ides', 'including', 'increment', 'individual', 'inducer', 'industry', 'infrequently', 'innovation', 'innovative', 'insight', 'inspector', 'installed', 'instantaneous', 'instantaneously', 'instrumented', 'interference', 'invisible', 'invoke', 'joseph', 'kept', 'kind', 'lack', 'latency', 'leader', 'learning', 'leverage', 'library', 'logic', 'made', 'major', 'management', 'manager', 'managing', 'marked', 'market', 'matter', 'might', 'minimal', 'mistake', 'mollom', 'name', 'nearly', 'new', 'next', 'officer', 'one', 'open', 'ops', 'outlined', 'page', 'part', 'peer', 'phase', 'please', 'policy', 'post', 'practically', 'pressing', 'previous', 'privacy', 'private', 'process', 'produce', 'produced', 'productivity', 'project', 'protect', 'protected', 'protecting', 'protection', 'proximity', 'publicly', 'published', 'rasp', 'real', 'recently', 'recognized', 'related', 'released', 'reporting', 'repository', 'require', 'required', 'research', 'responsible', 'result', 'reveals', 'review', 'rewarding', 'risk', 'role', 'routed', 'run', 'running', 'runtime', 'sast', 'sca', 'second', 'secure', 'securing', 'security', 'see', 'server', 'share', 'shown', 'simulates', 'simulator', 'small', 'software', 'source', 'start', 'stay', 'still', 'strategy', 'submitting', 'support', 'system', 'teach', 'team', 'technology', 'test', 'tested', 'testing', 'therefore', 'thus', 'time', 'traditionally', 'traffic', 'transformation', 'transformed', 'transforming', 'two', 'typically', 'undergoing', 'unit', 'used', 'veracode', 'vulnerability', 'wafs', 'web', 'without'] | |
1007 | |
1008 | |
1009 | |
1009 2017-03-15T00:30:50.222000Z http://csoonline.com/article/3180519/security/microsoft-stays-security-bulletins-termination.html | |
1009 2017-03-29T18:31:10.755000Z http://csoonline.com/article/3186164/security/10-security-risks-of-wearables.html | |
['address', 'comma', 'email', 'emailing', 'error', 'friend', 'home', 'leadership', 'management', 'message', 'multiple', 'news', 'page', 'policy', 'privacy', 'pt', 'security', 'sent', 'separate', 'sorry', 'thank', 'use'] | |
1010 | |
1011 | |
1012 | |
1013 | |
1014 | |
1014 2017-03-16T18:31:38.973000Z https://www.mimecast.com/blog/2014/10/ip-expo-2014-when-reality-will-trump-hype/ | |
1014 2017-03-18T12:33:28.645000Z http://www.mimecast.com/blog/2014/10/ip-expo-2014-when-reality-will-trump-hype/ | |
['acceptable', 'actually', 'africa', 'also', 'america', 'apps', 'architecture', 'archive', 'archiving', 'area', 'around', 'asia', 'aside', 'associated', 'attack', 'award', 'backup', 'become', 'believe', 'big', 'blog', 'brings', 'budget', 'bundle', 'burgeoning', 'business', 'career', 'categorizing', 'center', 'central', 'challenge', 'chat', 'cloud', 'coalition', 'comment', 'company', 'compliance', 'contact', 'content', 'continuity', 'control', 'conversation', 'cost', 'craig', 'customer', 'cyber', 'data', 'defend', 'demo', 'detail', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'drop', 'east', 'economic', 'email', 'embedded', 'enable', 'enterprise', 'era', 'europe', 'event', 'evolution', 'exchange', 'excitement', 'expert', 'exploiting', 'expo', 'feel', 'file', 'filed', 'find', 'first', 'forward', 'fundamentally', 'future', 'get', 'glad', 'google', 'happened', 'heavily', 'help', 'home', 'hopefully', 'hot', 'huge', 'hybrid', 'hype', 'im', 'impact', 'includes', 'information', 'infrastructure', 'intelligence', 'invest', 'investor', 'ip', 'javascript', 'job', 'keeping', 'knowledgebase', 'landscape', 'large', 'last', 'le', 'leadership', 'legacy', 'like', 'login', 'london', 'look', 'looking', 'lot', 'magical', 'managed', 'management', 'mentioned', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'month', 'moving', 'natural', 'network', 'new', 'news', 'next', 'north', 'number', 'office', 'one', 'opportunity', 'option', 'organization', 'organizational', 'overview', 'pacific', 'partner', 'percent', 'peter', 'phase', 'plan', 'planning', 'platform', 'please', 'policy', 'post', 'posted', 'powered', 'pragmatic', 'pragmatism', 'predict', 'presentation', 'presenting', 'press', 'privacy', 'produced', 'product', 'productivity', 'professional', 'program', 'protection', 'quote', 'real', 'reality', 'recovery', 'registration', 'related', 'relation', 'release', 'reoccurring', 'replaced', 'require', 'reseller', 'reserved', 'resilience', 'resource', 'responsibility', 'responsible', 'right', 'risk', 'role', 'sale', 'schedule', 'scrutinized', 'secure', 'security', 'see', 'seems', 'send', 'service', 'share', 'shifted', 'short', 'signature', 'since', 'sitemap', 'solution', 'south', 'stand', 'staying', 'still', 'stop', 'strong', 'structure', 'success', 'support', 'talk', 'targeted', 'team', 'technical', 'technology', 'term', 'theatre', 'threat', 'time', 'titled', 'today', 'topic', 'trailer', 'training', 'trend', 'trump', 'trust', 'twelve', 'unprepared', 'use', 'useful', 'vendor', 'video', 'view', 'webinars', 'week', 'whaling', 'work', 'year'] | |
1015 | |
1016 | |
1016 2017-03-30T00:30:51.682000Z http://csoonline.com/article/3186484/security/trojan-source-code-leak-poised-to-spur-new-online-banking-attacks.html | |
1016 2017-03-30T12:30:57.445000Z http://csoonline.com/article/3186421/security/open-source-developers-targeted-in-sophisticated-malware-attack.html | |
['according', 'address', 'advantage', 'ahead', 'alert', 'allow', 'also', 'analysis', 'approach', 'article', 'ask', 'attack', 'attacker', 'attract', 'back', 'banking', 'block', 'blocker', 'blog', 'botnet', 'brandposts', 'breach', 'brochure', 'browsing', 'bypass', 'calendar', 'call', 'called', 'carol', 'christmas', 'cia', 'cloud', 'cloudy', 'code', 'comma', 'comment', 'concern', 'conference', 'connected', 'constantin', 'content', 'correspondent', 'cost', 'credit', 'cso', 'cybersecurity', 'data', 'deal', 'deluxe', 'device', 'digital', 'doctor', 'download', 'drive', 'easy', 'ebook', 'educating', 'email', 'emailing', 'employee', 'enterprise', 'error', 'even', 'event', 'example', 'facebook', 'featured', 'federal', 'fight', 'fill', 'find', 'fit', 'fitness', 'five', 'follow', 'friend', 'george', 'get', 'go', 'going', 'good', 'government', 'guide', 'hacked', 'hacker', 'hacking', 'headline', 'home', 'huge', 'hybrid', 'idg', 'increase', 'information', 'inhibit', 'inject', 'instantly', 'intel', 'intelligence', 'internet', 'isp', 'know', 'knowledge', 'latest', 'leadership', 'leak', 'learn', 'least', 'let', 'life', 'like', 'link', 'lucian', 'made', 'make', 'malware', 'management', 'master', 'matter', 'message', 'might', 'model', 'modernize', 'month', 'motherboard', 'move', 'mozilla', 'much', 'multiple', 'name', 'needed', 'network', 'new', 'news', 'newsletter', 'next', 'nothing', 'offering', 'often', 'online', 'open', 'operation', 'order', 'page', 'paper', 'past', 'pi', 'poised', 'policy', 'popular', 'post', 'potent', 'present', 'priority', 'privacy', 'process', 'program', 'project', 'protection', 'protectwise', 'provider', 'pt', 'published', 'question', 'ransomware', 'raspberry', 'related', 'remote', 'researcher', 'resource', 'resulted', 'right', 'rise', 'risk', 'romania', 'said', 'secure', 'security', 'sell', 'sent', 'sentinelone', 'separate', 'service', 'several', 'siem', 'sign', 'since', 'software', 'soon', 'sorry', 'source', 'sponsored', 'spur', 'state', 'step', 'story', 'stream', 'success', 'target', 'tax', 'telemarketers', 'terabyte', 'thank', 'though', 'threat', 'three', 'time', 'tip', 'tool', 'top', 'tracker', 'tracking', 'transformation', 'trojan', 'truth', 'turbotax', 'turn', 'twitter', 'unskilled', 'upcoming', 'update', 'use', 'used', 'user', 'version', 'video', 'visit', 'washington', 'way', 'wearable', 'website', 'wherever', 'white', 'whole', 'wikileaks', 'writes'] | |
1017 | |
1018 | |
1020 | |
1020 2017-03-23T18:33:48.598000Z http://www.welivesecurity.com/2015/02/16/internet-things-security-timebomb/ | |
1020 2017-03-27T12:32:11.463000Z https://www.welivesecurity.com/2015/02/16/internet-things-security-timebomb/ | |
['abusive', 'access', 'action', 'actually', 'address', 'aid', 'allowing', 'already', 'also', 'app', 'appeal', 'appealing', 'arrival', 'aspect', 'attack', 'audio', 'author', 'baby', 'band', 'belief', 'blood', 'borne', 'botnet', 'bulb', 'buy', 'case', 'colleague', 'collecting', 'come', 'coming', 'commercial', 'company', 'compromised', 'computer', 'concern', 'connect', 'connected', 'consumer', 'control', 'convenience', 'credential', 'crime', 'curbed', 'currently', 'dangerous', 'data', 'dawn', 'debate', 'detail', 'developing', 'device', 'door', 'doorbell', 'dozen', 'eagerness', 'earl', 'eating', 'ebay', 'effort', 'email', 'enough', 'entry', 'eset', 'even', 'every', 'everything', 'executive', 'existence', 'facilitating', 'false', 'fearful', 'fifteen', 'finally', 'firmware', 'fitness', 'former', 'fridge', 'friend', 'friendliness', 'front', 'ftc', 'function', 'gartner', 'given', 'glorious', 'go', 'grab', 'granted', 'greatly', 'habit', 'hack', 'hacked', 'hacker', 'hailed', 'heating', 'home', 'hour', 'house', 'household', 'houston', 'however', 'identity', 'individual', 'infected', 'information', 'interest', 'internet', 'karl', 'keep', 'kettle', 'last', 'later', 'leading', 'led', 'lifestyle', 'light', 'lighting', 'like', 'limited', 'long', 'majority', 'make', 'making', 'many', 'matter', 'maybe', 'microphone', 'might', 'minefield', 'moment', 'monitor', 'month', 'move', 'much', 'multiplication', 'name', 'nearing', 'need', 'nest', 'network', 'new', 'obvious', 'often', 'opening', 'page', 'panacea', 'party', 'pas', 'password', 'people', 'perkins', 'permission', 'pet', 'phone', 'physical', 'plain', 'point', 'possibility', 'possible', 'posted', 'president', 'pressure', 'prevented', 'print', 'product', 'properly', 'protected', 'proven', 'published', 'put', 'quickly', 'range', 'reality', 'realization', 'really', 'reason', 'recently', 'recording', 'reduces', 'report', 'required', 'research', 'reveal', 'revealed', 'right', 'risk', 'said', 'samsung', 'say', 'scratch', 'second', 'security', 'seems', 'sell', 'senate', 'sent', 'several', 'shared', 'similarly', 'sleeping', 'smart', 'solution', 'soon', 'spouse', 'stage', 'steal', 'stop', 'storing', 'study', 'system', 'tablet', 'technology', 'texas', 'text', 'thermostat', 'thief', 'thing', 'think', 'third', 'thomas', 'though', 'threat', 'time', 'timebomb', 'tipping', 'together', 'took', 'transmitting', 'triumph', 'tv', 'undoing', 'use', 'used', 'user', 'various', 'vaunted', 'vector', 'vendor', 'vice', 'video', 'vulnerability', 'vulnerable', 'warm', 'warned', 'water', 'week', 'weight', 'well', 'west', 'whatever', 'whats', 'whose', 'wide', 'wifi', 'wild', 'win', 'within', 'world'] | |
1021 | |
1022 | |
1022 2017-03-23T00:30:54.673000Z https://www.bleepingcomputer.com/news/security/the-next-big-thing-for-android-malware-is-plugin-frameworks-/ | |
1022 2017-03-23T18:33:33.250000Z https://www.grahamcluley.com/android-adware-abusing-plugin-frameworks-promote-potentially-malicious-apps/ | |
['abused', 'account', 'ad', 'adware', 'also', 'alto', 'android', 'app', 'application', 'apps', 'article', 'attack', 'author', 'automatically', 'available', 'banking', 'behavior', 'browser', 'called', 'campaign', 'category', 'check', 'comment', 'computer', 'contact', 'content', 'control', 'copyright', 'course', 'data', 'decryptor', 'detection', 'developer', 'device', 'discovered', 'downloaded', 'droidplugin', 'exploit', 'facebook', 'fake', 'feed', 'firefox', 'follow', 'found', 'framework', 'gadget', 'gear', 'get', 'google', 'home', 'infected', 'install', 'installed', 'instance', 'internet', 'latest', 'launch', 'like', 'list', 'live', 'login', 'malicious', 'malvertising', 'malware', 'medium', 'microsoft', 'million', 'mobile', 'month', 'multiple', 'name', 'network', 'new', 'news', 'newsletter', 'one', 'order', 'palo', 'password', 'past', 'phishing', 'play', 'plugin', 'pm', 'policy', 'popular', 'post', 'privacy', 'program', 'promoted', 'ramnit', 'ransomware', 'recent', 'register', 'remove', 'researcher', 'reserved', 'right', 'say', 'screen', 'secure', 'security', 'sign', 'site', 'social', 'software', 'spam', 'steal', 'store', 'support', 'system', 'tech', 'technique', 'technology', 'trojan', 'twitter', 'type', 'uninstall', 'used', 'user', 'virtualapp', 'virtualized', 'vulnerability', 'way', 'web', 'website', 'whatsapp', 'window', 'write'] | |
1023 | |
1024 | |
1025 | |
1027 | |
1027 2017-03-16T18:31:24.119000Z https://www.mimecast.com/blog/2015/08/under-the-hood-our-new-email-attachment-sandbox/ | |
1027 2017-03-18T12:32:56.274000Z http://www.mimecast.com/blog/2015/08/under-the-hood-our-new-email-attachment-sandbox/ | |
['achieve', 'action', 'added', 'addition', 'administrator', 'advocate', 'agent', 'allows', 'also', 'analysis', 'another', 'approach', 'approximately', 'area', 'ask', 'attachment', 'attack', 'attacker', 'attempt', 'award', 'awareness', 'back', 'become', 'best', 'blog', 'bring', 'bringing', 'business', 'bypass', 'capability', 'changed', 'channel', 'checking', 'choose', 'clearly', 'closely', 'cloud', 'code', 'combine', 'comment', 'company', 'comprehensive', 'compromise', 'contain', 'content', 'continuity', 'control', 'converted', 'cost', 'could', 'counter', 'countermeasure', 'credential', 'critical', 'customer', 'cyber', 'cybersecurity', 'data', 'deemed', 'deep', 'defence', 'defense', 'defining', 'delay', 'deliver', 'demand', 'deploy', 'difference', 'different', 'director', 'disqus', 'document', 'door', 'download', 'driving', 'easier', 'easily', 'edit', 'effective', 'email', 'employee', 'enable', 'ensure', 'environment', 'era', 'establish', 'even', 'evolving', 'example', 'excel', 'execution', 'existing', 'expensive', 'external', 'fact', 'file', 'filed', 'followed', 'format', 'fresh', 'frontier', 'frustrate', 'functionality', 'garbage', 'gateway', 'give', 'global', 'goal', 'granular', 'hack', 'held', 'help', 'hidden', 'home', 'hood', 'however', 'ideal', 'impact', 'inactive', 'inbound', 'include', 'includes', 'incoming', 'infiltrate', 'information', 'infosecurity', 'innovation', 'innovative', 'instance', 'insurance', 'javascript', 'joined', 'joining', 'keep', 'landscape', 'latency', 'like', 'limit', 'limitation', 'link', 'linkedin', 'macro', 'mail', 'make', 'malcious', 'malicious', 'malone', 'malware', 'management', 'message', 'microsoft', 'mimecast', 'mix', 'need', 'needed', 'neutralizing', 'new', 'night', 'number', 'offer', 'office', 'often', 'onto', 'open', 'opened', 'order', 'organization', 'organiziation', 'original', 'outlined', 'part', 'partner', 'passing', 'passionate', 'pdf', 'performance', 'performs', 'platform', 'please', 'policy', 'position', 'post', 'posted', 'potential', 'potentially', 'powered', 'powerpoint', 'predictive', 'prepared', 'prior', 'process', 'processed', 'product', 'productivity', 'protect', 'protection', 'psychology', 'put', 'question', 'raise', 'ransomware', 'read', 'reader', 'real', 'reality', 'reason', 'recently', 'recipient', 'related', 'released', 'render', 'rendered', 'replacing', 'reporting', 'request', 'research', 'rewriting', 'risk', 'roadmap', 'role', 'run', 'safe', 'safety', 'sale', 'sandbox', 'sandboxing', 'scam', 'security', 'senior', 'service', 'share', 'show', 'site', 'sophisticated', 'spin', 'springboard', 'staging', 'stealing', 'steve', 'steven', 'stop', 'system', 'targeted', 'tasked', 'tax', 'team', 'technical', 'technology', 'terabyte', 'thanks', 'threat', 'today', 'top', 'transcribed', 'transfer', 'url', 'used', 'user', 'using', 'vector', 'version', 'via', 'view', 'virtual', 'vision', 'visually', 'vital', 'vulnerable', 'warning', 'watch', 'way', 'weakness', 'weaponized', 'website', 'whaling', 'whole', 'winner', 'without', 'word', 'work', 'year'] | |
1028 | |
1028 2017-03-09T18:32:12.955000Z http://www.welivesecurity.com/2017/03/09/new-instagram-credentials-stealers-discovered-google-play/ | |
1028 2017-03-13T18:30:54.127000Z https://www.bleepingcomputer.com/news/security/13-google-play-store-apps-caught-stealing-instagram-credentials/ | |
1028 2017-03-27T12:34:02.165000Z https://www.welivesecurity.com/2017/03/09/new-instagram-credentials-stealers-discovered-google-play/ | |
['account', 'across', 'ad', 'also', 'android', 'app', 'appear', 'apps', 'article', 'ask', 'attack', 'attempt', 'attempting', 'boost', 'boosting', 'case', 'category', 'change', 'comment', 'community', 'contact', 'content', 'copyright', 'credential', 'data', 'developer', 'device', 'discovered', 'downloaded', 'error', 'eset', 'facebook', 'find', 'follow', 'follower', 'form', 'found', 'google', 'home', 'information', 'instagram', 'installed', 'language', 'last', 'later', 'latest', 'like', 'log', 'login', 'lukas', 'malicious', 'malware', 'manager', 'many', 'medium', 'might', 'million', 'mobile', 'month', 'new', 'news', 'newsletter', 'notification', 'number', 'official', 'offline', 'order', 'page', 'password', 'play', 'policy', 'popular', 'post', 'posted', 'privacy', 'ransomware', 'remote', 'remove', 'removed', 'reserved', 'right', 'screen', 'security', 'selling', 'server', 'service', 'sign', 'site', 'sitemap', 'social', 'someone', 'spam', 'stefanko', 'stolen', 'store', 'target', 'tool', 'topic', 'twitter', 'uninstall', 'use', 'used', 'user', 'using', 'various', 'via', 'victim', 'virus', 'visit', 'web', 'well', 'work'] | |
1029 | |
1029 2017-03-23T12:32:20.718000Z http://www.itsecurityguru.org/2017/03/23/government-acknowledge-need-preventive-methods-following-significant-growing-threat-ransomware/ | |
1029 2017-03-23T12:33:08.718000Z http://www.itsecurityguru.org/2017/03/23/millions-sap-users-exposed-ransomware-due-gui-vulnerability/ | |
1029 2017-03-23T12:33:16.244000Z http://www.itsecurityguru.org/2017/03/23/apple-responds-hack-threats-says-no-icloud-apple-id-breaches/ | |
1029 2017-03-23T12:33:20.688000Z http://www.itsecurityguru.org/2017/03/23/evil-malware-turns-antivirus-software-pcs/ | |
1029 2017-03-23T12:33:27.570000Z http://www.itsecurityguru.org/2017/03/23/majority-uk-biz-lacks-dns-insight-leading-ddos/ | |
['ability', 'across', 'action', 'ad', 'administrator', 'advanced', 'affect', 'afraid', 'ago', 'also', 'american', 'amidst', 'anonabox', 'antivirus', 'apple', 'application', 'appriver', 'approves', 'around', 'article', 'ask', 'atm', 'attack', 'back', 'backlash', 'badly', 'baker', 'bank', 'banking', 'biggest', 'binary', 'biometrics', 'biz', 'blind', 'board', 'breach', 'broadly', 'build', 'business', 'campaign', 'change', 'citibank', 'cloud', 'cm', 'code', 'combat', 'come', 'comment', 'communication', 'community', 'creating', 'criminal', 'curse', 'cyber', 'cybersecurity', 'data', 'date', 'ddos', 'demanded', 'despite', 'development', 'dns', 'doe', 'dtmf', 'due', 'ebay', 'editor', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'everyone', 'evil', 'execution', 'experience', 'explain', 'exporting', 'exposed', 'express', 'facebook', 'family', 'find', 'finnish', 'flaw', 'follow', 'forum', 'fraud', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'good', 'goodbye', 'google', 'got', 'government', 'grip', 'gui', 'guru', 'guy', 'hack', 'hacked', 'hacker', 'hacking', 'hello', 'help', 'hit', 'hitting', 'home', 'hospital', 'hour', 'http', 'icloud', 'id', 'impact', 'imposter', 'improve', 'incident', 'industrial', 'infected', 'information', 'infosec', 'infosecurity', 'inside', 'insight', 'internet', 'jay', 'jones', 'joyce', 'know', 'lack', 'landmark', 'lastpass', 'law', 'leading', 'leave', 'lee', 'life', 'like', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'majority', 'making', 'malware', 'many', 'million', 'min', 'mind', 'mitigation', 'mixed', 'mobile', 'netflix', 'neustar', 'new', 'news', 'next', 'num', 'oiza', 'open', 'operation', 'option', 'organisation', 'password', 'paypal', 'pc', 'per', 'persistent', 'pervasive', 'phishing', 'plant', 'platform', 'pm', 'police', 'polite', 'popular', 'posted', 'previous', 'primary', 'privacy', 'professional', 'protecting', 'protection', 'quality', 'queen', 'ransomware', 'recent', 'regulation', 'related', 'relationship', 'reli', 'remains', 'responds', 'response', 'retailer', 'return', 'rich', 'rise', 'risk', 'round', 'run', 'sale', 'sap', 'say', 'scam', 'scammer', 'security', 'sensitive', 'service', 'sex', 'share', 'shortage', 'show', 'sign', 'skill', 'software', 'sort', 'source', 'spam', 'spot', 'squad', 'stealing', 'stock', 'story', 'supporter', 'tackle', 'tag', 'tagged', 'talking', 'tania', 'target', 'technology', 'ten', 'term', 'themed', 'thing', 'threat', 'top', 'trading', 'trend', 'turn', 'turning', 'tweet', 'uk', 'unaware', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'video', 'viral', 'vulnerability', 'warns', 'watch', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'within', 'working', 'worse', 'would', 'year'] | |
1030 | |
1030 2017-03-05T00:41:36.101000Z http://thehackernews.com/2011/05/dna-stuxnetin-hacked-database-leaked-by.html | |
1030 2017-03-05T00:41:43.824000Z http://thehackernews.com/2011/05/hackmeoutnet-hacked-by-shadow008.html | |
1030 2017-03-05T00:42:02.165000Z http://thehackernews.com/2011/05/skidhackercom-underground-hackingnet.html | |
1030 2017-03-05T00:42:13.317000Z http://thehackernews.com/2011/05/indocoderorid-hacked-by-shadow008.html | |
1030 2017-03-05T00:42:20.317000Z http://thehackernews.com/2011/05/one-more-hacker-website-ub3rhakerznet.html | |
1030 2017-03-05T00:42:24.274000Z http://thehackernews.com/2011/05/cyber-detective-cyber-force-hacked-by.html | |
1030 2017-03-05T00:43:00.910000Z http://thehackernews.com/2011/04/70-indian-websites-hacked-by-shadow008.html | |
1030 2017-03-05T00:43:25.964000Z http://thehackernews.com/2011/03/cif-cyberindiaforcein-owned-by.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pakcyberarmy', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1031 | |
1032 | |
1032 2017-03-09T18:31:25.265000Z http://www.welivesecurity.com/2015/02/11/census-scams-grandparent-scams/ | |
1032 2017-03-27T12:32:23.071000Z https://www.welivesecurity.com/2015/02/11/census-scams-grandparent-scams/ | |
['abroad', 'abstracted', 'abusing', 'ac', 'acceding', 'access', 'accident', 'accommodate', 'accordance', 'according', 'account', 'accounted', 'across', 'add', 'agreed', 'al', 'also', 'always', 'american', 'android', 'answering', 'anyone', 'anything', 'anywhere', 'api', 'app', 'apparently', 'appears', 'apply', 'approach', 'archive', 'around', 'article', 'ask', 'asking', 'asks', 'assume', 'assumption', 'attach', 'attack', 'author', 'authority', 'aware', 'bank', 'based', 'became', 'become', 'behalf', 'benjamin', 'beyond', 'big', 'blog', 'book', 'bound', 'brief', 'brought', 'bureau', 'call', 'called', 'caller', 'calling', 'came', 'carrot', 'case', 'census', 'century', 'certain', 'certainly', 'challenge', 'check', 'circumstance', 'cited', 'claim', 'claiming', 'clear', 'clearly', 'clever', 'code', 'collect', 'commit', 'common', 'commonly', 'community', 'complete', 'completed', 'completing', 'computer', 'conduct', 'conducted', 'conference', 'consequence', 'contact', 'contacted', 'context', 'continue', 'convince', 'copyright', 'country', 'couple', 'course', 'criminal', 'crossed', 'cut', 'cybersecurity', 'danger', 'data', 'daughter', 'david', 'de', 'deal', 'death', 'decennial', 'demanding', 'described', 'describes', 'detail', 'detect', 'determined', 'deutsch', 'developer', 'different', 'difficult', 'diminished', 'dire', 'direct', 'directing', 'directly', 'directs', 'disaster', 'distorted', 'div', 'doctor', 'due', 'easy', 'edition', 'either', 'election', 'else', 'email', 'embed', 'en', 'enforcement', 'engineering', 'english', 'ensure', 'envelope', 'episode', 'equivalent', 'eset', 'español', 'especially', 'even', 'every', 'everyone', 'example', 'exist', 'exotic', 'expect', 'expert', 'face', 'facebook', 'facility', 'fact', 'fake', 'falling', 'false', 'family', 'faq', 'fee', 'financial', 'find', 'fine', 'fined', 'fishing', 'follow', 'fortunately', 'franklin', 'fraud', 'fraudsters', 'frequent', 'frequently', 'friend', 'fully', 'get', 'give', 'giving', 'go', 'google', 'grandchild', 'grandma', 'grandpa', 'great', 'gullible', 'gunpoint', 'hacking', 'hard', 'harder', 'harley', 'hear', 'hello', 'help', 'home', 'hope', 'hospital', 'hot', 'hour', 'however', 'http', 'humanity', 'idiot', 'implement', 'important', 'inbox', 'income', 'increase', 'indeed', 'information', 'injury', 'insight', 'instance', 'instruction', 'interested', 'internet', 'investment', 'involves', 'ir', 'jail', 'jailed', 'justify', 'kirchheimer', 'know', 'known', 'lagos', 'language', 'last', 'later', 'latest', 'law', 'le', 'leave', 'legal', 'legitimate', 'let', 'like', 'likely', 'line', 'link', 'linkedin', 'little', 'lived', 'london', 'londoning', 'longer', 'love', 'made', 'magazine', 'mailing', 'maintain', 'make', 'making', 'mandatory', 'many', 'material', 'mean', 'mechanism', 'medical', 'meltdown', 'member', 'might', 'missouri', 'money', 'month', 'mother', 'much', 'mugged', 'mugging', 'multimedia', 'navigation', 'necessarily', 'need', 'nervous', 'news', 'newsletter', 'next', 'noted', 'nothing', 'number', 'offer', 'office', 'official', 'often', 'older', 'one', 'ongoing', 'online', 'onto', 'opinion', 'opportunity', 'page', 'paper', 'particularly', 'password', 'past', 'pay', 'pc', 'pension', 'people', 'percentage', 'perhaps', 'persistent', 'person', 'personal', 'persuade', 'phishers', 'phishing', 'phone', 'plan', 'play', 'podcasts', 'point', 'police', 'policeman', 'policy', 'popular', 'population', 'position', 'possible', 'post', 'posted', 'potential', 'predict', 'presidential', 'presumably', 'pretence', 'preventing', 'primarily', 'print', 'privacy', 'probably', 'proof', 'protect', 'prove', 'publicized', 'purport', 'push', 'put', 'question', 'radar', 'ransomware', 'read', 'real', 'really', 'received', 'recently', 'recognize', 'recognized', 'recommendation', 'referred', 'regional', 'related', 'relating', 'relative', 'report', 'reported', 'request', 'required', 'research', 'reserved', 'responding', 'ridicule', 'right', 'ring', 'ringing', 'risk', 'rule', 'safe', 'said', 'salesmanship', 'sample', 'sanctioned', 'say', 'scam', 'scammer', 'scamwatching', 'sceptical', 'scrupulous', 'search', 'section', 'secure', 'security', 'see', 'seems', 'select', 'send', 'senior', 'sent', 'sentence', 'several', 'sid', 'sign', 'simple', 'site', 'sitemap', 'small', 'snowden', 'social', 'someone', 'sometimes', 'somewhere', 'son', 'sort', 'sound', 'specifically', 'spend', 'spill', 'spoofing', 'statistic', 'statistical', 'stick', 'stopped', 'stranded', 'strictly', 'stylesheet', 'suggest', 'suggesting', 'suitably', 'summary', 'support', 'supposedly', 'sure', 'survey', 'susceptible', 'suspicious', 'taken', 'talked', 'targeting', 'tax', 'tech', 'telephone', 'tell', 'telling', 'think', 'though', 'thought', 'threatening', 'thumb', 'time', 'title', 'toggle', 'told', 'topic', 'transfer', 'transferred', 'trip', 'trust', 'try', 'trying', 'twitter', 'two', 'uk', 'undermined', 'unfortunately', 'union', 'unless', 'unwary', 'urgent', 'urgently', 'use', 'used', 'useful', 'usually', 'validate', 'verified', 'verify', 'victim', 'victimized', 'video', 'view', 'violence', 'virus', 'vishing', 'visit', 'vmworld', 'voice', 'vulnerable', 'waking', 'watch', 'way', 'web', 'website', 'wechseln', 'well', 'western', 'whats', 'whether', 'white', 'wire', 'without', 'wls', 'work', 'would', 'year', 'yearly', 'yet', 'young', 'youtube', 'zum'] | |
1033 | |
1034 | |
1035 | |
1036 | |
1037 | |
1038 | |
1039 | |
1040 | |
1041 | |
1041 2017-03-08T00:30:54.539000Z https://securityledger.com/2017/03/consumer-reports-floats-draft-cyber-standard/ | |
1041 2017-03-09T18:31:00.417000Z http://www.welivesecurity.com/2017/03/09/consumer-reports-launches-new-privacy-data-security-standard/ | |
1041 2017-03-27T12:31:26.072000Z https://www.welivesecurity.com/2017/03/09/consumer-reports-launches-new-privacy-data-security-standard/ | |
['also', 'among', 'article', 'author', 'camera', 'collected', 'connected', 'consumer', 'customer', 'data', 'device', 'digital', 'draft', 'effort', 'email', 'expert', 'facebook', 'friend', 'help', 'home', 'include', 'industry', 'information', 'initiative', 'latest', 'linkedin', 'make', 'new', 'nonprofit', 'organization', 'partner', 'policy', 'posted', 'print', 'privacy', 'private', 'product', 'read', 'related', 'report', 'research', 'right', 'security', 'similar', 'software', 'standard', 'threat', 'twitter', 'various', 'whether'] | |
1043 | |
1044 | |
1045 | |
1046 | |
1047 | |
1049 | |
1051 | |
1052 | |
1052 2017-03-05T00:46:37.752000Z http://thehackernews.com/2010/11/frisson-lingeriecom-hacked-by-tunisian.html | |
1052 2017-03-05T00:46:55.537000Z http://thehackernews.com/2010/11/tunisian-hacker-youssef-attia-x-hunter.html | |
1052 2017-03-05T00:47:03.158000Z http://thehackernews.com/2010/11/donna12fatcowcom-hacked-by-youssef.html | |
1052 2017-03-05T00:47:14.014000Z http://thehackernews.com/2010/10/shopaseaviewse-hacked-by-youssef-attia.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'attia', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'link', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york', 'youssef'] | |
1053 | |
1053 2017-03-05T00:39:51.328000Z http://thehackernews.com/2011/09/ghana-red-cross-website-defaced-by.html | |
1053 2017-03-05T00:41:29.312000Z http://thehackernews.com/2011/05/50-cpanels-hacked-by-ahmdosa-hacker.html | |
['ability', 'ahmdosa', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
1054 | |
1055 | |
1055 2017-03-14T06:30:57.752000Z http://www.welivesecurity.com/2016/01/07/ces-2016-day-1-surviving-swarm/ | |
1055 2017-03-27T12:31:51.465000Z https://www.welivesecurity.com/2016/01/07/ces-2016-day-1-surviving-swarm/ | |
['add', 'ago', 'al', 'almost', 'also', 'among', 'android', 'annually', 'api', 'app', 'archive', 'arise', 'around', 'article', 'aside', 'aspect', 'assessing', 'assessment', 'assuming', 'assumption', 'astonishing', 'attack', 'attacker', 'attendance', 'attention', 'attracting', 'author', 'avoid', 'bad', 'became', 'big', 'black', 'blank', 'blog', 'built', 'buy', 'cameron', 'camp', 'ce', 'century', 'certain', 'changed', 'child', 'close', 'club', 'code', 'come', 'coming', 'community', 'comparatively', 'computer', 'conference', 'connected', 'consumer', 'contact', 'cop', 'cope', 'copyright', 'crosshairs', 'curve', 'custom', 'data', 'day', 'de', 'detail', 'deutsch', 'developer', 'device', 'devoted', 'difficult', 'digital', 'direct', 'discussing', 'div', 'dog', 'doll', 'door', 'dozen', 'edition', 'education', 'effective', 'election', 'electronics', 'elicit', 'email', 'embed', 'en', 'endpoint', 'english', 'entrance', 'eset', 'español', 'even', 'ever', 'everything', 'except', 'expert', 'facebook', 'faq', 'far', 'find', 'first', 'flank', 'focus', 'follow', 'foot', 'foothold', 'friend', 'gadget', 'gain', 'generation', 'get', 'giant', 'go', 'gold', 'golf', 'google', 'goon', 'greater', 'grip', 'growth', 'guard', 'guy', 'hacking', 'half', 'hand', 'held', 'hired', 'home', 'hot', 'house', 'http', 'huge', 'hundred', 'inbox', 'indeed', 'industry', 'information', 'insight', 'insole', 'interested', 'internet', 'intersection', 'iot', 'ir', 'issue', 'keep', 'key', 'kind', 'know', 'la', 'language', 'large', 'last', 'latest', 'legal', 'level', 'link', 'linkedin', 'long', 'lot', 'luckily', 'magazine', 'malware', 'manufacturer', 'material', 'mess', 'might', 'missing', 'month', 'much', 'multimedia', 'must', 'nasty', 'navigation', 'near', 'need', 'nevada', 'new', 'news', 'newsletter', 'next', 'nowadays', 'obvious', 'offering', 'often', 'oh', 'one', 'opened', 'opinion', 'page', 'paper', 'past', 'people', 'perimeter', 'play', 'player', 'podcasts', 'policy', 'popular', 'post', 'posted', 'power', 'presidential', 'press', 'print', 'printed', 'privacy', 'protect', 'public', 'purchase', 'radar', 'ransomware', 'rather', 'read', 'recently', 'related', 'relative', 'reported', 'research', 'researcher', 'reserved', 'right', 'router', 'routing', 'running', 'safe', 'saw', 'scaling', 'scammer', 'scope', 'search', 'section', 'secure', 'security', 'seen', 'select', 'sense', 'sensor', 'shoe', 'show', 'sideshow', 'sign', 'since', 'site', 'sitemap', 'size', 'slurping', 'small', 'smartphone', 'smattering', 'snoop', 'snowden', 'somber', 'somehow', 'something', 'soon', 'speaking', 'sprawling', 'stare', 'still', 'stuff', 'stylesheet', 'subject', 'surface', 'surviving', 'swarm', 'table', 'talking', 'tech', 'technology', 'term', 'thing', 'think', 'thousand', 'tie', 'tiny', 'today', 'toehold', 'together', 'toggle', 'topic', 'traverse', 'trove', 'trust', 'trying', 'twitter', 'ubiquity', 'ukraine', 'undermined', 'understanding', 'unimaginable', 'unlock', 'user', 'using', 'vega', 'vendor', 'video', 'view', 'virus', 'visitor', 'vmworld', 'vulnerable', 'way', 'wechseln', 'well', 'whats', 'white', 'whole', 'wls', 'world', 'would', 'writ', 'year', 'youtube', 'zum'] | |
1056 | |
1056 2017-03-16T18:32:30.386000Z https://www.mimecast.com/blog/2012/08/mimecasts-visionary-secure-email-gateway/ | |
1056 2017-03-18T12:35:16.280000Z http://www.mimecast.com/blog/2012/08/mimecasts-visionary-secure-email-gateway/ | |
['ability', 'acceptable', 'act', 'adapts', 'add', 'added', 'administrator', 'adsl', 'africa', 'almost', 'already', 'america', 'annually', 'apps', 'archive', 'archiving', 'argue', 'asia', 'autumn', 'available', 'award', 'back', 'bacn', 'basis', 'become', 'believe', 'blog', 'blue', 'boom', 'bring', 'brings', 'broadband', 'budget', 'built', 'bundle', 'business', 'buy', 'ca', 'capability', 'career', 'case', 'caused', 'center', 'central', 'centralized', 'chat', 'choose', 'chorus', 'cloud', 'coalition', 'coinciding', 'collaborative', 'combine', 'comment', 'commoditisation', 'commoditised', 'communication', 'company', 'complaint', 'compliance', 'connection', 'consultancy', 'contact', 'content', 'continuity', 'control', 'controlling', 'conversation', 'corporate', 'could', 'course', 'credential', 'currently', 'customer', 'cyber', 'cybersecurity', 'data', 'defend', 'delivering', 'delivers', 'demand', 'demanding', 'demo', 'department', 'designed', 'detail', 'determination', 'directly', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'east', 'email', 'embedded', 'emergence', 'emerging', 'enable', 'enables', 'end', 'enhancement', 'entire', 'equipped', 'essential', 'europe', 'evaluate', 'evangelism', 'event', 'evolves', 'exchange', 'fair', 'file', 'filed', 'filter', 'five', 'flexibility', 'form', 'future', 'gartner', 'gateway', 'get', 'google', 'government', 'grew', 'hack', 'ham', 'herbal', 'highlight', 'home', 'hybrid', 'im', 'important', 'inbox', 'includes', 'increased', 'industry', 'influential', 'information', 'infrastructure', 'innovation', 'instantaneous', 'intellectual', 'internet', 'investor', 'isdn', 'javascript', 'joining', 'junk', 'knowledgebase', 'large', 'latest', 'leadership', 'leading', 'leased', 'legacy', 'line', 'linkedin', 'little', 'live', 'login', 'lot', 'louder', 'macro', 'magic', 'malicious', 'malware', 'managed', 'management', 'market', 'marketed', 'mean', 'meat', 'mesaging', 'messaging', 'methodology', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'much', 'nervous', 'network', 'news', 'normal', 'north', 'nothing', 'offered', 'offering', 'office', 'option', 'orlando', 'overview', 'pacific', 'pain', 'part', 'particular', 'partner', 'pay', 'pill', 'placed', 'platform', 'play', 'please', 'plug', 'point', 'policy', 'positioned', 'post', 'posted', 'powered', 'press', 'price', 'prior', 'privacy', 'pro', 'product', 'productivity', 'professional', 'program', 'progress', 'property', 'protect', 'protection', 'provider', 'publication', 'quadrant', 'queued', 'quickly', 'quite', 'quote', 'ransomware', 'real', 'reason', 'receive', 'recognise', 'registration', 'related', 'relation', 'relationship', 'release', 'report', 'reseller', 'resellers', 'reserved', 'resilience', 'resource', 'responsible', 'return', 'right', 'rise', 'rising', 'risk', 'robot', 'role', 'rubbish', 'saas', 'sale', 'schedule', 'scheduled', 'secure', 'securing', 'security', 'selling', 'send', 'server', 'service', 'share', 'signature', 'simultaneous', 'since', 'sitemap', 'solution', 'solve', 'south', 'spam', 'speaking', 'spend', 'straight', 'strategist', 'success', 'support', 'targeted', 'team', 'technical', 'technology', 'telephone', 'temptation', 'term', 'thing', 'threat', 'tide', 'today', 'tool', 'topic', 'training', 'true', 'trust', 'type', 'unintelligent', 'unless', 'use', 'used', 'user', 'validation', 'value', 'variety', 'vendor', 'version', 'veteran', 'view', 'vision', 'visionary', 'watch', 'way', 'webinars', 'website', 'welcome', 'well', 'whole', 'wisely', 'within', 'without', 'work', 'worked', 'working', 'would', 'writing', 'yearn'] | |
1057 | |
1059 | |
1060 | |
1061 | |
1064 | |
1065 | |
1065 2017-03-01T06:33:13.390000Z https://www.mimecast.com/blog/2011/06/office-365-finally-gets-its-wings-so-what-now/ | |
1065 2017-03-16T18:32:01.474000Z https://www.mimecast.com/blog/2013/11/getting-together-with-our-uk-customers-to-talk-microsoft-exchange-2013/ | |
1065 2017-03-16T18:32:18.440000Z https://www.mimecast.com/blog/2013/05/windows-8-has-ruined-my-lifeoh-wait-maybe-not/ | |
1065 2017-03-16T18:33:08.440000Z https://www.mimecast.com/blog/2011/03/exchange-2007-sp3-ru3-status/ | |
1065 2017-03-18T12:34:02.511000Z http://www.mimecast.com/blog/2014/03/the-road-to-office-365-its-not-if-but-when-and-how/ | |
1065 2017-03-18T12:34:14.006000Z http://www.mimecast.com/blog/2013/11/getting-together-with-our-uk-customers-to-talk-microsoft-exchange-2013/ | |
1065 2017-03-18T12:34:44.093000Z http://www.mimecast.com/blog/2013/05/windows-8-has-ruined-my-lifeoh-wait-maybe-not/ | |
1065 2017-03-18T12:35:22.148000Z http://www.mimecast.com/blog/2012/07/sysadmin-day-2012-the-brightest-future-yet/ | |
1065 2017-03-18T12:35:31.957000Z http://www.mimecast.com/blog/2012/05/understanding-the-risks-of-byod-and-exchange/ | |
1065 2017-03-18T12:36:16.010000Z http://www.mimecast.com/blog/2011/06/office-365-finally-gets-its-wings-so-what-now/ | |
1065 2017-03-18T12:36:34.161000Z http://www.mimecast.com/blog/2011/03/exchange-2007-sp3-ru3-status/ | |
1065 2017-03-18T12:37:18.144000Z http://www.mimecast.com/blog/2010/10/exchange-2010-architecture-poster-released/ | |
['acceptable', 'africa', 'america', 'apps', 'archive', 'archiving', 'asia', 'award', 'become', 'blog', 'bundle', 'career', 'center', 'central', 'chat', 'coalition', 'comment', 'company', 'compliance', 'contact', 'content', 'continuity', 'control', 'customer', 'cyber', 'data', 'demo', 'detail', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'east', 'email', 'enable', 'europe', 'event', 'exchange', 'file', 'filed', 'get', 'google', 'home', 'hybrid', 'im', 'information', 'investor', 'javascript', 'knowledgebase', 'large', 'leadership', 'legacy', 'login', 'managed', 'management', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'network', 'news', 'north', 'office', 'option', 'overview', 'pacific', 'partner', 'platform', 'please', 'policy', 'post', 'posted', 'powered', 'press', 'privacy', 'product', 'productivity', 'professional', 'program', 'protection', 'quote', 'registration', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'sale', 'schedule', 'secure', 'security', 'send', 'service', 'share', 'signature', 'sitemap', 'solution', 'south', 'success', 'support', 'targeted', 'team', 'technical', 'term', 'threat', 'training', 'trust', 'use', 'view', 'webinars', 'work'] | |
1066 | |
1067 | |
1068 | |
1069 | |
1069 2017-03-01T12:32:23.358000Z http://www.itsecurityguru.org/2017/03/01/think-know-cyber-security-think-worlds-famous-hacker-comes-ip-expo-manchester/ | |
1069 2017-03-01T12:32:33.868000Z http://www.itsecurityguru.org/2017/03/01/million-worldwide-cyberattacks-online-lending-transactions-2016-potential-loss-8-billion/ | |
['ability', 'abysmal', 'access', 'across', 'action', 'ad', 'administrator', 'advanced', 'advertising', 'afraid', 'ago', 'already', 'alvarez', 'american', 'amidst', 'anonabox', 'application', 'appriver', 'approves', 'around', 'article', 'aside', 'ask', 'atm', 'atombombing', 'attack', 'audio', 'back', 'backlash', 'band', 'bank', 'banking', 'bear', 'became', 'becomes', 'behind', 'biggest', 'billion', 'binary', 'biometrics', 'blading', 'blind', 'board', 'book', 'breach', 'broadly', 'build', 'business', 'campaign', 'change', 'christian', 'citibank', 'cloudpets', 'cm', 'collective', 'combat', 'come', 'comment', 'community', 'consumer', 'contentious', 'continues', 'convenience', 'cost', 'creating', 'criminal', 'cross', 'cyber', 'cyberattacks', 'cybersecurity', 'data', 'date', 'ddos', 'dean', 'development', 'disposal', 'doe', 'dridex', 'ebay', 'editor', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'explain', 'exploiting', 'expo', 'express', 'facebook', 'family', 'famous', 'feature', 'fed', 'find', 'fine', 'finnish', 'firm', 'first', 'flaw', 'follow', 'fraud', 'gdpr', 'general', 'generation', 'genuine', 'get', 'getting', 'globally', 'goodbye', 'got', 'government', 'greg', 'grip', 'group', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'harm', 'health', 'help', 'hidemyweb', 'high', 'hitting', 'home', 'hospital', 'hour', 'http', 'ico', 'impact', 'imposter', 'improve', 'incident', 'include', 'increasingly', 'industry', 'information', 'infosec', 'infosecurity', 'inside', 'integrate', 'interest', 'internet', 'involved', 'ip', 'joe', 'knew', 'know', 'korean', 'landmark', 'laura', 'law', 'lazarus', 'least', 'leave', 'lending', 'likely', 'link', 'literacy', 'lizard', 'look', 'looking', 'loss', 'lure', 'machine', 'major', 'making', 'malvertising', 'malware', 'manager', 'manchester', 'many', 'million', 'mindef', 'mitigation', 'mobile', 'netflix', 'network', 'never', 'new', 'news', 'next', 'nh', 'nought', 'num', 'number', 'oboe', 'offline', 'one', 'online', 'open', 'operation', 'option', 'organisation', 'password', 'patient', 'paypal', 'people', 'persistent', 'personal', 'personnel', 'pervasive', 'phishing', 'place', 'platform', 'playing', 'pm', 'popular', 'posted', 'potential', 'previous', 'primary', 'privacy', 'protecting', 'protection', 'public', 'purpose', 'ransomware', 'ratankba', 'reach', 'reaction', 'real', 'recent', 'record', 'recording', 'reduce', 'regulation', 'related', 'remains', 'response', 'retailer', 'return', 'rich', 'right', 'rise', 'rising', 'risk', 'rock', 'roller', 'round', 'run', 'sale', 'scam', 'sector', 'security', 'sensitive', 'serious', 'share', 'shortage', 'sign', 'skill', 'slap', 'smart', 'software', 'sort', 'source', 'south', 'spam', 'spot', 'squad', 'stock', 'stolen', 'story', 'suffered', 'supporter', 'surprising', 'system', 'tackle', 'tag', 'take', 'talking', 'target', 'tasting', 'tech', 'technique', 'teddy', 'ten', 'term', 'themed', 'thing', 'think', 'threat', 'top', 'track', 'trading', 'transaction', 'trend', 'trojan', 'turning', 'tweet', 'uk', 'uncovers', 'understanding', 'underway', 'use', 'used', 'user', 'using', 'usps', 'vector', 'via', 'victim', 'video', 'viral', 'vital', 'vulnerability', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'wilson', 'wine', 'within', 'working', 'worldwide', 'worse', 'year'] | |
1070 | |
1071 | |
1072 | |
1073 | |
1073 2017-03-16T18:31:10.539000Z http://www.welivesecurity.com/2013/07/24/the-rise-of-tor-based-botnets/ | |
1073 2017-03-27T12:33:02.046000Z https://www.welivesecurity.com/2013/07/24/the-rise-of-tor-based-botnets/ | |
['ability', 'able', 'according', 'activate', 'active', 'activity', 'add', 'additional', 'address', 'aes', 'afterward', 'ago', 'al', 'aleksandr', 'algorithm', 'already', 'also', 'analysing', 'analysis', 'analyze', 'analyzed', 'android', 'another', 'anton', 'api', 'app', 'appdata', 'approach', 'archive', 'army', 'around', 'article', 'ascertain', 'atrax', 'authenticate', 'authentication', 'author', 'avalanche', 'away', 'awkward', 'backdoor', 'based', 'bcmd', 'begin', 'beginning', 'behavior', 'binary', 'bit', 'blog', 'blow', 'bot', 'botnet', 'botnets', 'boundary', 'browser', 'bversion', 'call', 'chain', 'change', 'changed', 'channel', 'char', 'check', 'checking', 'cherepanov', 'chose', 'claim', 'click', 'client', 'cmp', 'code', 'collected', 'combined', 'command', 'communicating', 'communication', 'community', 'comparison', 'compilation', 'compiled', 'complex', 'component', 'concerning', 'conclusion', 'conference', 'configuration', 'confirm', 'confirming', 'connection', 'contact', 'continue', 'control', 'copyright', 'could', 'customer', 'cybercriminals', 'cypher', 'danchev', 'dancho', 'data', 'db', 'dd', 'de', 'debugger', 'decompiled', 'decompress', 'decompression', 'decrypted', 'defcon', 'demonstrated', 'dependent', 'depends', 'detect', 'detected', 'detection', 'detector', 'deutsch', 'different', 'difficult', 'digitalproductid', 'direct', 'directory', 'discussed', 'disrupted', 'div', 'dlexec', 'dll', 'dlrunmem', 'dltorexec', 'dltorrunmem', 'domain', 'dorkbot', 'dorkside', 'download', 'downloaded', 'downloader', 'downloaders', 'downloading', 'dropper', 'dumbass', 'dw', 'dwlength', 'early', 'easy', 'eax', 'email', 'embed', 'embedded', 'en', 'enabled', 'encrypt', 'encrypted', 'encryption', 'end', 'engineering', 'english', 'eset', 'español', 'even', 'example', 'executable', 'execute', 'executing', 'execution', 'expert', 'extract', 'extracted', 'facebook', 'fact', 'family', 'file', 'find', 'first', 'fly', 'follow', 'following', 'forensic', 'form', 'fortune', 'found', 'fraud', 'friend', 'function', 'functionality', 'funny', 'generated', 'generation', 'get', 'getting', 'go', 'google', 'got', 'grabber', 'graph', 'growth', 'hahaha', 'hard', 'hardcoded', 'hardware', 'hash', 'header', 'help', 'hidden', 'high', 'home', 'hot', 'http', 'id', 'idea', 'implemented', 'inbox', 'infected', 'infects', 'information', 'initialization', 'initialized', 'inject', 'injection', 'inside', 'insight', 'install', 'installation', 'installed', 'installexec', 'instead', 'intelligence', 'interested', 'interesting', 'internal', 'investigation', 'ip', 'ir', 'je', 'jmp', 'joke', 'kay', 'keep', 'key', 'kill', 'know', 'language', 'last', 'latest', 'le', 'lead', 'legal', 'legit', 'length', 'like', 'link', 'linkedin', 'list', 'little', 'location', 'login', 'look', 'machine', 'machineguid', 'made', 'magazine', 'main', 'make', 'malicious', 'malware', 'malwaremustdie', 'material', 'matrosov', 'matter', 'memory', 'method', 'middle', 'might', 'module', 'month', 'motivation', 'mov', 'multimedia', 'name', 'named', 'navigation', 'need', 'network', 'new', 'newnym', 'news', 'newsletter', 'next', 'npo', 'ntsetcontextthread', 'null', 'number', 'observed', 'obvious', 'oh', 'old', 'one', 'operation', 'opinion', 'organizing', 'original', 'overhead', 'page', 'panel', 'paper', 'parameter', 'pas', 'password', 'path', 'pattern', 'paypal', 'pe', 'place', 'platform', 'play', 'played', 'playing', 'plugin', 'plugins', 'podcasts', 'point', 'policy', 'popular', 'possible', 'post', 'posted', 'pretty', 'print', 'privacy', 'probably', 'process', 'product', 'program', 'protocol', 'prototype', 'proxy', 'pursue', 'radar', 'ransomware', 'read', 'really', 'reason', 'receiving', 'recognize', 'recognizing', 'reconstruction', 'reddit', 'reduce', 'registered', 'registry', 'related', 'remote', 'representing', 'request', 'research', 'researcher', 'reserved', 'resilient', 'reverse', 'right', 'rise', 'rootkit', 'routine', 'rtldecompressbuffer', 'safe', 'sample', 'save', 'screen', 'search', 'second', 'security', 'seen', 'select', 'send', 'sends', 'server', 'service', 'set', 'setting', 'setup', 'sharing', 'sign', 'signal', 'simple', 'since', 'single', 'site', 'sitemap', 'size', 'skynet', 'slow', 'smiled', 'sniff', 'software', 'someone', 'special', 'stage', 'stamp', 'started', 'starting', 'state', 'status', 'stealer', 'stealing', 'stealth', 'still', 'stored', 'straight', 'strike', 'string', 'struct', 'structure', 'stylesheet', 'subsequent', 'successful', 'summer', 'support', 'supported', 'sure', 'system', 'take', 'takedown', 'team', 'technique', 'terminate', 'terminator', 'text', 'thank', 'therealchx', 'thing', 'thread', 'three', 'time', 'toggle', 'tool', 'topic', 'tor', 'track', 'tracked', 'tracking', 'trend', 'trick', 'tried', 'trojan', 'true', 'try', 'twitter', 'two', 'type', 'unique', 'unsigned', 'update', 'upon', 'us', 'use', 'used', 'useful', 'using', 'value', 'version', 'via', 'video', 'view', 'virtual', 'virus', 'volume', 'wasting', 'way', 'wechseln', 'whatever', 'whats', 'whether', 'white', 'winapi', 'wls', 'wmagic', 'wondering', 'work', 'xor', 'year', 'yet', 'youtube', 'yup', 'zombie', 'zum'] | |
1074 | |
1075 | |
1076 | |
1077 | |
1078 | |
1079 | |
1080 | |
1080 2017-03-01T06:34:07.675000Z https://www.mimecast.com/blog/2009/02/internal-clouds/ | |
1080 2017-03-18T12:38:07.596000Z http://www.mimecast.com/blog/2009/02/internal-clouds/ | |
['abstracted', 'acceptable', 'across', 'add', 'adding', 'additional', 'administative', 'administration', 'administrative', 'advantage', 'africa', 'allows', 'alongside', 'already', 'alternative', 'america', 'analyst', 'another', 'appliance', 'application', 'approach', 'apps', 'archive', 'archiving', 'asia', 'assigned', 'association', 'attack', 'available', 'award', 'away', 'become', 'behind', 'bittman', 'blackberry', 'blackboard', 'blake', 'blog', 'blurred', 'budget', 'build', 'building', 'bundle', 'burden', 'business', 'buy', 'capability', 'career', 'caused', 'center', 'central', 'centre', 'chat', 'chosen', 'cisco', 'classic', 'client', 'close', 'cloud', 'coalition', 'come', 'comment', 'company', 'compared', 'complexity', 'compliance', 'complicated', 'complication', 'computing', 'concentrate', 'concept', 'conference', 'consider', 'constant', 'contact', 'contary', 'content', 'continuity', 'contrasting', 'control', 'converge', 'core', 'cost', 'could', 'customer', 'cyber', 'data', 'dead', 'death', 'defend', 'deminishes', 'demo', 'department', 'deployed', 'deployment', 'design', 'detail', 'detection', 'developing', 'different', 'diligence', 'disclaimer', 'disclosure', 'discussed', 'discussing', 'disqus', 'distracting', 'distribued', 'dlp', 'done', 'due', 'easily', 'east', 'economic', 'email', 'employer', 'employment', 'enable', 'engine', 'environment', 'europe', 'even', 'event', 'every', 'everything', 'exception', 'exchange', 'expecting', 'expert', 'fact', 'factor', 'feedback', 'feel', 'felt', 'file', 'filed', 'fileserver', 'filing', 'fingernail', 'first', 'flexible', 'focused', 'form', 'found', 'fragmented', 'free', 'fully', 'function', 'future', 'gartner', 'get', 'go', 'goal', 'google', 'grid', 'guardian', 'handle', 'happily', 'happy', 'hardware', 'history', 'home', 'however', 'hybrid', 'im', 'immediately', 'increase', 'industry', 'information', 'infrastructure', 'instead', 'interface', 'internal', 'investor', 'iso', 'james', 'javascript', 'keep', 'keeping', 'kind', 'knowledgebase', 'large', 'last', 'layer', 'leadership', 'leading', 'legacy', 'life', 'light', 'like', 'line', 'login', 'long', 'longer', 'lot', 'machine', 'made', 'malware', 'manage', 'managed', 'management', 'managing', 'many', 'mark', 'marketing', 'maybe', 'medium', 'mention', 'mesaging', 'messaging', 'microsoft', 'middle', 'migrate', 'migrating', 'migration', 'mimecast', 'mimecaster', 'mobility', 'model', 'modeled', 'multiple', 'need', 'needed', 'network', 'new', 'news', 'north', 'offer', 'office', 'old', 'ondemand', 'one', 'operation', 'option', 'organisation', 'outsourcing', 'overview', 'pacific', 'parallel', 'partner', 'past', 'patch', 'patching', 'percent', 'perfect', 'personal', 'perspective', 'place', 'platform', 'please', 'point', 'policy', 'post', 'posted', 'powered', 'presentation', 'presenting', 'press', 'privacy', 'private', 'problem', 'product', 'productivity', 'professional', 'program', 'project', 'promising', 'proofpoint', 'protection', 'provider', 'provides', 'public', 'pure', 'quite', 'quote', 'rather', 'ready', 'really', 'receive', 'recent', 'recently', 'recognised', 'reduce', 'register', 'registration', 'related', 'relation', 'release', 'replace', 'replaced', 'replacing', 'reporting', 'required', 'requires', 'reseller', 'resellers', 'reserved', 'resilience', 'resilient', 'resource', 'responsible', 'result', 'right', 'risk', 'role', 'rule', 'running', 'sale', 'saw', 'scalable', 'schedule', 'secure', 'security', 'see', 'send', 'service', 'set', 'several', 'share', 'signature', 'single', 'sitemap', 'six', 'software', 'solution', 'someone', 'south', 'specialist', 'staff', 'started', 'still', 'success', 'support', 'swap', 'swapped', 'swayed', 'system', 'talk', 'talking', 'target', 'targeted', 'team', 'tech', 'technical', 'technology', 'term', 'thing', 'think', 'thomas', 'threat', 'three', 'thrown', 'time', 'titled', 'today', 'took', 'top', 'topic', 'totally', 'traditional', 'training', 'trivial', 'troubled', 'true', 'trust', 'uae', 'unexpected', 'unprepared', 'updating', 'upgrade', 'upgrading', 'use', 'used', 'using', 'utilise', 'value', 'vault', 'vendor', 'view', 'virtual', 'virtualised', 'vm', 'ware', 'way', 'webinars', 'well', 'wish', 'work', 'working', 'world', 'would', 'year', 'yet'] | |
1081 | |
1082 | |
1083 | |
1084 | |
1085 | |
1085 2017-03-04T06:30:43.011000Z https://isc.sans.edu/newssummary.html#1020147 | |
1085 2017-03-05T12:30:53.795000Z http://securityaffairs.co/wordpress/56886/hacking/metasploit-vulnerable-services-emulator.html | |
['available', 'emulate', 'emulator', 'get', 'metasploit', 'new', 'open', 'penetration', 'platform', 'released', 'service', 'source', 'testing', 'tool', 'vulnerable'] | |
1086 | |
1087 | |
1088 | |
1089 | |
1090 | |
1091 | |
1091 2017-03-01T06:33:37.089000Z https://www.mimecast.com/blog/2010/11/honey-theyve-stolen-the-internet-how-a-little-tls-goes-a-long-way-to-keep-your-data-secure/ | |
1091 2017-03-18T12:37:05.840000Z http://www.mimecast.com/blog/2010/11/honey-theyve-stolen-the-internet-how-a-little-tls-goes-a-long-way-to-keep-your-data-secure/ | |
['acceptable', 'across', 'actually', 'address', 'administrator', 'adopted', 'africa', 'albeit', 'allegation', 'already', 'america', 'anirudh', 'apps', 'archive', 'archiving', 'asia', 'assessment', 'attack', 'available', 'award', 'back', 'barry', 'become', 'believe', 'benchmarking', 'bgp', 'black', 'blog', 'bundle', 'captured', 'career', 'causing', 'center', 'central', 'chance', 'chat', 'china', 'claim', 'coalition', 'comment', 'company', 'compliance', 'consternation', 'contact', 'content', 'continuity', 'control', 'costly', 'could', 'coverage', 'create', 'cryptographic', 'customer', 'cyber', 'cybercrime', 'dangerous', 'data', 'dawn', 'day', 'decrypt', 'defend', 'demo', 'denying', 'detail', 'disclaimer', 'disclosure', 'discover', 'discus', 'disqus', 'dlp', 'doubly', 'earliest', 'east', 'effort', 'email', 'enable', 'encrypted', 'encryption', 'ensure', 'error', 'europe', 'event', 'everybody', 'exchange', 'expert', 'expose', 'exposed', 'fact', 'feamster', 'fear', 'feel', 'file', 'filed', 'first', 'geniunly', 'get', 'getting', 'gill', 'giving', 'go', 'google', 'great', 'ha', 'help', 'highlight', 'hijacking', 'home', 'honey', 'huge', 'hybrid', 'im', 'implanted', 'important', 'imposed', 'indiscriminate', 'information', 'infrastructure', 'innocent', 'institution', 'intellectual', 'interactive', 'interested', 'internet', 'investor', 'ip', 'javascript', 'keep', 'know', 'knowledgebase', 'known', 'large', 'layer', 'leadership', 'leaf', 'leak', 'legacy', 'like', 'little', 'lived', 'login', 'london', 'long', 'make', 'malware', 'managed', 'management', 'maximum', 'maybe', 'mesaging', 'message', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'minute', 'mobility', 'much', 'need', 'network', 'never', 'news', 'nick', 'north', 'nothing', 'occurred', 'office', 'old', 'one', 'option', 'order', 'organization', 'overview', 'pacific', 'paper', 'partner', 'party', 'past', 'percent', 'phishing', 'place', 'platform', 'please', 'policy', 'politician', 'post', 'posted', 'potential', 'powered', 'prattle', 'press', 'prevention', 'privacy', 'private', 'problem', 'product', 'productivity', 'professional', 'program', 'property', 'protection', 'public', 'quite', 'quote', 'ramachandran', 'ramification', 'rbl', 'really', 'referenced', 'registration', 'related', 'relation', 'release', 'report', 'requirement', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'ruined', 'sale', 'scale', 'scaremonger', 'schedule', 'secure', 'securing', 'security', 'seeing', 'seen', 'senate', 'send', 'sending', 'sensitive', 'service', 'shape', 'share', 'short', 'signature', 'sitemap', 'smaller', 'solution', 'something', 'south', 'spammer', 'spoke', 'standard', 'stealing', 'still', 'stole', 'stolen', 'stop', 'submit', 'success', 'support', 'system', 'talk', 'target', 'targeted', 'team', 'technical', 'technology', 'term', 'threat', 'time', 'tl', 'today', 'together', 'traffic', 'training', 'transmission', 'transport', 'traverse', 'trust', 'uk', 'understood', 'unprepared', 'unsecured', 'unsurprisingly', 'use', 'useless', 'various', 'view', 'virus', 'wait', 'way', 'webinars', 'website', 'week', 'well', 'whaling', 'whether', 'widely', 'wikipedia', 'window', 'wire', 'without', 'work', 'would', 'writer', 'wrong', 'year', 'yet'] | |
1092 | |
1093 | |
1093 2017-03-17T18:30:54.346000Z https://blog.threatstack.com/how-to-prepare-your-company-culture-for-its-first-security-hire | |
1093 2017-03-22T00:30:55.278000Z https://blog.threatstack.com/how-to-implement-a-security-awareness-program-at-your-organization | |
['able', 'access', 'adoption', 'advanced', 'advisor', 'agenda', 'agent', 'agile', 'ahern', 'alert', 'alerting', 'also', 'alternate', 'amazon', 'analysis', 'announcement', 'anomaly', 'answer', 'anything', 'api', 'apparmor', 'apply', 'approach', 'apps', 'apt', 'aptly', 'architecture', 'arg', 'arlette', 'arm', 'ask', 'assessment', 'atlas', 'attack', 'attribution', 'audit', 'auditd', 'auditing', 'authentication', 'automated', 'automation', 'automobile', 'awareness', 'aws', 'azazel', 'back', 'baldrick', 'bank', 'banking', 'baseline', 'bash', 'basis', 'becomes', 'behavior', 'behavioral', 'best', 'better', 'black', 'blame', 'blind', 'blog', 'board', 'boston', 'botnet', 'brain', 'breach', 'brief', 'bsides', 'budget', 'build', 'builder', 'building', 'business', 'buy', 'call', 'cancer', 'capital', 'capitalist', 'carbon', 'career', 'casb', 'case', 'cassandra', 'cause', 'center', 'centralized', 'ceo', 'chain', 'change', 'channel', 'chat', 'chatops', 'checksfiled', 'chef', 'cheslock', 'chicago', 'chris', 'cia', 'cicada', 'cio', 'circe', 'ciso', 'cloud', 'cloudsecurity', 'cloudtrail', 'collection', 'come', 'communicating', 'company', 'compiler', 'compliance', 'composition', 'conference', 'confidence', 'configuration', 'connection', 'contact', 'container', 'containment', 'content', 'context', 'continuous', 'conversation', 'cooprider', 'copyright', 'corporate', 'cost', 'could', 'council', 'cover', 'create', 'credential', 'crypto', 'csm', 'csp', 'culture', 'customer', 'cyber', 'cybersecurity', 'data', 'day', 'ddos', 'debt', 'dedicated', 'defense', 'deferring', 'deferrment', 'degree', 'delivered', 'demo', 'depending', 'deployment', 'design', 'detection', 'dev', 'develop', 'development', 'device', 'devops', 'devopsdays', 'devopsing', 'devopssec', 'devos', 'devsecops', 'digital', 'docker', 'dod', 'doobie', 'drive', 'ds', 'duo', 'eb', 'ebook', 'editor', 'education', 'efficiency', 'email', 'employee', 'encryption', 'endpoint', 'engaging', 'engineering', 'enhancement', 'ensure', 'enterprise', 'environment', 'error', 'establishing', 'even', 'event', 'every', 'everyone', 'exacom', 'examination', 'example', 'exception', 'experience', 'exploit', 'fa', 'fatigue', 'fbi', 'feature', 'federal', 'feel', 'ferpa', 'ffiec', 'file', 'fim', 'financial', 'finch', 'fintech', 'firewall', 'first', 'flask', 'focus', 'forensics', 'forget', 'foundation', 'framework', 'francisco', 'fraud', 'free', 'function', 'functional', 'funding', 'future', 'game', 'generator', 'get', 'give', 'go', 'goal', 'going', 'good', 'government', 'graduation', 'grinch', 'group', 'guided', 'habitat', 'hack', 'hackathon', 'hacker', 'hacking', 'hadoop', 'hand', 'handling', 'harbor', 'hart', 'hat', 'hawaii', 'hci', 'healthcare', 'help', 'hids', 'high', 'hijack', 'hipaa', 'hire', 'hold', 'home', 'http', 'hybrid', 'iam', 'id', 'idea', 'identity', 'immutable', 'importance', 'important', 'incident', 'increase', 'indicator', 'industry', 'information', 'infosec', 'infrastructure', 'insider', 'inspector', 'instead', 'institution', 'insurance', 'integration', 'integrity', 'intel', 'intelligence', 'intellij', 'interactive', 'internet', 'internship', 'intrusion', 'investigate', 'investigation', 'iot', 'issue', 'jadon', 'javascript', 'job', 'kernel', 'key', 'kill', 'know', 'knowledge', 'knowledgebase', 'language', 'laying', 'lcca', 'ldap', 'leadership', 'learn', 'legal', 'level', 'library', 'link', 'linting', 'linux', 'log', 'logging', 'long', 'loss', 'make', 'management', 'managing', 'mandiant', 'manner', 'many', 'mature', 'maturity', 'mean', 'medium', 'meeting', 'member', 'microservices', 'might', 'mirai', 'mobility', 'mocha', 'model', 'moment', 'monitor', 'monitorama', 'monitoring', 'montero', 'month', 'mttk', 'mttr', 'nagios', 'nathan', 'national', 'need', 'network', 'networking', 'new', 'news', 'next', 'nissan', 'nsm', 'nyc', 'offer', 'often', 'onboarding', 'one', 'ongoing', 'open', 'operating', 'operation', 'operational', 'opm', 'opportunity', 'optimistic', 'optimizing', 'organization', 'others', 'oversight', 'pagerduty', 'parboiled', 'parser', 'part', 'partner', 'password', 'patch', 'pattern', 'pci', 'peg', 'people', 'performance', 'perkins', 'pete', 'phi', 'phishing', 'pigsty', 'pii', 'place', 'plan', 'platform', 'playbook', 'pm', 'pokemon', 'policy', 'populi', 'possible', 'post', 'posture', 'practice', 'prediction', 'prepare', 'press', 'prevent', 'pricing', 'priority', 'privacy', 'pro', 'problem', 'process', 'product', 'production', 'professional', 'profiling', 'program', 'programming', 'protocol', 'provide', 'python', 'quantified', 'question', 'quill', 'rail', 'rds', 'reactjs', 'reality', 'recap', 'receive', 'recent', 'recommend', 'recruiting', 'redux', 'refactoring', 'regular', 'regulatory', 'reinvent', 'release', 'remind', 'reporting', 'representative', 'request', 'requirement', 'requires', 'resolution', 'resource', 'response', 'responsibility', 'right', 'risk', 'roadmap', 'rogue', 'role', 'root', 'rootkit', 'rsa', 'rule', 'rulesets', 'running', 'safe', 'sale', 'san', 'scala', 'scalability', 'scalac', 'scale', 'scalikejdbc', 'scam', 'scan', 'school', 'sdn', 'secdevops', 'secops', 'secopsplaybook', 'secret', 'securely', 'secureworld', 'security', 'securtiy', 'see', 'select', 'self', 'sense', 'series', 'server', 'service', 'setting', 'shadowops', 'share', 'shared', 'shellshock', 'shield', 'show', 'side', 'sight', 'slack', 'smbs', 'snorby', 'soc', 'social', 'software', 'solution', 'someone', 'source', 'specific', 'spend', 'sprout', 'stack', 'star', 'start', 'started', 'startup', 'state', 'stay', 'step', 'story', 'strategy', 'streamline', 'sts', 'subscribe', 'success', 'successful', 'sudoer', 'summit', 'support', 'supression', 'sure', 'survey', 'system', 'tackle', 'tag', 'take', 'team', 'tech', 'technical', 'technology', 'term', 'test', 'testing', 'thing', 'think', 'thinking', 'threat', 'threshold', 'time', 'tip', 'tool', 'top', 'topic', 'tough', 'training', 'trial', 'tweet', 'unique', 'unit', 'university', 'update', 'upgrade', 'upper', 'usability', 'use', 'usenix', 'user', 'ux', 'vector', 'velocity', 'venture', 'veracode', 'verizon', 'veronica', 'via', 'vulnerability', 'want', 'war', 'way', 'web', 'webhook', 'webinar', 'webpack', 'weigh', 'whether', 'whitelisting', 'whitepaper', 'win', 'window', 'workflow', 'workforce', 'workload', 'workshop', 'write', 'written', 'wysopal', 'xconomy', 'year', 'york', 'yubikey'] | |
1094 | |
1095 | |
1096 | |
1096 2017-03-05T00:45:20.056000Z http://thehackernews.com/2011/01/11-websites-hacked-by-team-jmc-h4x0rs.html | |
1096 2017-03-05T00:45:33.622000Z http://thehackernews.com/2011/01/chinese-website-jpspcc-database-owned.html | |
1096 2017-03-05T00:45:39.736000Z http://thehackernews.com/2011/01/chinese-website-dlzdjycom-database.html | |
1096 2017-03-05T00:45:43.286000Z http://thehackernews.com/2010/12/chinese-design-website-database-hacked.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'jmc', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'team', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
1097 | |
1099 | |
1100 | |
1101 | |
1102 | |
1103 | |
1103 2017-03-02T00:30:50.075000Z https://www.grahamcluley.com/come-see-speaking-security-shard-london/ | |
1103 2017-03-02T06:30:48.023000Z https://www.grahamcluley.com/slack-took-five-hours-fix-bug-allowed-hackers-hijack-account/ | |
1103 2017-03-02T12:30:45.138000Z https://www.grahamcluley.com/smashing-security-010-dolls-must-destroyed/ | |
1103 2017-03-16T12:30:50.894000Z https://www.grahamcluley.com/smashing-security-012-eau-de-eugene-kaspersky/ | |
1103 2017-03-30T12:30:50.765000Z https://www.grahamcluley.com/smashing-security-014-protecting-webmail/ | |
['advice', 'also', 'analyst', 'appearance', 'audio', 'author', 'bad', 'brilliant', 'buffer', 'carole', 'check', 'cluley', 'company', 'computer', 'daily', 'dr', 'drop', 'early', 'email', 'episode', 'ever', 'facebook', 'filed', 'first', 'focused', 'follow', 'free', 'fun', 'future', 'gchq', 'gcluley', 'gear', 'give', 'google', 'graham', 'guest', 'independent', 'industry', 'internet', 'itunes', 'latest', 'like', 'linkedin', 'listen', 'live', 'make', 'malware', 'medium', 'might', 'mobile', 'new', 'news', 'newsletter', 'number', 'often', 'online', 'people', 'plus', 'podcast', 'post', 'presentation', 'privacy', 'public', 'recorded', 'reddit', 'regularly', 'security', 'share', 'since', 'smashing', 'solomon', 'subscribe', 'support', 'tag', 'tell', 'theriault', 'threat', 'three', 'toolkit', 'top', 'topic', 'twitter', 'version', 'veteran', 'view', 'web', 'weekly', 'whatsapp', 'window', 'worked', 'wrote'] | |
1104 | |
1105 | |
1106 | |
1107 | |
1107 2017-03-21T12:30:56.138000Z https://www.helpnetsecurity.com/2017/03/21/electronic-devices-ban-airplane-us/ | |
1107 2017-03-22T00:30:57.874000Z https://nakedsecurity.sophos.com/2017/03/21/news-in-brief-carry-on-gadgets-ban-from-some-countries-android-o-preview-lands-hawking-to-space/ | |
1107 2017-03-23T12:31:47.254000Z https://nakedsecurity.sophos.com/2017/03/23/airline-devices-ban-heres-what-you-need-to-know/ | |
['ban', 'cabin', 'device', 'electronic', 'flight'] | |
1111 | |
1111 2017-03-05T00:43:15.348000Z http://thehackernews.com/2011/03/18-websites-hacked-by-minhal-mehdi.html | |
1111 2017-03-05T00:44:07.583000Z http://thehackernews.com/2011/03/3thical-noob-indishell-deface-25.html | |
1111 2017-03-05T00:46:29.830000Z http://thehackernews.com/2010/12/12-websites-hacked-by-g-n00ber.html | |
1111 2017-03-05T00:46:43.117000Z http://thehackernews.com/2010/11/17-more-websites-hacked-by-kill3rmind.html | |
1111 2017-03-05T00:46:45.112000Z http://thehackernews.com/2010/11/15-more-website-hacked-by-kill3rmind.html | |
1111 2017-03-05T00:47:02.370000Z http://thehackernews.com/2010/11/12-websites-hacked-by-cyb3rswati.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
1112 | |
1113 | |
1113 2017-03-05T00:40:44.586000Z http://thehackernews.com/2011/07/0day-unrealircd-32x-all-versions-remote.html | |
1113 2017-03-05T00:40:52.546000Z http://thehackernews.com/2011/07/hellenic-parliament-greek-websites.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'database', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'general', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'parliament', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1114 | |
1115 | |
1115 2017-03-09T18:30:53.780000Z https://www.scmagazine.com/vulnerability-in-apache-struts-active-in-the-wild/article/643033/ | |
1115 2017-03-16T18:31:04.605000Z https://www.scmagazine.com/apache-struts-vulnerability-being-exploited-by-attackers/article/644538/ | |
['acceptance', 'active', 'advertise', 'advisory', 'affected', 'afghanistan', 'africa', 'african', 'albania', 'algeria', 'american', 'andorra', 'angola', 'anguilla', 'antarctica', 'antigua', 'antilles', 'apache', 'arab', 'arabia', 'archive', 'argentina', 'arm', 'armenia', 'article', 'aruba', 'attack', 'australia', 'austria', 'authorization', 'award', 'azerbaijan', 'bahamas', 'bahrain', 'bangladesh', 'bar', 'barbados', 'barbuda', 'belarus', 'belgium', 'belize', 'benin', 'bermuda', 'bhutan', 'blog', 'board', 'bolivia', 'bosnia', 'botswana', 'bouvet', 'brazil', 'breach', 'british', 'broadcast', 'brunei', 'bulgaria', 'burkina', 'burundi', 'business', 'buzz', 'caicos', 'caledonia', 'cambodia', 'cameroon', 'canada', 'cape', 'cayman', 'center', 'central', 'chad', 'challenge', 'chile', 'china', 'christmas', 'city', 'click', 'cloud', 'coco', 'code', 'colombia', 'comment', 'comoros', 'compliance', 'condition', 'conference', 'congo', 'constitutes', 'contact', 'cook', 'copyright', 'costa', 'countless', 'croatia', 'cuba', 'cybercrime', 'cybersecurity', 'cyprus', 'czech', 'côte', 'darussalam', 'data', 'day', 'delivered', 'denmark', 'depth', 'different', 'djibouti', 'dominica', 'dominican', 'doug', 'drc', 'ecuador', 'egypt', 'el', 'email', 'emirate', 'equatorial', 'eritrea', 'establish', 'estonia', 'ethiopia', 'event', 'example', 'exploited', 'face', 'fact', 'falkland', 'faq', 'faroe', 'faso', 'fast', 'feature', 'featured', 'fiji', 'finland', 'first', 'follow', 'form', 'france', 'french', 'futuna', 'gabon', 'gambia', 'georgia', 'germany', 'get', 'ghana', 'gibraltar', 'greece', 'greenland', 'grenada', 'grenadine', 'group', 'guadeloupe', 'guam', 'guatemala', 'guiana', 'guinea', 'guyana', 'haiti', 'haymarket', 'heard', 'helena', 'herzegovina', 'high', 'hit', 'honduras', 'hong', 'hungary', 'iceland', 'inbox', 'india', 'indian', 'indonesia', 'information', 'insider', 'iot', 'iran', 'iraq', 'ireland', 'island', 'israel', 'italy', 'jakarta', 'jamaica', 'japan', 'jordan', 'kazakhstan', 'keeling', 'kenya', 'kingdom', 'kiribati', 'kitts', 'kong', 'korea', 'kuwait', 'kyrgyzstan', 'lanka', 'lao', 'latvia', 'lebanon', 'leone', 'lesotho', 'liberia', 'library', 'libya', 'liechtenstein', 'like', 'lithuania', 'log', 'login', 'look', 'lucia', 'luxembourg', 'macao', 'macedonia', 'madagascar', 'magazine', 'malawi', 'malaysia', 'maldives', 'mali', 'malta', 'malvinas', 'malware', 'management', 'mariana', 'marino', 'marshall', 'martin', 'martinique', 'material', 'mauritania', 'mauritius', 'mayen', 'mayotte', 'mcdonald', 'medium', 'meet', 'member', 'menu', 'mexico', 'micronesia', 'microsoft', 'miquelon', 'mobile', 'moldova', 'monaco', 'mongolia', 'montenegro', 'montserrat', 'morocco', 'mozambique', 'multipart', 'must', 'myanmar', 'namibia', 'nauru', 'need', 'nepal', 'netherlands', 'network', 'nevis', 'new', 'news', 'newswire', 'nicaragua', 'niger', 'nigeria', 'niue', 'norfolk', 'north', 'northern', 'norway', 'number', 'ny', 'observed', 'ocean', 'olenick', 'oman', 'online', 'open', 'opinion', 'overall', 'pakistan', 'palau', 'panama', 'paper', 'papua', 'paraguay', 'parser', 'patch', 'peru', 'philippine', 'phishing', 'pierre', 'pitcairn', 'poland', 'policy', 'polynesia', 'portugal', 'possible', 'post', 'posture', 'press', 'principe', 'prior', 'privacy', 'product', 'professional', 'published', 'puerto', 'qatar', 'ransomware', 'read', 'reboot', 'receive', 'recommends', 'redistributed', 'register', 'registered', 'related', 'release', 'relevant', 'reprint', 'republic', 'reserved', 'resource', 'reunion', 'review', 'rewritten', 'rica', 'rico', 'right', 'risk', 'risksec', 'romania', 'rsa', 'russia', 'rwanda', 'saint', 'salvador', 'samoa', 'san', 'sao', 'saudi', 'sc', 'search', 'security', 'senegal', 'seychelles', 'show', 'sierra', 'singapore', 'site', 'slovakia', 'slovenia', 'software', 'solomon', 'somalia', 'source', 'south', 'southern', 'spain', 'sri', 'state', 'strategy', 'strut', 'subscribe', 'sudan', 'suriname', 'svalbard', 'swaziland', 'sweden', 'switzerland', 'syria', 'tackle', 'taiwan', 'tajikistan', 'tanzania', 'team', 'technical', 'term', 'territory', 'test', 'thailand', 'threat', 'tobago', 'togo', 'tokelau', 'tome', 'tonga', 'topic', 'toronto', 'trinidad', 'tunisia', 'turk', 'turkey', 'turkmenistan', 'tuvalu', 'uganda', 'uk', 'ukraine', 'unbiased', 'underpin', 'united', 'upgrade', 'uruguay', 'use', 'user', 'uzbekistan', 'vanuatu', 'vatican', 'venezuela', 'verde', 'version', 'via', 'video', 'vietnam', 'vincent', 'virgin', 'virtual', 'vulnerability', 'wallis', 'webcasts', 'website', 'western', 'white', 'whitepaper', 'whitepapers', 'wild', 'without', 'would', 'yemen', 'yugoslavia', 'zambia', 'zealand', 'zimbabwe'] | |
1116 | |
1116 2017-03-09T18:30:44.758000Z http://darkreading.com/perimeter/securing-todays-elastic-attack-surface/a/d-id/1328355 | |
1116 2017-03-20T12:30:53.756000Z https://www.tenable.com/blog/2017-time-to-shake-up-your-understanding-of-risk | |
['address', 'also', 'amit', 'application', 'approach', 'ass', 'asset', 'attack', 'based', 'become', 'better', 'breach', 'build', 'business', 'byod', 'ceo', 'challenge', 'change', 'cisos', 'cloud', 'company', 'conference', 'confidence', 'container', 'critical', 'customer', 'cybersecurity', 'daily', 'devops', 'difficult', 'elastic', 'embrace', 'enterprise', 'environment', 'evolving', 'exposed', 'exposure', 'foundation', 'give', 'help', 'increase', 'infrastructure', 'iot', 'job', 'look', 'lot', 'manage', 'managing', 'must', 'need', 'never', 'new', 'next', 'one', 'organization', 'partner', 'program', 'question', 'report', 'rise', 'risk', 'security', 'simple', 'solution', 'still', 'strategic', 'surface', 'system', 'team', 'technology', 'tenable', 'time', 'today', 'traditional', 'true', 'understand', 'understanding', 'unlimited', 'use', 'view', 'visibility', 'vulnerability', 'want', 'way', 'web', 'yoran'] | |
1117 | |
1117 2017-03-18T06:31:03.658000Z http://www.welivesecurity.com/2015/02/13/medical-data-theft-fraud-ehr/ | |
1117 2017-03-27T12:32:15.206000Z https://www.welivesecurity.com/2015/02/13/medical-data-theft-fraud-ehr/ | |
['abuse', 'access', 'account', 'activity', 'actually', 'address', 'also', 'always', 'announcement', 'another', 'answer', 'anthem', 'app', 'appealing', 'around', 'assume', 'attack', 'attacker', 'attempt', 'audience', 'authentication', 'author', 'bad', 'badness', 'basic', 'beachhead', 'becomes', 'bidder', 'big', 'black', 'blamed', 'breach', 'breached', 'broader', 'buck', 'bulk', 'business', 'buyer', 'cameron', 'camp', 'card', 'carder', 'carefully', 'carry', 'case', 'certainly', 'challenge', 'change', 'clear', 'clue', 'cobb', 'cohesive', 'colleague', 'collection', 'commit', 'committing', 'compromised', 'contain', 'containing', 'corral', 'course', 'created', 'creating', 'credit', 'crook', 'data', 'detail', 'diagram', 'different', 'difficulty', 'digging', 'digital', 'dimension', 'disaster', 'doctor', 'done', 'donor', 'earn', 'earnings', 'easier', 'easily', 'easy', 'ecosystem', 'ehr', 'ehrs', 'electronic', 'elevated', 'email', 'enables', 'encryption', 'endpoint', 'engage', 'enough', 'entity', 'environment', 'eset', 'established', 'even', 'example', 'facility', 'fairly', 'fake', 'fat', 'filing', 'financial', 'firm', 'focus', 'folk', 'form', 'forum', 'fraud', 'fraudulent', 'fresh', 'friend', 'full', 'gain', 'gathering', 'general', 'generic', 'get', 'go', 'grab', 'grabbing', 'guy', 'hacking', 'handle', 'happens', 'harvest', 'haul', 'health', 'healthcare', 'healthy', 'heel', 'help', 'history', 'however', 'id', 'identity', 'illegal', 'imagine', 'impact', 'implication', 'implies', 'imply', 'info', 'information', 'instant', 'insurance', 'intelligence', 'kind', 'knowable', 'larger', 'level', 'leverage', 'license', 'like', 'look', 'lot', 'lower', 'make', 'making', 'managed', 'many', 'market', 'match', 'matching', 'medical', 'might', 'money', 'monitoring', 'much', 'name', 'narrower', 'need', 'needed', 'net', 'network', 'new', 'normally', 'notch', 'nuance', 'number', 'obviously', 'one', 'ongoing', 'online', 'open', 'opening', 'opinion', 'option', 'organization', 'osint', 'otherwise', 'page', 'partial', 'party', 'patient', 'payment', 'phone', 'physically', 'pinpointed', 'pivoting', 'plus', 'point', 'posted', 'potential', 'prefer', 'pretty', 'primarily', 'print', 'procedure', 'proliferation', 'property', 'protection', 'provider', 'question', 'really', 'receiving', 'recent', 'record', 'recovery', 'refund', 'related', 'relationship', 'reliable', 'repackaging', 'resale', 'return', 'roughly', 'rub', 'sane', 'say', 'scammer', 'scary', 'scope', 'security', 'segment', 'segmentation', 'sell', 'selling', 'sensitive', 'service', 'several', 'sick', 'significantly', 'similar', 'smaller', 'smart', 'social', 'somehow', 'source', 'sourced', 'spammer', 'specialized', 'specific', 'sprawl', 'spread', 'stephen', 'still', 'stolen', 'strength', 'strong', 'subset', 'surface', 'swipe', 'system', 'take', 'taking', 'tapped', 'target', 'targeted', 'tax', 'theft', 'thereby', 'thief', 'thing', 'third', 'though', 'threatscape', 'tool', 'treatment', 'trove', 'trust', 'turn', 'type', 'understand', 'underwent', 'underworld', 'universal', 'use', 'various', 'versus', 'vigilant', 'visualize', 'want', 'well', 'whats', 'wherever', 'whether', 'whose', 'wider', 'willing', 'within', 'without', 'wonderful', 'would'] | |
1119 | |
1120 | |
1121 | |
1122 | |
1122 2017-03-03T18:31:01.024000Z http://www.welivesecurity.com/2016/01/03/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry/ | |
1122 2017-03-07T12:30:55.385000Z http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/ | |
['able', 'activated', 'add', 'additional', 'address', 'al', 'already', 'also', 'analysis', 'android', 'another', 'anton', 'apart', 'app', 'appeared', 'appears', 'archive', 'around', 'article', 'asem', 'attack', 'attacked', 'attacker', 'author', 'avalanche', 'backdoor', 'banking', 'belong', 'biggest', 'blackenergy', 'blame', 'blog', 'bulletin', 'called', 'campaign', 'car', 'case', 'cherepanov', 'child', 'claim', 'code', 'community', 'company', 'component', 'compromise', 'computer', 'conference', 'connected', 'connector', 'contact', 'contain', 'contains', 'control', 'copyright', 'cybercrime', 'cybercriminals', 'data', 'de', 'delay', 'delete', 'deliver', 'described', 'destroyed', 'destructive', 'detail', 'detected', 'deutsch', 'direct', 'discovered', 'distribution', 'div', 'dns', 'document', 'dstr', 'election', 'electric', 'electricity', 'eltima', 'email', 'embed', 'en', 'energy', 'english', 'eset', 'español', 'ethernet', 'event', 'example', 'executable', 'expert', 'facebook', 'fake', 'family', 'file', 'first', 'follow', 'found', 'friend', 'functionality', 'furthermore', 'go', 'good', 'group', 'hacking', 'home', 'hot', 'however', 'http', 'ic', 'inbox', 'incident', 'indicator', 'industrial', 'industry', 'infected', 'infection', 'information', 'insight', 'instance', 'intended', 'interested', 'internet', 'ir', 'killdisk', 'language', 'large', 'latest', 'legal', 'link', 'linkedin', 'lite', 'local', 'macro', 'magazine', 'major', 'make', 'malicious', 'malware', 'material', 'mean', 'mechanism', 'medium', 'might', 'month', 'multimedia', 'navigation', 'new', 'news', 'newsletter', 'number', 'one', 'online', 'operator', 'opinion', 'order', 'overwrite', 'page', 'paper', 'payload', 'picture', 'platform', 'plugin', 'podcasts', 'policy', 'popular', 'post', 'posted', 'power', 'powerpoint', 'previously', 'print', 'privacy', 'process', 'provide', 'purpose', 'radar', 'random', 'ransomware', 'read', 'reason', 'recently', 'regular', 'related', 'remote', 'report', 'research', 'reserved', 'result', 'right', 'rtm', 'run', 'sabotage', 'safety', 'search', 'second', 'security', 'select', 'serial', 'set', 'sign', 'site', 'sitemap', 'situation', 'smartphones', 'software', 'specific', 'specifically', 'ssh', 'stealthy', 'strategy', 'strike', 'stylesheet', 'system', 'talk', 'target', 'targeted', 'targeting', 'terminate', 'text', 'time', 'toggle', 'topic', 'trojan', 'try', 'twitter', 'two', 'typical', 'ubiquity', 'uk', 'ukraine', 'ukrainian', 'unbootable', 'unique', 'update', 'use', 'used', 'variant', 'various', 'video', 'view', 'virus', 'wechseln', 'well', 'whats', 'white', 'wls', 'year', 'youtube', 'zum'] | |
1123 | |
1124 | |
1125 | |
1125 2017-03-14T06:30:53.911000Z https://krebsonsecurity.com/2017/03/if-your-iphone-is-stolen-these-guys-may-try-to-iphish-you/ | |
1125 2017-03-23T12:31:50.242000Z http://securityaffairs.co/wordpress/57360/cyber-crime/turkish-crime-family-iphone-wipe.html | |
1125 2017-03-24T00:30:52.071000Z https://isc.sans.edu/newssummary.html#1023285 | |
1125 2017-03-28T12:30:55.640000Z http://csoonline.com/article/3185704/security/ignore-that-call-from-apple-about-an-icloud-breach.html | |
1125 2017-03-29T12:30:52.695000Z http://thehackernews.com/2017/03/apple-extortion-icloud-hack.html | |
['account', 'apple', 'group', 'icloud'] | |
1127 | |
1127 2017-03-22T00:30:51.187000Z http://blog.checkpoint.com/2017/03/20/get-off-private-cloud/ | |
1127 2017-03-30T00:31:00.423000Z https://blog.checkpoint.com/2017/03/20/get-off-private-cloud/ | |
['ability', 'able', 'access', 'across', 'adapt', 'added', 'address', 'adjust', 'admins', 'adopted', 'advanced', 'agile', 'agility', 'aka', 'alarming', 'allow', 'allowed', 'also', 'altogether', 'another', 'anymore', 'application', 'applying', 'approach', 'appropriate', 'apps', 'arsenal', 'asset', 'attack', 'attacker', 'attempting', 'augment', 'automate', 'automated', 'automatically', 'automating', 'automation', 'available', 'bad', 'becomes', 'benefit', 'better', 'blind', 'blistering', 'blog', 'bottleneck', 'boundary', 'brake', 'bring', 'business', 'center', 'challenge', 'change', 'changing', 'check', 'cloud', 'communicate', 'communication', 'company', 'compared', 'completely', 'complex', 'compounding', 'comprehensive', 'compute', 'constant', 'continues', 'contract', 'control', 'cost', 'creates', 'creating', 'critical', 'cross', 'crossing', 'customer', 'cybercriminals', 'data', 'datacenter', 'define', 'deliver', 'demand', 'deploy', 'deployed', 'deployment', 'development', 'devops', 'dictate', 'discloses', 'discreetly', 'disrupt', 'dissolve', 'divide', 'domain', 'donald', 'dramatic', 'dramatically', 'drive', 'driving', 'dynamic', 'effective', 'efficiency', 'efficient', 'elastic', 'elasticity', 'enabled', 'encapsulated', 'endpoint', 'engine', 'enjoying', 'ensure', 'enterprise', 'entry', 'environment', 'era', 'essential', 'even', 'ever', 'example', 'existing', 'exists', 'exit', 'expertise', 'exploit', 'expose', 'face', 'fact', 'feature', 'fixed', 'flex', 'flexibility', 'fond', 'found', 'four', 'freely', 'fully', 'function', 'gap', 'gas', 'get', 'getting', 'giving', 'greater', 'group', 'grouping', 'growing', 'growth', 'guy', 'hacker', 'handle', 'handy', 'head', 'heavier', 'help', 'home', 'however', 'http', 'hybrid', 'inadvertently', 'incorporates', 'increased', 'infect', 'information', 'infrastructure', 'inherently', 'inside', 'insight', 'inspect', 'insurmountable', 'integrate', 'internal', 'intervention', 'introduce', 'involves', 'jagger', 'keep', 'keeping', 'knowledge', 'lateral', 'laterally', 'like', 'limiting', 'link', 'list', 'load', 'logical', 'logically', 'longer', 'machine', 'main', 'make', 'malicious', 'manageable', 'management', 'manual', 'manually', 'marketing', 'mean', 'measure', 'meyer', 'mick', 'migrating', 'migration', 'model', 'move', 'movement', 'moving', 'multiple', 'must', 'necessary', 'need', 'neglected', 'network', 'new', 'next', 'notion', 'often', 'one', 'onto', 'operational', 'operationally', 'orchestration', 'order', 'organization', 'overhead', 'pace', 'part', 'pathway', 'physical', 'place', 'point', 'policy', 'popular', 'post', 'posted', 'potentially', 'premise', 'prevention', 'previous', 'primarily', 'private', 'process', 'production', 'proper', 'protect', 'protected', 'protection', 'provide', 'provider', 'provisioning', 'public', 'rage', 'rapid', 'rapidly', 'really', 'recent', 'reduced', 'reflected', 'remarkably', 'reported', 'requires', 'requiring', 'resource', 'responsibility', 'responsiveness', 'resulting', 'right', 'rightscale', 'risk', 'roll', 'route', 'running', 'safe', 'safeguard', 'saving', 'saying', 'scalability', 'scale', 'secure', 'security', 'segment', 'segmentation', 'sensitive', 'server', 'service', 'set', 'shared', 'short', 'similarly', 'since', 'slowing', 'smaller', 'solution', 'sophisticated', 'specific', 'spot', 'static', 'steal', 'still', 'strategy', 'strong', 'successful', 'sufficient', 'supply', 'survey', 'surveyed', 'swearing', 'system', 'tag', 'target', 'team', 'technique', 'technology', 'telling', 'testing', 'therefore', 'threat', 'thus', 'tool', 'topology', 'touch', 'traditional', 'traditionally', 'traffic', 'transform', 'travel', 'trend', 'trojan', 'tuned', 'tunnel', 'ultimately', 'unable', 'understand', 'usage', 'use', 'ushered', 'utilize', 'variety', 'vector', 'viewing', 'virtual', 'virtualization', 'virtualized', 'visibility', 'vital', 'vulnerability', 'way', 'weakest', 'well', 'within', 'without', 'work', 'workload', 'xaas'] | |
1128 | |
1129 | |
1129 2017-03-06T18:30:56.548000Z https://securityintelligence.com/closing-cloud-security-gaps-at-every-step-of-the-migration-process/ | |
1129 2017-03-08T12:30:50.956000Z https://securityintelligence.com/hybrid-cloud-adoption-the-logical-next-step-toward-innovation-and-modernization/ | |
['access', 'accessibility', 'additionally', 'address', 'adoption', 'along', 'also', 'analysis', 'application', 'article', 'associated', 'audit', 'author', 'avoid', 'become', 'brought', 'business', 'case', 'center', 'closing', 'cloud', 'company', 'compliance', 'contact', 'contributor', 'cost', 'customer', 'data', 'ensure', 'enterprise', 'evaluating', 'event', 'every', 'example', 'existing', 'expand', 'experience', 'expressed', 'facebook', 'featured', 'field', 'finish', 'first', 'follow', 'future', 'gap', 'get', 'home', 'however', 'ibm', 'incident', 'include', 'industry', 'information', 'insight', 'intelligence', 'internet', 'iot', 'key', 'leader', 'leading', 'lengthy', 'line', 'linkedin', 'look', 'make', 'manage', 'management', 'many', 'medium', 'migrating', 'migration', 'model', 'must', 'navigation', 'necessarily', 'new', 'news', 'official', 'opinion', 'perform', 'pit', 'policy', 'position', 'post', 'practice', 'present', 'privacy', 'process', 'professional', 'protection', 'provider', 'quora', 'read', 'reflect', 'regulation', 'related', 'remotely', 'research', 'response', 'risk', 'road', 'search', 'secure', 'security', 'see', 'sensitive', 'service', 'share', 'slideshare', 'step', 'stop', 'strategy', 'subscribe', 'sure', 'system', 'tag', 'take', 'team', 'technical', 'technology', 'term', 'testing', 'thing', 'thinkstock', 'toggle', 'topic', 'twitter', 'use', 'user', 'vendor', 'view', 'virtual', 'webinars', 'year', 'youtube'] | |
1130 | |
1131 | |
1132 | |
1133 | |
1134 | |
1135 | |
1137 | |
1138 | |
1140 | |
1141 | |
1142 | |
1142 2017-03-02T18:30:59.775000Z https://isc.sans.edu/newssummary.html#1019903 | |
1142 2017-03-11T00:30:56.342000Z https://isc.sans.edu/newssummary.html#1021255 | |
1142 2017-03-13T12:30:48.800000Z https://isc.sans.edu/newssummary.html#1021447 | |
1142 2017-03-13T12:30:52.432000Z https://isc.sans.edu/newssummary.html#1021379 | |
1142 2017-03-13T12:30:53.325000Z https://isc.sans.edu/newssummary.html#1021381 | |
1142 2017-03-13T18:30:50.961000Z https://isc.sans.edu/newssummary.html#1021483 | |
1142 2017-03-13T18:30:53.396000Z https://isc.sans.edu/newssummary.html#1021491 | |
1142 2017-03-13T18:30:54.791000Z https://isc.sans.edu/newssummary.html#1021521 | |
1142 2017-03-21T18:31:01.484000Z https://isc.sans.edu/newssummary.html#1022883 | |
1142 2017-03-21T18:31:05.955000Z https://isc.sans.edu/newssummary.html#1022933 | |
1142 2017-03-23T00:30:52.534000Z https://isc.sans.edu/newssummary.html#1023123 | |
1142 2017-03-24T12:33:49.618000Z https://isc.sans.edu/newssummary.html#1023363 | |
1142 2017-03-28T12:30:58.881000Z https://isc.sans.edu/newssummary.html#1023799 | |
['ago', 'hour', 'synopsis', 'view'] | |
1143 | |
1144 | |
1145 | |
1146 | |
1147 | |
1149 | |
1149 2017-03-09T18:30:47.044000Z https://f5.com/about-us/blog/articles/turns-out-sdn-is-not-dead-yet-24785 | |
1149 2017-03-16T12:30:47.585000Z http://packetpushers.net/simplified-approach-sdn-network-disaggregation/ | |
['abstraction', 'answer', 'ask', 'automation', 'back', 'become', 'big', 'buy', 'certainly', 'component', 'cost', 'deployment', 'either', 'flexibility', 'flexible', 'folk', 'four', 'got', 'high', 'hybrid', 'inevitable', 'information', 'know', 'least', 'like', 'likely', 'load', 'make', 'management', 'many', 'much', 'need', 'network', 'one', 'option', 'orchestration', 'part', 'people', 'point', 'possible', 'pro', 'product', 'programmable', 'provide', 'reason', 'requirement', 'requires', 'resulting', 'right', 'sdn', 'see', 'seem', 'service', 'set', 'side', 'solution', 'something', 'still', 'support', 'term', 'thing', 'think', 'today', 'topic', 'traditional', 'two', 'type', 'value', 'way', 'whether', 'without'] | |
1150 | |
1151 | |
1151 2017-03-03T00:31:30.652000Z http://www.welivesecurity.com/2011/06/06/sony-usa-has-an-opening-for-a-senior-network-administrator/ | |
1151 2017-03-07T12:31:12.652000Z http://www.welivesecurity.com/2011/06/08/sony-says-personally-identifiable-information-might-have-been-stolen/ | |
['abrams', 'add', 'administrator', 'aftermath', 'al', 'also', 'america', 'analysis', 'android', 'anonymous', 'app', 'archive', 'article', 'associated', 'attack', 'author', 'better', 'blog', 'breach', 'breached', 'center', 'child', 'clearly', 'code', 'community', 'conference', 'confirmed', 'consumer', 'contact', 'copyright', 'cyber', 'cybercriminals', 'data', 'de', 'deutsch', 'direct', 'director', 'div', 'dns', 'education', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'facebook', 'fake', 'firewire', 'follow', 'friend', 'go', 'hacktivism', 'home', 'hot', 'http', 'identifiable', 'inbox', 'information', 'insight', 'interested', 'internet', 'ir', 'language', 'latest', 'legal', 'link', 'linkedin', 'magazine', 'major', 'man', 'material', 'megaupload', 'might', 'month', 'multimedia', 'name', 'navigation', 'network', 'news', 'newsletter', 'nice', 'north', 'obviously', 'online', 'opening', 'opinion', 'page', 'pair', 'paper', 'password', 'personally', 'picture', 'plain', 'podcasts', 'policy', 'popular', 'post', 'posted', 'press', 'print', 'privacy', 'property', 'published', 'radar', 'randy', 'ransomware', 'read', 'reason', 'related', 'research', 'reserved', 'right', 'safety', 'say', 'search', 'secure', 'security', 'select', 'senior', 'sign', 'significant', 'site', 'sitemap', 'smartphones', 'smoke', 'sony', 'stolen', 'strategy', 'stylesheet', 'target', 'technical', 'threat', 'toggle', 'topic', 'try', 'twitter', 'ugly', 'uk', 'usa', 'user', 'victim', 'video', 'view', 'virus', 'wechseln', 'whats', 'white', 'wls', 'youtube', 'zum'] | |
1152 | |
1154 | |
1155 | |
1155 2017-03-25T06:31:45.529000Z http://www.welivesecurity.com/2009/07/02/beware-of-independence-day-scams/ | |
1155 2017-03-27T12:34:11.741000Z https://www.welivesecurity.com/2009/07/02/beware-of-independence-day-scams/ | |
['abta', 'active', 'add', 'al', 'allow', 'also', 'android', 'antivirus', 'app', 'appear', 'apple', 'archive', 'around', 'article', 'author', 'behind', 'believe', 'beware', 'blog', 'botnet', 'breach', 'bureau', 'calvet', 'campaign', 'car', 'cert', 'christmas', 'cia', 'code', 'come', 'command', 'community', 'compromised', 'computer', 'conference', 'connected', 'consumer', 'contact', 'controller', 'copy', 'copyright', 'criminal', 'currently', 'cybersecurity', 'dangerous', 'data', 'day', 'de', 'detecting', 'detection', 'deutsch', 'direct', 'directed', 'div', 'domain', 'done', 'download', 'easily', 'easy', 'ecole', 'economics', 'effort', 'email', 'embed', 'en', 'end', 'english', 'eset', 'español', 'estimate', 'even', 'event', 'experience', 'expert', 'exploit', 'exploited', 'facebook', 'family', 'firework', 'follow', 'fresh', 'friend', 'general', 'go', 'google', 'hackable', 'handful', 'heart', 'help', 'hole', 'holiday', 'home', 'hot', 'http', 'implant', 'inbox', 'increase', 'independence', 'infamous', 'infected', 'information', 'insight', 'intelligence', 'interested', 'ir', 'joan', 'knobloch', 'know', 'known', 'language', 'latest', 'least', 'legal', 'like', 'link', 'linkedin', 'low', 'magazine', 'main', 'malicious', 'malware', 'material', 'method', 'might', 'minecraft', 'mod', 'month', 'montreal', 'multimedia', 'name', 'navigation', 'netgear', 'network', 'new', 'newest', 'news', 'newsletter', 'objective', 'operation', 'opinion', 'order', 'page', 'paper', 'patch', 'play', 'podcasts', 'policy', 'polytechnique', 'popular', 'post', 'posted', 'prepared', 'preparing', 'print', 'privacy', 'product', 'quite', 'radar', 'randy', 'ransomware', 'read', 'reality', 'receive', 'regard', 'registered', 'related', 'reliable', 'reminded', 'research', 'researcher', 'reserved', 'revealed', 'right', 'router', 'safer', 'scam', 'scare', 'search', 'security', 'select', 'send', 'sending', 'senior', 'sign', 'similar', 'since', 'site', 'sitemap', 'six', 'size', 'someone', 'spam', 'special', 'spread', 'start', 'steal', 'still', 'storm', 'stylesheet', 'supposed', 'ten', 'thanks', 'theme', 'thousand', 'threat', 'toggle', 'topic', 'twitter', 'undecided', 'underwhelmed', 'unsolicited', 'upcoming', 'upgrade', 'urged', 'us', 'use', 'used', 'variant', 'version', 'video', 'view', 'virus', 'waledac', 'warns', 'way', 'webmaster', 'wechseln', 'well', 'whats', 'white', 'wikileaks', 'wls', 'wordpress', 'worm', 'youtube', 'zum'] | |
1156 | |
1158 | |
1160 | |
1160 2017-03-16T00:30:39.779000Z http://thehackernews.com/2017/03/yahoo-russian-hacker.html | |
1160 2017-03-16T00:30:42.818000Z http://darkreading.com/endpoint/doj-indicts-russian-fsb-officers-and-cybercriminals-in-yahoo-breach/d/d-id/1328412 | |
1160 2017-03-16T06:30:48.143000Z https://krebsonsecurity.com/2017/03/four-men-charged-with-hacking-500m-yahoo-accounts/ | |
1160 2017-03-16T12:30:58.268000Z http://securityaffairs.co/wordpress/57171/cyber-crime/2014-yahoo-data-breach.html | |
1160 2017-03-16T18:30:56.111000Z https://hotforsecurity.bitdefender.com/blog/two-russian-fsb-agents-charged-with-hiring-hackers-to-breach-yahoo-17808.html | |
1160 2017-03-17T18:30:59.573000Z https://digitalguardian.com/blog/friday-five-3/17-edition | |
1160 2017-03-21T00:31:11.458000Z https://securityledger.com/2017/03/podcast-what-does-the-yahoo-indictment-tell-us-about-russian-state-hacking/ | |
['charged', 'data', 'department', 'indictment', 'information', 'intelligence', 'justice', 'million', 'official', 'one', 'russia', 'russian', 'security', 'two', 'yahoo'] | |
1161 | |
1163 | |
1164 | |
1164 2017-03-01T18:30:45.568000Z https://www.scmagazine.com/1000-redmond-ore-school-district-workers-affected-by-w-2-breach/article/641046/ | |
1164 2017-03-21T18:30:53.758000Z https://www.scmagazine.com/w-2-phishing-scam-scourge-continues-hitting-powhatan-county-va-schools/article/645468/ | |
['acceptance', 'address', 'advertise', 'advisory', 'affected', 'afghanistan', 'africa', 'african', 'albania', 'algeria', 'amalgamated', 'american', 'andorra', 'angola', 'anguilla', 'antarctica', 'antigua', 'antilles', 'apologize', 'arab', 'arabia', 'archive', 'argentina', 'arm', 'armenia', 'article', 'aruba', 'attended', 'australia', 'austria', 'authorization', 'award', 'azerbaijan', 'bahamas', 'bahrain', 'bangladesh', 'bar', 'barbados', 'barbuda', 'belarus', 'belgium', 'belize', 'benin', 'bermuda', 'bhutan', 'blog', 'board', 'bolivia', 'bosnia', 'botswana', 'bouvet', 'brazil', 'breach', 'british', 'broadcast', 'brunei', 'bulgaria', 'bulletin', 'burkina', 'burundi', 'business', 'buzz', 'caicos', 'caledonia', 'cambodia', 'cameroon', 'canada', 'cape', 'cayman', 'center', 'central', 'chad', 'challenge', 'child', 'chile', 'china', 'christmas', 'city', 'click', 'cloud', 'cmp', 'coco', 'colombia', 'comment', 'community', 'comoros', 'compliance', 'compromised', 'computer', 'condition', 'conference', 'congo', 'constitutes', 'consumer', 'contact', 'cook', 'copyright', 'costa', 'could', 'countless', 'covered', 'credit', 'croatia', 'cuba', 'cybercrime', 'cybersecurity', 'cyprus', 'czech', 'côte', 'darussalam', 'data', 'day', 'delivered', 'denmark', 'depth', 'district', 'djibouti', 'dominica', 'dominican', 'doug', 'drc', 'ecuador', 'editor', 'egypt', 'el', 'electronic', 'electronics', 'email', 'emirate', 'employee', 'equatorial', 'eritrea', 'establish', 'estonia', 'ethiopia', 'event', 'exposed', 'face', 'fact', 'falkland', 'faq', 'faroe', 'faso', 'fast', 'feature', 'featured', 'fell', 'fiji', 'file', 'finland', 'first', 'follow', 'form', 'found', 'france', 'french', 'futuna', 'gabon', 'gambia', 'georgia', 'germany', 'get', 'ghana', 'gibraltar', 'government', 'greece', 'greenland', 'greg', 'grenada', 'grenadine', 'group', 'guadeloupe', 'guam', 'guatemala', 'guiana', 'guinea', 'guyana', 'haiti', 'happened', 'haymarket', 'head', 'heard', 'helena', 'herzegovina', 'honduras', 'hong', 'hundred', 'hungary', 'iceland', 'inbox', 'india', 'indian', 'indonesia', 'industry', 'information', 'insider', 'iot', 'iran', 'iraq', 'ireland', 'island', 'israel', 'italy', 'jamaica', 'japan', 'joined', 'jordan', 'kazakhstan', 'keeling', 'kenya', 'kingdom', 'kiribati', 'kitts', 'kong', 'korea', 'kuwait', 'kyrgyzstan', 'lanka', 'lao', 'latvia', 'leaked', 'lebanon', 'leone', 'lesotho', 'letter', 'liberia', 'library', 'libya', 'liechtenstein', 'like', 'lithuania', 'local', 'log', 'login', 'long', 'longest', 'look', 'lucia', 'luxembourg', 'macao', 'macedonia', 'madagascar', 'magazine', 'mainstreet', 'malawi', 'malaysia', 'maldives', 'mali', 'malta', 'malvinas', 'malware', 'management', 'many', 'mariana', 'marino', 'marshall', 'martin', 'martinique', 'martinsville', 'master', 'material', 'mauritania', 'mauritius', 'mayen', 'mayotte', 'mcdonald', 'medium', 'meet', 'member', 'menu', 'mexico', 'micronesia', 'miquelon', 'mobile', 'moldova', 'monaco', 'mongolia', 'montenegro', 'montserrat', 'morocco', 'mozambique', 'must', 'myanmar', 'name', 'namibia', 'nauru', 'need', 'nepal', 'netherlands', 'network', 'nevis', 'new', 'newbay', 'news', 'newspaper', 'newswire', 'nicaragua', 'niger', 'nigeria', 'niue', 'norfolk', 'north', 'northern', 'norway', 'number', 'ny', 'ocean', 'olenick', 'oman', 'one', 'online', 'operation', 'opinion', 'overall', 'pakistan', 'palau', 'panama', 'paper', 'papua', 'paraguay', 'person', 'personal', 'peru', 'philippine', 'phishing', 'pierre', 'pitcairn', 'poland', 'policy', 'polynesia', 'portugal', 'position', 'post', 'posture', 'previous', 'principe', 'prior', 'privacy', 'product', 'professional', 'publication', 'published', 'puerto', 'purpose', 'qatar', 'quote', 'ransomware', 'read', 'reboot', 'receive', 'recently', 'redistributed', 'redmond', 'register', 'registered', 'related', 'release', 'relevant', 'reporter', 'reprint', 'republic', 'reserved', 'resides', 'resource', 'response', 'retail', 'reunion', 'review', 'rewritten', 'rica', 'rico', 'right', 'risk', 'risksec', 'romania', 'rsa', 'russia', 'rwanda', 'said', 'saint', 'salvador', 'samoa', 'san', 'sao', 'saudi', 'sc', 'scam', 'school', 'search', 'sector', 'security', 'senegal', 'senior', 'sent', 'seychelles', 'show', 'sierra', 'singapore', 'site', 'slovakia', 'slovenia', 'social', 'solomon', 'somalia', 'soon', 'source', 'south', 'southern', 'spain', 'sri', 'state', 'strategy', 'string', 'subscribe', 'sudan', 'sugar', 'superintendent', 'suriname', 'svalbard', 'swaziland', 'sweden', 'sweet', 'switzerland', 'syria', 'tackle', 'taiwan', 'tajikistan', 'taken', 'tanzania', 'tax', 'team', 'tech', 'technical', 'technology', 'tenured', 'term', 'territory', 'test', 'thailand', 'thestreet', 'threat', 'tobago', 'togo', 'tokelau', 'tome', 'tonga', 'topic', 'toronto', 'trinidad', 'tunisia', 'turk', 'turkey', 'turkmenistan', 'tuvalu', 'twice', 'two', 'type', 'uganda', 'uk', 'ukraine', 'unbiased', 'underpin', 'united', 'uruguay', 'use', 'used', 'user', 'uzbekistan', 'vanuatu', 'vatican', 'venezuela', 'verde', 'veteran', 'via', 'victim', 'video', 'vietnam', 'vincent', 'virgin', 'virtual', 'vulnerability', 'wage', 'wallis', 'web', 'webcasts', 'website', 'week', 'western', 'white', 'whitepaper', 'whitepapers', 'wife', 'without', 'work', 'worked', 'worker', 'would', 'year', 'yemen', 'yugoslavia', 'zambia', 'zealand', 'zimbabwe'] | |
1165 | |
1166 | |
1167 | |
1167 2017-03-23T00:31:23.071000Z http://www.welivesecurity.com/2009/06/26/popularity-and-some-spurious-statistics/ | |
1167 2017-03-27T12:34:14.274000Z https://www.welivesecurity.com/2009/06/26/popularity-and-some-spurious-statistics/ | |
['abta', 'account', 'act', 'actual', 'actually', 'add', 'admit', 'adverse', 'advocate', 'aiming', 'al', 'algorithm', 'also', 'ambivalent', 'android', 'anything', 'app', 'apparently', 'approval', 'archive', 'article', 'author', 'ba', 'back', 'base', 'based', 'beatles', 'bigger', 'biggest', 'bizarre', 'blog', 'book', 'bottom', 'brand', 'breach', 'car', 'carried', 'cartoon', 'category', 'cert', 'cheer', 'cissp', 'citp', 'clarification', 'classification', 'code', 'colleague', 'come', 'comment', 'community', 'compliment', 'conclusion', 'conference', 'connected', 'consider', 'contact', 'context', 'copy', 'copyright', 'course', 'criterion', 'crowd', 'cybersecurity', 'damned', 'data', 'david', 'de', 'decision', 'deutsch', 'direct', 'director', 'disclaimer', 'div', 'doe', 'draw', 'easily', 'easy', 'ebola', 'economics', 'either', 'elaborate', 'email', 'embed', 'en', 'engine', 'english', 'enquiry', 'enter', 'envisage', 'eset', 'español', 'especially', 'essential', 'et', 'even', 'experience', 'experiment', 'expert', 'exploited', 'facebook', 'fact', 'fair', 'father', 'favour', 'fbcs', 'fever', 'figured', 'find', 'first', 'follow', 'fond', 'friend', 'fun', 'general', 'generate', 'generating', 'get', 'getting', 'give', 'given', 'glad', 'global', 'go', 'google', 'great', 'guy', 'hackable', 'haemorrhagic', 'harley', 'heart', 'heartrending', 'hit', 'hnldesign', 'hole', 'home', 'hot', 'however', 'http', 'human', 'humble', 'igor', 'implant', 'inbox', 'information', 'insight', 'instance', 'intelligence', 'interested', 'interesting', 'internet', 'ir', 'jesus', 'john', 'knew', 'know', 'language', 'last', 'latest', 'legal', 'lennon', 'let', 'lie', 'light', 'liked', 'likelihood', 'link', 'linkedin', 'little', 'lot', 'made', 'magazine', 'make', 'malware', 'mark', 'material', 'mauling', 'maybe', 'mcafee', 'mean', 'median', 'message', 'microsoft', 'might', 'misleadingly', 'misuse', 'moment', 'month', 'movie', 'much', 'multimedia', 'musical', 'must', 'name', 'nature', 'navigation', 'need', 'negative', 'net', 'netgear', 'new', 'news', 'newsletter', 'note', 'observing', 'one', 'online', 'opinion', 'outclassed', 'overwhelmingly', 'page', 'paper', 'particular', 'patch', 'people', 'percentage', 'perhaps', 'picky', 'place', 'podcasts', 'point', 'policy', 'popular', 'popularity', 'positive', 'post', 'posted', 'pr', 'prepared', 'pretty', 'print', 'privacy', 'problem', 'product', 'profile', 'provided', 'quinton', 'quite', 'radar', 'ransomware', 'rather', 'read', 'real', 'realize', 'reassuring', 'received', 'related', 'reliable', 'research', 'researching', 'reserved', 'resounding', 'result', 'right', 'river', 'router', 'say', 'scare', 'score', 'search', 'searched', 'security', 'see', 'seems', 'select', 'serious', 'several', 'sign', 'single', 'site', 'sitemap', 'six', 'skew', 'skewed', 'slightly', 'something', 'sorry', 'sort', 'specific', 'spend', 'spot', 'spurious', 'statistic', 'statistician', 'steal', 'study', 'stylesheet', 'subject', 'submits', 'suggesting', 'suggestion', 'support', 'symantec', 'tell', 'term', 'thanks', 'thing', 'think', 'though', 'thread', 'three', 'time', 'toggle', 'tool', 'topic', 'totally', 'try', 'turn', 'tweaking', 'twitter', 'uk', 'undecided', 'unfortunately', 'upgrade', 'urged', 'used', 'using', 'usual', 'value', 'varying', 'vendor', 'version', 'video', 'view', 'virus', 'virustotal', 'wa', 'want', 'warns', 'way', 'web', 'webmaster', 'website', 'wechseln', 'well', 'whatdoestheinternetthink', 'whats', 'whereas', 'whether', 'white', 'wisdom', 'wls', 'wordpress', 'work', 'world', 'would', 'youtube', 'zum'] | |
1169 | |
1171 | |
1172 | |
1173 | |
1175 | |
1176 | |
1177 | |
1178 | |
1179 | |
1181 | |
1182 | |
1183 | |
1184 | |
1185 | |
1185 2017-03-05T00:42:18.531000Z http://thehackernews.com/2011/05/banglarmelaorg-hacked-by-evilsoul.html | |
1185 2017-03-05T00:42:32.820000Z http://thehackernews.com/2011/04/hackers-paradise-hacked-by-khantastic.html | |
1185 2017-03-05T00:42:47.548000Z http://thehackernews.com/2011/04/5-sites-hacked-by-133t-indian-h4x0rs.html | |
1185 2017-03-05T00:44:58.175000Z http://thehackernews.com/2011/02/xtremerootnet-hacked-by-boxhead-belegit.html | |
1185 2017-03-05T00:46:02.456000Z http://thehackernews.com/2010/12/arb4allcom-hacked-by-th3-kill3r.html | |
1185 2017-03-05T00:46:21.638000Z http://thehackernews.com/2010/12/pakcyberarmynet-is-now-down-by-max11.html | |
1185 2017-03-05T00:46:22.462000Z http://thehackernews.com/2010/12/pakistangovpk-is-downed-by-max11.html | |
1185 2017-03-05T00:46:25.863000Z http://thehackernews.com/2010/12/artandframingcouk-hacked-by-pimpdaddy.html | |
1185 2017-03-05T00:46:33.107000Z http://thehackernews.com/2010/11/270-more-indian-sites-deface-by-hex786.html | |
1185 2017-03-05T00:46:38.594000Z http://thehackernews.com/2010/11/shahid-afridis-official-site-hacked-by.html | |
1185 2017-03-05T00:46:47.958000Z http://thehackernews.com/2010/11/shenzhenfdicn-hacked-by-cheeta.html | |
1185 2017-03-05T00:46:48.949000Z http://thehackernews.com/2010/11/citcochandigarhgovin-hacked-by.html | |
1185 2017-03-05T00:46:49.360000Z http://thehackernews.com/2010/11/tsacompk-hacked-by-s4ltfish.html | |
1185 2017-03-05T00:46:55.129000Z http://thehackernews.com/2010/11/mooretastecom-hacked-by-sami-fakhfakh.html | |
1185 2017-03-05T00:47:01.218000Z http://thehackernews.com/2010/11/russian-site-center-narekru-hacked-by.html | |
1185 2017-03-05T00:47:04.784000Z http://thehackernews.com/2010/11/fazendabaiagrandecombr-hacked-by-indian.html | |
1185 2017-03-05T00:47:07.370000Z http://thehackernews.com/2010/11/one-more-indian-site-hacked-f3indiabiz.html | |
1185 2017-03-05T00:47:18.806000Z http://thehackernews.com/2010/10/indian-site-maplebearindirapuramcoin.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1186 | |
1186 2017-03-10T00:30:53.698000Z http://www.veracode.com/blog/managing-appsec/your-next-steps-if-your-appsec-program-baseline-stage | |
1186 2017-03-16T18:30:52.051000Z http://www.veracode.com/blog/managing-appsec/your-next-steps-if-your-appsec-program-expanded-stage | |
1186 2017-03-23T18:33:29.958000Z http://www.veracode.com/blog/managing-appsec/what-does-advanced-application-security-program-look | |
['accept', 'ad', 'addition', 'address', 'advanced', 'application', 'appsec', 'ass', 'baseline', 'blog', 'cengage', 'ciccone', 'clear', 'code', 'comment', 'company', 'compelling', 'compliance', 'configuration', 'content', 'date', 'detail', 'developer', 'development', 'ebsco', 'editor', 'email', 'entry', 'expanded', 'fall', 'field', 'fix', 'form', 'forrester', 'four', 'get', 'guide', 'hoc', 'home', 'homepage', 'including', 'information', 'instance', 'kept', 'learning', 'lifecycle', 'light', 'look', 'major', 'make', 'managing', 'many', 'marked', 'marketing', 'mature', 'maturity', 'metric', 'mollom', 'move', 'multiple', 'name', 'new', 'next', 'one', 'organization', 'outline', 'page', 'part', 'path', 'please', 'policy', 'post', 'previous', 'privacy', 'private', 'process', 'professional', 'program', 'publicly', 'published', 'reactive', 'report', 'required', 'research', 'result', 'review', 'risk', 'role', 'runtime', 'security', 'see', 'series', 'service', 'share', 'shed', 'shown', 'significant', 'software', 'solution', 'stage', 'stay', 'step', 'submitting', 'suzanne', 'take', 'team', 'technique', 'test', 'testing', 'time', 'toward', 'typically', 'veracode', 'vulnerability', 'within', 'work', 'working', 'writer', 'year'] | |
1188 | |
1188 2017-03-20T12:31:03.585000Z https://blog.avira.com/3d-printer-for-anyone/ | |
1188 2017-03-28T18:30:49.433000Z https://isc.sans.edu/forums/Preventing+outside+sources+accessing+the+local+network+via+open+ports+on+a+networked+printer/1737 | |
['hour', 'open', 'print', 'printer', 'source', 'thanks'] | |
1189 | |
1189 2017-03-05T00:39:07.479000Z http://thehackernews.com/2011/12/xss-vulnerability-on-twitter-found-by.html | |
1189 2017-03-05T00:39:52.327000Z http://thehackernews.com/2011/09/gamecom-xss-vulnerability-by-cyber4rt.html | |
1189 2017-03-05T00:41:25.256000Z http://thehackernews.com/2011/05/sqli-vulnerability-in-united-nations-un.html | |
1189 2017-03-05T00:41:28.583000Z http://thehackernews.com/2011/05/xss-vulnerability-on-real-player.html | |
1189 2017-03-05T00:44:17.927000Z http://thehackernews.com/2011/03/vulnerability-in-dtdccom-and-hrithiks.html | |
1189 2017-03-05T00:45:18.988000Z http://thehackernews.com/2011/01/tech2spider-found-sqli-vulnerability-in.html | |
1189 2017-03-05T00:45:27.583000Z http://thehackernews.com/2011/01/samyak-tejawat-found-vulnerability-in.html | |
1189 2017-03-05T00:45:28.793000Z http://thehackernews.com/2011/01/krunal-goswami-tech2spider-found-new.html | |
1189 2017-03-05T00:46:13.649000Z http://thehackernews.com/2010/12/irfan-shakeel-has-found-xss.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'vulnerability', 'walking', 'want', 'without', 'york'] | |
1190 | |
1190 2017-03-11T12:31:30.612000Z http://www.welivesecurity.com/2009/06/23/microsoft-av-revisited/ | |
1190 2017-03-27T12:34:19.999000Z https://www.welivesecurity.com/2009/06/23/microsoft-av-revisited/ | |
['across', 'actually', 'add', 'adequately', 'ago', 'ah', 'al', 'alex', 'already', 'also', 'android', 'anecdote', 'another', 'antivirus', 'app', 'archive', 'arena', 'article', 'author', 'av', 'avalanche', 'avien', 'aware', 'ba', 'back', 'basis', 'believed', 'benefit', 'beta', 'big', 'bless', 'blog', 'bought', 'bulletin', 'bundled', 'buy', 'came', 'central', 'check', 'cissp', 'citp', 'code', 'come', 'comment', 'commercial', 'community', 'company', 'conclusion', 'conference', 'consequent', 'considered', 'contact', 'copy', 'copyright', 'couple', 'course', 'cover', 'credible', 'currently', 'cybersecurity', 'daily', 'data', 'david', 'de', 'deal', 'declining', 'defense', 'defensive', 'detection', 'deutsch', 'development', 'direct', 'director', 'disadvantaged', 'disaster', 'discussion', 'distributed', 'div', 'done', 'dramatic', 'drop', 'either', 'elsevier', 'email', 'embed', 'en', 'english', 'entirely', 'equivalent', 'eset', 'español', 'essential', 'evaluating', 'even', 'ever', 'exactly', 'expert', 'expertise', 'facebook', 'fbcs', 'feature', 'feeling', 'firewall', 'follow', 'free', 'freebie', 'friend', 'full', 'functionality', 'gift', 'give', 'go', 'god', 'going', 'good', 'google', 'grabbed', 'guide', 'happened', 'harley', 'hat', 'hate', 'hit', 'holiday', 'home', 'hot', 'http', 'idea', 'inbox', 'incentive', 'industry', 'information', 'insight', 'interested', 'interesting', 'introduce', 'ir', 'issue', 'job', 'language', 'lapse', 'later', 'latest', 'leaf', 'learned', 'left', 'legal', 'legitimate', 'let', 'likely', 'limited', 'link', 'linkedin', 'living', 'long', 'looking', 'lot', 'love', 'mac', 'macro', 'magazine', 'make', 'malware', 'many', 'market', 'material', 'mean', 'medical', 'mention', 'microsoft', 'might', 'month', 'msav', 'much', 'multimedia', 'navigation', 'never', 'news', 'newsletter', 'nice', 'note', 'number', 'one', 'open', 'opinion', 'organization', 'others', 'page', 'paid', 'paper', 'part', 'past', 'pc', 'pdfs', 'people', 'personal', 'piece', 'pirated', 'play', 'player', 'podcasts', 'point', 'policy', 'popular', 'post', 'posted', 'pretty', 'print', 'privacy', 'probably', 'product', 'program', 'publicly', 'put', 'putting', 'quite', 'quoted', 'radai', 'radar', 'randy', 'ransomware', 'rate', 'read', 'redundant', 'related', 'relevant', 'reliance', 'render', 'research', 'reserved', 'responsible', 'rest', 'review', 'revisited', 'revisiting', 'right', 'said', 'sale', 'saved', 'say', 'scenario', 'scrape', 'search', 'sector', 'securing', 'security', 'see', 'select', 'seriously', 'sign', 'significant', 'similar', 'similarly', 'since', 'site', 'sitemap', 'six', 'software', 'sold', 'something', 'somewhat', 'source', 'stage', 'still', 'strategy', 'struggle', 'stylesheet', 'subset', 'suggest', 'suggesting', 'support', 'surely', 'surprise', 'syngress', 'system', 'talent', 'tasked', 'tech', 'testing', 'therefore', 'thing', 'think', 'thought', 'threat', 'time', 'together', 'toggle', 'topic', 'trickle', 'try', 'turn', 'twitter', 'two', 'uk', 'unlikely', 'used', 'useful', 'user', 'using', 'version', 'video', 'view', 'virus', 'wa', 'way', 'wechseln', 'week', 'whats', 'white', 'window', 'wls', 'work', 'working', 'worth', 'would', 'writing', 'year', 'yesterday', 'yisrael', 'youtube', 'zum'] | |
1191 | |
1191 2017-03-28T06:30:56.389000Z http://darkreading.com/threat-intelligence/hacking-the-business-email-compromise-/d/d-id/1328497 | |
1191 2017-03-28T12:31:09.866000Z http://www.itsecurityguru.org/2017/03/28/business-email-compromise-bec-attacks-increase-45-percent-23-use-spoofed-email-domains-trick-victims/ | |
['account', 'address', 'advanced', 'also', 'another', 'application', 'ask', 'attack', 'attacker', 'attempt', 'authentication', 'back', 'bec', 'behind', 'billion', 'breach', 'build', 'business', 'cause', 'ceo', 'challenge', 'cloud', 'combined', 'come', 'comment', 'community', 'company', 'compliance', 'compromise', 'conformance', 'control', 'course', 'customer', 'cyber', 'cybercriminals', 'cybersecurity', 'data', 'development', 'director', 'dmarc', 'doe', 'domain', 'editor', 'email', 'employee', 'enabled', 'engineering', 'ensure', 'enterprise', 'event', 'example', 'executive', 'experience', 'expert', 'explains', 'facebook', 'find', 'firm', 'follow', 'fund', 'future', 'game', 'get', 'got', 'group', 'guy', 'hack', 'hacker', 'hacking', 'harder', 'help', 'high', 'home', 'human', 'impact', 'incident', 'including', 'increase', 'information', 'infrastructure', 'inside', 'insider', 'intelligence', 'key', 'last', 'law', 'legitimate', 'like', 'line', 'link', 'look', 'lookalike', 'loss', 'machine', 'make', 'malware', 'many', 'message', 'million', 'money', 'month', 'need', 'new', 'news', 'next', 'often', 'one', 'open', 'operation', 'overall', 'part', 'payment', 'person', 'phishing', 'pm', 'policy', 'popular', 'president', 'prevention', 'privacy', 'proofpoint', 'protect', 'protecting', 'protection', 'ransomware', 'reach', 'recently', 'recipient', 'remains', 'reporting', 'request', 'research', 'researcher', 'return', 'rise', 'risk', 'scam', 'security', 'send', 'service', 'share', 'show', 'social', 'software', 'solution', 'spoofed', 'spoofing', 'spot', 'story', 'subject', 'tackle', 'take', 'target', 'targeted', 'tax', 'team', 'tech', 'technology', 'term', 'think', 'threat', 'top', 'training', 'transfer', 'trend', 'trick', 'tweet', 'two', 'understanding', 'urgent', 'use', 'used', 'user', 'vector', 'via', 'vice', 'victim', 'video', 'volume', 'vulnerability', 'warns', 'web', 'webinar', 'webinars', 'week', 'well', 'wire', 'wiring', 'working', 'world', 'year'] | |
1192 | |
1193 | |
1194 | |
1195 | |
1196 | |
1197 | |
1198 | |
1198 2017-03-01T18:30:41.898000Z http://packetpushers.net/podcast/podcasts/datanauts-073-getting-inside-software-engineering/ | |
1198 2017-03-29T18:30:55.474000Z http://packetpushers.net/podcast/podcasts/datanauts-077-transitioning-less-technical-role/ | |
['accelerates', 'audio', 'balancing', 'blogger', 'bot', 'career', 'cdn', 'datanauts', 'ddos', 'different', 'discussion', 'download', 'drew', 'embed', 'engineer', 'episode', 'fortune', 'free', 'go', 'guest', 'http', 'imperva', 'incapsula', 'including', 'individual', 'inspection', 'link', 'listener', 'load', 'management', 'million', 'network', 'networking', 'property', 'protection', 'protects', 'role', 'service', 'share', 'site', 'social', 'software', 'sponsor', 'subscribe', 'talk', 'technical', 'technology', 'traffic', 'try', 'twitter', 'web'] | |
1199 | |
1199 2017-03-14T06:30:52.934000Z http://csoonline.com/article/3179615/security/report-finds-the-security-of-confidential-documents-is-a-significant-problem.html | |
1199 2017-03-15T18:30:59.452000Z https://www.scmagazine.com/study-shows-ignorance-of-and-critical-need-to-secure-important-documents/article/644242/ | |
1199 2017-03-16T12:31:09.028000Z https://www.helpnetsecurity.com/2017/03/16/securing-document-flow/ | |
['accidental', 'area', 'available', 'aware', 'basis', 'best', 'biggest', 'bpi', 'breach', 'business', 'clearly', 'come', 'company', 'compromise', 'concern', 'confidential', 'contained', 'contract', 'could', 'create', 'critical', 'cyber', 'data', 'dave', 'digital', 'distribution', 'document', 'educate', 'effectively', 'employee', 'enough', 'explicit', 'exposure', 'financial', 'growing', 'head', 'identified', 'improve', 'inadvertent', 'indicates', 'information', 'intellectual', 'intentional', 'le', 'leadership', 'leak', 'least', 'loss', 'manager', 'marketing', 'mobile', 'murray', 'need', 'network', 'new', 'outside', 'partner', 'party', 'perceived', 'percent', 'permission', 'policy', 'practice', 'property', 'protecting', 'range', 'record', 'related', 'report', 'respondent', 'risk', 'said', 'say', 'securing', 'security', 'sending', 'sensitive', 'sent', 'set', 'shared', 'solution', 'stopping', 'study', 'surrounding', 'survey', 'theft', 'thought', 'time', 'today', 'tool', 'understood', 'used', 'vulnerable', 'weekly', 'well', 'wide', 'widely', 'without', 'worker', 'wrong'] | |
1200 | |
1201 | |
1203 | |
1206 | |
1207 | |
1207 2017-03-06T18:30:48.640000Z https://www.grahamcluley.com/hackers-bypass-twitter-locked-accounts/ | |
1207 2017-03-11T00:30:53.829000Z https://www.grahamcluley.com/new-linux-malware-hijacks-one-vendors-iot-devices-by-exploiting-cgi-bug/ | |
1207 2017-03-16T12:30:54.490000Z https://www.grahamcluley.com/bye-bye-botnet-kibosh-put-chamois-android-fraud-network/ | |
1207 2017-03-17T18:30:59.135000Z https://www.grahamcluley.com/kirk-ransomware-sports-star-trek-themed-decryptor-little-known-crypto-currency/ | |
1207 2017-03-22T18:30:50.148000Z https://www.grahamcluley.com/smut-surfers-infected-ramnit-trojan-malvertising-campaign-deploys-pop-ads/ | |
['account', 'adobe', 'advice', 'also', 'android', 'appearance', 'apple', 'application', 'article', 'associate', 'attack', 'audio', 'author', 'award', 'backup', 'bad', 'best', 'billion', 'bisson', 'blackberry', 'blog', 'blox', 'bob', 'botnet', 'brilliant', 'browser', 'btc', 'buffer', 'cancel', 'carbonite', 'carole', 'category', 'celebrity', 'channel', 'check', 'chrome', 'click', 'clickjacking', 'cluley', 'comment', 'computer', 'condition', 'contact', 'content', 'contributing', 'contributor', 'cooky', 'copyright', 'covello', 'cyber', 'data', 'david', 'ddos', 'defence', 'denial', 'dmbisson', 'editor', 'email', 'encryption', 'episode', 'event', 'explorer', 'facebook', 'fake', 'feed', 'filed', 'firefox', 'flash', 'focused', 'follow', 'free', 'fun', 'game', 'gchq', 'gear', 'google', 'graham', 'guest', 'guideline', 'hack', 'hacked', 'hacker', 'happened', 'hire', 'home', 'hosted', 'humbug', 'idea', 'incapsula', 'industry', 'informed', 'infosec', 'interested', 'internet', 'io', 'jacaranda', 'java', 'jim', 'journalist', 'junkie', 'latest', 'law', 'le', 'leave', 'like', 'limited', 'link', 'linkedin', 'linux', 'list', 'listen', 'live', 'login', 'loss', 'macos', 'malware', 'medium', 'menu', 'microsoft', 'might', 'mobile', 'naked', 'name', 'navigation', 'network', 'new', 'news', 'newsletter', 'nude', 'often', 'one', 'operating', 'opinion', 'oracle', 'order', 'pdf', 'people', 'philip', 'phishing', 'phone', 'plus', 'podcast', 'podcasts', 'policy', 'popular', 'post', 'powered', 'pressidium', 'privacy', 'protected', 'public', 'published', 'put', 'ransomware', 'recent', 'reddit', 'register', 'reply', 'required', 'reserved', 'return', 'review', 'riche', 'right', 'risk', 'rogue', 'safari', 'security', 'send', 'service', 'share', 'site', 'smashing', 'social', 'soliman', 'spam', 'speak', 'speaking', 'sponsor', 'sponsorship', 'state', 'stay', 'story', 'stream', 'subscribe', 'support', 'svajcer', 'system', 'tag', 'term', 'testimonial', 'theriault', 'threat', 'three', 'tip', 'top', 'tripwire', 'twitter', 'uncategorized', 'user', 'vanja', 'video', 'view', 'visit', 'vulnerability', 'want', 'web', 'website', 'week', 'weekly', 'whatsapp', 'wibbling', 'wilf', 'window', 'wordpress', 'work', 'write', 'yahoo', 'yasin', 'yet', 'youtube'] | |
1208 | |
1209 | |
1210 | |
1210 2017-03-10T18:30:51.861000Z https://www.bleepingcomputer.com/news/security/isp-blocks-teamviewer-because-of-tech-support-scammers/ | |
1210 2017-03-14T18:30:50.466000Z https://nakedsecurity.sophos.com/2017/03/14/questions-linger-after-isp-blocks-teamviewer-over-fraud-fears/ | |
['able', 'access', 'account', 'address', 'also', 'antivirus', 'application', 'aware', 'bbc', 'better', 'block', 'blocking', 'call', 'channel', 'comment', 'company', 'complain', 'comprehensive', 'computer', 'connection', 'constantly', 'convincing', 'customer', 'data', 'day', 'decided', 'detail', 'email', 'even', 'extensive', 'facebook', 'far', 'fault', 'find', 'first', 'fix', 'follow', 'forum', 'fraud', 'giving', 'go', 'going', 'hang', 'hard', 'home', 'including', 'indian', 'install', 'ip', 'isp', 'issue', 'joint', 'learn', 'like', 'line', 'mac', 'make', 'mobile', 'monitor', 'need', 'network', 'new', 'noticed', 'number', 'one', 'order', 'part', 'point', 'popular', 'possible', 'post', 'previous', 'professional', 'protect', 'provider', 'question', 'remote', 'removal', 'reported', 'rule', 'scam', 'scamming', 'security', 'software', 'solution', 'start', 'statement', 'still', 'support', 'take', 'talk', 'talktalk', 'targeting', 'teamviewer', 'tech', 'telephone', 'tell', 'temporarily', 'time', 'told', 'tool', 'traffic', 'twitter', 'two', 'uk', 'user', 'using', 'victim', 'virus', 'web', 'website', 'window', 'word', 'work', 'working', 'would'] | |
1211 | |
1212 | |
1213 | |
1214 | |
1215 | |
1216 | |
1217 | |
1217 2017-03-01T06:32:11.520000Z https://www.mimecast.com/blog/2014/01/paying-tribute-to-our-mimecast-trainers-1000-times-over/ | |
1217 2017-03-01T06:32:41.216000Z https://www.mimecast.com/blog/2012/11/email-is-in-great-shape/ | |
1217 2017-03-16T18:31:52.848000Z https://www.mimecast.com/blog/2014/03/three-predictions-for-the-future-of-the-web/ | |
1217 2017-03-16T18:33:03.759000Z https://www.mimecast.com/blog/2011/05/the-hidden-security-danger-dont-let-email-be-your-downfall/ | |
1217 2017-03-16T18:33:17.297000Z https://www.mimecast.com/blog/2011/01/looking-back-going-forward-2010-in-review/ | |
1217 2017-03-16T18:33:46.101000Z https://www.mimecast.com/blog/2010/07/email-archiving-case-study-townsend-manages-email-in-the-cloud-video/ | |
1217 2017-03-18T12:35:08.133000Z http://www.mimecast.com/blog/2012/11/email-is-in-great-shape/ | |
1217 2017-03-18T12:36:24.222000Z http://www.mimecast.com/blog/2011/05/the-hidden-security-danger-dont-let-email-be-your-downfall/ | |
1217 2017-03-20T18:30:59.970000Z https://www.mimecast.com/blog/2017/032/can-dmarc-stop-all-business-email-compromise-attacks/ | |
['acceptable', 'africa', 'america', 'apps', 'archive', 'archiving', 'asia', 'award', 'become', 'blog', 'bundle', 'career', 'center', 'central', 'chat', 'coalition', 'comment', 'company', 'compliance', 'contact', 'content', 'continuity', 'control', 'customer', 'cyber', 'data', 'demo', 'detail', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'east', 'email', 'enable', 'europe', 'event', 'exchange', 'file', 'filed', 'get', 'google', 'home', 'hybrid', 'im', 'information', 'investor', 'javascript', 'knowledgebase', 'large', 'leadership', 'legacy', 'login', 'managed', 'management', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'network', 'news', 'north', 'office', 'option', 'overview', 'pacific', 'partner', 'platform', 'please', 'policy', 'post', 'posted', 'powered', 'press', 'privacy', 'product', 'productivity', 'professional', 'program', 'protection', 'quote', 'registration', 'related', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'sale', 'schedule', 'secure', 'security', 'send', 'service', 'share', 'signature', 'sitemap', 'solution', 'south', 'success', 'support', 'targeted', 'team', 'technical', 'term', 'threat', 'training', 'trust', 'use', 'view', 'webinars', 'work'] | |
1218 | |
1220 | |
1221 | |
1221 2017-03-05T00:40:26.060000Z http://thehackernews.com/2011/08/mini-php-shell-279-v2-released.html | |
1221 2017-03-05T00:41:13.299000Z http://thehackernews.com/2011/06/wso-new-version-25-web-shell-2011.html | |
1221 2017-03-05T00:41:53.409000Z http://thehackernews.com/2011/05/devil-shell-v12-php-shell-with-ddos.html | |
1221 2017-03-05T00:44:16.471000Z http://thehackernews.com/2011/03/php-shell-by-trick-teamp0ison-was.html | |
1221 2017-03-05T00:44:29.457000Z http://thehackernews.com/2011/02/devil-shell-v11-new-release-download.html | |
1221 2017-03-05T00:45:05.254000Z http://thehackernews.com/2011/01/devil-shell-coded-by-underground-devil.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'downloads', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'shell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1223 | |
1223 2017-03-14T18:30:45.366000Z https://isc.sans.edu/forums/diary/February+and+March+Microsoft+Patch+Tuesday/22185/ | |
1223 2017-03-15T12:30:47.966000Z http://thehackernews.com/2017/03/microsoft-patch-tuesday.html | |
1223 2017-03-16T00:30:40.408000Z http://csoonline.com/article/3181411/security/microsoft-fixes-record-number-of-flaws-some-publicly-known.html | |
['also', 'bulletin', 'code', 'disclosed', 'edge', 'execution', 'exploit', 'exploited', 'explorer', 'flash', 'gdi', 'include', 'includes', 'internet', 'learn', 'microsoft', 'month', 'one', 'patch', 'publicly', 'release', 'remote', 'security', 'server', 'service', 'smb', 'two', 'update', 'user', 'vulnerability', 'window'] | |
1224 | |
1225 | |
1226 | |
1227 | |
1228 | |
1228 2017-03-14T18:30:46.487000Z http://securityaffairs.co/wordpress/57130/hacking/cra-apache-struts-hack.html | |
1228 2017-03-15T12:30:51.383000Z https://hotforsecurity.bitdefender.com/blog/apache-vulnerability-exposes-canadian-government-websites-to-hackers-17797.html | |
['according', 'added', 'agency', 'also', 'apache', 'attacker', 'breach', 'bug', 'canada', 'canadian', 'certain', 'conference', 'country', 'credible', 'data', 'filing', 'glowacki', 'government', 'greater', 'hacker', 'including', 'information', 'john', 'last', 'many', 'network', 'new', 'news', 'official', 'online', 'press', 'problem', 'read', 'remote', 'revenue', 'said', 'security', 'server', 'shared', 'shut', 'site', 'social', 'software', 'specific', 'statistic', 'strut', 'system', 'tax', 'threat', 'vulnerability', 'web', 'website', 'week', 'year'] | |
1229 | |
1229 2017-03-25T06:31:35.795000Z http://www.welivesecurity.com/2010/08/26/dynamic-dll-loading-vulnerability/ | |
1229 2017-03-27T12:33:42.713000Z https://www.welivesecurity.com/2010/08/26/dynamic-dll-loading-vulnerability/ | |
['able', 'abta', 'add', 'additional', 'addressed', 'advisory', 'affected', 'al', 'albors', 'allow', 'already', 'also', 'although', 'analysis', 'android', 'announced', 'antivirus', 'app', 'application', 'applied', 'arbitrary', 'archive', 'article', 'associated', 'attack', 'attacker', 'attempt', 'author', 'available', 'back', 'block', 'blog', 'breach', 'breath', 'bug', 'came', 'carlos', 'changed', 'checking', 'cissp', 'citp', 'clearly', 'client', 'code', 'coded', 'colleague', 'common', 'community', 'computer', 'conference', 'contact', 'context', 'controlled', 'copyright', 'correct', 'corresponding', 'could', 'critical', 'cybersecurity', 'data', 'david', 'de', 'define', 'detail', 'deutsch', 'developer', 'device', 'direct', 'directory', 'disable', 'div', 'dll', 'donoso', 'download', 'dynamic', 'economics', 'email', 'embed', 'en', 'english', 'entry', 'eset', 'español', 'execute', 'execution', 'experience', 'expert', 'explaining', 'explanation', 'exploit', 'exploitation', 'facebook', 'failure', 'fbcs', 'fellow', 'file', 'find', 'firewall', 'fix', 'flaw', 'follow', 'forestall', 'forty', 'free', 'friend', 'full', 'give', 'go', 'google', 'got', 'group', 'handling', 'harley', 'hd', 'helpful', 'higher', 'home', 'hot', 'http', 'inbox', 'including', 'incorrectly', 'information', 'informed', 'initially', 'insight', 'interesting', 'investigating', 'ir', 'issue', 'josep', 'juan', 'kb', 'laboratory', 'language', 'latest', 'legal', 'library', 'lie', 'light', 'limit', 'link', 'linkedin', 'load', 'loaded', 'loading', 'local', 'location', 'made', 'magazine', 'mainly', 'malicious', 'management', 'material', 'measure', 'memory', 'microsoft', 'minecraft', 'mitigate', 'mod', 'month', 'moore', 'multimedia', 'navigation', 'network', 'new', 'news', 'newsletter', 'number', 'obtained', 'occasion', 'occurs', 'open', 'opinion', 'order', 'original', 'outbound', 'page', 'paper', 'patch', 'path', 'perimeter', 'play', 'podcasts', 'policy', 'popular', 'port', 'possible', 'post', 'posted', 'potential', 'predefined', 'presenting', 'prevent', 'print', 'privacy', 'problem', 'public', 'publication', 'published', 'radar', 'ransomware', 'read', 'recent', 'recently', 'recommends', 'reduce', 'registry', 'related', 'released', 'remediating', 'remotely', 'replaced', 'reported', 'research', 'researcher', 'reserved', 'resource', 'responsibility', 'result', 'right', 'risk', 'run', 'running', 'scanty', 'scarcely', 'scenario', 'scope', 'search', 'security', 'select', 'series', 'serious', 'server', 'shared', 'shortcut', 'sign', 'signficantly', 'site', 'sitemap', 'smb', 'software', 'solution', 'solve', 'somewhat', 'soon', 'specifying', 'state', 'stay', 'still', 'stop', 'storage', 'stylesheet', 'suggests', 'supposed', 'taken', 'thank', 'thought', 'threat', 'toggle', 'topic', 'traffic', 'translation', 'try', 'trying', 'twitter', 'unauthorized', 'undecided', 'untrusted', 'update', 'usb', 'use', 'user', 'using', 'various', 'vary', 'video', 'view', 'virus', 'vulnerability', 'vulnerable', 'web', 'webdav', 'wechseln', 'whats', 'white', 'window', 'without', 'wls', 'workstation', 'would', 'youtube', 'zum'] | |
1230 | |
1230 2017-03-05T00:39:48.070000Z http://thehackernews.com/2011/09/hundreds-of-domains-hacked-by-x-nerd.html | |
1230 2017-03-05T00:42:22.187000Z http://thehackernews.com/2011/05/bryantxgov-city-of-bryan-hacked-and-175.html | |
1230 2017-03-05T00:42:36.413000Z http://thehackernews.com/2011/04/election-commission-society-of-aircraft.html | |
1230 2017-03-05T00:45:12.082000Z http://thehackernews.com/2011/01/2-indian-websites-hacked-by-team.html | |
1230 2017-03-05T00:46:22.053000Z http://thehackernews.com/2010/12/pakistan-web-designing-company-hacked.html | |
1230 2017-03-05T00:46:50.848000Z http://thehackernews.com/2010/11/pakistan-hosting-company-hacked-by.html | |
1230 2017-03-05T00:46:56.782000Z http://thehackernews.com/2010/11/vijay-mallyas-website-again-hacked-by.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pakistan', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1231 | |
1232 | |
1233 | |
1233 2017-03-04T00:30:46.981000Z https://www.schneier.com/blog/archives/2017/03/friday_squid_bl_567.html | |
1233 2017-03-11T00:30:51.689000Z https://www.schneier.com/blog/archives/2017/03/friday_squid_bl_568.html | |
1233 2017-03-25T00:30:50.785000Z https://www.schneier.com/blog/archives/2017/03/friday_squid_bl_570.html | |
['address', 'allowed', 'also', 'blank', 'blockquote', 'blog', 'blogging', 'bruce', 'cite', 'comment', 'covered', 'em', 'entry', 'ervland', 'even', 'expressed', 'fill', 'html', 'http', 'ibm', 'issue', 'leave', 'li', 'long', 'name', 'necessarily', 'news', 'ol', 'opinion', 'per', 'personal', 'photo', 'pm', 'post', 'posted', 'pre', 'required', 'resilient', 'schneier', 'security', 'squid', 'story', 'strong', 'sub', 'subscribe', 'sup', 'tag', 'talk', 'ul', 'url', 'use', 'usual', 'website'] | |
1234 | |
1235 | |
1236 | |
1236 2017-03-15T12:31:54.608000Z http://www.itsecurityguru.org/2017/03/15/google-shuts-massive-android-ad-fraud-botnet-chamois/ | |
1236 2017-03-15T12:31:59.540000Z http://www.itsecurityguru.org/2017/03/15/microsoft-releases-18-security-bulletins-8-critical/ | |
['ability', 'ad', 'administrator', 'advanced', 'affect', 'afraid', 'ago', 'aid', 'air', 'also', 'american', 'amidst', 'anderson', 'android', 'anonabox', 'application', 'appreciate', 'appriver', 'approves', 'around', 'article', 'arturplavnik', 'ask', 'atm', 'attack', 'back', 'backlash', 'badly', 'ban', 'bank', 'banking', 'bid', 'biggest', 'binary', 'biometrics', 'blind', 'board', 'botnet', 'breach', 'broadly', 'bryan', 'build', 'bulletin', 'business', 'campaign', 'chamois', 'change', 'citibank', 'cm', 'combat', 'comment', 'communication', 'community', 'couple', 'creating', 'criminal', 'critical', 'cto', 'cybe', 'cyber', 'cybercrime', 'cyberhacklords', 'cybersecurity', 'data', 'date', 'ddos', 'depot', 'detail', 'developer', 'development', 'doe', 'dtmf', 'ebay', 'editor', 'editorial', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enemy', 'enough', 'enterprise', 'environment', 'eset', 'eu', 'event', 'expect', 'explain', 'expose', 'express', 'facebook', 'family', 'find', 'finnish', 'flaw', 'follow', 'force', 'ford', 'fraud', 'full', 'gdpr', 'general', 'generation', 'get', 'getting', 'globally', 'goodbye', 'google', 'got', 'government', 'grip', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'hana', 'head', 'hello', 'help', 'helped', 'hitting', 'hold', 'home', 'hospital', 'hour', 'http', 'huge', 'impact', 'imposter', 'improve', 'incident', 'including', 'increase', 'industrial', 'information', 'infosec', 'infosecurity', 'inside', 'instagram', 'iot', 'jackson', 'japonica', 'jay', 'jesse', 'know', 'landmark', 'latest', 'law', 'leak', 'learning', 'leave', 'lee', 'like', 'lillie', 'link', 'linkedin', 'literacy', 'lizard', 'look', 'lure', 'machine', 'making', 'malware', 'many', 'massive', 'met', 'microsoft', 'min', 'mind', 'mitigation', 'mixed', 'nazi', 'ncsc', 'ne', 'need', 'netflix', 'new', 'news', 'next', 'nsa', 'num', 'officer', 'open', 'operation', 'option', 'original', 'password', 'patch', 'pay', 'paypal', 'persistent', 'pervasive', 'phishing', 'phone', 'platform', 'please', 'pm', 'popular', 'posted', 'postin', 'previous', 'primary', 'privacy', 'professional', 'propaganda', 'protecting', 'protection', 'qinetiq', 'quality', 'ramond', 'ransomware', 'really', 'recent', 'regulation', 'related', 'release', 'remains', 'report', 'research', 'researcher', 'response', 'retailer', 'return', 'rich', 'rise', 'risk', 'round', 'run', 'rush', 'said', 'sale', 'sap', 'say', 'scam', 'secret', 'security', 'sensitive', 'service', 'settlement', 'share', 'shortage', 'shuts', 'sign', 'skill', 'smart', 'software', 'sort', 'source', 'spam', 'spot', 'spread', 'squad', 'stock', 'story', 'supporter', 'surveillance', 'swastika', 'tackle', 'tag', 'tagged', 'talking', 'target', 'technology', 'ten', 'term', 'themed', 'thing', 'threat', 'time', 'today', 'top', 'touch', 'trading', 'tremendous', 'trend', 'turning', 'tweet', 'twitter', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'video', 'view', 'viral', 'vulnerability', 'walcot', 'warns', 'weak', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'within', 'working', 'worse', 'year'] | |
1237 | |
1240 | |
1241 | |
1242 | |
1243 | |
1244 | |
1245 | |
1246 | |
1247 | |
1248 | |
1249 | |
1250 | |
1251 | |
1252 | |
1253 | |
1255 | |
1255 2017-03-05T00:45:49.401000Z http://thehackernews.com/2010/12/142-websites-hacked-by-tn-vrus.html | |
1255 2017-03-05T00:46:14.408000Z http://thehackernews.com/2010/12/130-websites-hacked-by-077-hamdi-hacker.html | |
1255 2017-03-05T00:46:33.874000Z http://thehackernews.com/2010/11/72-websites-hacked-by-darkl00k.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
1256 | |
1257 | |
1258 | |
1259 | |
1261 | |
1262 | |
1264 | |
1265 | |
1266 | |
1267 | |
1267 2017-03-05T00:41:48.191000Z http://thehackernews.com/2011/05/appin-information-security-and-ethical.html | |
1267 2017-03-05T00:42:03.635000Z http://thehackernews.com/2011/05/ethical-hacking-services-appin-security.html | |
['ability', 'amazon', 'anonymity', 'appin', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'learn', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mirror', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1268 | |
1269 | |
1269 2017-03-28T06:30:56.221000Z https://arstechnica.com/security/2017/03/ransomware-scammers-exploited-safari-bug-to-extort-porn-viewing-ios-users/ | |
1269 2017-03-29T18:31:07.891000Z http://csoonline.com/article/3185761/ios/scammers-scare-iphone-users-into-paying-to-unlock-not-really-locked-safari.html | |
['andrew', 'apple', 'ask', 'attack', 'attacker', 'blaich', 'blog', 'browser', 'bug', 'campaign', 'card', 'claim', 'clear', 'code', 'comment', 'content', 'control', 'data', 'demanding', 'device', 'displayed', 'easy', 'endless', 'exploited', 'fee', 'flaw', 'get', 'gift', 'going', 'history', 'internet', 'io', 'itunes', 'javascript', 'large', 'least', 'lookout', 'loop', 'lost', 'many', 'matter', 'message', 'mobile', 'multiple', 'number', 'ok', 'one', 'page', 'patched', 'pay', 'paying', 'payment', 'post', 'present', 'prevented', 'provider', 'published', 'ransomware', 'regain', 'reported', 'researcher', 'risk', 'safari', 'said', 'scam', 'scammer', 'setting', 'sign', 'site', 'story', 'time', 'trick', 'use', 'used', 'user', 'version', 'vulnerability', 'website', 'would'] | |
1270 | |
1271 | |
1272 | |
1273 | |
1274 | |
1275 | |
1278 | |
1279 | |
1279 2017-03-05T00:42:02.664000Z http://thehackernews.com/2011/05/cbseguesscom-4243-users-data.html | |
1279 2017-03-05T00:42:12.584000Z http://thehackernews.com/2011/05/paktribunecom-compromised-800.html | |
1279 2017-03-05T00:42:18.067000Z http://thehackernews.com/2011/05/gloriousindiacom-database-hacked-by.html | |
1279 2017-03-05T00:43:24.484000Z http://thehackernews.com/2011/03/xss-vulnerable-on-dmozorg.html | |
1279 2017-03-05T00:46:00.633000Z http://thehackernews.com/2010/12/bluefish-hacked-by-r3d7r0zn-and-gives.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1280 | |
1281 | |
1282 | |
1283 | |
1284 | |
1285 | |
1286 | |
1287 | |
1290 | |
1291 | |
1292 | |
1294 | |
1294 2017-03-05T00:42:01.108000Z http://thehackernews.com/2011/05/channel-v-india-website-hacked-by-madni.html | |
1294 2017-03-05T00:42:08.225000Z http://thehackernews.com/2011/05/116-indian-sites-hacked-by-madni-pak.html | |
1294 2017-03-05T00:44:18.651000Z http://thehackernews.com/2011/03/6-indian-websites-hacked-by-shak-pak.html | |
1294 2017-03-05T00:44:54.372000Z http://thehackernews.com/2011/02/wwwsethpt-hacked-by-pak-cyber-combat.html | |
1294 2017-03-05T00:45:08.694000Z http://thehackernews.com/2011/01/110-websites-hacked-by-pak-cyber-combat.html | |
1294 2017-03-05T00:45:23.543000Z http://thehackernews.com/2011/01/5-websites-hacked-by-pak-cyber-combat.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pak', 'pakistan', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1295 | |
1296 | |
1296 2017-03-05T00:42:09.706000Z http://thehackernews.com/2011/05/conservativeca-vulnerable-to-sql.html | |
1296 2017-03-05T00:42:54.459000Z http://thehackernews.com/2011/04/apollohospitalscom-is-vulnerable-to-sql.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'sql', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'vulnerability', 'vulnerable', 'walking', 'want', 'without', 'york'] | |
1297 | |
1298 | |
1298 2017-03-17T18:30:53.739000Z https://blogs.msdn.microsoft.com/tzink/2017/03/17/a-quick-overview-of-outlook-com-hotmail-sender-support/ | |
1298 2017-03-29T00:30:57.829000Z https://blogs.msdn.microsoft.com/tzink/2017/03/28/why-adding-to-blocked-senders-sometimes-doesnt-block-the-sender/ | |
['add', 'also', 'back', 'best', 'blocked', 'blocking', 'cancel', 'comment', 'complaint', 'content', 'day', 'either', 'email', 'fact', 'fixing', 'future', 'get', 'going', 'good', 'happens', 'help', 'hopefully', 'however', 'junk', 'list', 'make', 'name', 'one', 'part', 'reply', 'request', 'sender', 'sending', 'share', 'sometimes', 'spam', 'spammer', 'think', 'try', 'tzink', 'user', 'want', 'way', 'website'] | |
1299 | |
1300 | |
1300 2017-03-23T18:33:43.125000Z http://www.welivesecurity.com/2016/01/12/smartwatch-may-revealing-cards-pin-code/ | |
1300 2017-03-27T12:31:58.269000Z https://www.welivesecurity.com/2016/01/12/smartwatch-may-revealing-cards-pin-code/ | |
['able', 'abta', 'accelerometer', 'access', 'accuracy', 'achieve', 'across', 'add', 'added', 'agrees', 'al', 'also', 'analysis', 'android', 'app', 'architecture', 'archive', 'around', 'article', 'atm', 'attack', 'attacker', 'author', 'autumn', 'based', 'beltramelli', 'blog', 'breach', 'bring', 'business', 'card', 'choudhury', 'classifier', 'code', 'combining', 'come', 'community', 'compromised', 'conference', 'confined', 'contact', 'continues', 'copenhagen', 'copyright', 'could', 'credit', 'cybercriminal', 'cybercriminals', 'cybersecurity', 'cyberthreat', 'data', 'datasets', 'de', 'deduce', 'deep', 'depot', 'described', 'detailed', 'deutsch', 'device', 'different', 'digit', 'direct', 'div', 'documented', 'economics', 'elaborated', 'email', 'embed', 'en', 'engineer', 'english', 'enterprising', 'eset', 'español', 'evaluated', 'even', 'example', 'excitement', 'experience', 'expert', 'explained', 'extract', 'facebook', 'first', 'flaw', 'follow', 'former', 'found', 'friend', 'gained', 'go', 'google', 'grow', 'guess', 'gyroscope', 'hazard', 'highlighting', 'home', 'hot', 'http', 'illinois', 'inbox', 'including', 'industry', 'infer', 'information', 'infosec', 'innovation', 'inputted', 'insight', 'interested', 'ir', 'karl', 'key', 'keyboard', 'keylogging', 'keypad', 'keystroke', 'lai', 'language', 'last', 'latest', 'leakage', 'learning', 'legal', 'life', 'like', 'link', 'linkedin', 'lock', 'log', 'machine', 'made', 'magazine', 'make', 'material', 'maximum', 'measurement', 'might', 'million', 'monitoring', 'month', 'motion', 'movement', 'multimedia', 'navigation', 'new', 'news', 'newsletter', 'number', 'observe', 'one', 'opinion', 'page', 'paper', 'pattern', 'penetrating', 'pin', 'podcasts', 'policy', 'popular', 'post', 'posted', 'potential', 'print', 'privacy', 'private', 'processing', 'radar', 'range', 'ransomware', 'read', 'reasonable', 'recently', 'recorded', 'related', 'reported', 'research', 'researcher', 'reserved', 'respectively', 'revealing', 'right', 'risk', 'romit', 'roy', 'screen', 'search', 'security', 'seems', 'select', 'sensitive', 'sensor', 'settlement', 'severely', 'sign', 'signal', 'significant', 'simply', 'site', 'sitemap', 'smartphone', 'smartwatch', 'software', 'specific', 'spying', 'still', 'store', 'structure', 'student', 'studying', 'stylesheet', 'suggests', 'system', 'technological', 'ted', 'theoretically', 'thesis', 'thomas', 'three', 'time', 'toggle', 'tony', 'topic', 'touchlogging', 'touchscreen', 'tracking', 'trained', 'twitter', 'typed', 'typing', 'uk', 'undecided', 'university', 'user', 'using', 'valid', 'various', 'victim', 'video', 'view', 'virus', 'wang', 'wearable', 'website', 'wechseln', 'whats', 'white', 'whole', 'wide', 'wls', 'woman', 'word', 'world', 'wrist', 'wrote', 'yet', 'youtube', 'zum'] | |
1301 | |
1302 | |
1302 2017-03-07T12:31:58.277000Z http://www.itsecurityguru.org/2017/03/07/half-global-cyber-firms-cannot-detect-cyber-attacks/ | |
1302 2017-03-07T12:31:26.647000Z http://www.itsecurityguru.org/2017/03/07/dont-worry-slowpoke-microsoft-patched-windows-bug-brags-security-biz/ | |
1302 2017-03-07T12:31:29.954000Z http://www.itsecurityguru.org/2017/03/07/shamoon-malware-spawns-even-nastier-stonedrill/ | |
1302 2017-03-07T12:31:33.648000Z http://www.itsecurityguru.org/2017/03/07/2-5-businesses-blame-rivals-ddos-attack/ | |
1302 2017-03-07T12:31:38.877000Z http://www.itsecurityguru.org/2017/03/07/google-microsoft-increase-bug-bounties/ | |
['ability', 'acquire', 'ad', 'administrator', 'advanced', 'advocate', 'affare', 'afraid', 'agency', 'ago', 'american', 'amidst', 'anderson', 'anonabox', 'application', 'appriver', 'approves', 'around', 'article', 'ask', 'asks', 'atm', 'attack', 'avente', 'back', 'backlash', 'bad', 'bank', 'banking', 'barare', 'betty', 'biggest', 'billion', 'binary', 'biometrics', 'biz', 'blame', 'blank', 'blind', 'board', 'book', 'bought', 'bounty', 'brag', 'breach', 'broadly', 'bug', 'build', 'business', 'ca', 'campaign', 'card', 'cash', 'change', 'citibank', 'claim', 'cm', 'collection', 'combat', 'comey', 'comment', 'community', 'complaint', 'confirms', 'consider', 'consumer', 'cool', 'creating', 'criminal', 'cybe', 'cyber', 'cyberhacklords', 'cybersecurity', 'data', 'date', 'ddos', 'dead', 'debt', 'dept', 'destructive', 'detect', 'development', 'devops', 'di', 'digital', 'discovered', 'discus', 'doe', 'ebay', 'editor', 'editorial', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'even', 'event', 'everyone', 'explain', 'exposed', 'express', 'facebook', 'family', 'find', 'finnish', 'firm', 'flaw', 'follow', 'fraud', 'full', 'gdpr', 'general', 'generation', 'genuine', 'get', 'getting', 'global', 'globally', 'good', 'goodbye', 'google', 'got', 'government', 'greg', 'grip', 'guru', 'habit', 'hack', 'hacked', 'hacker', 'hacking', 'half', 'handle', 'happened', 'head', 'hello', 'help', 'hitting', 'home', 'hospital', 'hour', 'http', 'il', 'impact', 'imposter', 'impostor', 'improve', 'incident', 'increase', 'industry', 'information', 'infosec', 'infosecurity', 'inside', 'jackson', 'japonica', 'justice', 'knew', 'know', 'landmark', 'law', 'lawyer', 'leading', 'leave', 'like', 'link', 'literacy', 'lizard', 'look', 'lure', 'machine', 'making', 'malware', 'many', 'marito', 'michael', 'microsoft', 'min', 'mind', 'mitigation', 'moglie', 'morford', 'must', 'nastier', 'need', 'netflix', 'never', 'new', 'news', 'next', 'nsa', 'num', 'oh', 'one', 'online', 'open', 'operation', 'option', 'original', 'patched', 'paypal', 'persistent', 'pervasive', 'phishing', 'platform', 'please', 'pm', 'popular', 'posted', 'previous', 'primary', 'privacy', 'product', 'professional', 'programmed', 'protecting', 'protection', 'provider', 'ransomware', 'reaction', 'recent', 'record', 'regulation', 'reject', 'related', 'remains', 'report', 'response', 'retailer', 'return', 'review', 'rich', 'rise', 'risk', 'rival', 'round', 'run', 'sailpoint', 'sale', 'sarah', 'scam', 'secure', 'security', 'see', 'sensitive', 'service', 'shamoon', 'share', 'shortage', 'sign', 'skill', 'slowpoke', 'software', 'sort', 'source', 'spam', 'spamgate', 'spawn', 'spot', 'squad', 'stamped', 'stephen', 'stock', 'stonedrill', 'story', 'strategy', 'su', 'success', 'supporter', 'survey', 'tackle', 'tag', 'talking', 'target', 'technology', 'ten', 'term', 'themed', 'thing', 'threat', 'top', 'touch', 'trading', 'trend', 'tua', 'tuo', 'turning', 'tweet', 'uk', 'un', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'veracode', 'video', 'view', 'viral', 'viscuso', 'vulnerability', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'wild', 'window', 'wiretapping', 'within', 'working', 'worry', 'worse', 'wow', 'year', 'yo', 'yokehew'] | |
1303 | |
1304 | |
1305 | |
1306 | |
1306 2017-03-16T18:30:52.385000Z http://securityaffairs.co/wordpress/57192/hacking/drupal-version-8-2-7.html | |
1306 2017-03-17T00:30:46.995000Z http://securityaffairs.co/wordpress/57194/hacking/cve-2017-2636-linux-kernel-flaw.html | |
['account', 'across', 'address', 'advisory', 'affair', 'affect', 'agency', 'agent', 'also', 'america', 'analyst', 'apps', 'apt', 'article', 'attacker', 'author', 'awareness', 'back', 'belief', 'best', 'blog', 'book', 'breach', 'canada', 'caused', 'certified', 'chief', 'cm', 'code', 'contact', 'content', 'cookie', 'copyright', 'council', 'crime', 'currency', 'current', 'cyber', 'dark', 'data', 'deep', 'defense', 'development', 'device', 'digital', 'disable', 'drupal', 'ec', 'enisa', 'ethical', 'european', 'evaluate', 'evangelist', 'experience', 'expert', 'exploit', 'extended', 'field', 'find', 'firm', 'flaw', 'former', 'founded', 'freelance', 'fsb', 'group', 'guard', 'hacker', 'hacking', 'hacktivism', 'home', 'icttf', 'id', 'identity', 'indicted', 'information', 'infosec', 'installed', 'institute', 'intelligence', 'internet', 'island', 'issued', 'landscape', 'law', 'leader', 'led', 'let', 'like', 'london', 'magazine', 'majikpos', 'major', 'malware', 'management', 'many', 'member', 'might', 'mobile', 'module', 'multiple', 'must', 'named', 'national', 'network', 'new', 'news', 'north', 'officer', 'one', 'paganini', 'passion', 'personal', 'picture', 'pierluigi', 'please', 'policy', 'popular', 'previous', 'privacy', 'promote', 'publication', 'read', 'recently', 'regulation', 'release', 'released', 'report', 'reported', 'reserved', 'resource', 'right', 'risk', 'russian', 'security', 'securityaffairs', 'share', 'sharing', 'social', 'solution', 'sponsored', 'stakeholder', 'story', 'strong', 'system', 'take', 'target', 'team', 'telegram', 'terrorism', 'thing', 'threat', 'top', 'tracked', 'treat', 'two', 'union', 'update', 'used', 'user', 'using', 'version', 'virtual', 'vulnerability', 'war', 'warfare', 'web', 'whatsapp', 'would', 'writer', 'writing', 'yahoo', 'year', 'zone'] | |
1307 | |
1309 | |
1310 | |
1310 2017-03-01T06:33:53.516000Z https://www.mimecast.com/blog/2010/09/the-scourge-of-email-slush/ | |
1310 2017-03-18T12:37:35.091000Z http://www.mimecast.com/blog/2010/09/the-scourge-of-email-slush/ | |
['acceptable', 'add', 'addicted', 'addiction', 'advantage', 'africa', 'almost', 'already', 'america', 'american', 'amusing', 'analysis', 'announcing', 'another', 'anyone', 'apps', 'archive', 'archiving', 'arrived', 'asia', 'asking', 'attack', 'available', 'award', 'away', 'become', 'best', 'big', 'blackberry', 'blog', 'blurred', 'bold', 'brit', 'bundle', 'business', 'call', 'career', 'center', 'central', 'ceo', 'change', 'chat', 'check', 'choice', 'coalition', 'colleague', 'comment', 'commonly', 'company', 'compliance', 'compromise', 'concentrated', 'concentration', 'connected', 'contact', 'content', 'continuity', 'control', 'converge', 'corporate', 'could', 'crave', 'customer', 'cyber', 'dangerous', 'data', 'dead', 'deal', 'decision', 'deep', 'deeply', 'defend', 'delete', 'deleted', 'demand', 'demo', 'detail', 'disclaimer', 'disclosure', 'disjointed', 'disqus', 'disturbing', 'dlp', 'doggedly', 'drowned', 'east', 'email', 'enable', 'enormous', 'enough', 'eradicated', 'especially', 'europe', 'even', 'event', 'ever', 'evidence', 'exchange', 'expected', 'expert', 'face', 'feel', 'figure', 'file', 'filed', 'finally', 'fix', 'fixed', 'flooding', 'flying', 'follow', 'force', 'fresh', 'generally', 'genuine', 'get', 'give', 'gone', 'good', 'google', 'got', 'governance', 'great', 'grumpy', 'guessed', 'guesstimate', 'guilty', 'happening', 'hear', 'high', 'history', 'hit', 'home', 'hopefully', 'hub', 'hybrid', 'hypochondriac', 'idea', 'ideally', 'im', 'importantly', 'impossible', 'inbox', 'incoming', 'increasingly', 'incredibly', 'information', 'intense', 'interesting', 'internet', 'interruption', 'invading', 'investor', 'iphones', 'issue', 'javascript', 'keep', 'keeping', 'knowledgebase', 'laptop', 'large', 'lawyer', 'leadership', 'leave', 'legacy', 'legal', 'life', 'likely', 'line', 'little', 'log', 'logged', 'logging', 'login', 'lot', 'love', 'machine', 'made', 'mail', 'maintenance', 'make', 'making', 'male', 'managed', 'management', 'marginally', 'matthew', 'maybe', 'mean', 'meeting', 'memory', 'mesaging', 'message', 'messaging', 'metaphorically', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mindlessly', 'mobile', 'mobility', 'need', 'network', 'never', 'new', 'news', 'north', 'note', 'nothing', 'notion', 'office', 'often', 'okay', 'option', 'others', 'outage', 'overload', 'overview', 'pacific', 'paper', 'paradigm', 'particularly', 'partner', 'people', 'percent', 'personal', 'phone', 'plague', 'platform', 'play', 'pleading', 'please', 'policy', 'popping', 'post', 'posted', 'power', 'powered', 'practice', 'presentation', 'presenter', 'press', 'pretending', 'privacy', 'private', 'probably', 'problem', 'product', 'productivity', 'profession', 'professional', 'program', 'protection', 'provides', 'provoked', 'push', 'put', 'quality', 'quote', 'rap', 'ravden', 'read', 'ready', 'reality', 'really', 'registration', 'related', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'respect', 'respecting', 'responsible', 'rest', 'return', 'right', 'risk', 'road', 'role', 'sale', 'say', 'scanning', 'schedule', 'scourge', 'screen', 'secure', 'security', 'selling', 'send', 'server', 'service', 'share', 'shift', 'sign', 'signature', 'simple', 'simply', 'sitemap', 'skype', 'slot', 'slush', 'solution', 'something', 'south', 'spam', 'span', 'speaking', 'specie', 'stark', 'stay', 'stop', 'stopped', 'straight', 'string', 'stuff', 'success', 'suffering', 'suit', 'support', 'sure', 'surprising', 'survey', 'switching', 'table', 'take', 'taken', 'talking', 'targeted', 'team', 'technical', 'telling', 'temptation', 'tend', 'term', 'think', 'though', 'thought', 'threat', 'three', 'time', 'today', 'track', 'traditionally', 'training', 'trouble', 'trust', 'truth', 'two', 'type', 'unheard', 'unprepared', 'use', 'vacation', 'value', 'vault', 'vibrant', 'view', 'virus', 'want', 'wanted', 'way', 'webinars', 'whereas', 'whether', 'white', 'whole', 'without', 'work', 'working', 'worse', 'would', 'writing'] | |
1311 | |
1312 | |
1313 | |
1313 2017-03-02T18:30:42.945000Z http://darkreading.com/attacks-breaches/doj-indicts-19-people-in-global-fraud-money-laundering-schemes-/d/d-id/1328303 | |
1313 2017-03-02T18:30:49.466000Z http://darkreading.com/vulnerabilities---threats/google-enhances-safe-browsing-for-chrome-on-macos/d/d-id/1328302 | |
1313 2017-03-02T18:30:51.778000Z http://darkreading.com/risk/survey-finds-disconnect-between-security-strategy-and-execution/d/d-id/1328300 | |
['access', 'account', 'adapter', 'addition', 'advanced', 'advertise', 'advertising', 'afp', 'aix', 'aka', 'allows', 'analyst', 'analytics', 'anomali', 'apic', 'app', 'application', 'arbitrary', 'archive', 'archived', 'article', 'attack', 'attacker', 'attacking', 'attend', 'authentication', 'author', 'automated', 'back', 'bae', 'behavior', 'best', 'bio', 'black', 'board', 'box', 'breach', 'breaking', 'brief', 'bug', 'build', 'business', 'button', 'ca', 'calendar', 'caption', 'car', 'card', 'career', 'cartoon', 'case', 'cause', 'center', 'certification', 'challenge', 'channel', 'chooses', 'cisco', 'click', 'close', 'cloud', 'cloudpassage', 'code', 'collaboration', 'combining', 'coming', 'comment', 'communication', 'community', 'company', 'compliance', 'computing', 'conference', 'connect', 'consumption', 'contact', 'content', 'contest', 'controller', 'coolest', 'copyright', 'create', 'creative', 'csrf', 'current', 'cybercrime', 'cybersecurity', 'cylance', 'dark', 'darkreading', 'data', 'database', 'defense', 'delivers', 'deloitte', 'demonstrated', 'denial', 'development', 'device', 'devops', 'difference', 'dig', 'direct', 'directory', 'discovered', 'discus', 'download', 'dr', 'drm', 'editor', 'email', 'emerging', 'enabled', 'end', 'endpoint', 'engineer', 'enough', 'enterprise', 'event', 'evolution', 'execute', 'execution', 'executive', 'experience', 'extplorer', 'facebook', 'favorite', 'feed', 'fibre', 'fight', 'file', 'find', 'first', 'flag', 'flash', 'follow', 'force', 'foreground', 'forgery', 'found', 'free', 'full', 'fusion', 'future', 'gain', 'gamasutra', 'game', 'gdc', 'gem', 'graphic', 'group', 'guest', 'guide', 'gundert', 'hack', 'hacker', 'halo', 'handle', 'hat', 'hdi', 'higgins', 'hijack', 'hit', 'host', 'ibm', 'icmi', 'id', 'identifying', 'identity', 'impact', 'independent', 'info', 'information', 'informationweek', 'infrastructure', 'insider', 'insight', 'institute', 'intel', 'intelligence', 'interesting', 'interop', 'involving', 'iot', 'issue', 'item', 'itx', 'jackson', 'jitter', 'juniper', 'kamkar', 'kelly', 'kernel', 'key', 'lab', 'later', 'latest', 'leader', 'learn', 'leveraging', 'levi', 'library', 'licensing', 'link', 'linkedin', 'linux', 'list', 'live', 'local', 'login', 'machine', 'make', 'management', 'manager', 'many', 'marketing', 'mean', 'medical', 'memory', 'messaging', 'might', 'mimecast', 'mishandles', 'mobile', 'monitoring', 'move', 'multiplier', 'must', 'national', 'need', 'netstat', 'network', 'new', 'newest', 'news', 'newsletter', 'next', 'object', 'oldest', 'operation', 'operationalizing', 'opportunity', 'original', 'pace', 'page', 'paper', 'partnering', 'past', 'people', 'perimeter', 'phishy', 'php', 'please', 'policy', 'poll', 'post', 'practical', 'practice', 'president', 'print', 'privacy', 'privilege', 'process', 'profile', 'promise', 'protection', 'provided', 'provider', 'published', 'qnap', 'qts', 'quick', 'radio', 'rate', 'rating', 'raytheon', 'read', 'reader', 'reading', 'rebirth', 'recorded', 'red', 'regarding', 'remote', 'rendering', 'report', 'reprint', 'request', 'researcher', 'reserved', 'responding', 'right', 'risk', 'samy', 'save', 'schedule', 'sec', 'secdevops', 'secure', 'security', 'selecting', 'served', 'service', 'share', 'show', 'siem', 'significance', 'sitemap', 'slideshows', 'social', 'solution', 'source', 'speed', 'sprint', 'ssh', 'staff', 'starbucks', 'startup', 'statement', 'stop', 'story', 'strategic', 'study', 'subscribe', 'subsystem', 'summary', 'support', 'synopsis', 'system', 'tackle', 'talk', 'target', 'team', 'tech', 'technology', 'teller', 'term', 'testing', 'threaded', 'threat', 'tool', 'top', 'toward', 'track', 'transition', 'traversal', 'trying', 'ttps', 'tweet', 'twitter', 'ubm', 'understand', 'university', 'unspecified', 'unusual', 'use', 'used', 'useful', 'user', 'valuable', 'vector', 'veracode', 'via', 'vice', 'video', 'view', 'vios', 'vrdc', 'vulnerability', 'vulns', 'wanted', 'watch', 'way', 'webcasts', 'webinar', 'webinars', 'white', 'win', 'wish', 'working', 'workload', 'world', 'would', 'write', 'xero', 'year'] | |
1314 | |
1314 2017-03-14T18:31:09.980000Z http://www.welivesecurity.com/2011/12/08/secure-dns-encrypt-the-last-mile/ | |
1314 2017-03-27T12:33:28.149000Z https://www.welivesecurity.com/2011/12/08/secure-dns-encrypt-the-last-mile/ | |
['ability', 'access', 'account', 'activity', 'adding', 'aim', 'almost', 'also', 'among', 'another', 'apart', 'app', 'approach', 'area', 'around', 'aspect', 'attack', 'author', 'available', 'bank', 'banking', 'become', 'bolstering', 'boon', 'break', 'browsing', 'call', 'called', 'cameron', 'camp', 'censorship', 'certainly', 'changing', 'client', 'cohesive', 'combined', 'communication', 'concern', 'concerned', 'construct', 'contribute', 'convincing', 'could', 'current', 'data', 'defense', 'degree', 'dent', 'destination', 'device', 'difference', 'directs', 'dns', 'dnscrypt', 'dnssec', 'done', 'ecosystem', 'effort', 'email', 'encourage', 'encrypt', 'encrypted', 'end', 'entirely', 'eset', 'every', 'exercise', 'experience', 'eye', 'fabric', 'fake', 'fall', 'file', 'fix', 'folk', 'form', 'forthcoming', 'fraudulent', 'friend', 'fund', 'futility', 'get', 'go', 'greater', 'headline', 'hope', 'host', 'huge', 'im', 'impact', 'increase', 'information', 'input', 'instead', 'intended', 'intends', 'interesting', 'intermediary', 'internet', 'ip', 'large', 'largely', 'last', 'lately', 'later', 'level', 'like', 'link', 'linking', 'looking', 'mac', 'making', 'malicious', 'many', 'might', 'mile', 'mind', 'miraculous', 'missing', 'modification', 'must', 'name', 'nastiness', 'nasty', 'needed', 'note', 'notice', 'one', 'online', 'opendns', 'original', 'outside', 'page', 'pain', 'persist', 'piece', 'platform', 'please', 'possible', 'posted', 'potential', 'potentially', 'presumably', 'pretty', 'print', 'privacy', 'problematic', 'proposed', 'proposing', 'protect', 'protocol', 'prying', 'rather', 'rattling', 'real', 'reason', 'redirect', 'redirected', 'redirection', 'releasing', 'remarkably', 'remember', 'request', 'right', 'routed', 'sale', 'scam', 'scammer', 'scamming', 'scheme', 'scope', 'secure', 'security', 'server', 'set', 'setting', 'side', 'sidestep', 'sidestepped', 'similar', 'since', 'site', 'spirit', 'standard', 'start', 'statement', 'stolen', 'subject', 'technology', 'text', 'thwarting', 'time', 'together', 'touch', 'toward', 'traditional', 'traffic', 'trust', 'trusted', 'underworld', 'unencrypted', 'unprotected', 'untrusted', 'use', 'user', 'using', 'variant', 'variation', 'via', 'victim', 'visit', 'web', 'website', 'well', 'went', 'whatever', 'whats', 'wherever', 'whole', 'window', 'would'] | |
1315 | |
1315 2017-03-17T12:31:14.691000Z http://www.itsecurityguru.org/2017/03/17/rise-cyber-insurance-good-bad/ | |
1315 2017-03-20T12:31:10.386000Z https://www.helpnetsecurity.com/2017/03/20/cyber-insurance/ | |
1315 2017-03-21T12:30:48.675000Z https://letstalk.globalservices.bt.com/en/2017/03/challenges-insurance-sector-faces-2017/ | |
1315 2017-03-24T00:30:59.461000Z https://blog.strozfriedberg.com/women-cybersecurity-cyber-insurance-shannan-fort-stephanie-snyder-carrie-yang-aon/ | |
['business', 'company', 'cyber', 'data', 'even', 'find', 'important', 'industry', 'information', 'insurance', 'look', 'network', 'security', 'technology', 'would'] | |
1316 | |
1317 | |
1318 | |
1319 | |
1320 | |
1320 2017-03-05T00:44:14.033000Z http://thehackernews.com/2011/03/26-australian-beerwine-shop-websites.html | |
1320 2017-03-05T00:46:32.330000Z http://thehackernews.com/2010/11/47-more-indian-sites-hacked-by-pak.html | |
1320 2017-03-05T00:46:35.739000Z http://thehackernews.com/2010/11/10-indian-sites-deface-by-pakcobras.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pakistan', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1323 | |
1325 | |
1326 | |
1326 2017-03-05T00:40:12.847000Z http://thehackernews.com/2011/08/45-indian-websites-hacked-by-shadow008.html | |
1326 2017-03-05T00:42:26.716000Z http://thehackernews.com/2011/05/12-american-websites-hacked-by-minhal.html | |
1326 2017-03-05T00:42:52.536000Z http://thehackernews.com/2011/04/326-websites-hacked-by-minhal-mehdi.html | |
1326 2017-03-05T00:42:57.530000Z http://thehackernews.com/2011/04/71-websites-hacked-by-t0hr0-amn.html | |
1326 2017-03-05T00:43:02.818000Z http://thehackernews.com/2011/04/116-websites-hacked-by-minhal-mehdi.html | |
1326 2017-03-05T00:43:28.380000Z http://thehackernews.com/2011/03/25-website-hacked-by-xen0n-bangladeshi.html | |
1326 2017-03-05T00:43:29.802000Z http://thehackernews.com/2011/03/10-websites-hacked-by-cyberhunterxx.html | |
1326 2017-03-05T00:43:44.164000Z http://thehackernews.com/2011/03/3-websites-hacked-by-team-greyhat.html | |
1326 2017-03-05T00:43:50.922000Z http://thehackernews.com/2011/03/2-websites-hacked-by-kamtiez.html | |
1326 2017-03-05T00:43:53.364000Z http://thehackernews.com/2011/03/102-websites-hacked-by-dinelsonus-for.html | |
1326 2017-03-05T00:46:44.273000Z http://thehackernews.com/2010/11/3-websites-hacked-by-andrecorleone.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
1327 | |
1327 2017-03-24T18:33:40.905000Z http://www.welivesecurity.com/2017/03/24/16-years-mac-os-x-secure-not-invincible-malware/ | |
1327 2017-03-27T12:34:04.293000Z https://www.welivesecurity.com/2017/03/24/16-years-mac-os-x-secure-not-invincible-malware/ | |
['able', 'access', 'adding', 'ago', 'aka', 'almost', 'alone', 'along', 'also', 'another', 'app', 'application', 'attacker', 'author', 'backdoor', 'based', 'become', 'belonged', 'bittorrent', 'called', 'came', 'case', 'caught', 'certificate', 'changed', 'channel', 'chooses', 'claimed', 'click', 'client', 'communication', 'compromised', 'computer', 'concept', 'convincing', 'cybercriminal', 'data', 'despite', 'developer', 'different', 'discovered', 'distract', 'distribution', 'downloaded', 'drop', 'easy', 'email', 'encrypted', 'eset', 'every', 'executable', 'executed', 'exist', 'experience', 'feature', 'file', 'finally', 'first', 'friend', 'full', 'fully', 'functional', 'get', 'giving', 'gradually', 'group', 'growing', 'guaranteed', 'hour', 'however', 'impenetrable', 'increasing', 'infect', 'infected', 'infiltrating', 'interest', 'invincible', 'keranger', 'kubovič', 'last', 'launched', 'learn', 'legitimate', 'light', 'looking', 'mac', 'machine', 'malicious', 'malware', 'many', 'masqueraded', 'matter', 'named', 'new', 'novelty', 'often', 'ondrej', 'one', 'open', 'operating', 'page', 'passed', 'past', 'penetrated', 'pirating', 'place', 'popped', 'popular', 'posted', 'prey', 'print', 'promised', 'prove', 'radar', 'ransomware', 'secure', 'security', 'sednit', 'seen', 'signed', 'simply', 'single', 'site', 'sofacy', 'software', 'solution', 'source', 'specialist', 'spreading', 'stable', 'start', 'stealer', 'step', 'system', 'target', 'targeted', 'thousand', 'three', 'time', 'took', 'tool', 'transmission', 'type', 'unix', 'used', 'user', 'version', 'via', 'victim', 'visit', 'want', 'website', 'whats', 'would', 'writer', 'year', 'zip'] | |
1329 | |
1330 | |
1330 2017-03-16T18:31:05.596000Z http://www.welivesecurity.com/podcasts/nsa-revelations-impact-online-behavior/ | |
1330 2017-03-27T12:32:41.514000Z https://www.welivesecurity.com/podcasts/nsa-revelations-impact-online-behavior/ | |
['add', 'al', 'behavior', 'blog', 'code', 'community', 'conference', 'contact', 'copyright', 'currently', 'de', 'deutsch', 'direct', 'div', 'download', 'editor', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'facebook', 'follow', 'friend', 'go', 'home', 'http', 'impact', 'inbox', 'information', 'insight', 'ir', 'language', 'latest', 'legal', 'length', 'link', 'linkedin', 'magazine', 'material', 'message', 'multimedia', 'navigation', 'news', 'newsletter', 'nsa', 'online', 'opinion', 'page', 'paper', 'pause', 'play', 'podcast', 'podcasts', 'policy', 'post', 'posted', 'print', 'privacy', 'radar', 'research', 'reserved', 'revelation', 'right', 'search', 'security', 'sent', 'sign', 'site', 'sitemap', 'stylesheet', 'toggle', 'total', 'twitter', 'video', 'view', 'virus', 'wechseln', 'white', 'wls', 'youtube', 'zum'] | |
1331 | |
1331 2017-03-01T06:30:50.568000Z https://www.mimecast.com/blog/2016/11/our-top-3-takeaways-from-the-forrester-wave-information-archiving-cloud-providers-report/ | |
1331 2017-03-18T12:31:18.637000Z http://www.mimecast.com/blog/2016/11/our-top-3-takeaways-from-the-forrester-wave-information-archiving-cloud-providers-report/ | |
['accelerate', 'acceptable', 'accomplishment', 'achmad', 'adoption', 'advisory', 'africa', 'alone', 'also', 'america', 'analyst', 'api', 'apps', 'architecture', 'archive', 'archiving', 'arm', 'asia', 'ask', 'automation', 'award', 'back', 'barracuda', 'based', 'become', 'big', 'bit', 'blog', 'boon', 'breakaway', 'bring', 'brings', 'buildout', 'bundle', 'business', 'call', 'career', 'category', 'center', 'central', 'certain', 'chadran', 'challenge', 'chat', 'cloud', 'coalition', 'come', 'comment', 'community', 'company', 'compliance', 'contact', 'content', 'continuity', 'contribution', 'control', 'conversation', 'copyrighted', 'customer', 'cyber', 'cybercrime', 'data', 'degree', 'delighted', 'delivering', 'demo', 'detail', 'developed', 'disappoint', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'dna', 'domination', 'earned', 'east', 'ecm', 'economy', 'eia', 'email', 'emailed', 'emergence', 'enable', 'enterprise', 'europe', 'even', 'event', 'ever', 'evolution', 'exchange', 'expanded', 'expansion', 'expected', 'exposure', 'extends', 'face', 'familiar', 'fascinating', 'feel', 'file', 'filed', 'finally', 'financial', 'firm', 'fluid', 'focused', 'focusing', 'forrester', 'found', 'foundation', 'founded', 'frequently', 'fully', 'gartner', 'gdpr', 'get', 'global', 'google', 'hand', 'hard', 'held', 'high', 'hold', 'home', 'honor', 'hybrid', 'ideal', 'im', 'include', 'included', 'indebted', 'infinite', 'information', 'insight', 'instant', 'interesting', 'interview', 'intronis', 'investor', 'javascript', 'joining', 'keep', 'key', 'know', 'knowledge', 'knowledgebase', 'large', 'law', 'lead', 'leader', 'leadership', 'legacy', 'legal', 'legendary', 'let', 'leverage', 'library', 'login', 'lot', 'magic', 'make', 'managed', 'management', 'manager', 'market', 'marketing', 'matured', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mix', 'mobility', 'morphed', 'msp', 'mushroomed', 'name', 'need', 'network', 'new', 'news', 'north', 'offer', 'office', 'ohio', 'option', 'organization', 'origin', 'overcome', 'overview', 'pace', 'pacific', 'part', 'partner', 'performance', 'platform', 'please', 'policy', 'position', 'post', 'posted', 'powered', 'press', 'prior', 'privacy', 'privilege', 'product', 'productivity', 'professional', 'program', 'proprietary', 'protection', 'proven', 'provided', 'provider', 'provides', 'put', 'quadrant', 'quote', 'rapid', 'rarely', 'recently', 'recognition', 'recognize', 'recognized', 'recognizing', 'record', 'reflecting', 'regard', 'registration', 'regulation', 'related', 'relation', 'release', 'report', 'research', 'reseller', 'reserved', 'resilience', 'resource', 'responding', 'responsible', 'retention', 'right', 'risk', 'rival', 'role', 'root', 'rose', 'saas', 'sale', 'say', 'scale', 'schedule', 'secure', 'security', 'see', 'send', 'service', 'share', 'sharing', 'siemens', 'signature', 'simplifying', 'sitemap', 'snapshot', 'solution', 'somehow', 'south', 'specialist', 'spiraling', 'state', 'story', 'strategy', 'success', 'support', 'surprise', 'surprised', 'takeaway', 'targeted', 'team', 'teaming', 'technical', 'term', 'thanks', 'threat', 'three', 'tm', 'together', 'top', 'touchpoint', 'trademark', 'training', 'trust', 'turn', 'understandably', 'unified', 'unique', 'unit', 'university', 'upon', 'use', 'user', 'vendor', 'vertical', 'view', 'virginia', 'vital', 'want', 'wave', 'way', 'web', 'webinars', 'well', 'win', 'without', 'work', 'workflow', 'world', 'worth', 'yet'] | |
1332 | |
1332 2017-03-01T06:31:30.376000Z https://www.mimecast.com/blog/2015/08/three-ways-to-improve-the-human-firewall-and-strengthen-email-security/ | |
1332 2017-03-18T12:32:58.303000Z http://www.mimecast.com/blog/2015/08/three-ways-to-improve-the-human-firewall-and-strengthen-email-security/ | |
['ability', 'action', 'actually', 'ally', 'alternative', 'analyst', 'answer', 'appeal', 'applying', 'archiving', 'army', 'attachment', 'attack', 'attacker', 'aware', 'back', 'backwards', 'bay', 'behavior', 'best', 'blackenergy', 'blog', 'break', 'build', 'business', 'busy', 'care', 'career', 'case', 'caveat', 'clear', 'click', 'clicking', 'cloud', 'come', 'comment', 'company', 'compelling', 'compliance', 'comprises', 'consequence', 'consultancy', 'context', 'continue', 'continuity', 'continuous', 'control', 'core', 'correctly', 'could', 'credential', 'critical', 'current', 'cyber', 'cybersecurity', 'data', 'defend', 'defender', 'defense', 'department', 'depends', 'desired', 'determine', 'disqus', 'educate', 'effective', 'either', 'email', 'emergence', 'employee', 'enable', 'engineering', 'enough', 'enter', 'enterprise', 'entire', 'equipped', 'evangelism', 'event', 'exactly', 'example', 'exist', 'explained', 'explore', 'fall', 'farfetched', 'feel', 'fewer', 'fighting', 'filed', 'finding', 'firewall', 'first', 'five', 'flag', 'forrester', 'gave', 'get', 'go', 'government', 'guarantee', 'hack', 'happens', 'hayes', 'highlight', 'home', 'hosted', 'human', 'hypothetical', 'identify', 'illustrate', 'impart', 'important', 'improve', 'includes', 'industry', 'influential', 'infrastructure', 'innovative', 'instead', 'internal', 'introducing', 'javascript', 'jeopardized', 'joined', 'joining', 'know', 'knowledge', 'language', 'last', 'le', 'learn', 'learned', 'like', 'likely', 'line', 'link', 'linkedin', 'macro', 'made', 'malicious', 'malone', 'malware', 'manager', 'merely', 'microsoft', 'might', 'mimecast', 'mobile', 'motivation', 'necessary', 'need', 'nervous', 'neutralize', 'new', 'next', 'nick', 'office', 'one', 'organization', 'orlando', 'overwhelmed', 'particular', 'phone', 'picture', 'place', 'play', 'please', 'point', 'post', 'posted', 'powered', 'previously', 'price', 'prior', 'pro', 'problem', 'process', 'product', 'properly', 'protect', 'protection', 'publication', 'putting', 'ransomware', 'reach', 'react', 'read', 'real', 'reason', 'recognize', 'refers', 'related', 'remember', 'research', 'resellers', 'respond', 'right', 'ringing', 'rising', 'risk', 'robot', 'saas', 'sale', 'savvy', 'security', 'seem', 'seen', 'sensitive', 'shadow', 'share', 'shore', 'snuck', 'social', 'someone', 'speaking', 'spend', 'step', 'steve', 'strategist', 'strengthen', 'strengthening', 'stress', 'strongest', 'successful', 'take', 'takeaway', 'talking', 'targeted', 'teach', 'technology', 'temptation', 'though', 'threat', 'three', 'tide', 'topic', 'trained', 'training', 'trojan', 'trying', 'two', 'understand', 'unknowingly', 'upon', 'url', 'variety', 'vendor', 'veteran', 'victim', 'view', 'vulnerable', 'want', 'ward', 'wave', 'way', 'webinar', 'week', 'well', 'whatever', 'whether', 'widespread', 'wisely', 'work', 'worked', 'working', 'workplace', 'would', 'writing', 'wrong'] | |
1333 | |
1334 | |
1334 2017-03-02T00:30:52.849000Z http://csoonline.com/article/3176094/data-breach/6-dangerous-toys-that-are-not-childs-play.html | |
1334 2017-03-15T18:30:51.953000Z http://csoonline.com/article/3180810/fraud/five-tips-to-be-security-smart-this-tax-season.html | |
1334 2017-03-23T12:31:47.134000Z http://csoonline.com/article/3183471/security/how-to-stop-insider-threats.html | |
1334 2017-03-28T18:30:51.546000Z http://csoonline.com/article/3184217/social-engineering/social-engineering-fake-outs.html | |
1334 2017-03-30T18:30:55.677000Z http://csoonline.com/article/3186267/security/hackers-continue-to-troll-linkedin.html | |
['access', 'account', 'additional', 'address', 'breach', 'brochure', 'business', 'cloud', 'comma', 'company', 'concern', 'courtesy', 'cso', 'cybersecurity', 'data', 'download', 'email', 'emailing', 'error', 'fit', 'francis', 'friend', 'george', 'headline', 'home', 'image', 'inhibit', 'instantly', 'larger', 'learn', 'let', 'life', 'link', 'management', 'manager', 'master', 'message', 'move', 'multiple', 'next', 'online', 'page', 'paper', 'password', 'policy', 'prev', 'privacy', 'pt', 'related', 'resource', 'right', 'risk', 'ryan', 'secure', 'security', 'see', 'sent', 'separate', 'slideshow', 'sorry', 'sponsored', 'take', 'terabyte', 'thank', 'threat', 'tip', 'use', 'user', 'washington', 'wherever', 'white'] | |
1335 | |
1336 | |
1337 | |
1338 | |
1339 | |
1339 2017-03-09T00:30:49.995000Z https://community.rapid7.com/community/metasploit/blog/2017/03/08/attacking-microsoft-office-openoffice-with-metasploit-macro-exploits | |
1339 2017-03-23T12:31:53.401000Z https://www.bleepingcomputer.com/news/security/word-document-spreads-macro-malware-targeting-both-windows-and-macos/ | |
['allow', 'also', 'application', 'attack', 'box', 'breach', 'case', 'code', 'comment', 'content', 'copy', 'data', 'depending', 'different', 'document', 'doe', 'download', 'even', 'exploit', 'file', 'final', 'inside', 'last', 'like', 'mac', 'macro', 'malicious', 'malware', 'mean', 'medium', 'meterpreter', 'microsoft', 'million', 'module', 'need', 'never', 'new', 'office', 'order', 'payload', 'popular', 'post', 'prompt', 'ransomware', 'right', 'run', 'security', 'server', 'show', 'sign', 'since', 'software', 'start', 'support', 'task', 'time', 'tool', 'use', 'used', 'user', 'using', 'usually', 'web', 'window', 'word', 'write'] | |
1340 | |
1341 | |
1341 2017-03-01T12:30:43.992000Z https://www.grahamcluley.com/recover-filecoder-ransomware-mac/ | |
1341 2017-03-01T12:30:48.065000Z https://www.grahamcluley.com/gatekeeper-like-feature-for-windows-10-allows-app-installations-only-from-microsoft-store/ | |
['account', 'adobe', 'advice', 'adwind', 'alert', 'allows', 'also', 'android', 'app', 'appearance', 'apple', 'application', 'apps', 'article', 'associate', 'attack', 'audio', 'author', 'award', 'backdoor', 'backup', 'bad', 'best', 'billion', 'bisson', 'blackberry', 'blog', 'blox', 'bob', 'botnet', 'brilliant', 'browser', 'btc', 'buffer', 'ca', 'carole', 'category', 'celebrity', 'channel', 'charged', 'check', 'chef', 'chrome', 'clickjacking', 'close', 'clue', 'cluley', 'comment', 'company', 'computer', 'condition', 'contact', 'content', 'contributor', 'cooky', 'copyright', 'country', 'covello', 'crash', 'credential', 'cyber', 'daily', 'data', 'david', 'ddos', 'defaces', 'defence', 'deluge', 'denial', 'dirty', 'donald', 'edge', 'email', 'encryption', 'episode', 'event', 'exploit', 'explorer', 'facebook', 'fake', 'false', 'feature', 'feed', 'filecoder', 'filed', 'firefox', 'first', 'flag', 'flash', 'focused', 'follow', 'free', 'fun', 'fundraising', 'future', 'game', 'gchq', 'gear', 'get', 'google', 'gordon', 'graham', 'guest', 'guideline', 'hack', 'hacked', 'hacker', 'hacking', 'happened', 'help', 'hire', 'hit', 'home', 'hope', 'hosted', 'humbug', 'idea', 'incapsula', 'industry', 'infected', 'info', 'informed', 'installed', 'internet', 'io', 'itunes', 'jacaranda', 'java', 'jim', 'latest', 'laundry', 'law', 'le', 'leaking', 'leave', 'like', 'limited', 'link', 'linkedin', 'linux', 'list', 'listen', 'live', 'login', 'loss', 'mac', 'macos', 'malicious', 'malware', 'mean', 'medium', 'menu', 'microsoft', 'might', 'mobile', 'movie', 'naked', 'navigation', 'network', 'new', 'news', 'newsletter', 'night', 'nope', 'notify', 'nude', 'often', 'one', 'operating', 'opinion', 'oracle', 'order', 'pdf', 'people', 'philip', 'phishers', 'phishing', 'phone', 'plus', 'podcast', 'podcasts', 'policy', 'popular', 'post', 'pouring', 'powered', 'press', 'pressidium', 'privacy', 'protected', 'public', 'put', 'raining', 'ramsay', 'ransomware', 'rat', 'receipt', 'recent', 'recorded', 'recover', 'reddit', 'register', 'reply', 'reserved', 'return', 'review', 'riche', 'right', 'risk', 'rogue', 'running', 'safari', 'script', 'security', 'send', 'service', 'share', 'since', 'site', 'smashing', 'social', 'software', 'soliman', 'someone', 'spam', 'speak', 'speaking', 'sponsor', 'sponsorship', 'staff', 'stay', 'stealing', 'stop', 'store', 'story', 'stream', 'subdomain', 'subscribe', 'support', 'svajcer', 'system', 'tab', 'tag', 'takeover', 'targeting', 'tell', 'term', 'testimonial', 'theriault', 'thing', 'threat', 'three', 'tip', 'tool', 'top', 'trending', 'trump', 'twitter', 'uncategorized', 'user', 'vanja', 'via', 'video', 'view', 'visit', 'vulnerability', 'want', 'warned', 'weather', 'web', 'website', 'week', 'weekly', 'whatsapp', 'wibbling', 'wilf', 'window', 'wordpress', 'work', 'world', 'write', 'yahoo', 'yasin', 'youtube'] | |
1342 | |
1342 2017-03-13T18:30:53.873000Z http://www.welivesecurity.com/2017/03/13/challenges-implications-cybersecurity-legislation/ | |
1342 2017-03-27T12:31:22.072000Z https://www.welivesecurity.com/2017/03/13/challenges-implications-cybersecurity-legislation/ | |
['ability', 'able', 'absence', 'academic', 'access', 'account', 'across', 'act', 'action', 'activity', 'adapt', 'adapted', 'add', 'additional', 'adhere', 'adherence', 'adopted', 'adoption', 'advance', 'advancing', 'affect', 'affecting', 'agency', 'agenda', 'agreement', 'aim', 'aimed', 'al', 'almost', 'along', 'already', 'also', 'although', 'always', 'america', 'among', 'android', 'another', 'anyone', 'app', 'apple', 'application', 'applied', 'appropriate', 'approved', 'archive', 'area', 'arise', 'around', 'article', 'ascendancy', 'ascertain', 'aspect', 'asset', 'associated', 'attack', 'australia', 'author', 'authority', 'avoid', 'based', 'basic', 'become', 'becomes', 'behavior', 'behind', 'benefit', 'best', 'bilateral', 'bletchley', 'blocking', 'blog', 'border', 'brazil', 'bring', 'budapest', 'capacity', 'caribbean', 'case', 'certain', 'challenge', 'characteristic', 'check', 'citizen', 'clear', 'clearly', 'code', 'codebreakers', 'collaborate', 'collaboration', 'come', 'coming', 'commercial', 'commitment', 'common', 'community', 'company', 'competent', 'complete', 'computer', 'conception', 'concerning', 'condition', 'conference', 'confidence', 'conflict', 'conflicting', 'congress', 'connection', 'consider', 'consideration', 'considered', 'considers', 'constitutional', 'contact', 'context', 'continue', 'continuously', 'contribute', 'convention', 'cooperation', 'coordinate', 'cope', 'copyright', 'corresponding', 'could', 'council', 'counterpoint', 'country', 'course', 'creation', 'crime', 'criterion', 'critical', 'csirt', 'culture', 'current', 'cyber', 'cyberattacks', 'cybercrime', 'cybersecurity', 'data', 'day', 'de', 'debate', 'decade', 'decisive', 'defensive', 'define', 'defines', 'delay', 'demonstrate', 'dependent', 'depends', 'despite', 'detail', 'determine', 'deutsch', 'develop', 'developed', 'developing', 'development', 'device', 'differ', 'difference', 'different', 'differing', 'difficult', 'diffusion', 'digital', 'direct', 'directive', 'disclosure', 'disparity', 'div', 'document', 'done', 'doubt', 'due', 'easy', 'economic', 'economy', 'effect', 'effective', 'electronic', 'email', 'embed', 'emerge', 'emergence', 'emergent', 'emerging', 'emphasizes', 'en', 'enactment', 'encouraging', 'end', 'energy', 'engage', 'english', 'enjoyed', 'entail', 'enter', 'equipped', 'era', 'eset', 'español', 'especially', 'establishing', 'eternal', 'ethical', 'eu', 'european', 'even', 'event', 'every', 'evidence', 'evolving', 'example', 'exchange', 'exist', 'existing', 'experiencing', 'expert', 'expression', 'face', 'facebook', 'faced', 'facing', 'factor', 'fall', 'falling', 'far', 'fbi', 'fiction', 'field', 'finance', 'fine', 'focus', 'focused', 'focusing', 'follow', 'forefront', 'formation', 'found', 'framework', 'free', 'freedom', 'frequency', 'friend', 'fund', 'fundamental', 'future', 'gap', 'gathering', 'generally', 'generation', 'giant', 'given', 'global', 'globe', 'go', 'goal', 'google', 'government', 'growth', 'habit', 'half', 'health', 'held', 'heterogeneity', 'highlight', 'home', 'homogeneous', 'hot', 'however', 'http', 'human', 'hyperconnectivity', 'idea', 'identified', 'impact', 'implementation', 'implemented', 'implementing', 'implication', 'importance', 'important', 'improved', 'improves', 'improving', 'inbox', 'incident', 'include', 'including', 'increased', 'increasing', 'increasingly', 'indicator', 'industry', 'ineffective', 'influence', 'information', 'infosec', 'infrastructure', 'inhibit', 'initiative', 'innovation', 'insight', 'instilled', 'instils', 'intelligence', 'intended', 'interest', 'interested', 'international', 'internet', 'investigate', 'investigation', 'involved', 'iot', 'iphone', 'ir', 'issue', 'janeiro', 'judge', 'known', 'lack', 'landscape', 'language', 'large', 'latest', 'latin', 'launched', 'law', 'lead', 'leading', 'legal', 'legislate', 'legislation', 'legislative', 'legislator', 'level', 'lie', 'light', 'like', 'limitation', 'link', 'linkedin', 'local', 'look', 'magazine', 'mainly', 'make', 'malware', 'management', 'many', 'material', 'materialise', 'maturity', 'mean', 'meaning', 'measure', 'meet', 'member', 'mendoza', 'mention', 'method', 'might', 'miguel', 'mitigating', 'model', 'month', 'moral', 'moreover', 'much', 'multimedia', 'multiplicity', 'must', 'national', 'navigation', 'nearly', 'necessary', 'need', 'network', 'nevertheless', 'new', 'news', 'newsletter', 'next', 'ni', 'note', 'number', 'objective', 'obstacle', 'obvious', 'often', 'one', 'operation', 'opinion', 'order', 'ordered', 'organization', 'organizational', 'overcome', 'page', 'paper', 'park', 'part', 'participation', 'particularly', 'party', 'perhaps', 'period', 'personal', 'physical', 'place', 'play', 'plug', 'podcasts', 'point', 'policy', 'political', 'popular', 'popularization', 'population', 'position', 'possibility', 'post', 'posted', 'postponed', 'practice', 'prepared', 'present', 'preventing', 'previous', 'principle', 'print', 'privacy', 'private', 'processing', 'project', 'prominence', 'promote', 'promoting', 'promotion', 'promptly', 'promulgation', 'prosecutor', 'protect', 'protected', 'protection', 'protective', 'prove', 'provides', 'public', 'quite', 'radar', 'range', 'ranging', 'ransom', 'ransomware', 'rapid', 'rate', 'ratification', 'ratified', 'read', 'reality', 'recent', 'recently', 'recognized', 'recorded', 'rectify', 'reducing', 'refer', 'referring', 'regard', 'region', 'regional', 'regulate', 'regulated', 'regulating', 'regulation', 'regulatory', 'related', 'relating', 'relatively', 'reliable', 'remains', 'report', 'requested', 'requirement', 'requires', 'requiring', 'research', 'reserved', 'resilience', 'respond', 'responding', 'response', 'responsible', 'responsibly', 'result', 'right', 'rio', 'rising', 'risk', 'ruin', 'rule', 'scale', 'scope', 'search', 'section', 'sector', 'security', 'seeing', 'seeking', 'seen', 'select', 'setting', 'several', 'shall', 'shared', 'shield', 'short', 'sign', 'signatory', 'significant', 'similarly', 'since', 'site', 'sitemap', 'social', 'society', 'sophistication', 'sought', 'specific', 'stakeholder', 'standard', 'started', 'state', 'status', 'stranger', 'strategy', 'study', 'stylesheet', 'suggests', 'supported', 'system', 'take', 'taken', 'talent', 'task', 'team', 'tech', 'technical', 'technological', 'technology', 'tension', 'term', 'territory', 'terrorist', 'therefore', 'thing', 'threat', 'threaten', 'throughout', 'thwart', 'time', 'toggle', 'tool', 'topic', 'towards', 'toy', 'training', 'transferred', 'transport', 'trend', 'truly', 'trust', 'trying', 'twitter', 'undermine', 'understanding', 'union', 'united', 'unlock', 'update', 'updated', 'use', 'user', 'various', 'version', 'video', 'view', 'virus', 'vital', 'vulnerability', 'way', 'wechseln', 'well', 'whats', 'whatsapp', 'white', 'whose', 'within', 'without', 'wls', 'work', 'working', 'world', 'worldwide', 'would', 'year', 'youtube', 'zealand', 'zum', 'ángel'] | |
1343 | |
1344 | |
1345 | |
1345 2017-03-27T06:30:56.614000Z https://isc.sans.edu/newssummary.html#1023425 | |
1345 2017-03-27T12:30:51.656000Z https://isc.sans.edu/newssummary.html#1023433 | |
1345 2017-03-27T12:30:59.238000Z https://isc.sans.edu/newssummary.html#1023447 | |
['ago', 'already', 'ask', 'browsing', 'data', 'day', 'forbes', 'give', 'good', 'history', 'isp', 'made', 'marketing', 'nicely', 'overturn', 'rule', 'segmented', 'senate', 'shove', 'synopsis', 'take', 'taking', 'thing', 'view', 'voted', 'web', 'would'] | |
1348 | |
1349 | |
1351 | |
1352 | |
1353 | |
1353 2017-03-16T12:30:54.850000Z http://www.welivesecurity.com/2017/03/16/us-charges-russian-fsb-officials-connection-massive-yahoo-security-breach/ | |
1353 2017-03-27T12:31:20.202000Z https://www.welivesecurity.com/2017/03/16/us-charges-russian-fsb-officials-connection-massive-yahoo-security-breach/ | |
['access', 'accessed', 'accessing', 'account', 'accused', 'action', 'activity', 'add', 'addition', 'additionally', 'address', 'agency', 'aka', 'akehmet', 'al', 'aleksandrovich', 'alexsey', 'alexseyevich', 'alleged', 'allowed', 'also', 'although', 'amt', 'anatolyevich', 'android', 'announcement', 'answer', 'app', 'appreciate', 'apprehended', 'approximately', 'archive', 'arrested', 'article', 'attachment', 'attack', 'attacker', 'authentication', 'author', 'authority', 'back', 'bank', 'banking', 'baratov', 'belan', 'belief', 'believed', 'belonging', 'better', 'biggest', 'billion', 'birth', 'blame', 'blog', 'book', 'breach', 'break', 'bring', 'browser', 'campaign', 'canada', 'canadian', 'car', 'card', 'case', 'charge', 'charged', 'check', 'claim', 'cluley', 'code', 'collect', 'combat', 'commission', 'committed', 'communication', 'community', 'company', 'computer', 'conference', 'connected', 'connection', 'conspirator', 'contact', 'contain', 'containing', 'continue', 'cookie', 'cooky', 'copyright', 'country', 'create', 'credit', 'crime', 'criminal', 'cyber', 'cybercrime', 'cybercriminals', 'cybersecurity', 'data', 'database', 'date', 'de', 'decisive', 'denied', 'department', 'detail', 'detained', 'deutsch', 'diligent', 'direct', 'directed', 'div', 'dmitry', 'doj', 'dokuchaev', 'dubbed', 'earn', 'email', 'embed', 'employee', 'en', 'encrypted', 'enforcement', 'engage', 'engine', 'english', 'equity', 'escaping', 'eset', 'español', 'european', 'expert', 'exploited', 'extradition', 'facebook', 'facilitate', 'financial', 'firm', 'follow', 'following', 'forge', 'forged', 'four', 'french', 'friend', 'fsb', 'gain', 'gained', 'gang', 'go', 'google', 'government', 'graham', 'granting', 'group', 'guard', 'hack', 'hacker', 'hacking', 'hashed', 'home', 'hot', 'http', 'igor', 'impacting', 'important', 'inbox', 'incident', 'included', 'including', 'indictment', 'individual', 'information', 'insight', 'intelligence', 'interest', 'interested', 'internal', 'investigation', 'investigative', 'involvement', 'ir', 'journalist', 'justice', 'karim', 'kazakh', 'keeping', 'knowledgebase', 'kremlin', 'language', 'last', 'late', 'later', 'latest', 'law', 'least', 'legal', 'link', 'linkedin', 'list', 'listed', 'live', 'locate', 'magazine', 'malware', 'managed', 'management', 'massive', 'material', 'meanwhile', 'men', 'might', 'million', 'month', 'multimedia', 'name', 'national', 'navigation', 'needing', 'network', 'news', 'newsletter', 'number', 'numerous', 'occurred', 'officer', 'official', 'one', 'opinion', 'others', 'overshadowed', 'page', 'paid', 'paper', 'password', 'personal', 'phishy', 'platform', 'play', 'podcasts', 'policy', 'popular', 'post', 'posted', 'previously', 'print', 'privacy', 'private', 'prominent', 'proprietary', 'protect', 'provided', 'provider', 'question', 'radar', 'ransomware', 'read', 'reason', 'recommendation', 'redirecting', 'related', 'remains', 'remote', 'request', 'research', 'reserved', 'resident', 'responsible', 'revealed', 'right', 'rtm', 'russia', 'russian', 'said', 'saw', 'saying', 'search', 'searching', 'secure', 'security', 'seen', 'select', 'separate', 'series', 'serious', 'service', 'sign', 'site', 'sitemap', 'smartphones', 'sought', 'spam', 'staggering', 'state', 'stealing', 'stealthy', 'stolen', 'stylesheet', 'sushchin', 'suspicious', 'system', 'target', 'targeted', 'targeting', 'telephone', 'thought', 'thousand', 'time', 'toggle', 'tokbergenov', 'tool', 'topic', 'traffic', 'transportation', 'twitter', 'two', 'udb', 'unauthorized', 'unencrypted', 'united', 'unknown', 'unnamed', 'unsolicited', 'use', 'user', 'video', 'view', 'virus', 'wanted', 'web', 'wechseln', 'week', 'welcomed', 'whats', 'whether', 'white', 'whose', 'without', 'wls', 'work', 'yahoo', 'year', 'youtube', 'zum'] | |
1354 | |
1354 2017-03-03T12:31:00.956000Z http://csoonline.com/article/3176076/security/pence-used-private-mail-for-state-work-as-governor-account-was-hacked.html | |
1354 2017-03-03T18:30:46.601000Z https://www.grahamcluley.com/mike-pence-aol-hacked/ | |
1354 2017-03-04T18:30:45.109000Z http://securityaffairs.co/wordpress/56879/data-breach/pences-personal-aol-account.html | |
['access', 'according', 'account', 'aol', 'archived', 'attack', 'attacked', 'blog', 'breach', 'business', 'campaign', 'clinton', 'confidential', 'email', 'fbi', 'government', 'governor', 'hacked', 'hacker', 'hacking', 'hillary', 'indiana', 'indystar', 'information', 'involving', 'law', 'like', 'message', 'might', 'mike', 'much', 'news', 'office', 'one', 'page', 'penny', 'personal', 'president', 'private', 'public', 'released', 'secretary', 'security', 'sensitive', 'server', 'state', 'story', 'top', 'use', 'used', 'using', 'work'] | |
1356 | |
1358 | |
1359 | |
1360 | |
1361 | |
1362 | |
1363 | |
1364 | |
1365 | |
1366 | |
1368 | |
1368 2017-03-27T18:30:58.125000Z http://securityaffairs.co/wordpress/57457/iot/mele-washer-disinfector-flaw.html | |
1368 2017-03-27T18:31:02.342000Z http://thehackernews.com/2017/03/iot-washer-disinfector.html | |
['able', 'access', 'according', 'also', 'analyst', 'appliance', 'article', 'attack', 'attacker', 'back', 'best', 'breach', 'code', 'connected', 'consultancy', 'corresponding', 'cyber', 'data', 'ddos', 'device', 'directory', 'disclosure', 'disconnect', 'discovered', 'dishwasher', 'disinfect', 'embedded', 'encryption', 'execute', 'exploit', 'file', 'filesystem', 'find', 'fix', 'flaw', 'full', 'german', 'get', 'hacker', 'hacking', 'home', 'information', 'instrument', 'internet', 'ip', 'issue', 'jens', 'laboratory', 'lan', 'listens', 'malicious', 'malware', 'medical', 'miele', 'model', 'month', 'much', 'network', 'news', 'newsletter', 'patch', 'pg', 'poc', 'port', 'professional', 'prone', 'published', 'reason', 'regel', 'report', 'request', 'schneider', 'security', 'sensitive', 'server', 'shadow', 'simple', 'smart', 'story', 'subsequent', 'surgical', 'telnet', 'therefore', 'thing', 'traversal', 'typically', 'unauthenticated', 'used', 'user', 'vendor', 'vulnerability', 'want', 'web', 'webserver', 'whatever', 'writer', 'wulf'] | |
1369 | |
1369 2017-03-05T00:40:01.209000Z http://thehackernews.com/2011/08/32-israel-websites-defaced-by-sbz-ghost.html | |
1369 2017-03-05T00:40:36.947000Z http://thehackernews.com/2011/07/mallika-sherawat-official-website.html | |
1369 2017-03-05T00:41:14.359000Z http://thehackernews.com/2011/06/60-websites-defaced-by-sbz-ghost-team.html | |
1369 2017-03-05T00:43:36.988000Z http://thehackernews.com/2011/03/40-websites-defaced-by-a42-skywalk3r.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defaced', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'team', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
1370 | |
1373 | |
1373 2017-03-05T00:45:33.218000Z http://thehackernews.com/2011/01/venerability-in-mtv-website-found-by.html | |
1373 2017-03-05T00:46:05.932000Z http://thehackernews.com/2010/12/nivosb-israel-hacker-found-xss-on.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'israel', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'nivosb', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'vulnerability', 'walking', 'want', 'website', 'without', 'york'] | |
1374 | |
1375 | |
1376 | |
1377 | |
1377 2017-03-01T18:30:44.658000Z https://veracode.com/blog/security-news/veracode-named-leader-gartner-magic-quadrant-application-security-testing-fourth | |
1377 2017-03-07T18:30:53.203000Z http://www.veracode.com/blog/security-news/veracode-named-leader-gartner-magic-quadrant-application-security-testing-fourth | |
['ability', 'accept', 'adapt', 'address', 'advise', 'analyst', 'application', 'ast', 'automation', 'ayal', 'based', 'blog', 'breadth', 'charge', 'chooses', 'code', 'combination', 'come', 'comment', 'completeness', 'complexity', 'consecutive', 'consist', 'construed', 'content', 'continues', 'customer', 'date', 'demonstrated', 'depicted', 'depth', 'designation', 'development', 'dionisio', 'disclaims', 'download', 'due', 'email', 'endorse', 'entire', 'every', 'excited', 'execute', 'expressed', 'fact', 'faster', 'field', 'fitness', 'flaw', 'form', 'fourth', 'gartner', 'global', 'growing', 'helped', 'highest', 'home', 'homepage', 'http', 'identify', 'implied', 'including', 'increased', 'integrate', 'integrates', 'kept', 'largely', 'laura', 'leader', 'leadership', 'led', 'lifecycle', 'line', 'magic', 'management', 'manager', 'marked', 'market', 'merchantability', 'methodology', 'million', 'mollom', 'must', 'name', 'named', 'nearly', 'new', 'news', 'opinion', 'organization', 'page', 'paine', 'particular', 'passed', 'placed', 'platform', 'please', 'policy', 'post', 'powerful', 'previous', 'privacy', 'private', 'process', 'product', 'proof', 'public', 'publication', 'publicly', 'published', 'pudding', 'purpose', 'quadrant', 'rating', 'recognize', 'reduce', 'relation', 'remediate', 'remediated', 'report', 'required', 'research', 'respect', 'review', 'risk', 'row', 'say', 'scanned', 'seamlessly', 'security', 'see', 'select', 'service', 'share', 'shown', 'significantly', 'software', 'solution', 'speed', 'stage', 'state', 'statement', 'stay', 'submitting', 'technology', 'testing', 'tirosh', 'trillion', 'two', 'unified', 'user', 'vendor', 'veracode', 'vision', 'warranty', 'zumerle'] | |
1378 | |
1379 | |
1380 | |
1381 | |
1382 | |
1382 2017-03-05T00:47:10.376000Z http://thehackernews.com/2010/11/mits-university-website-hacked-by-wings.html | |
1382 2017-03-05T00:47:15.903000Z http://thehackernews.com/2010/10/pakistan-group-wings-haxors-hack-4-more.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'haxors', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pakistan', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'wing', 'without', 'york'] | |
1383 | |
1385 | |
1385 2017-03-02T06:40:08.229000Z https://clearwatercompliance.com/blog/hipaa-audit-tips-clearwater-compliance-publishes-seminal-hipaa-audit-white-paper/ | |
1385 2017-03-13T18:30:57.708000Z https://clearwatercompliance.com/blog/five-frequently-overlooked-assets-include-hipaa-risk-analysis/ | |
['adjust', 'agency', 'aha', 'align', 'also', 'american', 'analysis', 'analyst', 'area', 'assessment', 'assisting', 'associate', 'association', 'audit', 'author', 'award', 'backup', 'based', 'best', 'blog', 'breach', 'business', 'call', 'cancel', 'cap', 'care', 'case', 'certified', 'chaos', 'chime', 'choose', 'clearwater', 'coming', 'comment', 'community', 'compliance', 'condition', 'considered', 'consulting', 'contact', 'continuing', 'contract', 'copyright', 'covered', 'credit', 'criterion', 'critical', 'cyber', 'cybersecurity', 'data', 'demand', 'department', 'developed', 'device', 'disclose', 'document', 'earned', 'easy', 'education', 'effort', 'endorsement', 'entity', 'establish', 'eu', 'even', 'event', 'exclusive', 'experience', 'expertise', 'fail', 'find', 'fire', 'first', 'focus', 'format', 'front', 'gallery', 'get', 'group', 'guided', 'health', 'healthcare', 'help', 'helping', 'hipaa', 'home', 'hospital', 'http', 'improve', 'incentive', 'included', 'industry', 'info', 'information', 'insight', 'intel', 'keep', 'known', 'lab', 'latest', 'law', 'leadership', 'learn', 'leave', 'listed', 'live', 'llc', 'look', 'management', 'many', 'mature', 'meaningful', 'meet', 'member', 'might', 'moser', 'needed', 'news', 'newsletter', 'obviously', 'ocr', 'office', 'online', 'operationalize', 'organization', 'otherwise', 'paper', 'patient', 'permalink', 'point', 'policy', 'popular', 'post', 'princeton', 'principal', 'privacy', 'procedure', 'professional', 'program', 'provider', 'qualify', 'quality', 'read', 'readiness', 'recognition', 'recognized', 'related', 'reply', 'requirement', 'reserved', 'resource', 'richmond', 'right', 'risk', 'runner', 'safety', 'secure', 'security', 'see', 'seen', 'service', 'shawnee', 'sitemap', 'software', 'solution', 'soon', 'source', 'state', 'strategic', 'study', 'subscribe', 'suite', 'talk', 'team', 'term', 'testimonial', 'tim', 'tip', 'today', 'toolkits', 'tour', 'township', 'train', 'transfer', 'trouble', 'understand', 'upon', 'use', 'using', 'view', 'vulnerability', 'wayne', 'web', 'webinars', 'website', 'whatever', 'white', 'working', 'workshop', 'year'] | |
1386 | |
1387 | |
1389 | |
1389 2017-03-05T00:40:11.706000Z http://thehackernews.com/2011/08/8-china-website-government-defaced-by.html | |
1389 2017-03-05T00:41:49.031000Z http://thehackernews.com/2011/05/53-websites-defaced-by-andre-corleone.html | |
1389 2017-03-05T00:45:34.980000Z http://thehackernews.com/2011/01/jntuh-college-site-hacked-by-indonesian.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'indonesian', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1390 | |
1391 | |
1391 2017-03-02T18:30:43.646000Z https://nakedsecurity.sophos.com/2017/03/02/cloudflare-chief-pledges-third-party-review-of-code/ | |
1391 2017-03-03T12:30:45.573000Z http://securityaffairs.co/wordpress/56845/hacking/cloudbleed-incident-impact.html | |
['also', 'article', 'authentication', 'blog', 'bug', 'cached', 'ceo', 'chief', 'cloudbleed', 'cloudflare', 'code', 'company', 'contained', 'content', 'could', 'credential', 'customer', 'data', 'day', 'detailed', 'device', 'discovered', 'encountered', 'engine', 'evidence', 'exploit', 'exploited', 'google', 'home', 'impact', 'incident', 'infrastructure', 'initial', 'internet', 'investigation', 'iot', 'issue', 'leaked', 'many', 'matthew', 'memory', 'mobile', 'national', 'network', 'news', 'nightmare', 'number', 'one', 'ormandy', 'page', 'password', 'patch', 'post', 'potential', 'present', 'previous', 'prince', 'project', 'provider', 'read', 'regulation', 'request', 'researcher', 'risk', 'search', 'security', 'serious', 'server', 'set', 'share', 'since', 'site', 'still', 'tavis', 'team', 'threat', 'time', 'trigger', 'user', 'way', 'website', 'wrote', 'zero'] | |
1394 | |
1395 | |
1396 | |
1397 | |
1398 | |
1398 2017-03-05T00:46:26.942000Z http://thehackernews.com/2010/12/40-websites-hacked-by-ahg-crew.html | |
1398 2017-03-05T00:46:56.053000Z http://thehackernews.com/2010/11/videoznaikaru-hacked-by-n3tworm-ahg.html | |
['ability', 'ahg', 'albania', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1399 | |
1400 | |
1400 2017-03-08T12:30:47.795000Z https://www.grahamcluley.com/lame-comment-spam-campaign-attempts-promote-iphone-app/ | |
1400 2017-03-10T18:30:51.482000Z https://www.grahamcluley.com/perils-working-home-young-children/ | |
1400 2017-03-13T12:30:51.984000Z https://www.grahamcluley.com/typo-ip-address/ | |
['account', 'adobe', 'advice', 'allow', 'also', 'analyst', 'android', 'angel', 'appearance', 'apple', 'application', 'apps', 'article', 'associate', 'attack', 'audio', 'author', 'award', 'back', 'backup', 'bad', 'best', 'bill', 'billion', 'bisson', 'blackberry', 'blog', 'blox', 'bob', 'botnet', 'brilliant', 'browser', 'btc', 'buffer', 'cancel', 'carole', 'category', 'celebrity', 'channel', 'check', 'chrome', 'cia', 'click', 'clickjacking', 'cluley', 'comment', 'company', 'computer', 'condition', 'contact', 'content', 'contributor', 'cooky', 'copyright', 'could', 'covello', 'cyber', 'data', 'david', 'ddos', 'defence', 'denial', 'device', 'dr', 'draft', 'drop', 'early', 'email', 'encryption', 'enter', 'episode', 'event', 'ever', 'explorer', 'facebook', 'fake', 'feed', 'filed', 'firefox', 'first', 'flash', 'focused', 'follow', 'free', 'fun', 'game', 'gchq', 'gcluley', 'gear', 'get', 'give', 'google', 'graham', 'guest', 'guideline', 'hack', 'hacked', 'hacker', 'hacking', 'happened', 'hire', 'home', 'hosted', 'humbug', 'idea', 'incapsula', 'independent', 'industry', 'informed', 'internet', 'io', 'jacaranda', 'java', 'jim', 'latest', 'law', 'le', 'leave', 'like', 'limited', 'link', 'linkedin', 'linux', 'list', 'listen', 'live', 'login', 'loss', 'macos', 'make', 'malware', 'medium', 'menu', 'microsoft', 'might', 'mobile', 'naked', 'name', 'navigation', 'network', 'new', 'news', 'newsletter', 'nude', 'number', 'often', 'one', 'online', 'operating', 'opinion', 'oracle', 'order', 'password', 'pdf', 'people', 'philip', 'phishing', 'phone', 'plus', 'podcast', 'podcasts', 'policy', 'popular', 'post', 'powered', 'presentation', 'pressidium', 'privacy', 'protected', 'public', 'published', 'put', 'ransomware', 'recent', 'reddit', 'register', 'regularly', 'reply', 'required', 'reserved', 'return', 'review', 'riche', 'right', 'risk', 'rogue', 'safari', 'say', 'secure', 'security', 'send', 'service', 'share', 'since', 'site', 'smashing', 'social', 'soliman', 'solomon', 'spam', 'speak', 'speaking', 'sponsor', 'sponsorship', 'spying', 'stay', 'story', 'stream', 'subscribe', 'support', 'svajcer', 'system', 'tag', 'term', 'testimonial', 'theriault', 'threat', 'three', 'tip', 'toolkit', 'top', 'topic', 'try', 'tv', 'twitter', 'uncategorized', 'user', 'vanja', 'version', 'veteran', 'victim', 'video', 'view', 'viewer', 'visit', 'vulnerability', 'want', 'warns', 'web', 'website', 'week', 'weekly', 'weeping', 'whatsapp', 'wibbling', 'wilf', 'window', 'wordpress', 'work', 'worked', 'would', 'write', 'wrote', 'yahoo', 'yasin', 'youtube'] | |
1401 | |
1401 2017-03-05T00:37:08.486000Z http://thehackernews.com/2012/11/english-defence-league-donors.html | |
1401 2017-03-05T00:40:37.835000Z http://thehackernews.com/2011/07/english-defence-league-facebook-page.html | |
1401 2017-03-05T00:44:50.526000Z http://thehackernews.com/2011/02/english-defence-league-hacked-by-trick.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defence', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'english', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'league', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pakistan', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1403 | |
1403 2017-03-13T18:30:47.406000Z https://veracode.com/blog/security-news/podcast-skills-you-need-suceed-digital-economy | |
1403 2017-03-22T00:30:57.964000Z http://www.veracode.com/blog/security-news/podcast-skills-you-need-succeed-digital-economy | |
['accept', 'address', 'application', 'around', 'astaro', 'back', 'blog', 'career', 'college', 'comment', 'communication', 'company', 'content', 'corporate', 'create', 'created', 'creates', 'date', 'decade', 'developer', 'digital', 'discus', 'economy', 'educate', 'education', 'email', 'engage', 'engineer', 'ensure', 'evp', 'field', 'fill', 'form', 'gap', 'getting', 'go', 'great', 'greg', 'growing', 'held', 'help', 'hiring', 'home', 'homepage', 'industry', 'inspire', 'involvement', 'jessica', 'job', 'join', 'kept', 'lavery', 'like', 'look', 'looking', 'management', 'marked', 'marketing', 'mollom', 'name', 'need', 'news', 'next', 'nicastro', 'operation', 'opportunity', 'page', 'part', 'people', 'please', 'podcast', 'policy', 'post', 'power', 'previous', 'privacy', 'private', 'product', 'professional', 'proficient', 'promote', 'publicly', 'published', 'required', 'review', 'right', 'role', 'security', 'share', 'shown', 'skill', 'software', 'sophos', 'staring', 'stay', 'strives', 'student', 'submitting', 'succeed', 'switch', 'team', 'topic', 'trying', 'university', 'veracode'] | |
1404 | |
1405 | |
1405 2017-03-05T00:43:49.721000Z http://thehackernews.com/2011/03/3-websites-defaced-by-team-dna-stuxnet.html | |
1405 2017-03-05T00:45:10.914000Z http://thehackernews.com/2011/01/3-websites-hacked-by-cyber-pr3dat0r.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'indian', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'source', 'speaker', 'spying', 'store', 'story', 'stuxnet', 'subscribe', 'surveillance', 'system', 'team', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'website', 'without', 'york'] | |
1406 | |
1406 2017-03-17T12:31:04.075000Z http://www.itsecurityguru.org/2017/03/17/kaspersky-lab-royal-holloway-university-host-cyber-day-raise-awareness/ | |
1406 2017-03-17T18:31:07.229000Z http://www.itsecurityguru.org/2017/03/17/financial-fraud-costing-uk-millions-day/ | |
1406 2017-03-20T18:31:03.233000Z https://www.helpnetsecurity.com/2017/03/20/w-2-phishing-scam/ | |
['cybersecurity', 'even', 'firm', 'phishing', 'scam'] | |
1408 | |
1409 | |
1410 | |
1412 | |
1413 | |
1413 2017-03-04T12:30:50.861000Z https://isc.sans.edu/newssummary.html#1020213 | |
1413 2017-03-06T18:30:56.463000Z https://isc.sans.edu/newssummary.html#1020249 | |
1413 2017-03-06T18:31:04.756000Z https://isc.sans.edu/newssummary.html#1020303 | |
['ago', 'business', 'company', 'hour', 'say', 'synopsis', 'view'] | |
1414 | |
1417 | |
1417 2017-03-29T00:31:00.166000Z https://veracode.com/blog/4-features-veracode-greenlight-developers-love | |
1417 2017-03-30T00:30:57.999000Z http://www.veracode.com/blog/4-features-veracode-greenlight-developers-love | |
['accept', 'address', 'advice', 'application', 'assurance', 'avoided', 'batch', 'becomes', 'blog', 'check', 'clean', 'code', 'coding', 'comment', 'company', 'content', 'contextual', 'cycle', 'date', 'deal', 'defect', 'delivering', 'developer', 'development', 'devops', 'devsecops', 'downstream', 'early', 'easier', 'easiest', 'email', 'enables', 'engine', 'error', 'even', 'experience', 'fast', 'feature', 'feedback', 'field', 'find', 'fix', 'flaw', 'form', 'fortune', 'get', 'give', 'giving', 'go', 'greenlight', 'guaranteed', 'help', 'home', 'homepage', 'ide', 'incorporate', 'innovative', 'insight', 'integration', 'introduced', 'issue', 'janet', 'job', 'joined', 'joining', 'kept', 'know', 'late', 'le', 'learn', 'led', 'leveraging', 'life', 'love', 'make', 'making', 'manager', 'marked', 'mix', 'mollom', 'move', 'name', 'nature', 'next', 'number', 'one', 'pace', 'page', 'painful', 'please', 'policy', 'post', 'powerful', 'previous', 'prior', 'privacy', 'private', 'problem', 'product', 'program', 'progress', 'proven', 'provides', 'publicly', 'published', 'quality', 'remediation', 'required', 'review', 'right', 'roadblock', 'scan', 'second', 'secure', 'security', 'senior', 'service', 'share', 'show', 'shown', 'size', 'skip', 'small', 'smoothly', 'software', 'solution', 'speed', 'startup', 'static', 'stay', 'submitting', 'successfully', 'team', 'technology', 'test', 'testing', 'tool', 'true', 'veracode', 'want', 'working', 'worthington', 'wrong', 'year'] | |
1418 | |
1419 | |
1420 | |
1421 | |
1422 | |
1423 | |
1424 | |
1426 | |
1427 | |
1428 | |
1430 | |
1430 2017-03-23T18:34:15.290000Z http://www.welivesecurity.com/2017/03/23/download-minecraft-mods-google-play-read/ | |
1430 2017-03-27T12:34:01.018000Z https://www.welivesecurity.com/2017/03/23/download-minecraft-mods-google-play-read/ | |
['able', 'abta', 'across', 'act', 'activated', 'active', 'activity', 'actual', 'actually', 'ad', 'add', 'added', 'additional', 'address', 'administrator', 'advertisement', 'aggressive', 'airline', 'al', 'also', 'altogether', 'among', 'analyzed', 'android', 'angry', 'app', 'application', 'apps', 'archive', 'article', 'attempting', 'author', 'bad', 'based', 'believe', 'beware', 'big', 'block', 'blog', 'breach', 'brings', 'brought', 'browser', 'button', 'capable', 'capture', 'case', 'category', 'caution', 'check', 'clean', 'click', 'clickable', 'clicking', 'code', 'come', 'community', 'component', 'conference', 'contact', 'content', 'copyright', 'coupon', 'cybersecurity', 'dangerous', 'data', 'de', 'deactivate', 'dead', 'deceptive', 'demanded', 'detect', 'detected', 'deutsch', 'device', 'different', 'direct', 'discovered', 'disguise', 'disguised', 'display', 'displayed', 'displaying', 'distributed', 'div', 'divided', 'download', 'downloaded', 'downloader', 'downloaders', 'downloading', 'dropper', 'earlier', 'easier', 'easy', 'economics', 'effect', 'either', 'element', 'email', 'embed', 'emirate', 'en', 'end', 'english', 'enough', 'eset', 'español', 'even', 'evolution', 'evolved', 'exercise', 'existing', 'experience', 'expert', 'exposed', 'extra', 'facebook', 'fake', 'fig', 'figure', 'first', 'flight', 'follow', 'following', 'found', 'free', 'friend', 'function', 'functionality', 'future', 'gap', 'go', 'going', 'good', 'google', 'granting', 'hash', 'holiday', 'home', 'hot', 'however', 'http', 'icon', 'immediately', 'impersonating', 'importantly', 'inbox', 'including', 'indicator', 'infected', 'information', 'informs', 'insight', 'install', 'installation', 'installed', 'installing', 'installs', 'instead', 'interested', 'interestingly', 'interface', 'internet', 'interrupting', 'intrusive', 'ip', 'ir', 'jackpot', 'keep', 'kind', 'language', 'latest', 'launch', 'launched', 'launcher', 'legal', 'like', 'link', 'linkedin', 'localized', 'logical', 'low', 'lukas', 'lure', 'magazine', 'make', 'malicious', 'malware', 'manager', 'manually', 'market', 'material', 'medium', 'message', 'might', 'minecraft', 'mobile', 'mod', 'module', 'month', 'multimedia', 'name', 'navigation', 'necessary', 'needed', 'negative', 'new', 'news', 'newsletter', 'next', 'notification', 'number', 'obtrusive', 'offer', 'offering', 'official', 'old', 'one', 'opened', 'operate', 'opinion', 'opt', 'order', 'original', 'originally', 'package', 'page', 'paper', 'part', 'payload', 'permission', 'plague', 'play', 'player', 'podcasts', 'policy', 'poor', 'popular', 'popularity', 'porn', 'post', 'posted', 'prevent', 'print', 'privacy', 'proceed', 'process', 'promise', 'prompted', 'protect', 'provided', 'push', 'radar', 'random', 'ranging', 'ransomware', 'rating', 'reached', 'read', 'real', 'reason', 'recently', 'recognize', 'redirecting', 'redirects', 'reign', 'related', 'remaining', 'remove', 'reported', 'reputable', 'request', 'research', 'reserved', 'responsible', 'result', 'review', 'right', 'sample', 'scam', 'scammy', 'scare', 'screen', 'search', 'season', 'security', 'seeing', 'select', 'setting', 'several', 'show', 'showing', 'shown', 'sign', 'similar', 'simultaneously', 'since', 'site', 'sitemap', 'skill', 'social', 'solution', 'sort', 'spain', 'spotted', 'static', 'stefanko', 'step', 'stop', 'stylesheet', 'substituted', 'support', 'sure', 'survey', 'thousand', 'threat', 'ticket', 'toggle', 'topic', 'trick', 'tricked', 'trojan', 'twitter', 'two', 'uggs', 'undecided', 'uninstall', 'uninstalling', 'unlike', 'untrustworthiness', 'unwanted', 'update', 'uploaded', 'upon', 'us', 'use', 'used', 'user', 'version', 'video', 'view', 'virus', 'warning', 'web', 'website', 'wechseln', 'whats', 'whatsapp', 'white', 'widely', 'win', 'without', 'wls', 'work', 'would', 'youtube', 'zum'] | |
1432 | |
1432 2017-03-28T00:30:56.590000Z https://www.bleepingcomputer.com/news/security/microsoft-quietly-patched-windows-zero-day-used-in-attacks-by-zirconium-group/ | |
1432 2017-03-28T00:31:05.321000Z https://www.bleepingcomputer.com/offer/deals/new-deal-97-percent-off-a-microsoft-office-mastery-bundle/ | |
['abusive', 'ad', 'advanced', 'advertisement', 'advertising', 'adware', 'adwcleaner', 'agreement', 'allowed', 'also', 'alureon', 'anonymously', 'antimalware', 'antivirus', 'api', 'article', 'attack', 'available', 'becoming', 'bleeping', 'bleepingcomputer', 'bundle', 'campaign', 'category', 'certificate', 'certification', 'changelog', 'chat', 'checklist', 'chrome', 'close', 'closer', 'combofix', 'command', 'comment', 'community', 'company', 'computer', 'contact', 'content', 'copy', 'copyright', 'course', 'critic', 'cryptodefense', 'cryptolocker', 'cryptomix', 'cryptorbit', 'cryptosearch', 'database', 'deal', 'decryptor', 'display', 'dll', 'downloaded', 'downloads', 'drm', 'durango', 'elearning', 'email', 'emergency', 'emsisoft', 'exposed', 'extension', 'facebook', 'fanatic', 'faq', 'featured', 'feed', 'file', 'find', 'firm', 'flaw', 'folder', 'follow', 'form', 'forum', 'free', 'gadget', 'gear', 'general', 'get', 'glossary', 'going', 'google', 'group', 'guide', 'hacked', 'hardware', 'harmful', 'help', 'heur', 'hidden', 'hijacker', 'home', 'hotspot', 'howdecrypt', 'hp', 'inappropriate', 'included', 'including', 'infected', 'information', 'installed', 'instruction', 'internal', 'irc', 'issue', 'key', 'kid', 'kit', 'language', 'latest', 'learn', 'license', 'like', 'llc', 'locky', 'log', 'login', 'made', 'main', 'malvertising', 'malware', 'manager', 'massive', 'mastery', 'member', 'microsoft', 'mini', 'mode', 'msevents', 'na', 'need', 'netbook', 'new', 'news', 'newsletter', 'number', 'office', 'official', 'offline', 'one', 'order', 'password', 'past', 'patch', 'patched', 'periodic', 'phone', 'please', 'pm', 'policy', 'popular', 'post', 'posted', 'potplayer', 'previous', 'privacy', 'private', 'problem', 'program', 'prompt', 'push', 'quietly', 'rakhnidecryptor', 'ransomware', 'receive', 'recover', 'redirects', 'register', 'remember', 'removal', 'remove', 'repair', 'replaces', 'reporter', 'researcher', 'reserved', 'resource', 'result', 'returned', 'right', 'rkill', 'roguekiller', 'roguekillercmd', 'rootkit', 'rule', 'safe', 'save', 'say', 'search', 'section', 'security', 'securitytool', 'see', 'shadow', 'show', 'sign', 'silentmonolith', 'sitemap', 'social', 'spam', 'spyware', 'standard', 'start', 'startup', 'strong', 'submit', 'submitting', 'symantec', 'task', 'tdss', 'tdsskiller', 'third', 'tool', 'topic', 'trojan', 'tutorial', 'twitter', 'understand', 'uninstall', 'update', 'use', 'used', 'useful', 'user', 'username', 'using', 'version', 'viewed', 'virtumonde', 'virus', 'volume', 'web', 'welcome', 'wifi', 'window', 'winfixer', 'worm', 'would', 'write', 'yet', 'zemana', 'zirconium'] | |
1433 | |
1434 | |
1435 | |
1435 2017-03-01T18:30:52.517000Z http://csoonline.com/article/3175666/it-jobs/15-unfilled-tech-jobs-that-cost-the-u-s-billions.html | |
1435 2017-03-06T18:30:47.681000Z http://csoonline.com/article/3176715/security/the-10-essential-reddits-for-security-pros.html | |
['access', 'additional', 'address', 'also', 'analysis', 'application', 'article', 'attack', 'best', 'breach', 'brochure', 'business', 'certain', 'cloud', 'come', 'comma', 'computer', 'concern', 'continue', 'courtesy', 'cyber', 'cybersecurity', 'data', 'device', 'download', 'email', 'emailing', 'enterprise', 'error', 'everything', 'existing', 'experience', 'extending', 'find', 'fit', 'free', 'friend', 'george', 'get', 'hacker', 'headline', 'help', 'home', 'image', 'include', 'information', 'inhibit', 'instantly', 'larger', 'leadership', 'learn', 'let', 'life', 'like', 'link', 'look', 'lost', 'make', 'management', 'many', 'master', 'message', 'mobile', 'move', 'multiple', 'network', 'new', 'next', 'online', 'organization', 'page', 'paper', 'platform', 'policy', 'prev', 'privacy', 'pro', 'process', 'professional', 'pt', 'reading', 'register', 'related', 'report', 'resource', 'right', 'sector', 'secure', 'security', 'see', 'sent', 'separate', 'sign', 'site', 'slideshow', 'slideshows', 'software', 'sorry', 'spark', 'sponsored', 'story', 'system', 'technology', 'terabyte', 'test', 'thank', 'tool', 'use', 'user', 'washington', 'well', 'wherever', 'white'] | |
1436 | |
1437 | |
1438 | |
1439 | |
1440 | |
1441 | |
1443 | |
1444 | |
1445 | |
1446 | |
1447 | |
1447 2017-03-16T18:32:55.249000Z https://www.mimecast.com/blog/2011/08/get-full-control-over-your-exchange-remote-powershell-session/ | |
1447 2017-03-18T12:36:04.521000Z http://www.mimecast.com/blog/2011/08/get-full-control-over-your-exchange-remote-powershell-session/ | |
['accept', 'acceptable', 'access', 'account', 'add', 'admin', 'administrator', 'admins', 'africa', 'aka', 'aleksandar', 'allow', 'allowed', 'also', 'alternate', 'america', 'another', 'apis', 'app', 'appears', 'application', 'apppoolsexadmin', 'apps', 'archive', 'archiving', 'asia', 'automate', 'available', 'award', 'back', 'background', 'barry', 'become', 'behavior', 'better', 'bit', 'blog', 'book', 'bunch', 'bundle', 'bypass', 'byte', 'call', 'career', 'categoryinfo', 'center', 'central', 'certificate', 'change', 'changed', 'chat', 'client', 'clientaccess', 'cmdlet', 'coalition', 'code', 'command', 'comment', 'company', 'compliance', 'computer', 'configuration', 'configure', 'configuring', 'connect', 'connecting', 'connection', 'consequence', 'constrained', 'contact', 'contain', 'contains', 'content', 'continuity', 'control', 'convert', 'converted', 'cookbook', 'copy', 'create', 'created', 'credential', 'currently', 'customer', 'cyber', 'data', 'database', 'databasesize', 'day', 'db', 'decided', 'deep', 'default', 'dehydrated', 'demo', 'deserialized', 'destination', 'detail', 'dialog', 'direction', 'directory', 'disappointing', 'disclaimer', 'disclosure', 'disqus', 'dive', 'dlp', 'doe', 'east', 'em', 'email', 'enable', 'end', 'endpoint', 'environment', 'error', 'etc', 'europe', 'evaluated', 'event', 'exadmin', 'exbin', 'exbinexadmin', 'exchange', 'execute', 'executed', 'expected', 'failed', 'false', 'file', 'filed', 'final', 'find', 'finished', 'first', 'folder', 'following', 'format', 'friend', 'fulfilled', 'full', 'fulllanguage', 'fullyqualifiederrorid', 'gain', 'get', 'getting', 'gill', 'giving', 'google', 'great', 'group', 'guide', 'ha', 'hat', 'helpful', 'hold', 'home', 'hope', 'http', 'hybrid', 'identity', 'ii', 'im', 'implement', 'implicit', 'import', 'important', 'importing', 'information', 'inline', 'install', 'installation', 'installed', 'int', 'interactive', 'invalidoperation', 'investor', 'invocation', 'invoke', 'javascript', 'kerberos', 'kind', 'knowledgebase', 'language', 'languagemode', 'large', 'leadership', 'legacy', 'levy', 'like', 'limitation', 'load', 'local', 'locally', 'localsystem', 'lock', 'locked', 'log', 'logged', 'login', 'look', 'looking', 'machine', 'made', 'mailbox', 'maintenance', 'manage', 'managed', 'management', 'managing', 'many', 'maybe', 'mb', 'mean', 'member', 'mesaging', 'messaging', 'method', 'methodcallnotsupportedindatasection', 'methodnotfound', 'microsoft', 'middle', 'migration', 'mike', 'mimecast', 'mimecaster', 'mobility', 'mode', 'module', 'msexchangepowershellapppool', 'multiple', 'mvp', 'name', 'named', 'need', 'network', 'new', 'news', 'nikolic', 'nolanguage', 'none', 'north', 'note', 'notice', 'notion', 'object', 'office', 'one', 'open', 'opening', 'option', 'original', 'others', 'overview', 'pacific', 'parameter', 'parse', 'parseexception', 'parsererror', 'part', 'partner', 'path', 'pfeiffer', 'platform', 'please', 'point', 'policy', 'pool', 'possible', 'post', 'posted', 'powered', 'powershell', 'press', 'primitive', 'privacy', 'process', 'processmodel', 'product', 'productivity', 'professional', 'program', 'property', 'protection', 'provided', 'quote', 'real', 'recovery', 'recycled', 'registration', 'related', 'relation', 'release', 'remote', 'remotely', 'remoting', 'replicationtype', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'restricted', 'restrictedlanguage', 'result', 'reverted', 'right', 'risk', 'role', 'ruined', 'run', 'runspace', 'runtimeexception', 'sale', 'saved', 'sb', 'schedule', 'script', 'section', 'secure', 'security', 'see', 'selected', 'send', 'sends', 'sent', 'separate', 'serialized', 'series', 'server', 'service', 'session', 'set', 'setting', 'several', 'shape', 'share', 'shay', 'shown', 'signature', 'site', 'sitemap', 'size', 'solution', 'something', 'source', 'south', 'ssl', 'sslflags', 'sslnegotiatecert', 'start', 'started', 'station', 'step', 'string', 'success', 'support', 'sure', 'system', 'talk', 'targeted', 'team', 'technical', 'term', 'testing', 'threat', 'three', 'tip', 'tobytes', 'togb', 'together', 'tokb', 'token', 'tomb', 'tool', 'tostring', 'training', 'trust', 'try', 'two', 'type', 'uk', 'uncomment', 'understand', 'uri', 'use', 'used', 'useful', 'user', 'using', 'value', 'via', 'video', 'view', 'virtual', 'wait', 'want', 'way', 'wconfig', 'web', 'webadministration', 'webinars', 'well', 'whatever', 'window', 'without', 'word', 'work', 'worked', 'wrong', 'wrote', 'xml'] | |
1449 | |
1449 2017-03-17T12:30:59.496000Z https://www.helpnetsecurity.com/2017/03/17/impact-artificial-intelligence-business/ | |
1449 2017-03-29T12:30:52.193000Z http://csoonline.com/article/3184577/application-development/ai-will-transform-information-security-but-it-won-t-happen-overnight.html | |
['ability', 'across', 'ai', 'already', 'american', 'anticipate', 'artificial', 'automate', 'automation', 'back', 'becomes', 'believe', 'benefit', 'biggest', 'business', 'change', 'cognitive', 'company', 'conference', 'confidence', 'continually', 'cost', 'create', 'customer', 'cybersecurity', 'data', 'detect', 'development', 'download', 'efficiency', 'finding', 'forward', 'future', 'global', 'greatest', 'help', 'hire', 'however', 'important', 'improvement', 'include', 'increase', 'industry', 'intelligence', 'investment', 'issue', 'job', 'learn', 'level', 'life', 'make', 'manager', 'many', 'million', 'need', 'new', 'next', 'overnight', 'problem', 'process', 'professional', 'quickly', 'range', 'science', 'security', 'see', 'service', 'set', 'survey', 'system', 'technology', 'threat', 'three', 'time', 'today', 'tool', 'top', 'use', 'used', 'user', 'using', 'year'] | |
1451 | |
1452 | |
1453 | |
1454 | |
1455 | |
1455 2017-03-01T06:31:00.129000Z https://www.mimecast.com/blog/2016/07/road-show-2016/ | |
1455 2017-03-18T12:31:51.949000Z http://www.mimecast.com/blog/2016/07/road-show-2016/ | |
['ask', 'bruzzese', 'canada', 'comment', 'content', 'disqus', 'enable', 'ending', 'episode', 'exchange', 'excited', 'experience', 'filed', 'florida', 'get', 'hear', 'help', 'infrastructure', 'javascript', 'listen', 'microsoft', 'mimecast', 'mvp', 'office', 'orlando', 'please', 'podcast', 'posted', 'powered', 'question', 'ready', 'related', 'road', 'selecting', 'share', 'show', 'starting', 'toronto', 'travel', 'view', 'work', 'world', 'yor'] | |
1456 | |
1457 | |
1459 | |
1460 | |
1461 | |
1462 | |
1462 2017-03-15T12:30:54.384000Z https://www.bleepingcomputer.com/news/hardware/researchers-hack-accelerometers-with-sound-waves/ | |
1462 2017-03-22T18:30:55.384000Z https://nakedsecurity.sophos.com/2017/03/22/soundwaves-used-to-produce-fake-data-from-accelerometers/ | |
['accelerometer', 'acoustic', 'allowed', 'also', 'android', 'antivirus', 'attack', 'blindly', 'car', 'carolina', 'computer', 'concern', 'control', 'could', 'course', 'data', 'detect', 'device', 'different', 'embedded', 'emergency', 'even', 'exploit', 'facebook', 'fake', 'false', 'file', 'find', 'fitbit', 'follow', 'found', 'generating', 'going', 'hand', 'hardware', 'help', 'home', 'industrial', 'injection', 'learn', 'like', 'made', 'malicious', 'mass', 'mem', 'michigan', 'model', 'motion', 'move', 'movement', 'new', 'next', 'often', 'one', 'output', 'per', 'post', 'previous', 'principle', 'privacy', 'program', 'remote', 'removal', 'research', 'researcher', 'reward', 'right', 'scientist', 'security', 'sensor', 'sensory', 'showed', 'smartphone', 'software', 'sound', 'south', 'step', 'still', 'system', 'tested', 'threat', 'tool', 'trust', 'twitter', 'two', 'university', 'use', 'used', 'using', 'virus', 'vulnerability', 'vulnerable', 'wave', 'window', 'work'] | |
1463 | |
1464 | |
1465 | |
1466 | |
1466 2017-03-05T00:44:23.205000Z http://thehackernews.com/2011/02/xss-venerability-in-times-of-india.html | |
1466 2017-03-05T00:45:17.063000Z http://thehackernews.com/2011/01/devansh-kumar-jain-found-xss.html | |
1466 2017-03-05T00:45:41.931000Z http://thehackernews.com/2011/01/nivosb-israel-hackers-found.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cross', 'cyber', 'data', 'ddos', 'deal', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'scripting', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'venerability', 'virus', 'voice', 'vulnerability', 'walking', 'want', 'website', 'without', 'york'] | |
1467 | |
1468 | |
1469 | |
1470 | |
1471 | |
1472 | |
1472 2017-03-21T18:31:01.186000Z https://www.helpnetsecurity.com/2017/03/21/nest-security-cameras-stop-recording/ | |
1472 2017-03-23T18:33:37.112000Z https://www.bleepingcomputer.com/news/security/bluetooth-bug-lets-burglars-disable-google-nest-cams/ | |
['burglar', 'camera', 'google', 'make', 'nest', 'recording', 'security'] | |
1473 | |
1474 | |
1475 | |
1476 | |
1477 | |
1477 2017-03-05T00:42:05.489000Z http://thehackernews.com/2011/05/50-sites-hacked-by-error-boy.html | |
1477 2017-03-05T00:42:58.265000Z http://thehackernews.com/2011/04/1000-website-hacked-by-bad-boy.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'boy', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'list', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'site', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1478 | |
1479 | |
1479 2017-03-01T12:32:16.392000Z http://www.itsecurityguru.org/2017/03/01/feds-abysmal-track-record-comes-cybersecurity/ | |
1479 2017-03-01T12:32:20.188000Z http://www.itsecurityguru.org/2017/03/01/dridex-becomes-first-malware-family-integrate-atombombing-technique/ | |
['ability', 'abysmal', 'action', 'ad', 'administrator', 'advanced', 'advertising', 'afraid', 'ago', 'american', 'amidst', 'anonabox', 'application', 'appriver', 'approves', 'around', 'article', 'ask', 'atm', 'atombombing', 'attack', 'audio', 'back', 'backlash', 'bad', 'bank', 'banking', 'bear', 'became', 'becomes', 'behind', 'biggest', 'billion', 'binary', 'biometrics', 'blind', 'board', 'book', 'breach', 'broadly', 'build', 'business', 'campaign', 'change', 'citibank', 'cloudpets', 'cm', 'collective', 'combat', 'come', 'comment', 'community', 'consumer', 'contentious', 'convenience', 'cost', 'creating', 'criminal', 'cyber', 'cyberattacks', 'cybersecurity', 'data', 'date', 'ddos', 'development', 'disposal', 'doe', 'dridex', 'ebay', 'editor', 'editorial', 'email', 'embracing', 'enable', 'enabled', 'encryption', 'enterprise', 'environment', 'eset', 'eu', 'event', 'explain', 'exploiting', 'expo', 'express', 'facebook', 'family', 'famous', 'fed', 'find', 'fine', 'finnish', 'firm', 'first', 'flaw', 'follow', 'fraud', 'full', 'gdpr', 'general', 'generation', 'genuine', 'get', 'getting', 'globally', 'goodbye', 'got', 'government', 'greg', 'grip', 'group', 'guru', 'hack', 'hacked', 'hacker', 'hacking', 'harm', 'head', 'health', 'help', 'hidemyweb', 'hitting', 'home', 'hospital', 'hour', 'http', 'ico', 'impact', 'imposter', 'improve', 'incident', 'industry', 'information', 'infosec', 'infosecurity', 'inside', 'integrate', 'internet', 'involved', 'ip', 'jackson', 'japonica', 'joe', 'knew', 'know', 'korean', 'landmark', 'laura', 'law', 'lazarus', 'least', 'leave', 'lending', 'like', 'likely', 'link', 'literacy', 'lizard', 'look', 'looking', 'loss', 'lure', 'machine', 'making', 'malvertising', 'malware', 'manager', 'manchester', 'many', 'million', 'mindef', 'mitigation', 'mobile', 'netflix', 'never', 'new', 'news', 'next', 'nh', 'num', 'offline', 'one', 'online', 'open', 'operation', 'option', 'original', 'password', 'patient', 'paypal', 'persistent', 'personal', 'personnel', 'pervasive', 'phishing', 'platform', 'please', 'pm', 'popular', 'posted', 'potential', 'previous', 'primary', 'privacy', 'protecting', 'protection', 'public', 'purpose', 'ransomware', 'ratankba', 'reaction', 'real', 'recent', 'record', 'recording', 'reduce', 'regulation', 'related', 'remains', 'response', 'retailer', 'return', 'rich', 'right', 'rise', 'rising', 'risk', 'round', 'run', 'sale', 'scam', 'sector', 'security', 'sensitive', 'serious', 'share', 'shortage', 'sign', 'skill', 'slap', 'smart', 'software', 'sort', 'source', 'south', 'spam', 'spot', 'squad', 'stock', 'stolen', 'story', 'suffered', 'supporter', 'surprising', 'system', 'tackle', 'tag', 'take', 'talking', 'target', 'technique', 'teddy', 'ten', 'term', 'themed', 'thing', 'think', 'threat', 'top', 'touch', 'track', 'trading', 'transaction', 'trend', 'trojan', 'turning', 'tweet', 'uk', 'uncovers', 'understanding', 'underway', 'used', 'user', 'using', 'usps', 'vector', 'victim', 'video', 'view', 'viral', 'vital', 'vulnerability', 'warns', 'weakest', 'web', 'webinar', 'webinars', 'week', 'well', 'wilson', 'within', 'working', 'worldwide', 'worse', 'year'] | |
1480 | |
1480 2017-03-09T18:31:26.903000Z http://www.welivesecurity.com/2015/02/10/whatsapp-privacy-broken-reveals-proof-concept-hack/ | |
1480 2017-03-27T12:32:23.668000Z https://www.welivesecurity.com/2015/02/10/whatsapp-privacy-broken-reveals-proof-concept-hack/ | |
['ability', 'able', 'abused', 'account', 'act', 'added', 'affect', 'allows', 'also', 'anybody', 'app', 'apps', 'author', 'behind', 'bit', 'blog', 'broken', 'business', 'bypassed', 'claim', 'complete', 'concern', 'control', 'could', 'created', 'creepy', 'currently', 'dashboard', 'despite', 'developer', 'discovery', 'display', 'downloading', 'dutch', 'eff', 'electronic', 'ellison', 'email', 'encryption', 'eset', 'even', 'faq', 'flaw', 'follow', 'foundation', 'fresh', 'friend', 'frontier', 'full', 'get', 'give', 'hack', 'help', 'hide', 'highlight', 'however', 'ineffective', 'information', 'intented', 'international', 'introducing', 'keep', 'kyle', 'last', 'latest', 'like', 'limited', 'long', 'made', 'maikel', 'message', 'messaging', 'might', 'network', 'noted', 'number', 'offline', 'online', 'option', 'page', 'phone', 'photo', 'picture', 'pledged', 'policy', 'post', 'posted', 'pretty', 'previously', 'print', 'privacy', 'private', 'probably', 'profile', 'public', 'raise', 'rated', 'recently', 'report', 'reported', 'reveals', 'scope', 'secure', 'security', 'seen', 'service', 'set', 'setting', 'show', 'simple', 'software', 'spent', 'spy', 'stalker', 'stating', 'status', 'stranger', 'sure', 'tied', 'time', 'timeline', 'tool', 'tough', 'track', 'user', 'using', 'well', 'whats', 'whatsapp', 'whatsspy', 'work', 'world', 'would', 'wrote', 'zweerink'] | |
1481 | |
1482 | |
1482 2017-03-09T18:31:50.833000Z http://www.welivesecurity.com/podcasts/fda-alert-on-medical-device-security/ | |
1482 2017-03-27T12:33:09.081000Z https://www.welivesecurity.com/podcasts/fda-alert-on-medical-device-security/ | |
['add', 'al', 'alert', 'blog', 'cobb', 'code', 'community', 'conference', 'contact', 'copyright', 'currently', 'de', 'deutsch', 'device', 'direct', 'div', 'download', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'facebook', 'fda', 'follow', 'friend', 'go', 'home', 'http', 'inbox', 'information', 'insight', 'ir', 'language', 'latest', 'legal', 'length', 'link', 'linkedin', 'magazine', 'material', 'medical', 'message', 'multimedia', 'navigation', 'news', 'newsletter', 'opinion', 'page', 'paper', 'pause', 'play', 'podcast', 'podcasts', 'policy', 'post', 'posted', 'print', 'privacy', 'radar', 'research', 'reserved', 'right', 'search', 'security', 'sent', 'sign', 'site', 'sitemap', 'stephen', 'stylesheet', 'toggle', 'total', 'twitter', 'video', 'view', 'virus', 'wechseln', 'white', 'wls', 'youtube', 'zum'] | |
1483 | |
1484 | |
1485 | |
1487 | |
1487 2017-03-14T06:30:53.909000Z https://www.proofpoint.com/us/threat-insight/post/mobile-malware-masquerades-as-POS-management-app | |
1487 2017-03-23T18:33:25.771000Z https://www.zscaler.com/blogs/research/nasty-adware-hiding-apps-google-play-store | |
['add', 'also', 'analysis', 'analyzed', 'android', 'another', 'app', 'apps', 'average', 'behavior', 'blog', 'chinese', 'code', 'common', 'complete', 'conclusion', 'control', 'create', 'customer', 'day', 'developer', 'device', 'different', 'difficult', 'displayed', 'example', 'feature', 'figure', 'file', 'finding', 'first', 'found', 'function', 'icon', 'include', 'installation', 'installed', 'like', 'link', 'list', 'location', 'log', 'look', 'malicious', 'malware', 'mean', 'message', 'mobile', 'monitor', 'name', 'network', 'new', 'number', 'one', 'particular', 'phishing', 'phone', 'runtime', 'screen', 'server', 'shown', 'store', 'string', 'suspicious', 'system', 'technique', 'threat', 'time', 'type', 'upon', 'use', 'used', 'user', 'well', 'would'] | |
1488 | |
1489 | |
1490 | |
1491 | |
1491 2017-03-16T18:32:13.288000Z https://www.mimecast.com/blog/2013/07/large-file-sendingnow-easy-and-safe/ | |
1491 2017-03-18T12:34:34.990000Z http://www.mimecast.com/blog/2013/07/large-file-sendingnow-easy-and-safe/ | |
['ability', 'acceptable', 'access', 'account', 'add', 'administrator', 'advantage', 'aes', 'africa', 'allows', 'also', 'america', 'announced', 'announces', 'another', 'apps', 'archive', 'archiving', 'asia', 'asking', 'attach', 'attachment', 'attack', 'available', 'award', 'background', 'bad', 'become', 'beyond', 'blind', 'block', 'blog', 'box', 'breach', 'building', 'bundle', 'capitalizing', 'career', 'center', 'central', 'centrally', 'chat', 'check', 'choose', 'cloud', 'coalition', 'comment', 'company', 'complaint', 'compliance', 'concern', 'concerned', 'consumer', 'contact', 'content', 'continuity', 'control', 'core', 'corporate', 'costly', 'critical', 'customer', 'cyber', 'data', 'defend', 'deliver', 'delivers', 'demo', 'detail', 'directly', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'download', 'dropbox', 'dynamic', 'easily', 'east', 'easy', 'elegantly', 'eliminate', 'email', 'employee', 'enable', 'encrypted', 'encryption', 'end', 'enhanced', 'europe', 'event', 'ever', 'exchange', 'expert', 'exposing', 'eye', 'face', 'faced', 'feel', 'file', 'filed', 'fix', 'fletcher', 'flexibility', 'fortune', 'found', 'freeform', 'freeing', 'full', 'functionality', 'geared', 'get', 'give', 'go', 'google', 'governance', 'grant', 'great', 'happens', 'help', 'highlighted', 'home', 'hope', 'hybrid', 'ignore', 'im', 'impact', 'increased', 'increasing', 'information', 'installing', 'investor', 'javascript', 'key', 'know', 'knowledgebase', 'large', 'leadership', 'leak', 'leaving', 'legacy', 'let', 'like', 'limitation', 'locally', 'location', 'login', 'long', 'mailbox', 'managed', 'management', 'manager', 'managing', 'meet', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'necessarily', 'need', 'network', 'new', 'news', 'north', 'nothing', 'notification', 'notified', 'notifies', 'offer', 'office', 'onto', 'option', 'order', 'organization', 'outlook', 'overview', 'pacific', 'partner', 'people', 'percent', 'placing', 'platform', 'please', 'point', 'policy', 'post', 'posted', 'potentially', 'power', 'powered', 'press', 'prevention', 'privacy', 'problem', 'product', 'productivity', 'professional', 'program', 'protection', 'putting', 'quote', 'ready', 'real', 'receive', 'received', 'recent', 'recipient', 'reducing', 'registration', 'related', 'relation', 'release', 'report', 'requirement', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'running', 'safe', 'safely', 'safety', 'sale', 'schedule', 'secure', 'security', 'seemingly', 'seen', 'send', 'sending', 'sensitive', 'sent', 'service', 'set', 'shadow', 'share', 'shared', 'sharer', 'sharing', 'short', 'show', 'signature', 'significant', 'simple', 'simply', 'sitemap', 'size', 'solution', 'solve', 'south', 'space', 'specify', 'spend', 'spent', 'ssl', 'stark', 'stop', 'storage', 'stored', 'succeed', 'success', 'support', 'take', 'targeted', 'team', 'technical', 'technology', 'term', 'think', 'threat', 'three', 'today', 'towards', 'track', 'training', 'trust', 'turn', 'turning', 'tweet', 'unprepared', 'uploads', 'use', 'user', 'using', 'valuable', 'video', 'view', 'viewed', 'visibility', 'vital', 'want', 'way', 'webinars', 'well', 'west', 'whaling', 'wild', 'win', 'within', 'work', 'worrying', 'year', 'yet'] | |
1492 | |
1493 | |
1494 | |
1496 | |
1496 2017-03-06T18:30:52.457000Z https://nakedsecurity.sophos.com/2017/03/06/news-in-brief-facebook-tags-disputed-news-products-to-be-judged-on-security-smart-meters-snafu/ | |
1496 2017-03-12T00:30:54.533000Z https://www.bleepingcomputer.com/news/hardware/millions-of-smart-meters-may-over-inflate-readings-by-up-to-600-percent/ | |
['android', 'antivirus', 'associated', 'bill', 'company', 'computer', 'connected', 'consumer', 'consumption', 'could', 'covered', 'data', 'device', 'dutch', 'energy', 'facebook', 'firewall', 'follow', 'found', 'give', 'going', 'higher', 'home', 'iot', 'learn', 'least', 'meter', 'much', 'netherlands', 'news', 'number', 'one', 'password', 'post', 'previous', 'privacy', 'problem', 'product', 'program', 'reading', 'removal', 'research', 'result', 'said', 'say', 'science', 'security', 'see', 'seen', 'smart', 'social', 'software', 'start', 'tool', 'twente', 'twitter', 'university', 'use', 'used', 'user', 'virus', 'window'] | |
1498 | |
1499 | |
1500 | |
1501 | |
1502 | |
1504 | |
1504 2017-03-03T12:30:53.083000Z http://csoonline.com/article/3176531/security-awareness/why-awareness-needs-to-teach-scam-detection-and-reaction.html | |
1504 2017-03-06T18:30:52.767000Z http://csoonline.com/article/3175792/it-careers/why-more-chief-strategy-and-risk-officers-need-a-seat-at-the-security-table.html | |
1504 2017-03-08T18:31:15.854000Z http://csoonline.com/article/3178330/security/wikileaks-dump-of-cia-exploits-exposes-enterprises-to-new-risks.html | |
1504 2017-03-09T00:31:06.552000Z http://csoonline.com/article/3178627/security/security-holes-in-confide-messaging-app-exposed-user-details.html | |
1504 2017-03-10T18:30:49.963000Z http://csoonline.com/article/3176534/security/protecting-the-enterprise-against-mobile-threats.html | |
1504 2017-03-13T18:30:47.324000Z http://csoonline.com/article/3180187/security/gop-senator-alleges-password-hijack-attempts-after-blasting-wikileaks-founder.html | |
1504 2017-03-14T12:30:53.211000Z http://csoonline.com/article/3180684/security/more-than-120-000-affected-by-w-2-phishing-scams-this-tax-season.html | |
1504 2017-03-14T12:30:58.603000Z http://csoonline.com/article/3180606/security/mirai-is-the-hydra-of-iot-security-too-many-heads-to-cut-off.html | |
1504 2017-03-14T18:30:45.675000Z http://csoonline.com/article/3179107/security/continuous-authentication-why-it-s-getting-attention-and-what-you-need-to-know.html | |
1504 2017-03-15T00:30:58.555000Z http://csoonline.com/article/3180515/security/doj-no-we-wont-say-how-much-the-fbi-paid-to-hack-terrorists-iphone.html | |
1504 2017-03-16T12:30:49.852000Z http://csoonline.com/article/3181705/security/crime-ring-used-amazon-ebay-to-sell-stolen-printer-ink.html | |
1504 2017-03-16T12:30:57.851000Z http://csoonline.com/article/3181704/security/us-faces-limits-in-busting-russian-agents-over-yahoo-breach.html | |
1504 2017-03-16T12:31:00.123000Z http://csoonline.com/article/3181488/data-center/expert-apple-may-have-deployed-unauthorized-patch-by-mistake.html | |
1504 2017-03-17T12:30:55.734000Z http://csoonline.com/article/3181330/data-protection/do-you-have-an-incident-response-plan-in-place.html | |
1504 2017-03-17T12:30:58.088000Z http://csoonline.com/article/3182067/government-it/article.html | |
1504 2017-03-17T18:30:59.871000Z http://csoonline.com/article/3181987/security/adobe-reader-edge-safari-and-ubuntu-fall-during-first-day-at-pwn2own.html | |
1504 2017-03-20T12:30:59.840000Z http://csoonline.com/article/3182685/security/mcdonalds-india-asks-users-to-update-app-after-data-leak-report.html | |
1504 2017-03-20T12:31:00.854000Z http://csoonline.com/article/3182383/security/cebit-showcases-security-after-snowden.html | |
1504 2017-03-20T18:30:58.542000Z http://csoonline.com/article/3182873/security/fbi-looks-into-russian-hack-of-us-election-possible-trump-involvement.html | |
1504 2017-03-20T18:31:02.204000Z http://csoonline.com/article/3182443/security/cyberwarfare-conferences-and-events-calendar-for-2017.html | |
1504 2017-03-22T00:31:00.942000Z http://csoonline.com/article/3183503/security/uk-follows-us-ban-of-electronic-devices-in-cabins-on-some-flights.html | |
1504 2017-03-22T12:30:51.878000Z http://csoonline.com/article/3183640/techology-business/follow-the-money-where-vc-security-investment-is-occurring.html | |
1504 2017-03-23T18:33:33.199000Z http://csoonline.com/article/3184282/security/snowdens-ex-boss-offers-tips-on-stopping-insider-threats.html | |
1504 2017-03-24T12:33:47.778000Z http://csoonline.com/article/3184690/android/most-android-devices-lack-latest-security-patches.html | |
1504 2017-03-24T12:33:55.363000Z http://csoonline.com/article/3184379/security/blockchain-can-help-secure-medical-devices-improve-patient-privacy.html | |
1504 2017-03-27T12:30:51.880000Z http://csoonline.com/article/3184785/security/three-privacy-tools-that-block-your-internet-provider-from-tracking-you.html | |
1504 2017-03-27T18:30:57.043000Z http://csoonline.com/article/3184216/security/consultant-urges-never-pay-ransomware-demands.html | |
1504 2017-03-30T12:30:49.689000Z http://csoonline.com/article/3186572/government/trump-extends-obama-executive-order-on-cyberattacks.html | |
1504 2017-03-30T18:31:01.828000Z http://csoonline.com/article/3185735/security/ip-theft-declining-or-just-more-stealthy.html | |
1504 2017-03-30T18:31:03.723000Z http://csoonline.com/article/3186389/cyber-attacks-espionage/how-to-fend-off-cyberattacks-and-data-breaches.html | |
['address', 'breach', 'brochure', 'cloud', 'comma', 'concern', 'cybersecurity', 'data', 'download', 'email', 'emailing', 'error', 'fit', 'friend', 'george', 'get', 'headline', 'home', 'inhibit', 'instantly', 'learn', 'let', 'life', 'like', 'link', 'master', 'message', 'might', 'move', 'multiple', 'next', 'online', 'page', 'policy', 'privacy', 'pt', 'related', 'right', 'secure', 'security', 'sent', 'separate', 'sign', 'sorry', 'sponsored', 'terabyte', 'thank', 'use', 'washington', 'wherever'] | |
1505 | |
1505 2017-03-16T18:33:36.814000Z https://www.mimecast.com/blog/2010/09/the-long-wave-goodbye/ | |
1505 2017-03-18T12:37:32.483000Z http://www.mimecast.com/blog/2010/09/the-long-wave-goodbye/ | |
['absolutely', 'acceptable', 'actually', 'admired', 'africa', 'agonize', 'ala', 'almost', 'always', 'america', 'andrew', 'announcement', 'application', 'apps', 'archive', 'archiving', 'asia', 'aspect', 'attack', 'attempt', 'award', 'back', 'barely', 'basic', 'become', 'best', 'beyond', 'birthday', 'blog', 'blurred', 'borenstein', 'boy', 'bundle', 'business', 'car', 'career', 'case', 'center', 'central', 'character', 'chat', 'chief', 'coalition', 'college', 'come', 'comment', 'commercial', 'communicate', 'company', 'compliance', 'composed', 'composes', 'computer', 'consulted', 'contact', 'content', 'continuity', 'control', 'converge', 'cool', 'cooler', 'coolest', 'coolness', 'correct', 'correspond', 'creative', 'customer', 'cyber', 'danger', 'daring', 'data', 'day', 'defend', 'delorean', 'demise', 'demo', 'designed', 'designer', 'detail', 'developer', 'disclaimer', 'disclosure', 'disqus', 'distinguished', 'dlp', 'doe', 'done', 'doomed', 'doubt', 'dust', 'early', 'east', 'email', 'emotion', 'enable', 'end', 'endeavor', 'engineer', 'enough', 'error', 'europe', 'evaluation', 'event', 'eventually', 'every', 'exchange', 'experiment', 'expert', 'extend', 'extension', 'face', 'facebook', 'fact', 'faculty', 'fail', 'failure', 'fearlessly', 'feel', 'feeling', 'file', 'filed', 'flashy', 'funding', 'future', 'geek', 'get', 'good', 'goodbye', 'google', 'grinnell', 'hand', 'happen', 'happy', 'hold', 'home', 'hoped', 'human', 'hybrid', 'hypnotically', 'ibm', 'idea', 'ignore', 'im', 'implemented', 'including', 'indeed', 'information', 'innovation', 'innovative', 'insanely', 'insecure', 'instant', 'instead', 'interest', 'internet', 'investor', 'javascript', 'joining', 'knowledgebase', 'known', 'lab', 'large', 'le', 'leadership', 'learned', 'least', 'left', 'legacy', 'lesson', 'level', 'likely', 'line', 'live', 'login', 'long', 'looking', 'lot', 'luck', 'mail', 'make', 'managed', 'management', 'margin', 'matter', 'mean', 'meanwhile', 'member', 'mesaging', 'message', 'messaging', 'metamail', 'michigan', 'microsoft', 'middle', 'might', 'migration', 'mime', 'mimecast', 'mimecaster', 'mixed', 'mobility', 'mostly', 'multipurpose', 'nathaniel', 'network', 'news', 'next', 'noble', 'north', 'noticed', 'numerous', 'office', 'often', 'one', 'option', 'overview', 'pacific', 'paradoxically', 'partner', 'patent', 'payment', 'pending', 'percent', 'peril', 'person', 'personal', 'piece', 'platform', 'please', 'point', 'policy', 'positively', 'post', 'posted', 'potential', 'powered', 'practical', 'predictable', 'prediction', 'press', 'previously', 'pride', 'privacy', 'product', 'productivity', 'professional', 'program', 'programmer', 'project', 'protection', 'proved', 'quickly', 'quite', 'quote', 'real', 'reality', 'really', 'receive', 'recipient', 'registration', 'reinvent', 'related', 'relation', 'release', 'research', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'rest', 'right', 'risk', 'role', 'sale', 'say', 'schedule', 'scientist', 'screen', 'secure', 'security', 'see', 'seems', 'send', 'sender', 'sensitive', 'served', 'service', 'set', 'settled', 'several', 'shadow', 'share', 'signature', 'siren', 'sitemap', 'skill', 'slowly', 'software', 'solution', 'sort', 'south', 'spending', 'stage', 'standard', 'substantial', 'succeed', 'success', 'support', 'sure', 'system', 'take', 'talking', 'targeted', 'taxing', 'team', 'technical', 'technology', 'tend', 'term', 'thing', 'though', 'thought', 'threat', 'three', 'time', 'training', 'tried', 'trust', 'typo', 'underlying', 'unfortunately', 'university', 'unprepared', 'use', 'useful', 'usefulness', 'view', 'vision', 'vulnerable', 'wa', 'waiting', 'wasting', 'watch', 'wave', 'way', 'web', 'webinars', 'week', 'whole', 'wide', 'wish', 'wo', 'wording', 'work', 'world', 'writing', 'wrong', 'year'] | |
1507 | |
1508 | |
1508 2017-03-22T18:30:50.181000Z https://www.bleepingcomputer.com/news/security/most-industrial-control-systems-get-infected-with-malware-by-accident/ | |
1508 2017-03-25T18:30:51.715000Z http://securityaffairs.co/wordpress/57412/malware/siemens-plc-ics-malware.html | |
1508 2017-03-29T12:30:57.180000Z http://securityaffairs.co/wordpress/57490/hacking/kaspersky-ics-cert-icss-attacks.html | |
['active', 'also', 'around', 'article', 'attack', 'awareness', 'based', 'campaign', 'case', 'compromise', 'control', 'cyber', 'dark', 'data', 'detected', 'expert', 'file', 'find', 'found', 'hacking', 'human', 'ic', 'industrial', 'infection', 'information', 'internet', 'last', 'malicious', 'malware', 'member', 'month', 'network', 'news', 'operator', 'please', 'previous', 'report', 'researcher', 'resource', 'sample', 'security', 'show', 'strong', 'system', 'targeted', 'team', 'technology', 'time', 'top', 'used', 'various', 'vulnerability', 'web', 'window', 'year'] | |
1509 | |
1512 | |
1513 | |
1513 2017-03-10T18:30:56.916000Z http://csoonline.com/article/3179450/security/after-cia-leak-intel-security-releases-detection-tool-for-efi-rootkits.html | |
1513 2017-03-11T12:30:46.411000Z https://www.bleepingcomputer.com/news/security/intel-security-mcafee-releases-rootkit-scanner-following-vault-7-cia-leak/ | |
['address', 'also', 'apple', 'arbitrary', 'article', 'available', 'binary', 'bios', 'block', 'blog', 'boot', 'breach', 'called', 'chipsec', 'cia', 'clean', 'code', 'comment', 'company', 'component', 'computer', 'content', 'copyright', 'credit', 'current', 'data', 'deal', 'derstarke', 'detection', 'development', 'device', 'document', 'download', 'driver', 'efi', 'exploit', 'extensible', 'extract', 'facebook', 'featured', 'file', 'find', 'firmware', 'follow', 'framework', 'going', 'google', 'guide', 'hacker', 'hacking', 'hardware', 'help', 'hidden', 'home', 'image', 'implant', 'infected', 'information', 'inside', 'intel', 'interface', 'kernel', 'latest', 'leak', 'learn', 'like', 'mac', 'malicious', 'malware', 'medium', 'module', 'need', 'new', 'news', 'newsletter', 'operating', 'partition', 'persistence', 'platform', 'player', 'policy', 'popular', 'post', 'previous', 'privacy', 'program', 'project', 'protect', 'provide', 'quarkmatter', 'ransomware', 'release', 'released', 'removed', 'researcher', 'resource', 'revealed', 'right', 'rootkit', 'rootkits', 'run', 'said', 'sale', 'scan', 'second', 'security', 'share', 'show', 'sign', 'simple', 'smartphones', 'social', 'software', 'spam', 'stored', 'strong', 'support', 'system', 'tech', 'time', 'tool', 'twitter', 'unified', 'update', 'us', 'usage', 'use', 'user', 'various', 'version', 'vulnerability', 'web', 'whitelist', 'wikileaks', 'window'] | |
1514 | |
1515 | |
1516 | |
1517 | |
1518 | |
1519 | |
1520 | |
1520 2017-03-21T00:31:24.695000Z http://www.welivesecurity.com/podcasts/zeus-trojan-bot-steals-over-one-million-dollars-from-british-bank-accounts/ | |
1520 2017-03-27T12:33:49.014000Z https://www.welivesecurity.com/podcasts/zeus-trojan-bot-steals-over-one-million-dollars-from-british-bank-accounts/ | |
['account', 'add', 'al', 'audio', 'bank', 'blog', 'bot', 'british', 'code', 'community', 'conference', 'contact', 'copyright', 'currently', 'de', 'deutsch', 'direct', 'div', 'dollar', 'download', 'email', 'embed', 'en', 'english', 'eset', 'español', 'expert', 'facebook', 'follow', 'friend', 'go', 'home', 'http', 'inbox', 'information', 'insight', 'ir', 'language', 'latest', 'legal', 'length', 'link', 'linkedin', 'magazine', 'material', 'message', 'million', 'multimedia', 'navigation', 'news', 'newsletter', 'one', 'opinion', 'page', 'paper', 'pause', 'play', 'podcast', 'podcasts', 'policy', 'post', 'posted', 'print', 'privacy', 'radar', 'research', 'reserved', 'right', 'rob', 'search', 'security', 'sent', 'sign', 'site', 'sitemap', 'steal', 'stylesheet', 'toggle', 'total', 'trojan', 'twitter', 'video', 'view', 'virus', 'waugh', 'wechseln', 'white', 'wls', 'youtube', 'zeus', 'zum'] | |
1522 | |
1523 | |
1525 | |
1525 2017-03-08T00:30:41.665000Z http://blog.checkpoint.com/2017/03/07/introducing-check-point-vsec-google-cloud-platform/ | |
1525 2017-03-08T00:30:47.164000Z http://blog.checkpoint.com/2017/03/07/choice-flexibility-and-advanced-security-now-with-google-cloud-platform/ | |
1525 2017-03-10T00:30:50.939000Z http://blog.checkpoint.com/2017/03/02/check-point-honored-coolest-cloud-security-vendor-crn/ | |
['abbr', 'acronym', 'across', 'address', 'advanced', 'attribute', 'aws', 'azure', 'based', 'benefit', 'blockquote', 'blog', 'business', 'cancel', 'captcha', 'center', 'check', 'cite', 'cloud', 'code', 'company', 'complete', 'consistent', 'customer', 'data', 'del', 'deployed', 'dynamic', 'em', 'email', 'environment', 'equation', 'exhausted', 'feature', 'field', 'flexibility', 'gateway', 'help', 'home', 'html', 'http', 'hybrid', 'industry', 'infrastructure', 'insight', 'leave', 'limit', 'link', 'management', 'marked', 'name', 'need', 'network', 'new', 'next', 'one', 'platform', 'please', 'point', 'policy', 'post', 'posted', 'previous', 'private', 'protection', 'provider', 'provides', 'public', 'published', 'reload', 'reply', 'reporting', 'required', 'run', 'secure', 'security', 'service', 'software', 'strike', 'strong', 'submission', 'tag', 'technology', 'threat', 'time', 'use', 'vendor', 'verify', 'visibility', 'vsec', 'website', 'workload'] | |
1528 | |
1529 | |
1529 2017-03-02T06:30:49.279000Z https://arstechnica.com/security/2017/03/marissa-mayer-forgoes-bonus-after-yahoo-botches-hack-investigation/ | |
1529 2017-03-02T06:30:52.717000Z https://www.grahamcluley.com/yahoo-ceo-marissa-mayer-will-miss-cash-bonus-security-breaches/ | |
1529 2017-03-02T12:30:43.134000Z http://thehackernews.com/2017/03/yahoo-cookie-forging-hack.html | |
1529 2017-03-02T12:30:47.110000Z http://www.bankinfosecurity.com/yahoo-ceo-loses-bonus-over-security-lapses-a-9748 | |
1529 2017-03-02T12:30:48.283000Z https://www.bleepingcomputer.com/news/security/yahoo-ceo-gives-annual-bonus-to-employees-after-company-confirms-new-hacks/ | |
1529 2017-03-02T12:31:07.979000Z https://www.helpnetsecurity.com/2017/03/02/yahoo-cookie-forging-incident/ | |
1529 2017-03-03T18:30:52.813000Z http://www.welivesecurity.com/2017/03/03/yahoo-ceo-forgoes-annual-bonus-worth-millions-security-breaches/ | |
['account', 'incident', 'million', 'yahoo'] | |
1530 | |
1530 2017-03-01T06:31:33.357000Z http://www.welivesecurity.com/2006/09/09/doesnt-the-eicar-test-file-look-spiffy/ | |
1530 2017-03-02T06:31:37.659000Z http://www.welivesecurity.com/2006/09/11/what-is-a-behavior-blocker/ | |
1530 2017-03-07T12:31:20.141000Z http://www.welivesecurity.com/2006/10/26/spycar-what-can-it-tell-you/ | |
['abrams', 'also', 'app', 'approach', 'author', 'blog', 'characteristic', 'detect', 'detection', 'director', 'education', 'email', 'eset', 'find', 'friend', 'general', 'http', 'know', 'like', 'llc', 'look', 'one', 'page', 'people', 'post', 'posted', 'print', 'product', 'program', 'randy', 'research', 'security', 'see', 'software', 'specific', 'spycar', 'spyware', 'technical', 'tell', 'test', 'testing', 'thing', 'understand', 'use', 'virus', 'well', 'whats', 'would'] | |
1531 | |
1531 2017-03-03T18:30:43.902000Z https://www.webroot.com/blog/2017/03/02/top-5-tax-season-scams/ | |
1531 2017-03-20T18:30:56.385000Z https://www.grahamcluley.com/scammers-targeting-tax-preparers-with-last-minute-phishing-attacks/ | |
1531 2017-03-24T12:33:42.238000Z http://csoonline.com/article/3183537/security/irs-makes-tax-refund-scams-harder-but-w-2-phishing-attacks-continue-unabated.html | |
['agency', 'alert', 'also', 'attack', 'card', 'credit', 'data', 'deadline', 'email', 'file', 'fraud', 'get', 'identity', 'information', 'irs', 'like', 'making', 'nothing', 'number', 'often', 'one', 'online', 'people', 'phishing', 'prepaid', 'preparers', 'professional', 'recent', 'refund', 'return', 'say', 'scam', 'scammer', 'season', 'security', 'see', 'service', 'social', 'tax', 'taxpayer', 'time', 'top', 'via', 'year'] | |
1532 | |
1533 | |
1534 | |
1534 2017-03-27T18:30:55.333000Z https://ananalyticalapproach.blogspot.de/2017/03/data-visualization-keeping-eye-on.html | |
1534 2017-03-27T18:31:01.657000Z http://darkreading.com/threat-intelligence/data-visualization-keeping-an-eye-on-security/a/d-id/1328493 | |
['attempt', 'darkreading', 'data', 'discus', 'ever', 'eye', 'goldfarb', 'josh', 'keeping', 'latest', 'leverage', 'many', 'people', 'result', 'security', 'struggle', 'value', 'visualization', 'want'] | |
1535 | |
1537 | |
1537 2017-03-05T00:38:37.020000Z http://thehackernews.com/2012/02/microsoft-store-india-got-hacked-in.html | |
1537 2017-03-05T00:40:22.027000Z http://thehackernews.com/2011/08/sulekhacom-got-hacked-by-mr52.html | |
1537 2017-03-05T00:40:30.572000Z http://thehackernews.com/2011/07/vimeo-brazil-video-sharing-site-got.html | |
['ability', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'deface', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'got', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1538 | |
1539 | |
1539 2017-03-07T00:30:46.756000Z https://www.arbornetworks.com/blog/insight/the-network-computing-magazine-awards/ | |
1539 2017-03-13T18:30:49.083000Z https://www.arbornetworks.com/blog/insight/application-layer-ddos-attacks-the-numbers-may-surprise-you/ | |
['according', 'across', 'ago', 'appliance', 'application', 'aps', 'arbor', 'attack', 'average', 'based', 'built', 'center', 'claimed', 'comment', 'conducted', 'data', 'ddos', 'dns', 'download', 'earned', 'effectiveness', 'email', 'ever', 'financial', 'firm', 'first', 'flood', 'get', 'highest', 'highlight', 'http', 'include', 'independent', 'internet', 'invite', 'isp', 'kevin', 'lab', 'learn', 'like', 'loic', 'low', 'mitigation', 'mix', 'mobile', 'network', 'ntp', 'overall', 'performed', 'posted', 'print', 'product', 'protection', 'protocol', 'provider', 'reflection', 'related', 'report', 'rudy', 'score', 'security', 'service', 'share', 'sip', 'slow', 'test', 'testing', 'top', 'tumblr', 'tweet', 'user', 'versus', 'volumetric', 'web', 'whalen', 'year'] | |
1540 | |
1541 | |
1542 | |
1543 | |
1544 | |
1545 | |
1546 | |
1547 | |
1549 | |
1550 | |
1551 | |
1552 | |
1553 | |
1554 | |
1555 | |
1556 | |
1557 | |
1558 | |
1559 | |
1560 | |
1561 | |
1562 | |
1563 | |
1564 | |
1564 2017-03-25T06:31:05.859000Z http://www.welivesecurity.com/2015/02/18/12000-exposed-possible-id-theft-jeb-bush-publishes-emails/ | |
1564 2017-03-27T12:32:08.029000Z https://www.welivesecurity.com/2015/02/18/12000-exposed-possible-id-theft-jeb-bush-publishes-emails/ | |
['abta', 'access', 'according', 'account', 'act', 'add', 'advocate', 'al', 'alan', 'also', 'android', 'announced', 'app', 'archive', 'around', 'article', 'attachment', 'author', 'available', 'bad', 'believe', 'birthdates', 'blog', 'blunder', 'breach', 'browsing', 'bush', 'cache', 'campbell', 'candidate', 'caution', 'certainly', 'charge', 'chief', 'circulating', 'citizen', 'code', 'collection', 'come', 'commander', 'community', 'concern', 'conference', 'congress', 'contact', 'contained', 'copy', 'copyright', 'coyote', 'create', 'cybersecurity', 'data', 'dated', 'de', 'department', 'describes', 'detail', 'deutsch', 'direct', 'discovered', 'div', 'download', 'downloaded', 'dump', 'economics', 'eight', 'elected', 'email', 'embed', 'en', 'encourage', 'english', 'enough', 'eset', 'español', 'ethic', 'every', 'exercise', 'experience', 'expert', 'exposed', 'facebook', 'failure', 'family', 'fiction', 'file', 'fine', 'florida', 'folk', 'follow', 'foresight', 'forever', 'former', 'fortune', 'found', 'friend', 'ftc', 'full', 'fully', 'getting', 'gizmodo', 'go', 'google', 'governor', 'guardian', 'hole', 'home', 'hope', 'hoping', 'hot', 'however', 'http', 'huge', 'id', 'identifying', 'identity', 'implication', 'inbox', 'including', 'indicator', 'information', 'insight', 'interested', 'internet', 'introduction', 'iot', 'ir', 'jeb', 'key', 'know', 'kristy', 'lame', 'language', 'last', 'latest', 'law', 'lawyer', 'lead', 'leading', 'legal', 'like', 'link', 'linkedin', 'list', 'made', 'magazine', 'majority', 'many', 'martin', 'material', 'matter', 'maximum', 'maybe', 'member', 'message', 'might', 'minecraft', 'mod', 'month', 'much', 'multimedia', 'name', 'navigation', 'netgear', 'new', 'news', 'newsletter', 'number', 'obviously', 'office', 'okay', 'online', 'opinion', 'original', 'otherwise', 'page', 'paper', 'people', 'per', 'performance', 'personal', 'personally', 'piece', 'play', 'podcasts', 'point', 'policy', 'popular', 'population', 'possible', 'post', 'posted', 'powerpoint', 'presence', 'presidential', 'pressed', 'pretty', 'print', 'privacy', 'private', 'proud', 'published', 'publishes', 'radar', 'raised', 'ransomware', 'read', 'realised', 'really', 'received', 'record', 'redact', 'redacted', 'related', 'released', 'releasing', 'removed', 'republican', 'research', 'reserved', 'retroactively', 'right', 'router', 'said', 'say', 'search', 'security', 'select', 'sent', 'serve', 'service', 'sharing', 'sign', 'single', 'site', 'sitemap', 'smart', 'social', 'something', 'sort', 'source', 'spam', 'spokesperson', 'ssns', 'state', 'still', 'stop', 'stranger', 'strong', 'stylesheet', 'team', 'theft', 'though', 'thousand', 'three', 'toggle', 'topic', 'toy', 'transparency', 'tv', 'twitter', 'undecided', 'understand', 'understatement', 'update', 'verge', 'video', 'view', 'violation', 'virus', 'vizio', 'waiting', 'website', 'wechseln', 'week', 'well', 'whats', 'white', 'wish', 'wls', 'worrying', 'would', 'wrote', 'year', 'youtube', 'zum'] | |
1566 | |
1567 | |
1568 | |
1568 2017-03-01T06:33:41.667000Z https://www.mimecast.com/blog/2010/10/good-communication-is-relevant-communicatio/ | |
1568 2017-03-18T12:37:16.198000Z http://www.mimecast.com/blog/2010/10/good-communication-is-relevant-communicatio/ | |
['abuse', 'acceptable', 'admit', 'adopter', 'africa', 'ago', 'akin', 'already', 'america', 'amongst', 'announcing', 'appearing', 'apps', 'archive', 'archiving', 'article', 'asia', 'attack', 'attention', 'average', 'award', 'become', 'best', 'better', 'blog', 'blogged', 'blurred', 'bother', 'bundle', 'business', 'called', 'career', 'celebs', 'center', 'central', 'change', 'chat', 'choice', 'clean', 'clever', 'cluttering', 'coalition', 'colleague', 'come', 'comment', 'communication', 'company', 'compliance', 'constantly', 'consumption', 'contact', 'content', 'continuity', 'control', 'converge', 'corporate', 'course', 'culture', 'customer', 'cut', 'cyber', 'data', 'day', 'dead', 'defend', 'delete', 'demand', 'demo', 'demonstrating', 'detail', 'different', 'disclaimer', 'disclosure', 'disqus', 'distracted', 'dlp', 'dominates', 'drop', 'earlier', 'east', 'effective', 'email', 'enable', 'endemic', 'engendering', 'europe', 'even', 'event', 'evidence', 'exchange', 'expert', 'exposure', 'fact', 'far', 'feel', 'file', 'filed', 'filter', 'find', 'finding', 'first', 'fixable', 'followed', 'following', 'get', 'give', 'good', 'google', 'governance', 'great', 'handful', 'haystack', 'history', 'home', 'hub', 'hybrid', 'im', 'inbox', 'inboxes', 'inconvenience', 'information', 'instilling', 'intended', 'interested', 'invasion', 'investor', 'javascript', 'kind', 'know', 'knowledgebase', 'large', 'late', 'lawyer', 'leadership', 'legacy', 'legal', 'limited', 'line', 'link', 'login', 'luddite', 'major', 'make', 'managed', 'management', 'many', 'matthew', 'medium', 'memory', 'mesaging', 'message', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mindlessly', 'minor', 'miracle', 'mobility', 'need', 'needle', 'network', 'never', 'news', 'noise', 'north', 'office', 'one', 'option', 'organisation', 'overview', 'pacific', 'partner', 'people', 'percent', 'personal', 'platform', 'please', 'plenty', 'policy', 'post', 'posted', 'power', 'powered', 'practice', 'press', 'privacy', 'product', 'productivity', 'profession', 'professional', 'program', 'proper', 'protected', 'protection', 'proverbial', 'quote', 'rather', 'ravden', 'reaction', 'read', 'ready', 'real', 'really', 'referring', 'refers', 'registration', 'related', 'relation', 'release', 'relevant', 'remainder', 'replied', 'reply', 'requiring', 'research', 'reseller', 'reserved', 'resilience', 'resource', 'response', 'responsible', 'responsibly', 'result', 'retweeted', 'right', 'risk', 'road', 'role', 'rubbish', 'sale', 'say', 'scenario', 'schedule', 'screen', 'secure', 'security', 'send', 'sensible', 'service', 'set', 'share', 'short', 'show', 'showed', 'signature', 'sitemap', 'slush', 'solution', 'somehow', 'sort', 'south', 'sporting', 'spotted', 'sprinkling', 'struggle', 'stuff', 'success', 'support', 'sure', 'sysomos', 'tangible', 'targeted', 'team', 'techie', 'technical', 'tempting', 'term', 'thing', 'though', 'threat', 'thrown', 'training', 'trivia', 'trivial', 'trust', 'tweet', 'tweetdeck', 'tweeting', 'twitter', 'unprepared', 'use', 'used', 'useful', 'user', 'vaguely', 'value', 'vault', 'view', 'wasteful', 'way', 'webinars', 'week', 'whatever', 'white', 'wired', 'within', 'work', 'world', 'worse', 'yes', 'yet'] | |
1569 | |
1571 | |
1572 | |
1575 | |
1576 | |
1577 | |
1578 | |
1579 | |
1580 | |
1581 | |
1582 | |
1583 | |
1584 | |
1585 | |
1586 | |
1587 | |
1588 | |
1589 | |
1591 | |
1592 | |
1593 | |
1595 | |
1596 | |
1597 | |
1598 | |
1599 | |
1601 | |
1602 | |
1603 | |
1604 | |
1605 | |
1606 | |
1607 | |
1608 | |
1608 2017-03-06T12:31:04.864000Z https://isc.sans.edu/newssummary.html#1020095 | |
1608 2017-03-06T12:31:05.752000Z https://isc.sans.edu/newssummary.html#1020099 | |
['act', 'admits', 'ago', 'analysis', 'antivirus', 'av', 'breaking', 'clean', 'day', 'defended', 'encrypted', 'firm', 'google', 'http', 'industry', 'intercepting', 'malware', 'mozilla', 'need', 'practice', 'right', 'security', 'stop', 'supporter', 'synopsis', 'traffic', 'vendor', 'view', 'zdnet'] | |
1609 | |
1609 2017-03-03T18:30:46.335000Z https://www.schneier.com/blog/archives/2017/03/jumping_air_gap_1.html | |
1609 2017-03-06T12:30:59.695000Z https://www.helpnetsecurity.com/2017/03/06/enterprises-drones/ | |
1609 2017-03-29T18:30:59.741000Z https://nakedsecurity.sophos.com/2017/03/29/got-a-drone-check-local-regulations-before-you-fly-it/ | |
['drone'] | |
1610 | |
1611 | |
1611 2017-03-05T00:43:18.380000Z http://thehackernews.com/2011/03/8-websites-hacked-by-albanian-hackers.html | |
1611 2017-03-05T00:46:40.201000Z http://thehackernews.com/2010/11/tlxdgscom-hacked-by-ath-crew-teo.html | |
['ability', 'albania', 'amazon', 'anonymity', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'downturn', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'teo', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'unknown', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1612 | |
1613 | |
1614 | |
1616 | |
1617 | |
1619 | |
1620 | |
1621 | |
1622 | |
1623 | |
1624 | |
1625 | |
1625 2017-03-05T00:41:19.155000Z http://thehackernews.com/2011/06/sony-12th-time-hacked-database-of.html | |
1625 2017-03-05T00:41:39.235000Z http://thehackernews.com/2011/05/sony-music-indonesia-defaced-by.html | |
['ability', 'amazon', 'anonymity', 'anonymous', 'apps', 'around', 'article', 'attack', 'automatically', 'banking', 'bear', 'become', 'best', 'big', 'boost', 'boot', 'botnet', 'bounty', 'breach', 'browser', 'bug', 'camp', 'card', 'career', 'ceo', 'certification', 'certified', 'chairman', 'chunk', 'cisa', 'cism', 'cissp', 'code', 'command', 'comment', 'computer', 'conference', 'consent', 'cracking', 'credit', 'cyber', 'data', 'ddos', 'deal', 'defacement', 'delivered', 'detection', 'dna', 'double', 'dridex', 'easy', 'ebooks', 'encryption', 'entrepreneur', 'espionage', 'ethical', 'evade', 'exam', 'exclusive', 'fcc', 'first', 'five', 'forensics', 'found', 'founder', 'free', 'gain', 'get', 'give', 'google', 'got', 'hack', 'hacked', 'hacker', 'hacking', 'home', 'http', 'inbox', 'increase', 'injection', 'interested', 'interesting', 'internet', 'investigator', 'isps', 'join', 'know', 'kumar', 'latest', 'leak', 'leaking', 'let', 'malware', 'manager', 'material', 'message', 'microsoft', 'million', 'mohit', 'movie', 'need', 'network', 'new', 'news', 'newsletter', 'online', 'operating', 'pas', 'password', 'payouts', 'people', 'popular', 'private', 'professional', 'public', 'ransomware', 'read', 'scada', 'scientist', 'secret', 'security', 'sell', 'show', 'simple', 'smartphone', 'sony', 'speaker', 'spying', 'store', 'story', 'subscribe', 'surveillance', 'system', 'tech', 'teddy', 'thanks', 'thn', 'took', 'tool', 'tor', 'training', 'trending', 'trojan', 'trump', 'typo', 'virus', 'voice', 'walking', 'want', 'without', 'york'] | |
1626 | |
1627 | |
1627 2017-03-01T06:32:31.882000Z https://www.mimecast.com/blog/2013/05/mimecast-gets-bigger-in-the-us/ | |
1627 2017-03-18T12:34:09.673000Z http://www.mimecast.com/blog/2013/12/mimecast-wins-bronze-in-best-in-biz-awards-2013/ | |
1627 2017-03-18T12:34:17.949000Z http://www.mimecast.com/blog/2013/10/do-you-know-mimecasts-u.s.-channel-director-sean-broderick-crn-thinks-you-should/ | |
1627 2017-03-18T12:34:46.667000Z http://www.mimecast.com/blog/2013/05/mimecast-gets-bigger-in-the-us/ | |
['acceptable', 'administration', 'africa', 'also', 'america', 'apps', 'archive', 'archiving', 'asia', 'award', 'base', 'become', 'best', 'bigger', 'bilbe', 'biz', 'blog', 'boost', 'boston', 'broderick', 'bronze', 'bundle', 'business', 'career', 'center', 'central', 'channel', 'chat', 'chief', 'coalition', 'comment', 'company', 'compliance', 'consecutive', 'console', 'contact', 'content', 'continuity', 'control', 'countermeasure', 'crn', 'customer', 'cyber', 'data', 'demo', 'detail', 'director', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'east', 'email', 'employee', 'enable', 'europe', 'event', 'exchange', 'experience', 'file', 'filed', 'frontier', 'get', 'globe', 'google', 'grow', 'home', 'hq', 'hybrid', 'im', 'improvement', 'information', 'infosecurity', 'investor', 'javascript', 'know', 'knowledgebase', 'large', 'leadership', 'legacy', 'login', 'managed', 'management', 'mark', 'mesaging', 'messaging', 'microsoft', 'middle', 'migration', 'mimecast', 'mimecaster', 'mobility', 'named', 'network', 'new', 'news', 'north', 'office', 'option', 'overview', 'pacific', 'partner', 'place', 'platform', 'please', 'policy', 'post', 'posted', 'powered', 'press', 'privacy', 'product', 'productivity', 'professional', 'program', 'protection', 'quote', 'recognized', 'registration', 'related', 'relation', 'release', 'reseller', 'reserved', 'resilience', 'resource', 'responsible', 'right', 'risk', 'role', 'sale', 'schedule', 'sean', 'second', 'secure', 'security', 'send', 'service', 'share', 'signature', 'sitemap', 'solution', 'south', 'success', 'support', 'targeted', 'team', 'technical', 'term', 'think', 'threat', 'top', 'training', 'trust', 'use', 'view', 'webinars', 'well', 'win', 'work', 'year'] | |
1628 | |
1628 2017-03-22T18:31:01.954000Z https://www.scmagazine.com/lastpass-bug-could-allow-hackers-to-steal-passwords-and-execute-code/article/645758/ | |
1628 2017-03-29T18:31:04.837000Z https://www.scmagazine.com/second-vulnerability-spotted-in-lastpass-password-manager/article/647121/ | |
['abel', 'acceptance', 'according', 'account', 'advertise', 'advisory', 'affect', 'affecting', 'afghanistan', 'africa', 'african', 'albania', 'algeria', 'allow', 'american', 'andorra', 'angola', 'anguilla', 'antarctica', 'antigua', 'antilles', 'arab', 'arabia', 'archive', 'argentina', 'arm', 'armenia', 'article', 'aruba', 'attacking', 'australia', 'austria', 'authorization', 'award', 'azerbaijan', 'bahamas', 'bahrain', 'bangladesh', 'bar', 'barbados', 'barbuda', 'belarus', 'belgium', 'belize', 'benin', 'bermuda', 'bhutan', 'blog', 'board', 'bolivia', 'bosnia', 'botswana', 'bouvet', 'brazil', 'breach', 'british', 'broadcast', 'browser', 'brunei', 'bug', 'bulgaria', 'burkina', 'burundi', 'business', 'buzz', 'caicos', 'caledonia', 'cambodia', 'cameroon', 'canada', 'cape', 'cayman', 'center', 'central', 'chad', 'challenge', 'chile', 'china', 'christmas', 'chrome', 'city', 'click', 'cloud', 'coco', 'code', 'colombia', 'comment', 'comoros', 'compliance', 'condition', 'conference', 'congo', 'constitutes', 'contact', 'cook', 'copyright', 'costa', 'could', 'countless', 'croatia', 'cuba', 'cybercrime', 'cybersecurity', 'cyprus', 'czech', 'côte', 'dark', 'darussalam', 'data', 'day', 'delivered', 'denmark', 'depth', 'detail', 'discovered', 'djibouti', 'dominica', 'dominican', 'drc', 'ecuador', 'egypt', 'el', 'email', 'emirate', 'equatorial', 'eritrea', 'establish', 'estonia', 'ethiopia', 'event', 'execute', 'extension', 'face', 'fact', 'falkland', 'faq', 'faroe', 'faso', 'fast', 'feature', 'featured', 'fiji', 'finland', 'first', 'flaw', 'follow', 'form', 'france', 'french', 'futuna', 'gabon', 'gambia', 'georgia', 'germany', 'get', 'ghana', 'gibraltar', 'gmail', 'google', 'greece', 'greenland', 'grenada', 'grenadine', 'group', 'guadeloupe', 'guam', 'guatemala', 'guiana', 'guinea', 'guyana', 'hacker', 'haiti', 'haymarket', 'heard', 'helena', 'herzegovina', 'honduras', 'hong', 'hungary', 'iceland', 'inbox', 'india', 'indian', 'indonesia', 'information', 'insider', 'intermediary', 'iot', 'iran', 'iraq', 'ireland', 'island', 'israel', 'italy', 'jamaica', 'japan', 'javascript', 'jordan', 'kazakhstan', 'keeling', 'kenya', 'kingdom', 'kiribati', 'kitts', 'kong', 'korea', 'kuwait', 'kyrgyzstan', 'lanka', 'lao', 'last', 'lastpass', 'latvia', 'leadership', 'leaked', 'lebanon', 'leone', 'lesotho', 'liberia', 'library', 'libya', 'liechtenstein', 'like', 'lithuania', 'log', 'login', 'look', 'lucia', 'luxembourg', 'macao', 'macedonia', 'madagascar', 'magazine', 'major', 'malawi', 'malaysia', 'maldives', 'mali', 'malta', 'malvinas', 'malware', 'management', 'manager', 'mariana', 'marino', 'marshall', 'martin', 'martinique', 'material', 'mauritania', 'mauritius', 'mayen', 'mayotte', 'mcdonald', 'medium', 'meet', 'member', 'menu', 'mexico', 'micronesia', 'million', 'millman', 'miquelon', 'mobile', 'moldova', 'monaco', 'mongolia', 'montenegro', 'montserrat', 'morocco', 'mozambique', 'must', 'myanmar', 'namibia', 'nauru', 'need', 'nepal', 'netherlands', 'network', 'nevis', 'new', 'news', 'newswire', 'nicaragua', 'niger', 'nigeria', 'niue', 'norfolk', 'north', 'northern', 'norway', 'ny', 'ocean', 'oman', 'one', 'online', 'opinion', 'ormandy', 'overall', 'pakistan', 'palau', 'panama', 'paper', 'papua', 'paraguay', 'password', 'patch', 'peru', 'philippine', 'phishing', 'pierre', 'pitcairn', 'poland', 'policy', 'polynesia', 'portugal', 'post', 'posture', 'press', 'principe', 'prior', 'privacy', 'private', 'product', 'professional', 'project', 'published', 'puerto', 'qatar', 'ransomware', 'read', 'reboot', 'receive', 'redistributed', 'register', 'registered', 'related', 'release', 'relevant', 'rene', 'reprint', 'republic', 'researcher', 'reserved', 'resource', 'reunion', 'review', 'rewritten', 'rica', 'rico', 'right', 'risk', 'risksec', 'robert', 'romania', 'rsa', 'russia', 'rwanda', 'said', 'saint', 'salvador', 'samoa', 'san', 'sao', 'saudi', 'sc', 'search', 'second', 'security', 'senegal', 'service', 'seychelles', 'show', 'sierra', 'singapore', 'site', 'slovakia', 'slovenia', 'solomon', 'somalia', 'source', 'south', 'southern', 'spain', 'sri', 'state', 'steal', 'store', 'strategy', 'subscribe', 'sudan', 'suriname', 'svalbard', 'swaziland', 'sweden', 'switzerland', 'syria', 'tackle', 'taiwan', 'tajikistan', 'tanzania', 'tavis', 'team', 'technical', 'term', 'territory', 'test', 'thailand', 'threat', 'time', 'tobago', 'togo', 'tokelau', 'tome', 'tonga', 'topic', 'toronto', 'trinidad', 'tunisia', 'turk', 'turkey', 'turkmenistan', 'tuvalu', 'two', 'uganda', 'uk', 'ukraine', 'unbiased', 'underpin', 'united', 'uruguay', 'use', 'user', 'uzbekistan', 'vanuatu', 'vatican', 'venezuela', 'verde', 'version', 'via', 'video', 'vietnam', 'vincent', 'virgin', 'virtual', 'vulnerability', 'wallis', 'web', 'webcasts', 'website', 'western', 'white', 'whitepaper', 'whitepapers', 'window', 'without', 'work', 'would', 'yahoo', 'yemen', 'yugoslavia', 'zambia', 'zealand', 'zero', 'zimbabwe'] | |
1630 | |
1631 | |
1632 | |
1633 | |
1634 | |
1635 | |
1636 | |
1637 | |
1638 | |
1640 | |
1640 2017-03-16T18:31:33.413000Z https://www.mimecast.com/blog/2014/12/target-breach-one-year-on-email-is-at-the-heart-of-supply-chain-security/ | |
1640 2017-03-18T12:33:17.721000Z http://www.mimecast.com/blog/2014/12/target-breach-one-year-on-email-is-at-the-heart-of-supply-chain-security/ | |
['abuse', 'acceptable', 'access', 'act', 'actually', 'added', 'addition', 'adopt', 'adversely', 'affecting', 'africa', 'afterward', 'air', 'also', 'america', 'appears', 'apps', 'archive', 'archiving', 'arm', 'asia', 'ask', 'assault', 'attack', 'attacker', 'audited', 'available', 'avoid', 'award', 'become', 'becoming', 'begun', 'believe', 'best', 'better', 'blog', 'breach', 'bundle', 'business', 'card', 'career', 'caught', 'center', 'central', 'chain', 'chat', 'check', 'click', 'cloud', 'coalition', 'combination', 'comment', 'company', 'compliance', 'conditioning', 'connection', 'connects', 'consider', 'considering', 'consultancy', 'consumer', 'contact', 'content', 'continual', 'continuity', 'control', 'cornerstone', 'corporate', 'creating', 'credential', 'credit', 'current', 'customer', 'cyber', 'cybersecurity', 'danger', 'dangerous', 'data', 'defend', 'defense', 'delayed', 'demo', 'demonstrate', 'detail', 'determined', 'device', 'direct', 'directly', 'disclaimer', 'disclosure', 'disqus', 'dlp', 'east', 'elected', 'email', 'embedded', 'emergence', 'emphasis', 'employee', 'enable', 'enterprise', 'entire', 'equipped', 'europe', 'evangelism', 'event', 'evolution', 'example', 'exchange', 'experience', 'exploit', 'exposed', 'fate', 'file', 'filed', 'firm', 'first', 'five', 'form', 'found', 'framework', 'gateway', 'get', 'getting', 'global' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment