It looks like this is a web page, not a feed. I looked for a feed associated with this page, but couldn't find one. Please enter the address of your feed to validate.

Source: http://cyberreport.io/

  1. <!DOCTYPE html>
  2. <html>
  3. <html dir="ltr" lang="en">
  4. <head>
  5. <meta charset="UTF-8">
  6. <meta http-equiv="content-language" content="en">
  7. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  8. <BASE href="https://www.cyberreport.io">
  9. <link rel="icon" type="image/png" href="favicon.png" />
  10. <link rel="shortcut icon" type="image/png" href="favicon.png" />
  11. <title>#1 Source for Cyber Security News, Reports and Threat Intelligence </title>
  12. <meta name="description" content="Global collection database for Cyber Security News, Reports and Threat Intelligence, keeping you informed and raising cyber awareness.">
  13. <meta name="keywords" content="cyber report, threat report, cyber news, cyber training, cyber reporting, cyber security, threat intelligence, cybersecurity, infosec, research paper, blue team, red team">
  14. <link href="https://fonts.googleapis.com/css?family=Roboto:100,300,400,700,900" rel="stylesheet">
  15. <link rel="stylesheet" href="themes/default/css/bootstrap.min.css">
  16. <link rel="stylesheet" href="themes/default/css/font-awesome.min.css">
  17. <link rel="stylesheet" href="themes/default/css/wysiwyg.css">
  18. <link rel="stylesheet" href="themes/default/css/rrssb.css">
  19. <link rel="stylesheet" href="themes/default/css/perfect-scrollbar.css">
  20. <link rel="stylesheet" href="themes/default/style.css">
  21. <link rel="stylesheet" href="themes/default/css/media-md.css">
  22. <link rel="stylesheet" href="themes/default/css/media-sm.css">
  23. <link rel="stylesheet" href="themes/default/css/media-xs.css">
  24. <script src="languages/english/site.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  25. <script src="themes/default/js/jquery.min.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  26. <script src="themes/default/js/bootstrap.min.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  27. <script src="themes/default/js/ajax_scroll.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  28. <script src="themes/default/js/jquery.lazyloadxt.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  29. <script src="themes/default/js/jquery.sticky-kit.min.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  30. <script src="themes/default/js/rrssb.min.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  31. <script src="themes/default/js/perfect-scrollbar.jquery.min.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  32. <script src="themes/default/js/jquery.cookiebar.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  33. <script src="themes/default/js/functions.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  34. </head>
  35. <body>
  36.  
  37. <nav class="pushy pushy-left">
  38. <div class="scrollbar">
  39. <h3>Categories</h3>
  40. <div class="pushy-content">
  41. <ul>
  42. <li class="pushy-link"><a href="./category/cyber-security?cat=1">Cyber Security</a></li>
  43. <li class="pushy-link"><a href="./category/threat-intelligence?cat=9">Threat Intelligence</a></li>
  44. <li class="pushy-link"><a href="./category/cryptocurrency?cat=15">Cryptocurrency</a></li>
  45. <li class="pushy-link"><a href="./category/technology?cat=2">Technology</a></li>
  46. <li class="pushy-submenu">
  47. <button>Cyber Security Videos</button>
  48. <ul>
  49. <li class="pushy-link"><a href="./category/ippsec-videos?cat=13" title="IppSec Videos">IppSec Videos</a></li>
  50. <li class="pushy-link"><a href="./category/john-hammond?cat=14" title="John Hammond">John Hammond</a></li>
  51. <li class="pushy-link"><a href="./category/cyber-security-videos?cat=3" title="Cyber Security Videos">All Cyber Security Videos</a></li>
  52. </ul>
  53. </li>
  54. <li class="pushy-link"><a href="./category/how-to?cat=4">How-to</a></li>
  55. <li class="divider"></li>
  56. <li class="pushy-link"><a href="./page/our-mission?pid=2" title="Our Mission">Our Mission</a></li>
  57. <li class="pushy-link"><a href="./page/ten-cyber-security-tips-for-2022?pid=4" title="Ten Cyber Security Tips for 2022">Ten Cyber Security Tips for 2022</a></li>
  58. <li class="pushy-link"><a href="./page/cyber-threat-maps?pid=3" title="Cyber Threat Maps">Cyber Threat Maps</a></li>
  59. <li class="pushy-link"><a href="./page/online-streamers?pid=5" title="Online Streamers">Online Streamers</a></li>
  60. <li class="pushy-link"><a href="./contact">Contact</a></li>
  61. </ul>
  62. </div>
  63. </div>
  64. </nav>
  65.  
  66. <div class="site-overlay"></div>
  67. <div class="mobile-top-menu hidden-md hidden-lg">
  68. <div class="row">
  69. <div class="col-xs-1">
  70. <div class="home-btn">
  71. <a href="./"><i class="fa fa-home"></i></a>
  72. </div>
  73. </div>
  74. <div class="col-xs-10">
  75. <div class="search-form search-form-mobile hidden-md hidden-lg">
  76. <form method="GET" action="./search/">
  77. <div class="input-group">
  78. <input type="text" name="q" class="form-control" placeholder="Search" />
  79. <span class="input-group-addon"><button type="submit" class="btn-link"><span class="fa fa-search"></span></button></span>
  80. </div>
  81. </form>
  82. </div>
  83. </div>
  84. <div class="col-xs-1">
  85. <div class="menu-btn">
  86. <a href="javascript:void;"><i class="fa fa-reorder"></i></a>
  87. </div>
  88. </div>
  89. </div>
  90. </div>
  91. <div class="top-menu hidden-sm hidden-xs">
  92. <div class="container">
  93. <div class="row">
  94. <ul class="col-md-8">
  95. <li><a href="./">Home</a></li>
  96. <li><a href="./contact">Contact</a></li>
  97. <li><a href="./page/our-mission?pid=2" title="Our Mission">Our Mission</a></li>
  98. <li><a href="./page/ten-cyber-security-tips-for-2022?pid=4" title="Ten Cyber Security Tips for 2022">Ten Cyber Security Tips for 2022</a></li>
  99. <li><a href="./page/cyber-threat-maps?pid=3" title="Cyber Threat Maps">Cyber Threat Maps</a></li>
  100. <li><a href="./page/online-streamers?pid=5" title="Online Streamers">Online Streamers</a></li>
  101. </ul>
  102. <ul class="col-md-4 search-nav">
  103. <li class="search-form">
  104. <form method="GET" action="./search/">
  105. <div class="input-group">
  106. <input type="text" name="q" class="form-control" placeholder="Search" />
  107. <span class="input-group-addon"><button type="submit" class="btn-link"><span class="fa fa-search"></span></button></span>
  108. </div>
  109. </form>
  110. </li>
  111. </ul>
  112. </div>
  113. </div>
  114. </div>
  115. <div class="header">
  116. <div class="container">
  117. <div class="row">
  118. <div class="col-md-3">
  119. <div class="logo">
  120. <a href="./" title="#1 Source for Cyber Security News, Reports and Threat Intelligence ">
  121. <img src="upload/60571559731495.png" class="img-responsive" alt="#1 Source for Cyber Security News, Reports and Threat Intelligence " />
  122. </a>
  123. </div>
  124. </div>
  125. <div class="col-md-9">
  126. <div class="header-ad">
  127. </div>
  128. </div>
  129. </div>
  130. </div>
  131. </div>
  132. <nav class="navbar navbar-inverse hidden-sm hidden-xs " role="navigation">
  133. <div class="container">
  134. <div class="row">
  135. <div class="navbar-header">
  136. <button type="button" class="navbar-toggle" data-toggle="collapse" data-target="#second-menu">
  137. <span class="sr-only">Toggle navigation</span>
  138. <span class="icon-bar"></span>
  139. <span class="icon-bar"></span>
  140. <span class="icon-bar"></span>
  141. </button>
  142. <span class="navbar-brand visible-xs">Categories</span>
  143. </div>
  144. <div class="collapse navbar-collapse" id="second-menu">
  145. <ul class="nav navbar-nav paragraph-font">
  146. <li><a href="./category/cyber-security?cat=1">Cyber Security</a></li>
  147. <li><a href="./category/threat-intelligence?cat=9">Threat Intelligence</a></li>
  148. <li><a href="./category/cryptocurrency?cat=15">Cryptocurrency</a></li>
  149. <li><a href="./category/technology?cat=2">Technology</a></li>
  150. <li class="dropdown">
  151. <a href="javascript:void();" class="dropdown-toggle" data-toggle="dropdown">Cyber Security Videos <b class="caret"></b></a>
  152. <ul class="dropdown-menu">
  153. <li><a href="./category/ippsec-videos?cat=13" title="IppSec Videos">IppSec Videos</a></li>
  154. <li><a href="./category/john-hammond?cat=14" title="John Hammond">John Hammond</a></li>
  155. <li class="divider"></li>
  156. <li><a href="./category/cyber-security-videos?cat=3" title="Cyber Security Videos">All Cyber Security Videos</a></li>
  157. </ul>
  158. </li>
  159. <li><a href="./category/how-to?cat=4">How-to</a></li>
  160. </ul>
  161. </div>
  162. </div>
  163. </div>
  164. </nav>
  165. <div class="container">
  166. <div class="row">
  167. </div>
  168. <div class="col-md-12">
  169. </div>
  170. <div class="col-md-8 the-body">
  171. <div class="section-box">
  172. <h4><span class="heading-font" style="background:#2761D5;">Cyber Security</span></h4>
  173. <div class="news-section-content">
  174. <div class="big-first-section">
  175. <div class="col-md-6">
  176. <div class="single-featured-item">
  177. <div class="single-featured-item-image">
  178. <a href="./news/top-9-compliance-automation-software-in-2024?article=92818" title="Top 9 Compliance Automation Software in 2024">
  179. <div class="overlay-image max-width">
  180. <img data-src="upload/sources/14211557905411.jpg" class="img-responsive" alt="Top 9 Compliance Automation Software in 2024" />
  181. </div>
  182. </a>
  183. </div>
  184. </div>
  185. </div>
  186. <div class="col-md-6">
  187. <span class="category-span" style="color:#2761D5;">Cyber Security</span>
  188. <div><a href="./news/top-9-compliance-automation-software-in-2024?article=92818" class="heading-font" title="Top 9 Compliance Automation Software in 2024">Top 9 Compliance Automation Software in 2024</a></div>
  189. <p> By Uzair Amir
  190. Simplify compliance with these leading software solutions. Discover features like automated evidence collection, risk assessment, and real-time reporting. Find the perfect fit for your startup or large enterprise.
  191. This is a post from HackRead.com Read the original post: Top...</p>
  192. </div>
  193. <div class="clear"></div>
  194. </div>
  195. <div class="col-md-4">
  196. <div class="featured-item-sections">
  197. <a href="./news/week-in-review-pocs-allow-persistence-on-palo-alto-firewalls-okta-credential-stuffing-attacks-help-net-security?article=92816" title="Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks - Help Net Security">
  198. <div class="overlay-image">
  199. <img data-src="upload/news/image_1714939238_98958937.jpg" class="img-responsive" alt="Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks - Help Net Security" />
  200. </div>
  201. <span class="category-span" style="color:#2761D5;">Cyber Security</span>
  202. <span>Week in review: PoCs allow persistence on Palo Alto firewalls, Okta...</span>
  203. </a>
  204. <p class="visible-sm"> Here’s an overview of some of last week’s most interesting news, articles, interviews and...</p>
  205. </div>
  206. </div>
  207. <div class="col-md-4">
  208. <div class="featured-item-sections">
  209. <a href="./news/end-to-end-encryption-may-be-the-bane-of-cops-but-they-can-t-close-that-pandora-s-box?article=92810" title="End-to-end encryption may be the bane of cops, but they can't close that Pandora's Box">
  210. <div class="overlay-image">
  211. <img data-src="upload/sources/39111563895254.png" class="img-responsive" alt="End-to-end encryption may be the bane of cops, but they can't close that Pandora's Box" />
  212. </div>
  213. <span class="category-span" style="color:#2761D5;">Cyber Security</span>
  214. <span>End-to-end encryption may be the bane of cops, but they can't close...</span>
  215. </a>
  216. <p class="visible-sm"> Internet Society's Robin Wilton tells us the war on privacy won't be won by the plod...</p>
  217. </div>
  218. </div>
  219. <div class="col-md-4">
  220. <div class="featured-item-sections">
  221. <a href="./news/pay-up-or-else-week-in-security-with-tony-anscombe?article=92796" title="Pay up, or else? – Week in security with Tony Anscombe">
  222. <div class="overlay-image">
  223. <img data-src="upload/sources/3251557220061.jpg" class="img-responsive" alt="Pay up, or else? – Week in security with Tony Anscombe" />
  224. </div>
  225. <span class="category-span" style="color:#2761D5;">Cyber Security</span>
  226. <span>Pay up, or else? – Week in security with Tony Anscombe</span>
  227. </a>
  228. <p class="visible-sm">Organizations that fall victim to a ransomware attack are often caught between a rock and a hard...</p>
  229. </div>
  230. </div>
  231. <div class="clear"></div>
  232. </div>
  233. </div>
  234. <div class="section-box">
  235. <h4><span class="heading-font" style="background:#FB0404;">Threat Intelligence</span></h4>
  236. <div class="news-section-content">
  237. <div class="big-first-section">
  238. <div class="col-md-6">
  239. <div class="single-featured-item">
  240. <div class="single-featured-item-image">
  241. <a href="./news/ransomware-attacks-continue-to-rise-as-operators-adapt-to-disruption?article=92805" title="Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption">
  242. <div class="overlay-image max-width">
  243. <img data-src="upload/sources/90301557219139.jpg" class="img-responsive" alt="Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption" />
  244. </div>
  245. </a>
  246. </div>
  247. </div>
  248. </div>
  249. <div class="col-md-6">
  250. <span class="category-span" style="color:#FB0404;">Threat Intelligence</span>
  251. <div><a href="./news/ransomware-attacks-continue-to-rise-as-operators-adapt-to-disruption?article=92805" class="heading-font" title="Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption">Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption</a></div>
  252. <p> Available evidence suggests vulnerability exploitation has replaced botnets as a prime infection vector. </p>
  253. </div>
  254. <div class="clear"></div>
  255. </div>
  256. <div class="col-md-4">
  257. <div class="featured-item-sections">
  258. <a href="./news/what-we-can-learn-from-the-best-collegiate-cyber-defenders?article=92754" title="What we can learn from the best collegiate cyber defenders">
  259. <div class="overlay-image">
  260. <img data-src="upload/sources/45731557218940.jpg" class="img-responsive" alt="What we can learn from the best collegiate cyber defenders" />
  261. </div>
  262. <span class="category-span" style="color:#FB0404;">Threat Intelligence</span>
  263. <span>What we can learn from the best collegiate cyber defenders</span>
  264. </a>
  265. <p class="visible-sm">
  266. This year marked the 19th season of the National Collegiate Cyber Defense Competition...</p>
  267. </div>
  268. </div>
  269. <div class="col-md-4">
  270. <div class="featured-item-sections">
  271. <a href="./news/ubuntu-security-notice-usn-6757-2?article=92752" title="Ubuntu Security Notice USN-6757-2">
  272. <div class="overlay-image">
  273. <img data-src="upload/sources/97451563771945.png" class="img-responsive" alt="Ubuntu Security Notice USN-6757-2" />
  274. </div>
  275. <span class="category-span" style="color:#FB0404;">Threat Intelligence</span>
  276. <span>Ubuntu Security Notice USN-6757-2</span>
  277. </a>
  278. <p class="visible-sm">Ubuntu Security Notice 6757-2 - USN-6757-1 fixed vulnerabilities in PHP. Unfortunately these...</p>
  279. </div>
  280. </div>
  281. <div class="col-md-4">
  282. <div class="featured-item-sections">
  283. <a href="./news/debian-security-advisory-5676-1?article=92710" title="Debian Security Advisory 5676-1">
  284. <div class="overlay-image">
  285. <img data-src="upload/sources/97451563771945.png" class="img-responsive" alt="Debian Security Advisory 5676-1" />
  286. </div>
  287. <span class="category-span" style="color:#FB0404;">Threat Intelligence</span>
  288. <span>Debian Security Advisory 5676-1</span>
  289. </a>
  290. <p class="visible-sm">Debian Linux Security Advisory 5676-1 - Security issues were discovered in Chromium, which could...</p>
  291. </div>
  292. </div>
  293. <div class="clear"></div>
  294. </div>
  295. </div>
  296. <div class="section-box">
  297. <h4><span class="heading-font" style="background:#FB16FB;">Cryptocurrency</span></h4>
  298. <div class="news-section-content">
  299. <div class="big-first-section">
  300. <div class="col-md-6">
  301. <div class="single-featured-item">
  302. <div class="single-featured-item-image">
  303. <a href="./news/bitcoin-reaches-one-billion-transactions?article=92819" title="Bitcoin reaches one billion transactions">
  304. <div class="overlay-image max-width">
  305. <img data-src="upload/sources/99091647330893.png" class="img-responsive" alt="Bitcoin reaches one billion transactions" />
  306. </div>
  307. </a>
  308. </div>
  309. </div>
  310. </div>
  311. <div class="col-md-6">
  312. <span class="category-span" style="color:#FB16FB;">Cryptocurrency</span>
  313. <div><a href="./news/bitcoin-reaches-one-billion-transactions?article=92819" class="heading-font" title="Bitcoin reaches one billion transactions">Bitcoin reaches one billion transactions</a></div>
  314. <p> An average of 178,475 daily transactions have been made on Bitcoin in its 5,603 day existence. </p>
  315. </div>
  316. <div class="clear"></div>
  317. </div>
  318. <div class="col-md-4">
  319. <div class="featured-item-sections">
  320. <a href="./news/xrp-holders-stack-coins-despite-price-dip-bullish-signal-or-hodl-of-desperation?article=92815" title="XRP Holders Stack Coins Despite Price Dip: Bullish Signal Or HODL Of Desperation?">
  321. <div class="overlay-image">
  322. <img data-src="upload/news/image_1714939236_52400327.jpg" class="img-responsive" alt="XRP Holders Stack Coins Despite Price Dip: Bullish Signal Or HODL Of Desperation?" />
  323. </div>
  324. <span class="category-span" style="color:#FB16FB;">Cryptocurrency</span>
  325. <span>XRP Holders Stack Coins Despite Price Dip: Bullish Signal Or HODL...</span>
  326. </a>
  327. <p class="visible-sm">The cryptocurrency market has been battered by recent storms, with many altcoins experiencing...</p>
  328. </div>
  329. </div>
  330. <div class="col-md-4">
  331. <div class="featured-item-sections">
  332. <a href="./news/cardano-founder-proposes-bitcoin-cash-integration-in-x-poll?article=92814" title="Cardano founder proposes Bitcoin Cash integration in X poll">
  333. <div class="overlay-image">
  334. <img data-src="upload/sources/99091647330893.png" class="img-responsive" alt="Cardano founder proposes Bitcoin Cash integration in X poll" />
  335. </div>
  336. <span class="category-span" style="color:#FB16FB;">Cryptocurrency</span>
  337. <span>Cardano founder proposes Bitcoin Cash integration in X poll</span>
  338. </a>
  339. <p class="visible-sm"> The ayes are winning with 8,301 votes for to 4,212 against, as of the time of this article’s...</p>
  340. </div>
  341. </div>
  342. <div class="col-md-4">
  343. <div class="featured-item-sections">
  344. <a href="./news/warren-buffett-compares-ai-to-nukes-after-seeing-deepfake-doppelganger?article=92811" title="Warren Buffett compares AI to nukes after seeing deepfake doppelganger">
  345. <div class="overlay-image">
  346. <img data-src="upload/sources/99091647330893.png" class="img-responsive" alt="Warren Buffett compares AI to nukes after seeing deepfake doppelganger" />
  347. </div>
  348. <span class="category-span" style="color:#FB16FB;">Cryptocurrency</span>
  349. <span>Warren Buffett compares AI to nukes after seeing deepfake doppelganger</span>
  350. </a>
  351. <p class="visible-sm"> The financial mogul’s commentary came during Berkshire Hathaway’s annual meeting. </p>
  352. </div>
  353. </div>
  354. <div class="clear"></div>
  355. </div>
  356. </div>
  357. <div class="section-box">
  358. <h4><span class="heading-font" style="background:#18ED0D;">Technology</span></h4>
  359. <div class="news-section-content">
  360. <div class="big-first-section">
  361. <div class="col-md-6">
  362. <div class="single-featured-item">
  363. <div class="single-featured-item-image">
  364. <a href="./news/what-is-bank-reconciliation-definition-process-and-example?article=92769" title="What Is Bank Reconciliation? Definition, Process,and Example">
  365. <div class="overlay-image max-width">
  366. <img data-src="upload/sources/31221557219769.jpg" class="img-responsive" alt="What Is Bank Reconciliation? Definition, Process,and Example" />
  367. </div>
  368. </a>
  369. </div>
  370. </div>
  371. </div>
  372. <div class="col-md-6">
  373. <span class="category-span" style="color:#18ED0D;">Technology</span>
  374. <div><a href="./news/what-is-bank-reconciliation-definition-process-and-example?article=92769" class="heading-font" title="What Is Bank Reconciliation? Definition, Process,and Example">What Is Bank Reconciliation? Definition, Process,and Example</a></div>
  375. <p>Learn the five steps of the bank reconciliation process and get answers to the most common bank reconciliation FAQs.</p>
  376. </div>
  377. <div class="clear"></div>
  378. </div>
  379. <div class="col-md-4">
  380. <div class="featured-item-sections">
  381. <a href="./news/department-of-commerce-announces-new-actions-to-implement-president-biden-s-executive-order-on-ai?article=92586" title="Department of Commerce Announces New Actions to Implement President Biden’s Executive Order on AI">
  382. <div class="overlay-image">
  383. <img data-src="upload/news/image_1714428012_12450554.jpg" class="img-responsive" alt="Department of Commerce Announces New Actions to Implement President Biden’s Executive Order on AI" />
  384. </div>
  385. <span class="category-span" style="color:#18ED0D;">Technology</span>
  386. <span>Department of Commerce Announces New Actions to Implement President...</span>
  387. </a>
  388. <p class="visible-sm"> The U.S. Department of Commerce announced today, following the 180-day mark since President...</p>
  389. </div>
  390. </div>
  391. <div class="col-md-4">
  392. <div class="featured-item-sections">
  393. <a href="./news/trello-vs-jira-showdown-who-wins-in-2024?article=92577" title="Trello vs. Jira Showdown: Who Wins in 2024?">
  394. <div class="overlay-image">
  395. <img data-src="upload/sources/31221557219769.jpg" class="img-responsive" alt="Trello vs. Jira Showdown: Who Wins in 2024?" />
  396. </div>
  397. <span class="category-span" style="color:#18ED0D;">Technology</span>
  398. <span>Trello vs. Jira Showdown: Who Wins in 2024?</span>
  399. </a>
  400. <p class="visible-sm">Discover the key differences between Trello and Jira. Find out which project management tool tops...</p>
  401. </div>
  402. </div>
  403. <div class="col-md-4">
  404. <div class="featured-item-sections">
  405. <a href="./news/beyondtrust-report-microsoft-security-vulnerabilities-decreased-by-5-in-2023?article=92525" title="BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023">
  406. <div class="overlay-image">
  407. <img data-src="upload/sources/31221557219769.jpg" class="img-responsive" alt="BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023" />
  408. </div>
  409. <span class="category-span" style="color:#18ED0D;">Technology</span>
  410. <span>BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by...</span>
  411. </a>
  412. <p class="visible-sm">Refreshed software and collaboration with the security researcher community may have contributed...</p>
  413. </div>
  414. </div>
  415. <div class="clear"></div>
  416. </div>
  417. </div>
  418. <div class="section-box">
  419. <h4><span class="heading-font" style="background:#8B16E3;">Cyber Security Videos</span></h4>
  420. <div class="news-section-content">
  421. <div class="big-first-section">
  422. <div class="col-md-6">
  423. <div class="single-featured-item">
  424. <div class="single-featured-item-image">
  425. <a href="./news/hackthebox-napper?article=92820" title="HackTheBox - Napper">
  426. <div class="overlay-image max-width">
  427. <img data-src="upload/news/youtube_ESXW8jsGkdM.jpg" class="img-responsive" alt="HackTheBox - Napper" />
  428. </div>
  429. </a>
  430. </div>
  431. </div>
  432. </div>
  433. <div class="col-md-6">
  434. <span class="category-span" style="color:#8B16E3;">IppSec Videos</span>
  435. <div><a href="./news/hackthebox-napper?article=92820" class="heading-font" title="HackTheBox - Napper">HackTheBox - Napper</a></div>
  436. <p>00:00 - Introduction
  437. 00:55 - Start of nmap, showing -vv will cause the output to contain TTL
  438. 04:40 - Checking out the website
  439. 05:23 - Doing a VHOST Bruteforce to discover the internal domain and discovering credentials on a blog post
  440. 07:30 - Checking out the NAPListener blog post, which gives us...</p>
  441. </div>
  442. <div class="clear"></div>
  443. </div>
  444. <div class="col-md-4">
  445. <div class="featured-item-sections">
  446. <a href="./news/why-you-need-to-turn-off-microsoft-start-in-windows-11?article=92813" title="Why you NEED to turn off Microsoft Start in Windows 11">
  447. <div class="overlay-image">
  448. <img data-src="upload/news/youtube_m9d-fXl3Z8k.jpg" class="img-responsive" alt="Why you NEED to turn off Microsoft Start in Windows 11" />
  449. </div>
  450. <span class="category-span" style="color:#8B16E3;">Cyber Security Videos</span>
  451. <span>Why you NEED to turn off Microsoft Start in Windows 11</span>
  452. </a>
  453. <p class="visible-sm">Microsoft's Start in Windows 11 comes with a whole load of crap but could you get malware from...</p>
  454. </div>
  455. </div>
  456. <div class="col-md-4">
  457. <div class="featured-item-sections">
  458. <a href="./news/time-management-skills-in-cybersecurity-cyber-work-podcast?article=92798" title="Time management skills in cybersecurity | Cyber Work Podcast">
  459. <div class="overlay-image">
  460. <img data-src="upload/news/youtube_6rP-tMolF58.jpg" class="img-responsive" alt="Time management skills in cybersecurity | Cyber Work Podcast" />
  461. </div>
  462. <span class="category-span" style="color:#8B16E3;">Cyber Security Videos</span>
  463. <span>Time management skills in cybersecurity | Cyber Work Podcast</span>
  464. </a>
  465. <p class="visible-sm">Jeffrey Brown is the CISO of the state of Connecticut, and in this clip he talks about all of his...</p>
  466. </div>
  467. </div>
  468. <div class="col-md-4">
  469. <div class="featured-item-sections">
  470. <a href="./news/is-data-analytics-the-right-career-for-me-data-analytics-career-intellipaat-shorts?article=92761" title="Is Data Analytics the Right Career For Me | Data Analytics Career | Intellipaat #Shorts">
  471. <div class="overlay-image">
  472. <img data-src="upload/news/youtube__SCwcZw4laM.jpg" class="img-responsive" alt="Is Data Analytics the Right Career For Me | Data Analytics Career | Intellipaat #Shorts" />
  473. </div>
  474. <span class="category-span" style="color:#8B16E3;">Cyber Security Videos</span>
  475. <span>Is Data Analytics the Right Career For Me | Data Analytics Career |...</span>
  476. </a>
  477. <p class="visible-sm">#IsDataAnalyticstheRightCareerForMe #DataAnalyticsCareer #ShortsVideo #ShortsFeed #Intellipaat...</p>
  478. </div>
  479. </div>
  480. <div class="clear"></div>
  481. </div>
  482. </div>
  483. <div class="section-box" id="section-news">
  484. <h4><span class="heading-font">Recently Added | Hourly updates!</span></h4>
  485. <div id="selected-news"></div>
  486. </div>
  487. <script type="6ab852121b9a07e4750d127e-text/javascript">
  488. $(document).ready(function() {
  489. $('#selected-news').scrollPagination({
  490. nop     : 12,
  491. offset   : 0,
  492. isthere   : 'More',
  493. error   : 'No More',
  494. ajax_file : 'ajax.php?case=index_news',
  495. delay   : 500,
  496. scroll   : true });
  497. });
  498. </script>
  499. </div>
  500. <div class="col-md-4 sidebar">
  501. <div class="top-news-widget hidden-xs hidden-sm">
  502. <div class="row">
  503. <div class="col-lg-12 col-md-12 col-sm-6 col-xs-12">
  504. <div class="single-trending-item-image">
  505. <a href="./news/record-breaking-q1-for-polkadot-daily-active-addresses-hit-514-000-as-dot-price-surges-7?article=92779" title="Record-Breaking Q1 For Polkadot: Daily Active Addresses Hit 514,000 As DOT Price Surges 7%">
  506. <div class="overlay-image max-width">
  507. <span class="trending-number">
  508. 1 </span>
  509. <img data-src="upload/news/image_1714795240_19185491.jpg" class="img-responsive" alt="Record-Breaking Q1 For Polkadot: Daily Active Addresses Hit 514,000 As DOT Price Surges 7%" />
  510. </div>
  511. <div class="single-trending-item-title">Record-Breaking Q1 For Polkadot: Daily Active Addresses Hit 514,000 As DOT Price Surges 7%</div>
  512. </a>
  513. </div>
  514. </div>
  515. </div>
  516. <div class="single-trending-item-image-rest">
  517. <div class="row">
  518. <div class="col-xs-5">
  519. <a href="./news/crypto-expert-arthur-hayes-says-bitcoin-has-found-its-local-bottom-but-can-it-hold-this-level?article=92790" title="Crypto Expert Arthur Hayes Says Bitcoin Has Found Its Local Bottom – But Can It Hold This Level?">
  520. <img data-src="upload/news/image_1714838442_30590031.jpg" class="img-responsive" alt="Crypto Expert Arthur Hayes Says Bitcoin Has Found Its Local Bottom – But Can It Hold This Level?" />
  521. </a>
  522. </div>
  523. <div class="col-xs-7">
  524. <span class="trending-number-rest">
  525. 2 </span>
  526. <a class="title-link" href="./news/crypto-expert-arthur-hayes-says-bitcoin-has-found-its-local-bottom-but-can-it-hold-this-level?article=92790" title="Crypto Expert Arthur Hayes Says Bitcoin Has Found Its Local Bottom – But Can It Hold This Level?">
  527. Crypto Expert Arthur Hayes Says Bitcoin Has Found Its...
  528. </a>
  529. </div>
  530. </div>
  531. </div>
  532. <div class="single-trending-item-image-rest">
  533. <div class="row">
  534. <div class="col-xs-5">
  535. <a href="./news/bitcoin-relative-strength-jumps-to-40-10x-research-reveals-next-steps-from-here?article=92801" title="Bitcoin Relative Strength Jumps To 40%: 10x Research Reveals Next Steps From Here">
  536. <img data-src="upload/news/image_1714881636_82635978.jpg" class="img-responsive" alt="Bitcoin Relative Strength Jumps To 40%: 10x Research Reveals Next Steps From Here" />
  537. </a>
  538. </div>
  539. <div class="col-xs-7">
  540. <span class="trending-number-rest">
  541. 3 </span>
  542. <a class="title-link" href="./news/bitcoin-relative-strength-jumps-to-40-10x-research-reveals-next-steps-from-here?article=92801" title="Bitcoin Relative Strength Jumps To 40%: 10x Research Reveals Next Steps From Here">
  543. Bitcoin Relative Strength Jumps To 40%: 10x Research...
  544. </a>
  545. </div>
  546. </div>
  547. </div>
  548. <div class="single-trending-item-image-rest">
  549. <div class="row">
  550. <div class="col-xs-5">
  551. <a href="./news/warren-buffett-compares-ai-to-nukes-after-seeing-deepfake-doppelganger?article=92811" title="Warren Buffett compares AI to nukes after seeing deepfake doppelganger">
  552. <img data-src="upload/sources/99091647330893.png" class="img-responsive" alt="Warren Buffett compares AI to nukes after seeing deepfake doppelganger" />
  553. </a>
  554. </div>
  555. <div class="col-xs-7">
  556. <span class="trending-number-rest">
  557. 4 </span>
  558. <a class="title-link" href="./news/warren-buffett-compares-ai-to-nukes-after-seeing-deepfake-doppelganger?article=92811" title="Warren Buffett compares AI to nukes after seeing deepfake doppelganger">
  559. Warren Buffett compares AI to nukes after seeing deepfake...
  560. </a>
  561. </div>
  562. </div>
  563. </div>
  564. <div class="single-trending-item-image-rest">
  565. <div class="row">
  566. <div class="col-xs-5">
  567. <a href="./news/dating-apps-kiss-n-tell-all-sorts-of-sensitive-personal-info?article=92793" title="Dating apps kiss'n'tell all sorts of sensitive personal info">
  568. <img data-src="upload/sources/39111563895254.png" class="img-responsive" alt="Dating apps kiss'n'tell all sorts of sensitive personal info" />
  569. </a>
  570. </div>
  571. <div class="col-xs-7">
  572. <span class="trending-number-rest">
  573. 5 </span>
  574. <a class="title-link" href="./news/dating-apps-kiss-n-tell-all-sorts-of-sensitive-personal-info?article=92793" title="Dating apps kiss'n'tell all sorts of sensitive personal info">
  575. Dating apps kiss'n'tell all sorts of sensitive personal info
  576. </a>
  577. </div>
  578. </div>
  579. </div>
  580. </div>
  581. <div class="widget feedburner hidden-xs hidden-sm" ">
  582. <h4 class="heading-font">Newsletter</h4>
  583. <div class="feedburner-form">
  584. <form action="https://feedburner.google.com/fb/a/mailverify" method="post" target="popupwindow" onsubmit="if (!window.__cfRLUnblockHandlers) return false; window.open('http://feedburner.google.com/fb/a/mailverify?uri=', 'popupwindow', 'scrollbars=yes,width=550,height=520');return true" data-cf-modified-6ab852121b9a07e4750d127e->
  585. <div class="form-group">
  586. <label for="email">Subscribe to Newsletter</label>
  587. <div class="input-group">
  588. <input type="text" name="email" id="email" class="form-control" placeholder="Email" />
  589. <input type="hidden" value="CyberReport-GlobalCollectionOfCyberSecurityNews" name="uri" />
  590. <input type="hidden" name="loc" value="en_US" />
  591. <span class="input-group-btn">
  592. <button type="submit" class="btn btn-warning"><i class="fa fa-envelope"></i></button>
  593. </span>
  594. </div>
  595. </div>
  596. </form>
  597. </div>
  598. </div>
  599. <div class="widget feedburner  ">
  600. <h4 class="heading-font">Be in Touch</h4>
  601. <div class="social-profiles">
  602. <div class="row">
  603. <div class="col-xs-3 social-col">
  604. <a href="https://www.facebook.com/cyberreport" class="social-profile facebook-profile" data-toggle="tooltip" data-placement="top" title="Facebook Page"><i class="fa fa-facebook fa-fw"></i></a>
  605. </div>
  606. <div class="col-xs-3 social-col">
  607. <a href="https://twitter.com/cyberreport_io" class="social-profile twitter-profile" data-toggle="tooltip" data-placement="top" title="Twitter Account"><i class="fa fa-twitter fa-fw"></i></a>
  608. </div>
  609. <div class="col-xs-3 social-col">
  610. <a href="./rss.xml" class="social-profile rss-profile" data-toggle="tooltip" data-placement="top" title="RSS"><i class="fa fa-rss fa-fw"></i></a>
  611. </div>
  612. </div><br>
  613. <p>
  614. Current News Sources: 60
  615. <br Daily posts: 70+ <br><br>
  616. Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!
  617. <br><br>
  618. If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.</p>
  619. </div>
  620. </div>
  621. </div>
  622. </div>
  623. </div>
  624. <div class="footer">
  625. <div class="container before-footer">
  626. <div class="row">
  627. <div class="col-md-6 footer-links">
  628. <ul>
  629. <li>
  630. <a href="./page/incident-response-tool-list?pid=6" title="Incident Response Tool List">Incident Response Tool List</a>
  631. </li>
  632. <li>
  633. <a href="./page/blue-team-tool-list?pid=7" title="Blue Team Tool List">Blue Team Tool List</a>
  634. </li>
  635. <li>
  636. <a href="./page/privacy-policy?pid=1" title="Privacy Policy">Privacy Policy</a>
  637. </li>
  638. </ul>
  639. </div>
  640. <div class="col-md-6 footer-links text-right">
  641. <ul>
  642. </ul>
  643. </div>
  644. </div>
  645. </div>
  646. <div class="container after-footer">
  647. <div class="row">
  648. <div class="col-sm-6 copyrights">All Rights Reserved <a href="https://www.cyberreport.io">#1 Source for Cyber Security News, Reports and Threat Intelligence </a></div>
  649. <div class="col-sm-6 powered-by text-right">Powered By The Internet!!!!</div>
  650. </div>
  651. </div>
  652. </div>
  653. <a href="javascript:void();" id="back-to-top" title="Back to top" class="hidden-sm hidden-xs"><i class="fa fa-up-arrow"></i></a>
  654. <script type="6ab852121b9a07e4750d127e-text/javascript">
  655.  (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
  656.  (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
  657.  m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
  658.  })(window,document,'script','//www.google-analytics.com/analytics.js','ga');
  659.  
  660.  ga('create', 'UA-39607120-5', 'auto');
  661.  ga('send', 'pageview');
  662.  
  663. </script>
  664. <script src="themes/default/js/pushy.min.js" type="6ab852121b9a07e4750d127e-text/javascript"></script>
  665. <script src="/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js" data-cf-settings="6ab852121b9a07e4750d127e-|49" defer></script></body>
  666. </html>
  667.  
Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda