www.itsecuritynews.info Open in urlscan Pro
2a01:238:20a:202:1079::  Public Scan

URL: https://www.itsecuritynews.info/
Submission: On June 17 via manual from IN — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://www.itsecuritynews.info/

<form role="search" method="get" class="search-form" action="https://www.itsecuritynews.info/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

GET https://www.itsecuritynews.info/

<form role="search" method="get" class="search-form" action="https://www.itsecuritynews.info/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

POST https://feedburner.google.com/fb/a/mailverify

<form action="https://feedburner.google.com/fb/a/mailverify" method="post" target="popupwindow"
  onsubmit="window.open('https://feedburner.google.com/fb/a/mailverify?uri=ItSecurityNewsAggregated', 'popupwindow', 'scrollbars=yes,width=800,height=500');return true">
  <p>Enter your email address:</p>
  <p><input type="text" name="email"></p><input type="hidden" value="ItSecurityNewsAggregated" name="uri"><input type="hidden" name="loc" value="en_US"><input type="submit" value="Subscribe">
</form>

GET https://www.itsecuritynews.info

<form action="https://www.itsecuritynews.info" method="get"><label class="screen-reader-text" for="cat">Categories</label><select name="cat" id="cat" class="postform">
    <option value="-1">Select Category</option>
    <option class="level-0" value="33906">$~ lloydlabs&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="30983">(ISC)2 Blog&nbsp;&nbsp;(323)</option>
    <option class="level-0" value="2">(ISC)2 Blog infosec&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="31783">(ISC)² Blog&nbsp;&nbsp;(800)</option>
    <option class="level-0" value="33031">2020-12-08 – Files for an ISC diary (recent Qakbot activity)&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="33036">2020-12-11 – Quick post: TA551 (Shathak) pushes IcedID&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="33042">2020-12-14 – Quick post: Hancitor infection with Cobalt Strike and Ficker Stealer&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="33299">2021-08-10 – Pcap and malware for ISC diary (TA551 -&gt; BazarLoader -&gt; Cobalt Strike)&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="33315">2021-08-19 – Traffic Analysis Exercise – Funkylizards&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="33319">2021-08-30 – Quick post: TA551 (Shathak) BazarLoader&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="33322">2021-09-02 – Hancitor with Cobalt Strike&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31823">A Journey in Security&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31536">A Journey through Security&nbsp;&nbsp;(143)</option>
    <option class="level-0" value="32206">A WordPress Site&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31078">Adobe Product Security Incident Response Team (PSIRT) Blog&nbsp;&nbsp;(141)</option>
    <option class="level-0" value="3">Adobe Product Security Incident Response Team (PSIRT) Blog infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31209">Advanced Persistent Security&nbsp;&nbsp;(70)</option>
    <option class="level-0" value="31219">All Articles and Blogs&nbsp;&nbsp;(912)</option>
    <option class="level-0" value="34245">All Blog Listing&nbsp;&nbsp;(20)</option>
    <option class="level-0" value="34130">All CISA Advisories&nbsp;&nbsp;(377)</option>
    <option class="level-0" value="34192">americansecuritytoday.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="31574">Arbor Networks Threat Intelligence&nbsp;&nbsp;(48)</option>
    <option class="level-0" value="31134">Arbor Threat Intelligence&nbsp;&nbsp;(49)</option>
    <option class="level-0" value="5">Arbor Threat Intelligence infosec&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="31008">Ars Technica&nbsp;&nbsp;(1,374)</option>
    <option class="level-0" value="6">Ars Technica » Risk Assessment infosec&nbsp;&nbsp;(31)</option>
    <option class="level-0" value="7">Articles at ComputerworldUK infosec&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="34482">AWS Security Blog&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31348">BankInfoSecurity.com RSS Syndication&nbsp;&nbsp;(40)</option>
    <option class="level-0" value="34097">Bitsight&nbsp;&nbsp;(10)</option>
    <option class="level-0" value="31053">BitSight Security Ratings Blog&nbsp;&nbsp;(401)</option>
    <option class="level-0" value="8">BitSight Security Ratings Blog infosec&nbsp;&nbsp;(19)</option>
    <option class="level-0" value="32160">BleepingComputer&nbsp;&nbsp;(3,766)</option>
    <option class="level-0" value="32915">Blog&nbsp;&nbsp;(710)</option>
    <option class="level-0" value="33512">Blog – crowdstrike.com&nbsp;&nbsp;(35)</option>
    <option class="level-0" value="34288">Blog – Wordfence&nbsp;&nbsp;(75)</option>
    <option class="level-0" value="33982">Blog RSS Feed&nbsp;&nbsp;(415)</option>
    <option class="level-0" value="31660">Blog | Avast EN&nbsp;&nbsp;(803)</option>
    <option class="level-0" value="31558">Blog | Imperva&nbsp;&nbsp;(232)</option>
    <option class="level-0" value="33337">Blog – crowdstrike.com&nbsp;&nbsp;(80)</option>
    <option class="level-0" value="33023">Blog – Stealthbits Technologies&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="33243">blog.avast.com EN&nbsp;&nbsp;(597)</option>
    <option class="level-0" value="34181">blog.checkpoint.com&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="34188">blog.malwarebytes.com&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="33039">Blogs List with categories – CipherCloud&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="31317">BreachAlarm Data Security Blog&nbsp;&nbsp;(66)</option>
    <option class="level-0" value="9">BreachAlarm Data Security Blog infosec&nbsp;&nbsp;(11)</option>
    <option class="level-0" value="31247">Breaking Malware&nbsp;&nbsp;(220)</option>
    <option class="level-0" value="31089">BrightPlanet&nbsp;&nbsp;(223)</option>
    <option class="level-0" value="11">BrightPlanet infosec&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="33990">Bulletins&nbsp;&nbsp;(60)</option>
    <option class="level-0" value="31643">Carbon Black&nbsp;&nbsp;(190)</option>
    <option class="level-0" value="31287">Carnal0wnage &amp; Attack Research Blog&nbsp;&nbsp;(59)</option>
    <option class="level-0" value="32608">CASB Vendors | Cloud Security Companies | CipherCloud&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="31670">CC 2017&nbsp;&nbsp;(14)</option>
    <option class="level-0" value="31198">Center for Internet Security Blog&nbsp;&nbsp;(33)</option>
    <option class="level-0" value="13">Center for Internet Security Blog infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="30938">CERT Recently Published Vulnerability Notes infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31267">Check Point Blog&nbsp;&nbsp;(443)</option>
    <option class="level-0" value="32545">Check Point Software&nbsp;&nbsp;(864)</option>
    <option class="level-0" value="32233">Check Point Software Blog&nbsp;&nbsp;(59)</option>
    <option class="level-0" value="30972">CHMag News Apps&nbsp;&nbsp;(1,152)</option>
    <option class="level-0" value="15">CHMag News Apps infosec&nbsp;&nbsp;(580)</option>
    <option class="level-0" value="31337">CipherCloud&nbsp;&nbsp;(81)</option>
    <option class="level-0" value="18">CipherCloud infosec&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="32564">CipherCloud | CASB+ Platform | Enterprise Cloud Security&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="32057">CircleID: Cyberattack&nbsp;&nbsp;(73)</option>
    <option class="level-0" value="32045">CircleID: Cybercrime&nbsp;&nbsp;(240)</option>
    <option class="level-0" value="32084">CircleID: Malware&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="32576">CISA All NCAS Products&nbsp;&nbsp;(1,939)</option>
    <option class="level-0" value="34148">CISA Blog&nbsp;&nbsp;(69)</option>
    <option class="level-0" value="33890">CISA Bulletins&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34128">CISA News&nbsp;&nbsp;(56)</option>
    <option class="level-0" value="32591">CISA TIPS feed&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="19">Cisco Blog » Security infosec&nbsp;&nbsp;(14)</option>
    <option class="level-0" value="34151">Cisco Blogs&nbsp;&nbsp;(714)</option>
    <option class="level-0" value="34220">Cisco Talos Blog&nbsp;&nbsp;(108)</option>
    <option class="level-0" value="32842">Cisco Umbrella Blog&nbsp;&nbsp;(10)</option>
    <option class="level-0" value="34150">CISO Collective&nbsp;&nbsp;(17)</option>
    <option class="level-0" value="34436">CISO Series&nbsp;&nbsp;(74)</option>
    <option class="level-0" value="32773">Confiant – Medium&nbsp;&nbsp;(45)</option>
    <option class="level-0" value="31101">Corporate Blog&nbsp;&nbsp;(2,196)</option>
    <option class="level-0" value="30950">Corporate Blog infosec&nbsp;&nbsp;(28)</option>
    <option class="level-0" value="32194">CSO Online&nbsp;&nbsp;(2,386)</option>
    <option class="level-0" value="31356">CUInfoSecurity.com RSS Syndication&nbsp;&nbsp;(76)</option>
    <option class="level-0" value="31015">Cyber Defense Magazine&nbsp;&nbsp;(1,533)</option>
    <option class="level-0" value="26">Cyber Defense Magazine infosec&nbsp;&nbsp;(33)</option>
    <option class="level-0" value="31237">Cyber Secure Car&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="33596">Cyber Security Archives – American Security Today&nbsp;&nbsp;(179)</option>
    <option class="level-0" value="31278">Cyber Security Buzz&nbsp;&nbsp;(237)</option>
    <option class="level-0" value="31895">Cyber Security News&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="32630">Cyber Security Review&nbsp;&nbsp;(79)</option>
    <option class="level-0" value="31211">Cyber Security – American Security Today&nbsp;&nbsp;(310)</option>
    <option class="level-0" value="32717">Cyber Security – Computer Business Review&nbsp;&nbsp;(400)</option>
    <option class="level-0" value="28">Cyber Trust Blog infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31093">Cyber Trust Blog » Cloud Computing&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="29">Cyber Trust Blog » Cloud Computing infosec&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="31203">Cyber Trust Blog » Cybersecurity&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="30">Cyber Trust Blog » Cybersecurity infosec&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="31185">CyberCrime &amp; Doing Time&nbsp;&nbsp;(73)</option>
    <option class="level-0" value="33893">Cybercrime – WeLiveSecurity&nbsp;&nbsp;(41)</option>
    <option class="level-0" value="31647">Cybereason&nbsp;&nbsp;(51)</option>
    <option class="level-0" value="30976">Cybersecurity&nbsp;&nbsp;(1,528)</option>
    <option class="level-0" value="33850">Cybersecurity Blog | CrowdStrike&nbsp;&nbsp;(29)</option>
    <option class="level-0" value="32">Cybersecurity infosec&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="32628">Cybersecurity Insiders&nbsp;&nbsp;(9,269)</option>
    <option class="level-0" value="33693">Cybersecurity News, Insights and Analysis | SecurityWeek&nbsp;&nbsp;(65)</option>
    <option class="level-0" value="33723">Cybersecurity News: Get the Latest Trends &amp; Threats | Cisco Umbrella&nbsp;&nbsp;(35)</option>
    <option class="level-0" value="34434">Cybersecurity Today&nbsp;&nbsp;(32)</option>
    <option class="level-0" value="31213">Cybersecurity – Cyber Trust Blog&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31027">Cylance Blog&nbsp;&nbsp;(215)</option>
    <option class="level-0" value="30947">Cyphort infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31000">CYREN Blog RSS Feed&nbsp;&nbsp;(54)</option>
    <option class="level-0" value="33">CYREN Blog RSS Feed infosec&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="33462">CySecurity News – Latest Information Security and Hacking Incidents&nbsp;&nbsp;(4,764)</option>
    <option class="level-0" value="34">Cyveillance Blog – The Cyber Intelligence Blog infosec&nbsp;&nbsp;(8)</option>
    <option class="level-0" value="31070">Cyveillance Blog – The Cyber Intelligence Blog&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="35">Cyveillance Blog – The Cyber Intelligence Blog infosec&nbsp;&nbsp;(19)</option>
    <option class="level-0" value="34424">Cyware News – Latest Cyber News&nbsp;&nbsp;(430)</option>
    <option class="level-0" value="36">daily summary&nbsp;&nbsp;(1,305)</option>
    <option class="level-0" value="33345">Dark Reading&nbsp;&nbsp;(5,620)</option>
    <option class="level-0" value="31150">Dark Reading:&nbsp;&nbsp;(4,723)</option>
    <option class="level-0" value="39">Darkmatters infosec&nbsp;&nbsp;(19)</option>
    <option class="level-0" value="31780">Darknet&nbsp;&nbsp;(35)</option>
    <option class="level-0" value="41">Darknet – The Darkside infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="33856">Darknet – Hacking Tools, Hacker News &amp; Cyber Security&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="31274">Darknet – The Darkside&nbsp;&nbsp;(241)</option>
    <option class="level-0" value="42">Darknet – The Darkside infosec&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="34177">data-protection.safenet-inc.com&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31358">DataBreachToday.com RSS Syndication&nbsp;&nbsp;(49)</option>
    <option class="level-0" value="31330">DDoS Attack Protection&nbsp;&nbsp;(16)</option>
    <option class="level-0" value="31080">Deeplinks&nbsp;&nbsp;(1,990)</option>
    <option class="level-0" value="46">Deeplinks infosec&nbsp;&nbsp;(181)</option>
    <option class="level-0" value="32637">Defense Systems: All Articles&nbsp;&nbsp;(457)</option>
    <option class="level-0" value="31040">Digital Guardian&nbsp;&nbsp;(932)</option>
    <option class="level-0" value="49">Digital Guardian infosec&nbsp;&nbsp;(50)</option>
    <option class="level-0" value="34226">DoublePulsar – Medium&nbsp;&nbsp;(18)</option>
    <option class="level-0" value="31036">Duo Security Bulletin&nbsp;&nbsp;(149)</option>
    <option class="level-0" value="50">Duo Security Bulletin infosec&nbsp;&nbsp;(24)</option>
    <option class="level-0" value="31857">DZone Security Zone&nbsp;&nbsp;(2,141)</option>
    <option class="level-0" value="31187">E Hacking News – Latest Hacker News and IT Security News&nbsp;&nbsp;(2,948)</option>
    <option class="level-0" value="52">E Hacking News – Latest Hacker News and IT Security News infosec&nbsp;&nbsp;(50)</option>
    <option class="level-0" value="34215">EN&nbsp;&nbsp;(24,113)</option>
    <option class="level-0" value="32953">Endpoint Cybersecurity&nbsp;&nbsp;(377)</option>
    <option class="level-0" value="34371">Endpoint Cybersecurity GmbH&nbsp;&nbsp;(31)</option>
    <option class="level-0" value="31016">Engadget RSS Feed&nbsp;&nbsp;(26)</option>
    <option class="level-0" value="31290">English – We Live Security&nbsp;&nbsp;(88)</option>
    <option class="level-0" value="31390">English – WeLiveSecurity&nbsp;&nbsp;(112)</option>
    <option class="level-0" value="32007">Enterprise Mobility + Security&nbsp;&nbsp;(94)</option>
    <option class="level-0" value="32255">Enterprise Mobility + Security articles&nbsp;&nbsp;(119)</option>
    <option class="level-0" value="31029">Errata Security&nbsp;&nbsp;(59)</option>
    <option class="level-0" value="55">Errata Security infosec&nbsp;&nbsp;(16)</option>
    <option class="level-0" value="34120">eSecurity Planet&nbsp;&nbsp;(196)</option>
    <option class="level-0" value="56">esecurityplanet&nbsp;&nbsp;(680)</option>
    <option class="level-0" value="31142">eSecurityPlanet RSS Feed&nbsp;&nbsp;(1,094)</option>
    <option class="level-0" value="57">eSecurityPlanet RSS Feed infosec&nbsp;&nbsp;(66)</option>
    <option class="level-0" value="31354">Everyone’s Blog Posts – CISO Platform&nbsp;&nbsp;(417)</option>
    <option class="level-0" value="60">F-Secure Antivirus Research Weblog infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="32433">Facecrooks&nbsp;&nbsp;(854)</option>
    <option class="level-0" value="33438">FCW – All Content&nbsp;&nbsp;(1,525)</option>
    <option class="level-0" value="31221">FCW: The business of federal technology&nbsp;&nbsp;(3,641)</option>
    <option class="level-0" value="34195">feedpress.me&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="34164">feeds.dzone.com&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="34174">feeds.feedburner.com&nbsp;&nbsp;(29)</option>
    <option class="level-0" value="34165">feeds.fortinet.com&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="30957">Fortinet Blog&nbsp;&nbsp;(50)</option>
    <option class="level-0" value="62">Fortinet Blog infosec&nbsp;&nbsp;(31)</option>
    <option class="level-0" value="31258">Fortinet Blog | Latest Posts&nbsp;&nbsp;(902)</option>
    <option class="level-0" value="34156">Fortinet Industry Trends Blog&nbsp;&nbsp;(77)</option>
    <option class="level-0" value="34149">Fortinet Threat Research Blog&nbsp;&nbsp;(39)</option>
    <option class="level-0" value="31175">Fox-IT International blog&nbsp;&nbsp;(47)</option>
    <option class="level-0" value="64">Fox-IT International blog infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="31581">GBHackers On Security&nbsp;&nbsp;(3,009)</option>
    <option class="level-0" value="34200">GBHackers on Security | #1 Globally Trusted Cyber Security News Platform&nbsp;&nbsp;(1,059)</option>
    <option class="level-0" value="33846">GBHackers – Latest Cyber Security News | Hacker News&nbsp;&nbsp;(889)</option>
    <option class="level-0" value="34175">gbhackers.com&nbsp;&nbsp;(10)</option>
    <option class="level-0" value="33436">GCN – All Content&nbsp;&nbsp;(1,776)</option>
    <option class="level-0" value="31226">GCN: News and Blogs&nbsp;&nbsp;(2,392)</option>
    <option class="level-0" value="32402">GCN: News, Explainers, Insights&nbsp;&nbsp;(2,349)</option>
    <option class="level-0" value="31058">GFI Blog&nbsp;&nbsp;(53)</option>
    <option class="level-0" value="66">GFI Blog infosec&nbsp;&nbsp;(26)</option>
    <option class="level-0" value="30979">Gizmodo&nbsp;&nbsp;(228)</option>
    <option class="level-0" value="31152">Google Online Security Blog&nbsp;&nbsp;(230)</option>
    <option class="level-0" value="68">Google Online Security Blog infosec&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="34194">googleonlinesecurity.blogspot.com&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31849">GuardiCore – Data Center and Cloud Security&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="31618">guest&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="32924">Hacker Combat&nbsp;&nbsp;(178)</option>
    <option class="level-0" value="34397">Hackers Online Club&nbsp;&nbsp;(54)</option>
    <option class="level-0" value="34154">Hackers Online Club (HOC)&nbsp;&nbsp;(77)</option>
    <option class="level-0" value="34198">hackersonlineclub.com&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31033">Hacking News — ScienceDaily&nbsp;&nbsp;(139)</option>
    <option class="level-0" value="74">Hacking News — ScienceDaily infosec&nbsp;&nbsp;(16)</option>
    <option class="level-0" value="31047">HACKMAGEDDON&nbsp;&nbsp;(229)</option>
    <option class="level-0" value="75">HACKMAGEDDON infosec&nbsp;&nbsp;(9)</option>
    <option class="level-0" value="32911">HackRead&nbsp;&nbsp;(1,212)</option>
    <option class="level-0" value="33477">HackRead | Latest Cyber Crime – InfoSec- Tech – Hacking News&nbsp;&nbsp;(756)</option>
    <option class="level-0" value="33865">HackRead | Latest Cybersecurity and Hacking News Site&nbsp;&nbsp;(520)</option>
    <option class="level-0" value="34094">Hackread – Latest Cybersecurity News, Press Releases &amp; Technology Today&nbsp;&nbsp;(431)</option>
    <option class="level-0" value="34333">Hackread – Latest Cybersecurity, Tech, Crypto &amp; Hacking News&nbsp;&nbsp;(424)</option>
    <option class="level-0" value="32061">Have I Been Pwned latest breaches&nbsp;&nbsp;(388)</option>
    <option class="level-0" value="31183">Have I been pwned? latest breaches&nbsp;&nbsp;(239)</option>
    <option class="level-0" value="77">Have I been pwned? latest breaches infosec&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="31097">HEAT Security Blog&nbsp;&nbsp;(19)</option>
    <option class="level-0" value="78">HEAT Security Blog infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31002">Heimdal Security Blog&nbsp;&nbsp;(3,689)</option>
    <option class="level-0" value="79">Heimdal Security Blog infosec&nbsp;&nbsp;(18)</option>
    <option class="level-0" value="30969">Help Net Security&nbsp;&nbsp;(17,798)</option>
    <option class="level-0" value="81">Help Net Security infosec&nbsp;&nbsp;(350)</option>
    <option class="level-0" value="33854">HelpSystems Blog&nbsp;&nbsp;(156)</option>
    <option class="level-0" value="31045">HITBSecNews – Keeping Knowledge Free for Over a Decade&nbsp;&nbsp;(1,461)</option>
    <option class="level-0" value="83">HITBSecNews – Keeping Knowledge Free for Over a Decade infosec&nbsp;&nbsp;(311)</option>
    <option class="level-0" value="31136">HolisticInfoSec&nbsp;&nbsp;(28)</option>
    <option class="level-0" value="84">HolisticInfoSec infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="31527">HolisticInfoSec™&nbsp;&nbsp;(62)</option>
    <option class="level-0" value="86">HOTforSecurity » Industry News infosec&nbsp;&nbsp;(23)</option>
    <option class="level-0" value="31510">http://blog.idwatchdog.com/index.php/feed/&nbsp;&nbsp;(47)</option>
    <option class="level-0" value="31509">http://blogs.cisco.com/rss/security/&nbsp;&nbsp;(213)</option>
    <option class="level-0" value="31515">http://blogs.rsa.com/feed/&nbsp;&nbsp;(106)</option>
    <option class="level-0" value="31511">http://facecrooks.com/feed/&nbsp;&nbsp;(496)</option>
    <option class="level-0" value="31505">http://feeds.arstechnica.com/arstechnica/security&nbsp;&nbsp;(300)</option>
    <option class="level-0" value="31507">http://feeds.feedburner.com/darknethackers&nbsp;&nbsp;(225)</option>
    <option class="level-0" value="31508">http://feeds.feedburner.com/Imperviews&nbsp;&nbsp;(190)</option>
    <option class="level-0" value="31963">http://feeds.feedburner.com/TalkTechToMe-All&nbsp;&nbsp;(69)</option>
    <option class="level-0" value="31956">http://feeds.trendmicro.com/Anti-MalwareBlog/&nbsp;&nbsp;(207)</option>
    <option class="level-0" value="31523">http://holisticinfosec.blogspot.com/feeds/posts/default&nbsp;&nbsp;(36)</option>
    <option class="level-0" value="31970">http://news.netcraft.com/feed&nbsp;&nbsp;(77)</option>
    <option class="level-0" value="31513">http://news.softpedia.com/newsRSS/Security-5.xml&nbsp;&nbsp;(883)</option>
    <option class="level-0" value="31499">http://packetstormsecurity.org/headlines.xml&nbsp;&nbsp;(600)</option>
    <option class="level-0" value="31973">http://rss.juniper.net/f/100001s481stb5hvl0q.rss&nbsp;&nbsp;(35)</option>
    <option class="level-0" value="32438">http://securityblog.redhat.com/feed/&nbsp;&nbsp;(43)</option>
    <option class="level-0" value="31503">http://venturebeat.com/category/security/feed/&nbsp;&nbsp;(15)</option>
    <option class="level-0" value="31512">http://welivesecurity.com/feed/rss&nbsp;&nbsp;(22)</option>
    <option class="level-0" value="31960">http://www.ciphercloud.com/feed/&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31958">http://www.eff.org/rss/updates.xml&nbsp;&nbsp;(622)</option>
    <option class="level-0" value="31967">http://www.europol.europa.eu/rss_news_feed&nbsp;&nbsp;(228)</option>
    <option class="level-0" value="31501">http://www.hotforsecurity.com/blog/category/industry-news/feed&nbsp;&nbsp;(348)</option>
    <option class="level-0" value="33297">http://www.informationsecuritybuzz.com/feed/&nbsp;&nbsp;(314)</option>
    <option class="level-0" value="31309">http://www.infosecurity-magazine.com/rss/news/76/application-security/&nbsp;&nbsp;(6,618)</option>
    <option class="level-0" value="31981">http://www.intezer.com/feed/&nbsp;&nbsp;(105)</option>
    <option class="level-0" value="31954">http://www.lawfareblog.com/rss.xml&nbsp;&nbsp;(1,168)</option>
    <option class="level-0" value="31517">http://www.secmaniac.com/feed/&nbsp;&nbsp;(16)</option>
    <option class="level-0" value="31506">http://www.techweekeurope.co.uk/category/security/feed&nbsp;&nbsp;(27)</option>
    <option class="level-0" value="31497">https://americansecuritytoday.com/category/itsecurity/cybersecurity/feed&nbsp;&nbsp;(15)</option>
    <option class="level-0" value="31989">https://blog.css-security.com/blog/rss.xml&nbsp;&nbsp;(121)</option>
    <option class="level-0" value="32919">https://blog.syscall.party/feed&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="32027">https://blogs.technet.microsoft.com/msrc/feed&nbsp;&nbsp;(52)</option>
    <option class="level-0" value="32624">https://hackercombat.com/feed/&nbsp;&nbsp;(204)</option>
    <option class="level-0" value="31965">https://www.crowdstrike.com/blog/feed&nbsp;&nbsp;(206)</option>
    <option class="level-0" value="32833">https://www.cyberdefensemagazine.com/feed/&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="32473">https://www.europol.europa.eu/rss.xml&nbsp;&nbsp;(254)</option>
    <option class="level-0" value="32041">https://www.hackread.com/feed/&nbsp;&nbsp;(617)</option>
    <option class="level-0" value="31516">https://www.ipswitch.com/blog/security/feed/&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="31547">IEEE Cybersecurity&nbsp;&nbsp;(12)</option>
    <option class="level-0" value="31049">Imperva Cyber Security Blog&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="88">Imperva Cyber Security Blog infosec&nbsp;&nbsp;(18)</option>
    <option class="level-0" value="32615">Improve Your Security&nbsp;&nbsp;(23)</option>
    <option class="level-0" value="31168">Industry News – HOTforSecurity&nbsp;&nbsp;(1,147)</option>
    <option class="level-0" value="90">Industry News – HOTforSecurity infosec&nbsp;&nbsp;(26)</option>
    <option class="level-0" value="31132">Info Security News&nbsp;&nbsp;(551)</option>
    <option class="level-0" value="91">Info Security News infosec&nbsp;&nbsp;(26)</option>
    <option class="level-0" value="92">InfoCON: green infosec&nbsp;&nbsp;(64)</option>
    <option class="level-0" value="31350">InfoRiskToday.com RSS Syndication&nbsp;&nbsp;(229)</option>
    <option class="level-0" value="30990">Information Security Buzz&nbsp;&nbsp;(3,324)</option>
    <option class="level-0" value="94">Information Security Buzz infosec&nbsp;&nbsp;(247)</option>
    <option class="level-0" value="30954">Information Security infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="96">infosec&nbsp;&nbsp;(314)</option>
    <option class="level-0" value="97">InfoSec Institute infosec&nbsp;&nbsp;(16)</option>
    <option class="level-0" value="30963">Infosec Island Latest Articles&nbsp;&nbsp;(163)</option>
    <option class="level-0" value="98">Infosec Island Latest Articles infosec&nbsp;&nbsp;(21)</option>
    <option class="level-0" value="32296">InfoSec News&nbsp;&nbsp;(45)</option>
    <option class="level-0" value="30977">InfoSec Resources&nbsp;&nbsp;(929)</option>
    <option class="level-0" value="99">InfoSec Resources infosec&nbsp;&nbsp;(35)</option>
    <option class="level-0" value="31297">InfoWorld Security&nbsp;&nbsp;(300)</option>
    <option class="level-0" value="32418">Insider Threat Security Blog&nbsp;&nbsp;(222)</option>
    <option class="level-0" value="31903">Intezer&nbsp;&nbsp;(410)</option>
    <option class="level-0" value="31686">Invincea Endpoint Security Blog – Invincea&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="31192">Irongeek’s Security Site&nbsp;&nbsp;(24)</option>
    <option class="level-0" value="103">Irongeek’s Security Site infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="30931">ISACA Now: Posts infosec&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="31113">iSIGHT Partners&nbsp;&nbsp;(247)</option>
    <option class="level-0" value="104">iSIGHT Partners infosec&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="31535">IT Security – The IT Security Industry’s Web Resource&nbsp;&nbsp;(141)</option>
    <option class="level-0" value="31124">IT Security Expert Blog&nbsp;&nbsp;(181)</option>
    <option class="level-0" value="30967">IT SECURITY GURU&nbsp;&nbsp;(3,073)</option>
    <option class="level-0" value="107">IT Security Guru infosec&nbsp;&nbsp;(294)</option>
    <option class="level-0" value="34077">IT World Canada&nbsp;&nbsp;(378)</option>
    <option class="level-0" value="31118">ITsecurity&nbsp;&nbsp;(201)</option>
    <option class="level-0" value="109">ITsecurity infosec&nbsp;&nbsp;(44)</option>
    <option class="level-0" value="34179">itsecurityguru.org&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="31064">ITSecurityPortal.com&nbsp;&nbsp;(1,830)</option>
    <option class="level-0" value="32883">Keen Security Lab Blog&nbsp;&nbsp;(123)</option>
    <option class="level-0" value="31532">Kevin Townsend&nbsp;&nbsp;(212)</option>
    <option class="level-0" value="31140">Krebs on Security&nbsp;&nbsp;(550)</option>
    <option class="level-0" value="112">Krebs on Security infosec&nbsp;&nbsp;(31)</option>
    <option class="level-0" value="34166">krebsonsecurity.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34293">Labs Archiv – SentinelOne DE&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31120">Latest articles from SC Magazine News&nbsp;&nbsp;(12)</option>
    <option class="level-0" value="114">Latest articles from SC Magazine News infosec&nbsp;&nbsp;(121)</option>
    <option class="level-0" value="31109">Latest Blogs Posts from ComputerworldUK&nbsp;&nbsp;(11)</option>
    <option class="level-0" value="32197">Latest Hacking News&nbsp;&nbsp;(2,886)</option>
    <option class="level-0" value="33730">Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses&nbsp;&nbsp;(677)</option>
    <option class="level-0" value="31235">Latest news and stories from BleepingComputer.com&nbsp;&nbsp;(3,085)</option>
    <option class="level-0" value="31062">Latest Secunia Blog Entries&nbsp;&nbsp;(1,916)</option>
    <option class="level-0" value="31179">Latest Security Advisories&nbsp;&nbsp;(21)</option>
    <option class="level-0" value="33701">Latest stories for ZDNet in Security&nbsp;&nbsp;(1,361)</option>
    <option class="level-0" value="31126">Latest topics for ZDNet in Security&nbsp;&nbsp;(9,535)</option>
    <option class="level-0" value="118">Latest topics for ZDNet in Security infosec&nbsp;&nbsp;(336)</option>
    <option class="level-0" value="34186">latesthackingnews.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="31011">Lawfare&nbsp;&nbsp;(2,023)</option>
    <option class="level-0" value="119">Lawfare infosec&nbsp;&nbsp;(255)</option>
    <option class="level-0" value="30959">Lifehacker&nbsp;&nbsp;(528)</option>
    <option class="level-0" value="32187">LinuxSecurity.com&nbsp;&nbsp;(9)</option>
    <option class="level-0" value="32452">LinuxSecurity.com – Hybrid RSS&nbsp;&nbsp;(1,141)</option>
    <option class="level-0" value="32039">LinuxSecurity.com – Security Advisories&nbsp;&nbsp;(763)</option>
    <option class="level-0" value="31031">Liquidmatrix Security Digest&nbsp;&nbsp;(130)</option>
    <option class="level-0" value="120">Liquidmatrix Security Digest infosec&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="31020">MacRumors: Mac News and Rumors – Front Page&nbsp;&nbsp;(11,159)</option>
    <option class="level-0" value="31170">Malcovery Security Blog&nbsp;&nbsp;(234)</option>
    <option class="level-0" value="31162">Malware don’t need Coffee&nbsp;&nbsp;(64)</option>
    <option class="level-0" value="122">Malware don’t need Coffee infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="34173">malware-traffic-analysis.net&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31938">Malware-Traffic-Analysis.net – Blog Entries&nbsp;&nbsp;(450)</option>
    <option class="level-0" value="34238">Malwarebytes&nbsp;&nbsp;(291)</option>
    <option class="level-0" value="31035">Malwarebytes Labs&nbsp;&nbsp;(2,318)</option>
    <option class="level-0" value="30936">Malwarebytes Labs infosec&nbsp;&nbsp;(22)</option>
    <option class="level-0" value="31196">MalwareTech&nbsp;&nbsp;(14)</option>
    <option class="level-0" value="123">MalwareTech infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="30996">Mashable&nbsp;&nbsp;(27)</option>
    <option class="level-0" value="33486">McAfee Blog&nbsp;&nbsp;(245)</option>
    <option class="level-0" value="31656">McAfee Blogs&nbsp;&nbsp;(673)</option>
    <option class="level-0" value="33649">McAfee Labs | McAfee Blogs&nbsp;&nbsp;(19)</option>
    <option class="level-0" value="33500">McAfee Labs – McAfee Blog&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31918">McAfee Labs – McAfee Blogs&nbsp;&nbsp;(59)</option>
    <option class="level-0" value="31038">Metasploit&nbsp;&nbsp;(167)</option>
    <option class="level-0" value="124">Metasploit infosec&nbsp;&nbsp;(28)</option>
    <option class="level-0" value="32009">Microsoft Azure Blog &gt; Security&nbsp;&nbsp;(209)</option>
    <option class="level-0" value="31567">Microsoft Malware Protection Center Blog&nbsp;&nbsp;(14)</option>
    <option class="level-0" value="125">Microsoft Malware Protection Center infosec&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="31950">Microsoft Secure&nbsp;&nbsp;(21)</option>
    <option class="level-0" value="32491">Microsoft Security&nbsp;&nbsp;(497)</option>
    <option class="level-0" value="34199">Microsoft Security Baselines Blog articles&nbsp;&nbsp;(12)</option>
    <option class="level-0" value="33228">Microsoft Security Blog&nbsp;&nbsp;(1,069)</option>
    <option class="level-0" value="31155">Microsoft Security Bulletins&nbsp;&nbsp;(133)</option>
    <option class="level-0" value="127">Microsoft Security Bulletins infosec&nbsp;&nbsp;(30)</option>
    <option class="level-0" value="31157">Microsoft Security Content: Comprehensive Edition&nbsp;&nbsp;(182)</option>
    <option class="level-0" value="128">Microsoft Security Content: Comprehensive Edition infosec&nbsp;&nbsp;(16)</option>
    <option class="level-0" value="32052">Microsoft Security Guidance blog&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="32594">Microsoft Security Response Center&nbsp;&nbsp;(222)</option>
    <option class="level-0" value="129">Microsoft Security Response Center infosec&nbsp;&nbsp;(8)</option>
    <option class="level-0" value="31416">Minded Security Blog&nbsp;&nbsp;(58)</option>
    <option class="level-0" value="130">Minded Security Blog infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="131">Mocana ON Blog infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31524">monthly summary&nbsp;&nbsp;(34)</option>
    <option class="level-0" value="31178">MSRC&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="132">MSRC infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34191">msrc.microsoft.com&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="33705">Naked Security&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="31146">Naked Security – Sophos&nbsp;&nbsp;(2,601)</option>
    <option class="level-0" value="133">Naked Security – Sophos infosec&nbsp;&nbsp;(186)</option>
    <option class="level-0" value="32172">NetApp Blog&nbsp;&nbsp;(825)</option>
    <option class="level-0" value="31677">Netcraft&nbsp;&nbsp;(40)</option>
    <option class="level-0" value="32690">Netcraft News&nbsp;&nbsp;(138)</option>
    <option class="level-0" value="31531">Network Security Blog&nbsp;&nbsp;(179)</option>
    <option class="level-0" value="135">Network Security Blog infosec&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="31108">News&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="30985">News from the Lab&nbsp;&nbsp;(273)</option>
    <option class="level-0" value="136">News infosec&nbsp;&nbsp;(12)</option>
    <option class="level-0" value="31141">News Items&nbsp;&nbsp;(22)</option>
    <option class="level-0" value="137">News Items infosec&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="31099">News ≈ Packet Storm&nbsp;&nbsp;(4,380)</option>
    <option class="level-0" value="138">News ≈ Packet Storm infosec&nbsp;&nbsp;(199)</option>
    <option class="level-0" value="31514">Newsroom&nbsp;&nbsp;(321)</option>
    <option class="level-0" value="33027">NorseCorp&nbsp;&nbsp;(932)</option>
    <option class="level-0" value="31314">OEM Hub | Insights into Antivirus Technology Licensing&nbsp;&nbsp;(1,772)</option>
    <option class="level-0" value="31223">Offensive Security&nbsp;&nbsp;(176)</option>
    <option class="level-0" value="140">Offensive Security – Offensive Security infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="141">Offensive Security infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="30992">Official Google Blog&nbsp;&nbsp;(32)</option>
    <option class="level-0" value="33910">OffSec&nbsp;&nbsp;(80)</option>
    <option class="level-0" value="30939">OpenDNS Blog infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="30943">OpenDNS Security Labs infosec&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="31673">OpenDNS Umbrella Blog&nbsp;&nbsp;(78)</option>
    <option class="level-0" value="34205">OpenSSL Blog&nbsp;&nbsp;(29)</option>
    <option class="level-0" value="142">Optimal Security infosec&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="34185">packetstormsecurity.org&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31043">Palo Alto Networks Blog&nbsp;&nbsp;(581)</option>
    <option class="level-0" value="143">Palo Alto Networks Blog infosec&nbsp;&nbsp;(55)</option>
    <option class="level-0" value="32336">Panda Security Mediacenter&nbsp;&nbsp;(730)</option>
    <option class="level-0" value="31819">Perception Point&nbsp;&nbsp;(144)</option>
    <option class="level-0" value="31466">PKI Blog&nbsp;&nbsp;(94)</option>
    <option class="level-0" value="31130">Power More&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="31589">Project Zero&nbsp;&nbsp;(11)</option>
    <option class="level-0" value="34350">PSIRT Blog&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="31534">rdist&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31055">Recorded Future&nbsp;&nbsp;(665)</option>
    <option class="level-0" value="145">Recorded Future infosec&nbsp;&nbsp;(16)</option>
    <option class="level-0" value="32963">Red Hat Security&nbsp;&nbsp;(227)</option>
    <option class="level-0" value="31302">Red Hat Security Blog Blog Posts&nbsp;&nbsp;(150)</option>
    <option class="level-0" value="146">Red Hat Security infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34140">RedPacket Security&nbsp;&nbsp;(607)</option>
    <option class="level-0" value="31009">Risk Assessment – Ars Technica&nbsp;&nbsp;(754)</option>
    <option class="level-0" value="147">Risk Assessment – Ars Technica infosec&nbsp;&nbsp;(52)</option>
    <option class="level-0" value="32719">safebreach.com – Main Channel&nbsp;&nbsp;(51)</option>
    <option class="level-0" value="31095">SANS Information Security Reading Room&nbsp;&nbsp;(527)</option>
    <option class="level-0" value="149">SANS Information Security Reading Room infosec&nbsp;&nbsp;(46)</option>
    <option class="level-0" value="150">SANS Internet Storm Center&nbsp;&nbsp;(64)</option>
    <option class="level-0" value="31018">SANS Internet Storm Center, InfoCON: green&nbsp;&nbsp;(1,176)</option>
    <option class="level-0" value="31650">SANS Internet Storm Center, InfoCON: yellow&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="31166">SANS ISC InfoSec News Feed&nbsp;&nbsp;(1,819)</option>
    <option class="level-0" value="31060">SANS NewsBites&nbsp;&nbsp;(429)</option>
    <option class="level-0" value="151">SANS NewsBites infosec&nbsp;&nbsp;(191)</option>
    <option class="level-0" value="31074">SANS Penetration Testing&nbsp;&nbsp;(230)</option>
    <option class="level-0" value="152">SANS Penetration Testing infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31025">Schneier on Security&nbsp;&nbsp;(1,105)</option>
    <option class="level-0" value="153">Schneier on Security infosec&nbsp;&nbsp;(53)</option>
    <option class="level-0" value="31899">Scott Helme&nbsp;&nbsp;(160)</option>
    <option class="level-0" value="154">SearchSecurity&nbsp;&nbsp;(2,808)</option>
    <option class="level-0" value="34189">SearchSecurity.techtarget.com&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31368">SearchSecurity: RSS Feed&nbsp;&nbsp;(495)</option>
    <option class="level-0" value="31159">SearchSecurity: Security Wire Daily News&nbsp;&nbsp;(887)</option>
    <option class="level-0" value="155">SearchSecurity: Security Wire Daily News infosec&nbsp;&nbsp;(37)</option>
    <option class="level-0" value="31635">Secunia Research: Research, opinions and views from our Vulnerability Research experts&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="32318">Securelist&nbsp;&nbsp;(537)</option>
    <option class="level-0" value="31086">Securelist – Information about Viruses, Hackers and Spam&nbsp;&nbsp;(544)</option>
    <option class="level-0" value="32005">Securelist – Kaspersky Lab’s cyberthreat research and reports&nbsp;&nbsp;(91)</option>
    <option class="level-0" value="30940">Security&nbsp;&nbsp;(892)</option>
    <option class="level-0" value="33582">Security – Cisco Blogs&nbsp;&nbsp;(176)</option>
    <option class="level-0" value="34103">Security @ Cisco Blogs&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="31022">Security Affairs&nbsp;&nbsp;(6,825)</option>
    <option class="level-0" value="160">Security Affairs infosec&nbsp;&nbsp;(235)</option>
    <option class="level-0" value="31138">Security Blog G Data Software AG&nbsp;&nbsp;(127)</option>
    <option class="level-0" value="161">Security Blog G Data Software AG infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="30981">Security Bloggers Network&nbsp;&nbsp;(2,260)</option>
    <option class="level-0" value="162">Security Bloggers Network infosec&nbsp;&nbsp;(697)</option>
    <option class="level-0" value="31840">Security Boulevard&nbsp;&nbsp;(9,357)</option>
    <option class="level-0" value="31642">Security Intelligence&nbsp;&nbsp;(1,457)</option>
    <option class="level-0" value="32130">Security Latest&nbsp;&nbsp;(2,103)</option>
    <option class="level-0" value="34105">Security News | TechCrunch&nbsp;&nbsp;(542)</option>
    <option class="level-0" value="33776">Security News | VentureBeat&nbsp;&nbsp;(1,084)</option>
    <option class="level-0" value="31117">Security on TechRepublic&nbsp;&nbsp;(2,926)</option>
    <option class="level-0" value="164">Security on TechRepublic infosec&nbsp;&nbsp;(43)</option>
    <option class="level-0" value="31122">Security Research &amp; Defense&nbsp;&nbsp;(33)</option>
    <option class="level-0" value="33848">Security Resources and Information from TechTarget&nbsp;&nbsp;(963)</option>
    <option class="level-0" value="33533">Security Software news and updates&nbsp;&nbsp;(318)</option>
    <option class="level-0" value="31066">Security Watch&nbsp;&nbsp;(2,137)</option>
    <option class="level-0" value="166">Security Watch infosec&nbsp;&nbsp;(9)</option>
    <option class="level-0" value="30991">Security Zap&nbsp;&nbsp;(246)</option>
    <option class="level-0" value="167">Security Zap infosec&nbsp;&nbsp;(31)</option>
    <option class="level-0" value="34022">Security | Azure Blog | Microsoft Azure&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34049">Security | TechCrunch&nbsp;&nbsp;(103)</option>
    <option class="level-0" value="33601">Security | TechRepublic&nbsp;&nbsp;(1,438)</option>
    <option class="level-0" value="31751">security – Ars Technica&nbsp;&nbsp;(147)</option>
    <option class="level-0" value="31056">Security – Cisco Blog&nbsp;&nbsp;(1,225)</option>
    <option class="level-0" value="168">Security – Cisco Blog infosec&nbsp;&nbsp;(20)</option>
    <option class="level-0" value="32742">Security – Cisco Blogs&nbsp;&nbsp;(684)</option>
    <option class="level-0" value="33188">Security – gHacks Technology News&nbsp;&nbsp;(36)</option>
    <option class="level-0" value="31224">Security – Ipswitch Blog&nbsp;&nbsp;(117)</option>
    <option class="level-0" value="31012">Security – Re/code&nbsp;&nbsp;(46)</option>
    <option class="level-0" value="169">Security – Re/code infosec&nbsp;&nbsp;(68)</option>
    <option class="level-0" value="31944">Security – Silicon UK&nbsp;&nbsp;(163)</option>
    <option class="level-0" value="31240">Security – VentureBeat&nbsp;&nbsp;(2,725)</option>
    <option class="level-0" value="34167">securityaffairs.co&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="34160">securityboulevard.com&nbsp;&nbsp;(20)</option>
    <option class="level-0" value="31324">SecurityFocus Vulnerabilities&nbsp;&nbsp;(468)</option>
    <option class="level-0" value="170">SecurityFocus Vulnerabilities infosec&nbsp;&nbsp;(316)</option>
    <option class="level-0" value="31637">SecurityRecruiter.com’s Security Recruiter Blog&nbsp;&nbsp;(19)</option>
    <option class="level-0" value="171">securityweek&nbsp;&nbsp;(26)</option>
    <option class="level-0" value="31133">SecurityWeek RSS Feed&nbsp;&nbsp;(10,189)</option>
    <option class="level-0" value="172">SecurityWeek RSS Feed infosec&nbsp;&nbsp;(329)</option>
    <option class="level-0" value="34196">securityzap.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34222">Sekoia.io Blog&nbsp;&nbsp;(43)</option>
    <option class="level-0" value="34241">SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.&nbsp;&nbsp;(10)</option>
    <option class="level-0" value="31644">SentinelOne&nbsp;&nbsp;(318)</option>
    <option class="level-0" value="33818">Services&nbsp;&nbsp;(400)</option>
    <option class="level-0" value="31051">Shell is Only the Beginning&nbsp;&nbsp;(9)</option>
    <option class="level-0" value="173">Shell is Only the Beginning infosec&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="32043">Silicon UK&nbsp;&nbsp;(6,644)</option>
    <option class="level-0" value="31526">Silicon UK » Security&nbsp;&nbsp;(1,033)</option>
    <option class="level-0" value="31004">Slashdot&nbsp;&nbsp;(25)</option>
    <option class="level-0" value="32940">Softpedia News / Security&nbsp;&nbsp;(417)</option>
    <option class="level-0" value="33789">Software Security Archives – Software Curated&nbsp;&nbsp;(53)</option>
    <option class="level-0" value="32475">Software Security – Software Curated&nbsp;&nbsp;(238)</option>
    <option class="level-0" value="557">Sorin Mustaca on Cyber Security infosec&nbsp;&nbsp;(18)</option>
    <option class="level-0" value="30974">Sorin Mustaca on Cybersecurity&nbsp;&nbsp;(97)</option>
    <option class="level-0" value="558">Sorin Mustaca on Security infosec&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="560">Speaking of Security – The RSA Blog and Podcast infosec&nbsp;&nbsp;(18)</option>
    <option class="level-0" value="31435">Speaking of Security – The RSA Blog&nbsp;&nbsp;(202)</option>
    <option class="level-0" value="31006">Speaking of Security – The RSA Blog and Podcast&nbsp;&nbsp;(142)</option>
    <option class="level-0" value="561">Speaking of Security – The RSA Blog and Podcast infosec&nbsp;&nbsp;(34)</option>
    <option class="level-0" value="31342">sponsored&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31533">StopBadware blogs&nbsp;&nbsp;(186)</option>
    <option class="level-0" value="562">StopBadware blogs infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="31529">Sucuri Blog&nbsp;&nbsp;(201)</option>
    <option class="level-0" value="566">Tech&nbsp;&nbsp;(358)</option>
    <option class="level-0" value="30970">TechCrunch&nbsp;&nbsp;(740)</option>
    <option class="level-0" value="34161">techcrunch.com&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="31293">Technical Blog&nbsp;&nbsp;(18)</option>
    <option class="level-0" value="30932">TechSpective infosec&nbsp;&nbsp;(24)</option>
    <option class="level-0" value="31023">TechWeekEurope UK&nbsp;&nbsp;(983)</option>
    <option class="level-0" value="570">TechWeekEurope UK infosec&nbsp;&nbsp;(358)</option>
    <option class="level-0" value="31370">TechWeekEurope UK » Security&nbsp;&nbsp;(235)</option>
    <option class="level-0" value="33867">Thales CPL Blog Feed&nbsp;&nbsp;(92)</option>
    <option class="level-0" value="31153">The Art of Data Protection&nbsp;&nbsp;(8)</option>
    <option class="level-0" value="571">The Art of Data Protection infosec&nbsp;&nbsp;(14)</option>
    <option class="level-0" value="31658">The AVIEN Blog&nbsp;&nbsp;(98)</option>
    <option class="level-0" value="34233">The DFIR Report&nbsp;&nbsp;(12)</option>
    <option class="level-0" value="31691">The Duo Blog&nbsp;&nbsp;(453)</option>
    <option class="level-0" value="32177">The first stop for security news | Threatpost&nbsp;&nbsp;(425)</option>
    <option class="level-0" value="31014">The Hacker News&nbsp;&nbsp;(5,657)</option>
    <option class="level-0" value="32854">The Hacker News – Cybersecurity News and Analysis&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="33699">The Hacker News – Most Trusted Cyber Security and Computer Security Analysis&nbsp;&nbsp;(37)</option>
    <option class="level-0" value="572">The Hacker News infosec&nbsp;&nbsp;(141)</option>
    <option class="level-0" value="32327">The Insider Threat Security Blog&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="31530">The Invisible Things Lab’s blog&nbsp;&nbsp;(199)</option>
    <option class="level-0" value="32926">The Mac Security Blog&nbsp;&nbsp;(472)</option>
    <option class="level-0" value="30930">The Official Blog from Kaspersky Lab infosec&nbsp;&nbsp;(28)</option>
    <option class="level-0" value="31281">The Official Google Blog&nbsp;&nbsp;(1,127)</option>
    <option class="level-0" value="31072">The PhishLabs Blog&nbsp;&nbsp;(179)</option>
    <option class="level-0" value="574">The PhishLabs Blog infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="575">the register&nbsp;&nbsp;(16,478)</option>
    <option class="level-0" value="31103">The Register – Security&nbsp;&nbsp;(6,159)</option>
    <option class="level-0" value="576">The Register – Security infosec&nbsp;&nbsp;(450)</option>
    <option class="level-0" value="577">The Register infosec&nbsp;&nbsp;(1,803)</option>
    <option class="level-0" value="31528">The Social Media Security Podcast&nbsp;&nbsp;(187)</option>
    <option class="level-0" value="31426">The Spamhaus Project News&nbsp;&nbsp;(33)</option>
    <option class="level-0" value="31105">The State of Security&nbsp;&nbsp;(1,924)</option>
    <option class="level-0" value="579">The State of Security infosec&nbsp;&nbsp;(159)</option>
    <option class="level-0" value="31091">The Watchblog — ID Watchdog&nbsp;&nbsp;(150)</option>
    <option class="level-0" value="580">The Watchblog — ID Watchdog infosec&nbsp;&nbsp;(10)</option>
    <option class="level-0" value="30961">ThinkGeek – What’s New&nbsp;&nbsp;(1,659)</option>
    <option class="level-0" value="34463">Threat Intelligence&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="31537">Threat Intelligence Times&nbsp;&nbsp;(111)</option>
    <option class="level-0" value="582">Threat Intelligence Times infosec&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="32102">Threat Research&nbsp;&nbsp;(334)</option>
    <option class="level-0" value="31160">Threat Research Blog&nbsp;&nbsp;(12)</option>
    <option class="level-0" value="30942">Threat Research Blog infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="583">Threat Research infosec&nbsp;&nbsp;(11)</option>
    <option class="level-0" value="32626">Threat Watch&nbsp;&nbsp;(362)</option>
    <option class="level-0" value="32805">Threat Watch – Binary Defense&nbsp;&nbsp;(1,011)</option>
    <option class="level-0" value="584">threatpost&nbsp;&nbsp;(4,022)</option>
    <option class="level-0" value="31111">Threatpost | The first stop for security news&nbsp;&nbsp;(185)</option>
    <option class="level-0" value="586">Threatpost | The first stop for security news infosec&nbsp;&nbsp;(169)</option>
    <option class="level-0" value="31613">Threatpost – English – Global – threatpost.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="31128">ThreatTrack Security Labs Blog&nbsp;&nbsp;(215)</option>
    <option class="level-0" value="587">ThreatTrack Security Labs Blog infosec&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="33397">Trend Micro Research, News and Perspectives&nbsp;&nbsp;(595)</option>
    <option class="level-0" value="32148">Trend Micro Simply Security&nbsp;&nbsp;(406)</option>
    <option class="level-0" value="31088">TrendLabs Security Intelligence Blog&nbsp;&nbsp;(512)</option>
    <option class="level-0" value="589">TrendLabs Security Intelligence Blog infosec&nbsp;&nbsp;(35)</option>
    <option class="level-0" value="31469">Troy Hunt&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="31164">Troy Hunt’s Blog&nbsp;&nbsp;(452)</option>
    <option class="level-0" value="30929">Troy Hunt’s Blog infosec&nbsp;&nbsp;(9)</option>
    <option class="level-0" value="592">TrustedSec – Information Security infosec&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="30998">TrustedSec – Information Security&nbsp;&nbsp;(54)</option>
    <option class="level-0" value="593">TrustedSec – Information Security infosec&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="31311">Trustwave Blog&nbsp;&nbsp;(288)</option>
    <option class="level-0" value="1">Uncategorized&nbsp;&nbsp;(11)</option>
    <option class="level-0" value="34218">Unit 42&nbsp;&nbsp;(54)</option>
    <option class="level-0" value="33704">US – Research, News, and Perspectives&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="31041">US-CERT Current Activity&nbsp;&nbsp;(671)</option>
    <option class="level-0" value="595">US-CERT Current Activity infosec&nbsp;&nbsp;(44)</option>
    <option class="level-0" value="31425">US-CERT Tips&nbsp;&nbsp;(82)</option>
    <option class="level-0" value="32013">US-CERT: The United States Computer Emergency Readiness Team&nbsp;&nbsp;(464)</option>
    <option class="level-0" value="31083">Venafi Blog&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="597">Venafi Blog infosec&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="34184">venturebeat.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="598">Virus Bulletin blog infosec&nbsp;&nbsp;(12)</option>
    <option class="level-0" value="31147">Virus Bulletin’s blog&nbsp;&nbsp;(161)</option>
    <option class="level-0" value="599">Virus Bulletin’s blog infosec&nbsp;&nbsp;(14)</option>
    <option class="level-0" value="32098">VirusTotal Blog&nbsp;&nbsp;(143)</option>
    <option class="level-0" value="32735">VMware Carbon Black&nbsp;&nbsp;(217)</option>
    <option class="level-0" value="31518">We Live Security&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="31143">We Live Security » Languages » English&nbsp;&nbsp;(119)</option>
    <option class="level-0" value="600">We Live Security » Languages » English infosec&nbsp;&nbsp;(96)</option>
    <option class="level-0" value="32067">Webroot Blog&nbsp;&nbsp;(227)</option>
    <option class="level-0" value="31032">Webroot Threat Blog&nbsp;&nbsp;(337)</option>
    <option class="level-0" value="601">Webroot Threat Blog infosec&nbsp;&nbsp;(19)</option>
    <option class="level-0" value="31233">weekly summary&nbsp;&nbsp;(170)</option>
    <option class="level-0" value="602">welivesecurity&nbsp;&nbsp;(1,036)</option>
    <option class="level-0" value="31068">Windows Incident Response&nbsp;&nbsp;(202)</option>
    <option class="level-0" value="603">Windows Incident Response infosec&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="31639">Windows Security&nbsp;&nbsp;(27)</option>
    <option class="level-0" value="31791">Windows Security blog&nbsp;&nbsp;(38)</option>
    <option class="level-0" value="604">wired&nbsp;&nbsp;(511)</option>
    <option class="level-0" value="30987">WIRED » WIRED&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="30994">WIRED » » Threat Level » WIRED&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="30928">WIRED » » Threat Level » WIRED infosec&nbsp;&nbsp;(37)</option>
    <option class="level-0" value="32260">Writing and Ramblings&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="34190">www.cisa.gov&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="34183">www.cyberdefensemagazine.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34176">www.cybersecurity-insiders.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34157">www.cysecurity.news&nbsp;&nbsp;(8)</option>
    <option class="level-0" value="34162">www.darkreading.com&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="34193">www.eff.org&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="34163">www.esecurityplanet.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34197">www.ghacks.net&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="34159">www.hackread.com&nbsp;&nbsp;(7)</option>
    <option class="level-0" value="34171">www.helpnetsecurity.com&nbsp;&nbsp;(13)</option>
    <option class="level-0" value="34178">www.infosecurity-magazine.com&nbsp;&nbsp;(972)</option>
    <option class="level-0" value="34187">www.itworldcanada.com&nbsp;&nbsp;(3)</option>
    <option class="level-0" value="34170">www.redpacketsecurity.com&nbsp;&nbsp;(32)</option>
    <option class="level-0" value="34182">www.schneier.com&nbsp;&nbsp;(1)</option>
    <option class="level-0" value="34180">www.silicon.co.uk&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="34169">www.techrepublic.com&nbsp;&nbsp;(2)</option>
    <option class="level-0" value="34172">www.theregister.co.uk&nbsp;&nbsp;(8)</option>
    <option class="level-0" value="34168">www.wired.com&nbsp;&nbsp;(4)</option>
    <option class="level-0" value="34158">www.zdnet.com&nbsp;&nbsp;(6)</option>
    <option class="level-0" value="31076">ZDI: Upcoming Advisories&nbsp;&nbsp;(952)</option>
    <option class="level-0" value="32930">ZDNet.de&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="32917">ZecOps Blog&nbsp;&nbsp;(40)</option>
    <option class="level-0" value="31115">ZenMate Blog | Internet Security and Privacy Reports&nbsp;&nbsp;(8)</option>
    <option class="level-0" value="608">ZenMate Blog | Internet Security and Privacy Reports infosec&nbsp;&nbsp;(12)</option>
    <option class="level-0" value="31462">ZenMate Mind&nbsp;&nbsp;(21)</option>
    <option class="level-0" value="33852">ZephrSec – Adventures In Information Security&nbsp;&nbsp;(8)</option>
    <option class="level-0" value="34223">Zero Day&nbsp;&nbsp;(5)</option>
    <option class="level-0" value="32921">ZeroSec – Adventures In Information Security&nbsp;&nbsp;(47)</option>
    <option class="level-0" value="609">Zscaler Blog infosec&nbsp;&nbsp;(7)</option>
  </select>
</form>

Text Content

Search for:


IT SECURITY NEWS

Cybersecurity news and articles about information security, vulnerabilities,
exploits, hacks, laws, spam, viruses, malware, breaches.
Search for:


MAIN MENU

Skip to content
 * Advertising
 * Sponsors
 * Legal & Contact
   * Contact
   * Privacy Policy
 * Social
   * Social Media
   * Daily summary
   * Apps
   * Telegram Channel
   * Weekly summary

EN, Silicon UK


META DELAYS EU AI LAUNCH AFTER PRIVACY COMPLAINTS

2024-06-17 09:06

Meta delays Europe launch of AI in Europe after user, privacy group complaints
over plans to train models on user data This article has been indexed from
Silicon UK Read the original article: Meta Delays EU AI Launch After Privacy…

Read more →

EN, Security Affairs


ONLINE JOB OFFERS, THE RESHIPPING AND MONEY MULE SCAMS

2024-06-17 09:06

Offers that promise easy earnings can also bring with them a host of scams that
deceive those who are genuinely seeking income opportunities. Often, behind
these enticing offers are pyramid schemes in which profits are generated through
the recruitment of…

Read more →

EN, GBHackers on Security | #1 Globally Trusted Cyber Security News Platform


HACKERS EMPLOYING NEW TECHNIQUES TO ATTACK DOCKER API

2024-06-17 09:06

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting
publicly exposed Docker Engine hosts by using new binaries chkstart (remote
access with payload execution), exeremo (lateral movement through SSH), and
vurld (Go downloader for malware retrieval) and a persistence…

Read more →


EN, SANS Internet Storm Center, InfoCON: green


NEW NETSUPPORT CAMPAIGN DELIVERED THROUGH MSIX PACKAGES, (MON, JUN 17TH)

2024-06-17 08:06

It&&#x23;x26;&#x23;39;s amazing to see how attackers reuse and combine known
techniques to target their victims with new campaigns! Last week, I spotted some
malicious MSIX packages on VT that drop a NetSupport[1] client preconfigured to
phone home to an attacker&&#x23;x26;&#x23;39;s…

Read more →

EN, Silicon UK


AI FUELS LOCAL MEMORY CHIP DEMAND FOR CHINA’S SANCTIONED YMTC

2024-06-17 08:06

China chipmaker YMTC sees surge in demand from local companies, government
projects amidst AI infrastructure boom, in spite of US sanctions This article
has been indexed from Silicon UK Read the original article: AI Fuels Local
Memory Chip Demand For…

Read more →

EN, GBHackers on Security | #1 Globally Trusted Cyber Security News Platform


HIDDEN BACKDOOR IN D-LINK ROUTERS LET ATTACKER LOGIN AS ADMIN

2024-06-17 08:06

A critical vulnerability has been discovered in several models of D-Link
wireless routers, allowing unauthenticated attackers to gain administrative
access to the devices. The CVE-2024-6045 vulnerability has a CVSS score of 8.8,
indicating a high severity level. CVE-2024-6045 – Vulnerability…

Read more →

EN, Malwarebytes


A WEEK IN SECURITY (JUNE 10 – JUNE 16)

2024-06-17 08:06

A list of topics we covered in the week of June 10 to June 16 of 2024 This
article has been indexed from Malwarebytes Read the original article: A week in
security (June 10 – June 16)

Read more →

EN, Security Latest


AMAZON-POWERED AI CAMERAS USED TO DETECT EMOTIONS OF UNWITTING UK TRAIN
PASSENGERS

2024-06-17 08:06

CCTV cameras and AI are being combined to monitor crowds, detect bike thefts,
and spot trespassers. This article has been indexed from Security Latest Read
the original article: Amazon-Powered AI Cameras Used to Detect Emotions of
Unwitting UK Train Passengers

Read more →

Security


EXPLORING THE THREE TYPES OF WEB DEVELOPMENT

2024-06-17 08:06

As a business owner, understanding the different types of web
development—back-end, front-end, and full-stack—is essential for making informed
decisions about your online presence. Each type plays a distinct role in shaping
your website’s functionality, usability, and aesthetics, ultimately influencing
the…

Read more →

EN, Have I Been Pwned latest breaches


ZADIG & VOLTAIRE – 586,895 BREACHED ACCOUNTS

2024-06-17 08:06

In June 2024, a data brach sourced from French fashion brand Zadig & Voltaire
was publicly posted to a popular hacking forum. The data included names, email
and physical addresses, phone numbers and genders. When contacted about the
incident, Zadig…

Read more →

EN, The Register - Security


NOTORIOUS CYBER GANG UNC3944 ATTACKS VSPHERE AND AZURE TO RUN VMS INSIDE
VICTIMS’ INFRASTRUCTURE

2024-06-17 08:06

Who needs ransomware when you can scare techies into coughing up their
credentials? Notorious cyber gang UNC3944 – the crew suspected of involvement in
the recent attacks on Snowflake and MGM Entertainment, and plenty more besides –
has changed its…

Read more →

EN, The Hacker News


HACKERS EXPLOIT LEGITIMATE WEBSITES TO DELIVER BADSPACE WINDOWS BACKDOOR

2024-06-17 08:06

Legitimate-but-compromised websites are being used as a conduit to deliver a
Windows backdoor dubbed BadSpace under the guise of fake browser updates. “The
threat actor employs a multi-stage attack chain involving an infected website, a
command-and-control (C2) server, in some…

Read more →

Page 1 of 18444
1 2 3 … 18,444 »


SOCIAL MEDIA

10.4K 8K 100+ 500+

IT Security News Intl. (EN, DE)


TOP POSTS

 * LockBit claims cyberattack on India’s national aerospace lab
 * IT Security News Daily Summary 2023-11-28
 * Hackers Can Exploit 'Forced Authentication' to Steal Windows NTLM Tokens
 * Okta Discloses Broader Impact Linked to October 2023 Support System Breach
 * Exploiting Wi-Fi Stack on Tesla Model S
 * Google fixes Chrome zero day exploited in the wild (CVE-2023-6345)
 * Data Breach Threat: Hackers Target TransUnion and Experian, Demand R1.1
   Billion Ransom
 * Ransomware attack on Law Firm can halt its M&A
 * IT Security News Daily Summary 2023-11-29
 * Hunters Security: Google Workspace Vulnerable to Takeover Due to Domain-Wide
   Delegation Flaw


DAILY SUMMARY

Enter your email address:



GDPR compliance


CATEGORIES

Categories Select Category $~ lloydlabs  (2) (ISC)2 Blog  (323) (ISC)2 Blog
infosec  (13) (ISC)² Blog  (800) 2020-12-08 – Files for an ISC diary (recent
Qakbot activity)  (1) 2020-12-11 – Quick post: TA551 (Shathak) pushes
IcedID  (2) 2020-12-14 – Quick post: Hancitor infection with Cobalt Strike and
Ficker Stealer  (1) 2021-08-10 – Pcap and malware for ISC diary (TA551 ->
BazarLoader -> Cobalt Strike)  (2) 2021-08-19 – Traffic Analysis Exercise –
Funkylizards  (3) 2021-08-30 – Quick post: TA551 (Shathak) BazarLoader  (3)
2021-09-02 – Hancitor with Cobalt Strike  (1) A Journey in Security  (5) A
Journey through Security  (143) A WordPress Site  (1) Adobe Product Security
Incident Response Team (PSIRT) Blog  (141) Adobe Product Security Incident
Response Team (PSIRT) Blog infosec  (5) Advanced Persistent Security  (70) All
Articles and Blogs  (912) All Blog Listing  (20) All CISA Advisories  (377)
americansecuritytoday.com  (2) Arbor Networks Threat Intelligence  (48) Arbor
Threat Intelligence  (49) Arbor Threat Intelligence infosec  (4) Ars
Technica  (1,374) Ars Technica » Risk Assessment infosec  (31) Articles at
ComputerworldUK infosec  (3) AWS Security Blog  (5) BankInfoSecurity.com RSS
Syndication  (40) Bitsight  (10) BitSight Security Ratings Blog  (401) BitSight
Security Ratings Blog infosec  (19) BleepingComputer  (3,766) Blog  (710) Blog –
crowdstrike.com  (35) Blog – Wordfence  (75) Blog RSS Feed  (415) Blog | Avast
EN  (803) Blog | Imperva  (232) Blog – crowdstrike.com  (80) Blog – Stealthbits
Technologies  (3) blog.avast.com EN  (597) blog.checkpoint.com  (1)
blog.malwarebytes.com  (3) Blogs List with categories – CipherCloud  (13)
BreachAlarm Data Security Blog  (66) BreachAlarm Data Security Blog
infosec  (11) Breaking Malware  (220) BrightPlanet  (223) BrightPlanet
infosec  (7) Bulletins  (60) Carbon Black  (190) Carnal0wnage & Attack Research
Blog  (59) CASB Vendors | Cloud Security Companies | CipherCloud  (2) CC
2017  (14) Center for Internet Security Blog  (33) Center for Internet Security
Blog infosec  (1) CERT Recently Published Vulnerability Notes infosec  (5) Check
Point Blog  (443) Check Point Software  (864) Check Point Software Blog  (59)
CHMag News Apps  (1,152) CHMag News Apps infosec  (580) CipherCloud  (81)
CipherCloud infosec  (3) CipherCloud | CASB+ Platform | Enterprise Cloud
Security  (2) CircleID: Cyberattack  (73) CircleID: Cybercrime  (240) CircleID:
Malware  (7) CISA All NCAS Products  (1,939) CISA Blog  (69) CISA Bulletins  (2)
CISA News  (56) CISA TIPS feed  (2) Cisco Blog » Security infosec  (14) Cisco
Blogs  (714) Cisco Talos Blog  (108) Cisco Umbrella Blog  (10) CISO
Collective  (17) CISO Series  (74) Confiant – Medium  (45) Corporate
Blog  (2,196) Corporate Blog infosec  (28) CSO Online  (2,386)
CUInfoSecurity.com RSS Syndication  (76) Cyber Defense Magazine  (1,533) Cyber
Defense Magazine infosec  (33) Cyber Secure Car  (1) Cyber Security Archives –
American Security Today  (179) Cyber Security Buzz  (237) Cyber Security
News  (2) Cyber Security Review  (79) Cyber Security – American Security
Today  (310) Cyber Security – Computer Business Review  (400) Cyber Trust Blog
infosec  (1) Cyber Trust Blog » Cloud Computing  (2) Cyber Trust Blog » Cloud
Computing infosec  (3) Cyber Trust Blog » Cybersecurity  (2) Cyber Trust Blog »
Cybersecurity infosec  (7) CyberCrime & Doing Time  (73) Cybercrime –
WeLiveSecurity  (41) Cybereason  (51) Cybersecurity  (1,528) Cybersecurity Blog
| CrowdStrike  (29) Cybersecurity infosec  (13) Cybersecurity Insiders  (9,269)
Cybersecurity News, Insights and Analysis | SecurityWeek  (65) Cybersecurity
News: Get the Latest Trends & Threats | Cisco Umbrella  (35) Cybersecurity
Today  (32) Cybersecurity – Cyber Trust Blog  (1) Cylance Blog  (215) Cyphort
infosec  (1) CYREN Blog RSS Feed  (54) CYREN Blog RSS Feed infosec  (4)
CySecurity News – Latest Information Security and Hacking Incidents  (4,764)
Cyveillance Blog – The Cyber Intelligence Blog infosec  (8) Cyveillance Blog –
The Cyber Intelligence Blog  (13) Cyveillance Blog – The Cyber Intelligence Blog
infosec  (19) Cyware News – Latest Cyber News  (430) daily summary  (1,305) Dark
Reading  (5,620) Dark Reading:  (4,723) Darkmatters infosec  (19) Darknet  (35)
Darknet – The Darkside infosec  (2) Darknet – Hacking Tools, Hacker News & Cyber
Security  (7) Darknet – The Darkside  (241) Darknet – The Darkside infosec  (13)
data-protection.safenet-inc.com  (1) DataBreachToday.com RSS Syndication  (49)
DDoS Attack Protection  (16) Deeplinks  (1,990) Deeplinks infosec  (181) Defense
Systems: All Articles  (457) Digital Guardian  (932) Digital Guardian
infosec  (50) DoublePulsar – Medium  (18) Duo Security Bulletin  (149) Duo
Security Bulletin infosec  (24) DZone Security Zone  (2,141) E Hacking News –
Latest Hacker News and IT Security News  (2,948) E Hacking News – Latest Hacker
News and IT Security News infosec  (50) EN  (24,113) Endpoint
Cybersecurity  (377) Endpoint Cybersecurity GmbH  (31) Engadget RSS Feed  (26)
English – We Live Security  (88) English – WeLiveSecurity  (112) Enterprise
Mobility + Security  (94) Enterprise Mobility + Security articles  (119) Errata
Security  (59) Errata Security infosec  (16) eSecurity Planet  (196)
esecurityplanet  (680) eSecurityPlanet RSS Feed  (1,094) eSecurityPlanet RSS
Feed infosec  (66) Everyone’s Blog Posts – CISO Platform  (417) F-Secure
Antivirus Research Weblog infosec  (2) Facecrooks  (854) FCW – All
Content  (1,525) FCW: The business of federal technology  (3,641)
feedpress.me  (1) feeds.dzone.com  (5) feeds.feedburner.com  (29)
feeds.fortinet.com  (1) Fortinet Blog  (50) Fortinet Blog infosec  (31) Fortinet
Blog | Latest Posts  (902) Fortinet Industry Trends Blog  (77) Fortinet Threat
Research Blog  (39) Fox-IT International blog  (47) Fox-IT International blog
infosec  (2) GBHackers On Security  (3,009) GBHackers on Security | #1 Globally
Trusted Cyber Security News Platform  (1,059) GBHackers – Latest Cyber Security
News | Hacker News  (889) gbhackers.com  (10) GCN – All Content  (1,776) GCN:
News and Blogs  (2,392) GCN: News, Explainers, Insights  (2,349) GFI Blog  (53)
GFI Blog infosec  (26) Gizmodo  (228) Google Online Security Blog  (230) Google
Online Security Blog infosec  (7) googleonlinesecurity.blogspot.com  (1)
GuardiCore – Data Center and Cloud Security  (3) guest  (1) Hacker Combat  (178)
Hackers Online Club  (54) Hackers Online Club (HOC)  (77)
hackersonlineclub.com  (1) Hacking News — ScienceDaily  (139) Hacking News —
ScienceDaily infosec  (16) HACKMAGEDDON  (229) HACKMAGEDDON infosec  (9)
HackRead  (1,212) HackRead | Latest Cyber Crime – InfoSec- Tech – Hacking
News  (756) HackRead | Latest Cybersecurity and Hacking News Site  (520)
Hackread – Latest Cybersecurity News, Press Releases & Technology Today  (431)
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News  (424) Have I Been
Pwned latest breaches  (388) Have I been pwned? latest breaches  (239) Have I
been pwned? latest breaches infosec  (13) HEAT Security Blog  (19) HEAT Security
Blog infosec  (5) Heimdal Security Blog  (3,689) Heimdal Security Blog
infosec  (18) Help Net Security  (17,798) Help Net Security infosec  (350)
HelpSystems Blog  (156) HITBSecNews – Keeping Knowledge Free for Over a
Decade  (1,461) HITBSecNews – Keeping Knowledge Free for Over a Decade
infosec  (311) HolisticInfoSec  (28) HolisticInfoSec infosec  (2)
HolisticInfoSec™  (62) HOTforSecurity » Industry News infosec  (23)
http://blog.idwatchdog.com/index.php/feed/  (47)
http://blogs.cisco.com/rss/security/  (213) http://blogs.rsa.com/feed/  (106)
http://facecrooks.com/feed/  (496)
http://feeds.arstechnica.com/arstechnica/security  (300)
http://feeds.feedburner.com/darknethackers  (225)
http://feeds.feedburner.com/Imperviews  (190)
http://feeds.feedburner.com/TalkTechToMe-All  (69)
http://feeds.trendmicro.com/Anti-MalwareBlog/  (207)
http://holisticinfosec.blogspot.com/feeds/posts/default  (36)
http://news.netcraft.com/feed  (77)
http://news.softpedia.com/newsRSS/Security-5.xml  (883)
http://packetstormsecurity.org/headlines.xml  (600)
http://rss.juniper.net/f/100001s481stb5hvl0q.rss  (35)
http://securityblog.redhat.com/feed/  (43)
http://venturebeat.com/category/security/feed/  (15)
http://welivesecurity.com/feed/rss  (22) http://www.ciphercloud.com/feed/  (1)
http://www.eff.org/rss/updates.xml  (622)
http://www.europol.europa.eu/rss_news_feed  (228)
http://www.hotforsecurity.com/blog/category/industry-news/feed  (348)
http://www.informationsecuritybuzz.com/feed/  (314)
http://www.infosecurity-magazine.com/rss/news/76/application-security/  (6,618)
http://www.intezer.com/feed/  (105) http://www.lawfareblog.com/rss.xml  (1,168)
http://www.secmaniac.com/feed/  (16)
http://www.techweekeurope.co.uk/category/security/feed  (27)
https://americansecuritytoday.com/category/itsecurity/cybersecurity/feed  (15)
https://blog.css-security.com/blog/rss.xml  (121)
https://blog.syscall.party/feed  (4)
https://blogs.technet.microsoft.com/msrc/feed  (52)
https://hackercombat.com/feed/  (204)
https://www.crowdstrike.com/blog/feed  (206)
https://www.cyberdefensemagazine.com/feed/  (1)
https://www.europol.europa.eu/rss.xml  (254)
https://www.hackread.com/feed/  (617)
https://www.ipswitch.com/blog/security/feed/  (6) IEEE Cybersecurity  (12)
Imperva Cyber Security Blog  (1) Imperva Cyber Security Blog infosec  (18)
Improve Your Security  (23) Industry News – HOTforSecurity  (1,147) Industry
News – HOTforSecurity infosec  (26) Info Security News  (551) Info Security News
infosec  (26) InfoCON: green infosec  (64) InfoRiskToday.com RSS
Syndication  (229) Information Security Buzz  (3,324) Information Security Buzz
infosec  (247) Information Security infosec  (1) infosec  (314) InfoSec
Institute infosec  (16) Infosec Island Latest Articles  (163) Infosec Island
Latest Articles infosec  (21) InfoSec News  (45) InfoSec Resources  (929)
InfoSec Resources infosec  (35) InfoWorld Security  (300) Insider Threat
Security Blog  (222) Intezer  (410) Invincea Endpoint Security Blog –
Invincea  (7) Irongeek’s Security Site  (24) Irongeek’s Security Site
infosec  (5) ISACA Now: Posts infosec  (4) iSIGHT Partners  (247) iSIGHT
Partners infosec  (6) IT Security – The IT Security Industry’s Web
Resource  (141) IT Security Expert Blog  (181) IT SECURITY GURU  (3,073) IT
Security Guru infosec  (294) IT World Canada  (378) ITsecurity  (201) ITsecurity
infosec  (44) itsecurityguru.org  (4) ITSecurityPortal.com  (1,830) Keen
Security Lab Blog  (123) Kevin Townsend  (212) Krebs on Security  (550) Krebs on
Security infosec  (31) krebsonsecurity.com  (2) Labs Archiv – SentinelOne
DE  (1) Latest articles from SC Magazine News  (12) Latest articles from SC
Magazine News infosec  (121) Latest Blogs Posts from ComputerworldUK  (11)
Latest Hacking News  (2,886) Latest Hacking News | Cyber Security News, Hacking
Tools and Penetration Testing Courses  (677) Latest news and stories from
BleepingComputer.com  (3,085) Latest Secunia Blog Entries  (1,916) Latest
Security Advisories  (21) Latest stories for ZDNet in Security  (1,361) Latest
topics for ZDNet in Security  (9,535) Latest topics for ZDNet in Security
infosec  (336) latesthackingnews.com  (2) Lawfare  (2,023) Lawfare
infosec  (255) Lifehacker  (528) LinuxSecurity.com  (9) LinuxSecurity.com –
Hybrid RSS  (1,141) LinuxSecurity.com – Security Advisories  (763) Liquidmatrix
Security Digest  (130) Liquidmatrix Security Digest infosec  (7) MacRumors: Mac
News and Rumors – Front Page  (11,159) Malcovery Security Blog  (234) Malware
don’t need Coffee  (64) Malware don’t need Coffee infosec  (1)
malware-traffic-analysis.net  (1) Malware-Traffic-Analysis.net – Blog
Entries  (450) Malwarebytes  (291) Malwarebytes Labs  (2,318) Malwarebytes Labs
infosec  (22) MalwareTech  (14) MalwareTech infosec  (2) Mashable  (27) McAfee
Blog  (245) McAfee Blogs  (673) McAfee Labs | McAfee Blogs  (19) McAfee Labs –
McAfee Blog  (5) McAfee Labs – McAfee Blogs  (59) Metasploit  (167) Metasploit
infosec  (28) Microsoft Azure Blog > Security  (209) Microsoft Malware
Protection Center Blog  (14) Microsoft Malware Protection Center infosec  (7)
Microsoft Secure  (21) Microsoft Security  (497) Microsoft Security Baselines
Blog articles  (12) Microsoft Security Blog  (1,069) Microsoft Security
Bulletins  (133) Microsoft Security Bulletins infosec  (30) Microsoft Security
Content: Comprehensive Edition  (182) Microsoft Security Content: Comprehensive
Edition infosec  (16) Microsoft Security Guidance blog  (13) Microsoft Security
Response Center  (222) Microsoft Security Response Center infosec  (8) Minded
Security Blog  (58) Minded Security Blog infosec  (1) Mocana ON Blog
infosec  (5) monthly summary  (34) MSRC  (6) MSRC infosec  (2)
msrc.microsoft.com  (1) Naked Security  (6) Naked Security – Sophos  (2,601)
Naked Security – Sophos infosec  (186) NetApp Blog  (825) Netcraft  (40)
Netcraft News  (138) Network Security Blog  (179) Network Security Blog
infosec  (3) News  (1) News from the Lab  (273) News infosec  (12) News
Items  (22) News Items infosec  (6) News ≈ Packet Storm  (4,380) News ≈ Packet
Storm infosec  (199) Newsroom  (321) NorseCorp  (932) OEM Hub | Insights into
Antivirus Technology Licensing  (1,772) Offensive Security  (176) Offensive
Security – Offensive Security infosec  (1) Offensive Security infosec  (2)
Official Google Blog  (32) OffSec  (80) OpenDNS Blog infosec  (5) OpenDNS
Security Labs infosec  (3) OpenDNS Umbrella Blog  (78) OpenSSL Blog  (29)
Optimal Security infosec  (13) packetstormsecurity.org  (5) Palo Alto Networks
Blog  (581) Palo Alto Networks Blog infosec  (55) Panda Security
Mediacenter  (730) Perception Point  (144) PKI Blog  (94) Power More  (6)
Project Zero  (11) PSIRT Blog  (3) rdist  (1) Recorded Future  (665) Recorded
Future infosec  (16) Red Hat Security  (227) Red Hat Security Blog Blog
Posts  (150) Red Hat Security infosec  (2) RedPacket Security  (607) Risk
Assessment – Ars Technica  (754) Risk Assessment – Ars Technica infosec  (52)
safebreach.com – Main Channel  (51) SANS Information Security Reading
Room  (527) SANS Information Security Reading Room infosec  (46) SANS Internet
Storm Center  (64) SANS Internet Storm Center, InfoCON: green  (1,176) SANS
Internet Storm Center, InfoCON: yellow  (7) SANS ISC InfoSec News Feed  (1,819)
SANS NewsBites  (429) SANS NewsBites infosec  (191) SANS Penetration
Testing  (230) SANS Penetration Testing infosec  (1) Schneier on
Security  (1,105) Schneier on Security infosec  (53) Scott Helme  (160)
SearchSecurity  (2,808) SearchSecurity.techtarget.com  (5) SearchSecurity: RSS
Feed  (495) SearchSecurity: Security Wire Daily News  (887) SearchSecurity:
Security Wire Daily News infosec  (37) Secunia Research: Research, opinions and
views from our Vulnerability Research experts  (3) Securelist  (537) Securelist
– Information about Viruses, Hackers and Spam  (544) Securelist – Kaspersky
Lab’s cyberthreat research and reports  (91) Security  (892) Security – Cisco
Blogs  (176) Security @ Cisco Blogs  (5) Security Affairs  (6,825) Security
Affairs infosec  (235) Security Blog G Data Software AG  (127) Security Blog G
Data Software AG infosec  (1) Security Bloggers Network  (2,260) Security
Bloggers Network infosec  (697) Security Boulevard  (9,357) Security
Intelligence  (1,457) Security Latest  (2,103) Security News | TechCrunch  (542)
Security News | VentureBeat  (1,084) Security on TechRepublic  (2,926) Security
on TechRepublic infosec  (43) Security Research & Defense  (33) Security
Resources and Information from TechTarget  (963) Security Software news and
updates  (318) Security Watch  (2,137) Security Watch infosec  (9) Security
Zap  (246) Security Zap infosec  (31) Security | Azure Blog | Microsoft
Azure  (2) Security | TechCrunch  (103) Security | TechRepublic  (1,438)
security – Ars Technica  (147) Security – Cisco Blog  (1,225) Security – Cisco
Blog infosec  (20) Security – Cisco Blogs  (684) Security – gHacks Technology
News  (36) Security – Ipswitch Blog  (117) Security – Re/code  (46) Security –
Re/code infosec  (68) Security – Silicon UK  (163) Security –
VentureBeat  (2,725) securityaffairs.co  (6) securityboulevard.com  (20)
SecurityFocus Vulnerabilities  (468) SecurityFocus Vulnerabilities
infosec  (316) SecurityRecruiter.com’s Security Recruiter Blog  (19)
securityweek  (26) SecurityWeek RSS Feed  (10,189) SecurityWeek RSS Feed
infosec  (329) securityzap.com  (2) Sekoia.io Blog  (43) SentinelLabs – We are
hunters, reversers, exploit developers, and tinkerers shedding light on the
world of malware, exploits, APTs, and cybercrime across all platforms.  (10)
SentinelOne  (318) Services  (400) Shell is Only the Beginning  (9) Shell is
Only the Beginning infosec  (2) Silicon UK  (6,644) Silicon UK »
Security  (1,033) Slashdot  (25) Softpedia News / Security  (417) Software
Security Archives – Software Curated  (53) Software Security – Software
Curated  (238) Sorin Mustaca on Cyber Security infosec  (18) Sorin Mustaca on
Cybersecurity  (97) Sorin Mustaca on Security infosec  (3) Speaking of Security
– The RSA Blog and Podcast infosec  (18) Speaking of Security – The RSA
Blog  (202) Speaking of Security – The RSA Blog and Podcast  (142) Speaking of
Security – The RSA Blog and Podcast infosec  (34) sponsored  (1) StopBadware
blogs  (186) StopBadware blogs infosec  (1) Sucuri Blog  (201) Tech  (358)
TechCrunch  (740) techcrunch.com  (6) Technical Blog  (18) TechSpective
infosec  (24) TechWeekEurope UK  (983) TechWeekEurope UK infosec  (358)
TechWeekEurope UK » Security  (235) Thales CPL Blog Feed  (92) The Art of Data
Protection  (8) The Art of Data Protection infosec  (14) The AVIEN Blog  (98)
The DFIR Report  (12) The Duo Blog  (453) The first stop for security news |
Threatpost  (425) The Hacker News  (5,657) The Hacker News – Cybersecurity News
and Analysis  (3) The Hacker News – Most Trusted Cyber Security and Computer
Security Analysis  (37) The Hacker News infosec  (141) The Insider Threat
Security Blog  (2) The Invisible Things Lab’s blog  (199) The Mac Security
Blog  (472) The Official Blog from Kaspersky Lab infosec  (28) The Official
Google Blog  (1,127) The PhishLabs Blog  (179) The PhishLabs Blog infosec  (5)
the register  (16,478) The Register – Security  (6,159) The Register – Security
infosec  (450) The Register infosec  (1,803) The Social Media Security
Podcast  (187) The Spamhaus Project News  (33) The State of Security  (1,924)
The State of Security infosec  (159) The Watchblog — ID Watchdog  (150) The
Watchblog — ID Watchdog infosec  (10) ThinkGeek – What’s New  (1,659) Threat
Intelligence  (7) Threat Intelligence Times  (111) Threat Intelligence Times
infosec  (4) Threat Research  (334) Threat Research Blog  (12) Threat Research
Blog infosec  (5) Threat Research infosec  (11) Threat Watch  (362) Threat Watch
– Binary Defense  (1,011) threatpost  (4,022) Threatpost | The first stop for
security news  (185) Threatpost | The first stop for security news
infosec  (169) Threatpost – English – Global – threatpost.com  (2) ThreatTrack
Security Labs Blog  (215) ThreatTrack Security Labs Blog infosec  (1) Trend
Micro Research, News and Perspectives  (595) Trend Micro Simply Security  (406)
TrendLabs Security Intelligence Blog  (512) TrendLabs Security Intelligence Blog
infosec  (35) Troy Hunt  (3) Troy Hunt’s Blog  (452) Troy Hunt’s Blog
infosec  (9) TrustedSec – Information Security infosec  (6) TrustedSec –
Information Security  (54) TrustedSec – Information Security infosec  (7)
Trustwave Blog  (288) Uncategorized  (11) Unit 42  (54) US – Research, News, and
Perspectives  (4) US-CERT Current Activity  (671) US-CERT Current Activity
infosec  (44) US-CERT Tips  (82) US-CERT: The United States Computer Emergency
Readiness Team  (464) Venafi Blog  (6) Venafi Blog infosec  (5)
venturebeat.com  (2) Virus Bulletin blog infosec  (12) Virus Bulletin’s
blog  (161) Virus Bulletin’s blog infosec  (14) VirusTotal Blog  (143) VMware
Carbon Black  (217) We Live Security  (4) We Live Security » Languages »
English  (119) We Live Security » Languages » English infosec  (96) Webroot
Blog  (227) Webroot Threat Blog  (337) Webroot Threat Blog infosec  (19) weekly
summary  (170) welivesecurity  (1,036) Windows Incident Response  (202) Windows
Incident Response infosec  (4) Windows Security  (27) Windows Security
blog  (38) wired  (511) WIRED » WIRED  (3) WIRED » » Threat Level » WIRED  (3)
WIRED » » Threat Level » WIRED infosec  (37) Writing and Ramblings  (1)
www.cisa.gov  (6) www.cyberdefensemagazine.com  (2)
www.cybersecurity-insiders.com  (2) www.cysecurity.news  (8)
www.darkreading.com  (13) www.eff.org  (1) www.esecurityplanet.com  (2)
www.ghacks.net  (1) www.hackread.com  (7) www.helpnetsecurity.com  (13)
www.infosecurity-magazine.com  (972) www.itworldcanada.com  (3)
www.redpacketsecurity.com  (32) www.schneier.com  (1) www.silicon.co.uk  (6)
www.techrepublic.com  (2) www.theregister.co.uk  (8) www.wired.com  (4)
www.zdnet.com  (6) ZDI: Upcoming Advisories  (952) ZDNet.de  (5) ZecOps
Blog  (40) ZenMate Blog | Internet Security and Privacy Reports  (8) ZenMate
Blog | Internet Security and Privacy Reports infosec  (12) ZenMate Mind  (21)
ZephrSec – Adventures In Information Security  (8) Zero Day  (5) ZeroSec –
Adventures In Information Security  (47) Zscaler Blog infosec  (7)


PAGES

 * Advertising
 * Contact
 * Legal & Contact
 * Privacy Policy
 * Social Media
   * Apps
   * Telegram Channel
 * Sponsors
   * Endpoint Cybersecurity

Log in

Copyright © 2024 IT Security News. All Rights Reserved. The Magazine Basic Theme
by bavotasan.com.




ITSECURITYNEWS.INFO ASKS FOR YOUR CONSENT TO USE YOUR PERSONAL DATA TO:

 * perm_identity
   Personalised advertising and content, advertising and content measurement,
   audience research and services development
 * devices
   Store and/or access information on a device

expand_moreremove
Learn more
 * 
   How can I change my choice?
 * 
   What if I don't consent?
 * 
   How does legitimate interest work?
 * 
   Do I have to consent to everything?

Your personal data will be processed and information from your device (cookies,
unique identifiers, and other device data) may be stored by, accessed by and
shared with 136 TCF vendor(s) and 62 ad partner(s), or used specifically by this
site or app.

Some vendors may process your personal data on the basis of legitimate interest,
which you can object to by managing your options below. Look for a link at the
bottom of this page to manage or withdraw consent in privacy and cookie
settings.

Consent



Manage options

arrow_back

Data preferences


MANAGE YOUR DATA

You can choose how your personal data is used. Vendors want your permission to
do the following:

TCF vendors

help_outline


STORE AND/OR ACCESS INFORMATION ON A DEVICE

Cookies, device or similar online identifiers (e.g. login-based identifiers,
randomly assigned identifiers, network based identifiers) together with other
information (e.g. browser type and information, language, screen size, supported
technologies etc.) can be stored or read on your device to recognise it each
time it connects to an app or to a website, for one or several of the purposes
presented here.

View details
Consent (118 vendors)


USE LIMITED DATA TO SELECT ADVERTISING

Advertising presented to you on this service can be based on limited data, such
as the website or app you are using, your non-precise location, your device type
or which content you are (or have been) interacting with (for example, to limit
the number of times an ad is presented to you).

View details
Consent (71 vendors)Legitimate interest (31 vendors)help_outline


CREATE PROFILES FOR PERSONALISED ADVERTISING

Information about your activity on this service (such as forms you submit,
content you look at) can be stored and combined with other information about you
(for example, information from your previous activity on this service and other
websites or apps) or similar users. This is then used to build or improve a
profile about you (that might include possible interests and personal aspects).
Your profile can be used (also later) to present advertising that appears more
relevant based on your possible interests by this and other entities.

View details
Consent (95 vendors)


USE PROFILES TO SELECT PERSONALISED ADVERTISING

Advertising presented to you on this service can be based on your advertising
profiles, which can reflect your activity on this service or other websites or
apps (like the forms you submit, content you look at), possible interests and
personal aspects.

View details
Consent (91 vendors)


CREATE PROFILES TO PERSONALISE CONTENT

Information about your activity on this service (for instance, forms you submit,
non-advertising content you look at) can be stored and combined with other
information about you (such as your previous activity on this service or other
websites or apps) or similar users. This is then used to build or improve a
profile about you (which might for example include possible interests and
personal aspects). Your profile can be used (also later) to present content that
appears more relevant based on your possible interests, such as by adapting the
order in which content is shown to you, so that it is even easier for you to
find content that matches your interests.

View details
Consent (29 vendors)


USE PROFILES TO SELECT PERSONALISED CONTENT

Content presented to you on this service can be based on your content
personalisation profiles, which can reflect your activity on this or other
services (for instance, the forms you submit, content you look at), possible
interests and personal aspects. This can for example be used to adapt the order
in which content is shown to you, so that it is even easier for you to find
(non-advertising) content that matches your interests.

View details
Consent (24 vendors)


MEASURE ADVERTISING PERFORMANCE

Information regarding which advertising is presented to you and how you interact
with it can be used to determine how well an advert has worked for you or other
users and whether the goals of the advertising were reached. For instance,
whether you saw an ad, whether you clicked on it, whether it led you to buy a
product or visit a website, etc. This is very helpful to understand the
relevance of advertising campaigns.

View details
Consent (77 vendors)Legitimate interest (46 vendors)help_outline


MEASURE CONTENT PERFORMANCE

Information regarding which content is presented to you and how you interact
with it can be used to determine whether the (non-advertising) content e.g.
reached its intended audience and matched your interests. For instance, whether
you read an article, watch a video, listen to a podcast or look at a product
description, how long you spent on this service and the web pages you visit etc.
This is very helpful to understand the relevance of (non-advertising) content
that is shown to you.

View details
Consent (31 vendors)Legitimate interest (14 vendors)help_outline


UNDERSTAND AUDIENCES THROUGH STATISTICS OR COMBINATIONS OF DATA FROM DIFFERENT
SOURCES

Reports can be generated based on the combination of data sets (like user
profiles, statistics, market research, analytics data) regarding your
interactions and those of other users with advertising or (non-advertising)
content to identify common characteristics (for instance, to determine which
target audiences are more receptive to an ad campaign or to certain contents).

View details
Consent (57 vendors)Legitimate interest (21 vendors)help_outline


DEVELOP AND IMPROVE SERVICES

Information about your activity on this service, such as your interaction with
ads or content, can be very helpful to improve products and services and to
build new products and services based on user interactions, the type of
audience, etc. This specific purpose does not include the development or
improvement of user profiles and identifiers.

View details
Consent (65 vendors)Legitimate interest (38 vendors)help_outline


USE LIMITED DATA TO SELECT CONTENT

Content presented to you on this service can be based on limited data, such as
the website or app you are using, your non-precise location, your device type,
or which content you are (or have been) interacting with (for example, to limit
the number of times a video or an article is presented to you).

View details
Consent (10 vendors)Legitimate interest (2 vendors)help_outline


ENSURE SECURITY, PREVENT AND DETECT FRAUD, AND FIX ERRORS

help_outline

Your data can be used to monitor for and prevent unusual and possibly fraudulent
activity (for example, regarding advertising, ad clicks by bots), and ensure
systems and processes work properly and securely. It can also be used to correct
any problems you, the publisher or the advertiser may encounter in the delivery
of content and ads and in your interaction with them.

View details


DELIVER AND PRESENT ADVERTISING AND CONTENT

help_outline

Certain information (like an IP address or device capabilities) is used to
ensure the technical compatibility of the content or advertising, and to
facilitate the transmission of the content or ad to your device.

View details


MATCH AND COMBINE DATA FROM OTHER DATA SOURCES

help_outline

Information about your activity on this service may be matched and combined with
other information relating to you and originating from various sources (for
instance your activity on a separate online service, your use of a loyalty card
in-store, or your answers to a survey), in support of the purposes explained in
this notice.

View details


LINK DIFFERENT DEVICES

help_outline

In support of the purposes explained in this notice, your device might be
considered as likely linked to other devices that belong to you or your
household (for instance because you are logged in to the same service on both
your phone and your computer, or because you may use the same Internet
connection on both devices).

View details


IDENTIFY DEVICES BASED ON INFORMATION TRANSMITTED AUTOMATICALLY

help_outline

Your device might be distinguished from other devices based on information it
automatically sends when accessing the Internet (for instance, the IP address of
your Internet connection or the type of browser you are using) in support of the
purposes exposed in this notice.

View details


USE PRECISE GEOLOCATION DATA

With your acceptance, your precise location (within a radius of less than 500
metres) may be used in support of the purposes explained in this notice.

View details
Consent

Vendor preferences

Accept all



Confirm choices

arrow_back

Vendor preferences


CONFIRM OUR VENDORS

Vendors can use your data to provide services. Declining a vendor can stop them
from using the data you shared.

TCF vendors

help_outline


EXPONENTIAL INTERACTIVE, INC D/B/A VDX.TV

Cookie duration: 90 (days).

Data collected and processed: Non-precise location data, IP addresses,
Probabilistic identifiers, Users’ profiles, Privacy choices, Browsing and
interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ROQ.AD GMBH

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Precise location data, Privacy choices, Browsing and interaction
data, Device identifiers

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


INDEX EXCHANGE INC.

Cookie duration: 395 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Precise location data, Privacy choices, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


QUANTCAST

Cookie duration: 396 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BEESWAXIO CORPORATION

Cookie duration: 395 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Precise location data, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


SOVRN, INC.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Users’ profiles, Privacy choices, Browsing and interaction data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


ADIKTEEV

Doesn't use cookies.

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


RTB HOUSE S.A.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Users’ profiles, Privacy choices, Browsing and interaction data,
Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


THE UK TRADE DESK LTD

Cookie duration: 3629 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADMETRICS GMBH

Doesn't use cookies.

Data collected and processed: Device characteristics, IP addresses, Privacy
choices, Browsing and interaction data

more




View details | Privacy policylaunch
Consent


NEXXEN INC.

Cookie duration: 180 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


EPSILON

Cookie duration: 184 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


YAHOO EMEA LIMITED

Cookie duration: 397 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ADVENTORI SAS

Cookie duration: 90 (days).

Data collected and processed: Non-precise location data, IP addresses,
Probabilistic identifiers, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


TRIPLELIFT, INC.

Cookie duration: 90 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Precise location data, Privacy choices, Browsing and interaction data, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


XANDR, INC.

Cookie duration: 90 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Precise location data, Privacy choices, Browsing and interaction data, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEORY GMBH

Cookie duration: 90 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


NEXXEN GROUP LLC

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Privacy choices,
Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEURAL.ONE

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Privacy choices, Browsing and
interaction data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADITION (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ACTIVE AGENT (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


TABOOLA EUROPE LIMITED

Cookie duration: 366 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


EQUATIV

Cookie duration: 396 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADFORM A/S

Cookie duration: 3650 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAGNITE, INC.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Precise location data, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


RATEGAIN ADARA INC

Cookie duration: 730 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more




View details | Storage details | Privacy policylaunch
Consent


SIFT MEDIA, INC

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Precise location data, Device identifiers

more




View details | Privacy policylaunch
Consent


RAKUTEN MARKETING LLC

Cookie duration: 730 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LUMEN RESEARCH LIMITED

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Browsing and interaction data

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


AMAZON AD SERVER

Cookie duration: 396 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


OPENX

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


YIELDLAB (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ROKU ADVERTISING SERVICES

Cookie duration: 396 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NANO INTERACTIVE GROUP LTD.

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
Browsing and interaction data

more




View details | Privacy policylaunch
Consent


SIMPLIFI HOLDINGS LLC

Cookie duration: 366 (days).

Data collected and processed: IP addresses, Precise location data, Device
identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


PUBMATIC, INC

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


COMSCORE B.V.

Cookie duration: 720 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, IP addresses, Probabilistic identifiers, Privacy choices,
Browsing and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


FLASHTALKING

Cookie duration: 730 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
Device identifiers

more




View details | Privacy policylaunch
Consent


PULSEPOINT, INC.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, IP addresses, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


SMAATO, INC.

Cookie duration: 21 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Precise location data, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SEMASIO GMBH

Cookie duration: 366 (days).

Data collected and processed: IP addresses, Privacy choices, Browsing and
interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CRIMTAN HOLDINGS LIMITED

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


GENIUS SPORTS UK LIMITED

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CRITEO SA

Cookie duration: 390 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADLOOX SA

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Browsing and interaction data, Device
identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BLIS GLOBAL LIMITED

Cookie duration: 400 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


LOTAME SOLUTIONS, INC

Cookie duration: 274 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, IP addresses, Probabilistic identifiers, Users’ profiles,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


LIVERAMP

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


GROUPM UK LIMITED

Cookie duration: 395 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Precise location data, Privacy choices, Browsing and interaction
data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LOOPME LIMITED

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


DYNATA LLC

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ASK LOCALA

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Precise location data, Privacy choices, Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


AZIRA

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DOUBLEVERIFY INC.

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Privacy choices, Browsing and
interaction data

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


BIDSWITCH GMBH

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Precise location data, Privacy choices, Browsing and interaction
data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


IPONWEB GMBH

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Privacy choices,
Browsing and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


NEXTROLL, INC.

Cookie duration: 183 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


TEADS FRANCE SAS

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Privacy choices,
Browsing and interaction data, Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


STRÖER SSP GMBH (SSP)

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Privacy choices,
Browsing and interaction data, Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


OS DATA SOLUTIONS GMBH & CO. KG

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Privacy choices,
Browsing and interaction data, User-provided data, Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PERMODO GMBH

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Users’ profiles, Privacy choices, Browsing and interaction data,
Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


PLATFORM161 B.V.

Cookie duration: 396 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADACADO TECHNOLOGIES INC. (DBA ADACADO)

Cookie duration: 365 (days).

Data collected and processed: Non-precise location data, IP addresses, Privacy
choices, Browsing and interaction data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


BASIS GLOBAL TECHNOLOGIES, INC.

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Precise location data, Privacy choices, Browsing and interaction data, Device
identifiers

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SMADEX, S.L.U.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Privacy choices,
User-provided data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


BOMBORA INC.

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


EASYMEDIA GMBH

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


REMERGE GMBH

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Browsing and interaction data, Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADVANCED STORE GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAGNITE CTV, INC.

Cookie duration: 366 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Precise location data, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DELTA PROJECTS AB

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


USEMAX ADVERTISEMENT (EMEGO GMBH)

Cookie duration: 365 (days).

Data collected and processed: Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


EMETRIQ GMBH

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


PUBLICIS MEDIA GMBH

Cookie duration: 1825 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


M.D. PRIMIS TECHNOLOGIES LTD.

Cookie duration: 25 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Privacy choices, Browsing and
interaction data, User-provided data, Device identifiers

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ONETAG LIMITED

Cookie duration: 396 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


CLOUD TECHNOLOGIES S.A.

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


SMARTOLOGY LIMITED

Doesn't use cookies.

Data collected and processed: IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


IMPROVE DIGITAL

Cookie duration: 90 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADOBE ADVERTISING CLOUD

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, IP addresses,
Privacy choices, Device identifiers

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BANNERFLOW AB

Cookie duration: 366 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Privacy choices

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


TABMO SAS

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


INTEGRAL AD SCIENCE (INCORPORATING ADMANTX)

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Privacy choices, Browsing and interaction data

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


WIZALY

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Privacy choices,
Browsing and interaction data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


WEBORAMA

Cookie duration: 393 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


JIVOX CORPORATION

Cookie duration: 30 (days).

Data collected and processed: Non-precise location data, IP addresses, Users’
profiles, Precise location data, Privacy choices, Browsing and interaction data,
Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


SAGE+ARCHER BV

Doesn't use cookies.

Data collected and processed: Non-precise location data

more




View details | Privacy policylaunch
Consent


ON DEVICE RESEARCH LIMITED

Cookie duration: 30 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Precise location data, Browsing and interaction data,
User-provided data, Device identifiers

more




View details | Storage details | Privacy policylaunch
Consent


ROCKABOX MEDIA LTD

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Browsing and interaction data

more




View details | Storage details | Privacy policylaunch
Legitimate interesthelp_outline


EXACTAG GMBH

Cookie duration: 180 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, IP addresses, Privacy choices, Browsing and interaction data,
Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CELTRA INC.

Doesn't use cookies.

Data collected and processed: Device characteristics, IP addresses, Precise
location data, Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MAINADV SRL

Cookie duration: 30 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Privacy choices, Browsing and interaction data, User-provided
data, Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


GEMIUS SA

Cookie duration: 1825 (days).

Data collected and processed: Device characteristics, Users’ profiles, Privacy
choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


THE KANTAR GROUP LIMITED

Cookie duration: 914 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


NIELSEN MEDIA RESEARCH LTD.

Cookie duration: 120 (days).

Data collected and processed: Device characteristics, IP addresses, Privacy
choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SOLOCAL SA

Cookie duration: 396 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PIXALATE, INC.

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Browsing and interaction data, Device identifiers

more




View details | Storage details | Privacy policylaunch
Consent


ORACLE ADVERTISING

Cookie duration: 180 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


NUMBERLY

Cookie duration: 180 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


AUDIENCEPROJECT A/S

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DEMANDBASE, INC.

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


EFFILIATION / EFFINITY

Cookie duration: 30 (days).

Data collected and processed: Device characteristics

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ARRIVALIST CO.

Cookie duration: 365 (days).

Data collected and processed: Non-precise location data, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


SEENTHIS AB

Doesn't use cookies.

Data collected and processed: Device characteristics, IP addresses

more




View details | Privacy policylaunch


COMMANDERS ACT

Cookie duration: 365 (days).

Data collected and processed: IP addresses, Device identifiers

more




View details | Storage details | Privacy policylaunch
Consent


TRAVEL AUDIENCE GMBH

Cookie duration: 397 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Browsing and interaction
data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


HUMAN

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Device identifiers

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


ADLUDIO LTD.

Doesn't use cookies.

Data collected and processed: Device characteristics

more




View details | Privacy policylaunch
Consent


BLENDEE SRL

Cookie duration: 366 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


INNOVID LLC

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PAPIRFLY AS

Doesn't use cookies.

Data collected and processed: Device characteristics

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


NEUSTAR, INC., A TRANSUNION COMPANY

Cookie duration: 365 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


VERVE GROUP EUROPE GMBH

Doesn't use cookies.

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Precise location data, Privacy choices, Browsing and interaction data,
User-provided data, Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


OTTO (GMBH & CO KG)

Cookie duration: 365 (days).

Data collected and processed: IP addresses, Users’ profiles, Privacy choices,
Browsing and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADOBE AUDIENCE MANAGER, ADOBE EXPERIENCE PLATFORM

Cookie duration: 180 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing
and interaction data, User-provided data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


LOCALSENSOR B.V.

Doesn't use cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Precise location data, Privacy choices, Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


ONLINE SOLUTION

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


RELAY42 NETHERLANDS B.V.

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, IP addresses,
Probabilistic identifiers, Users’ profiles, Privacy choices, Browsing and
interaction data, User-provided data, Device identifiers

more




View details | Storage details | Privacy policylaunch
Consent


GP ONE GMBH

Cookie duration: Uses session cookies.

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Privacy choices, Browsing and interaction data, User-provided data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


THE MEDIAGRID INC.

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Precise location data, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MINDTAKE RESEARCH GMBH

Cookie duration: 180 (days).

Data collected and processed: Device characteristics, IP addresses,
Probabilistic identifiers, Users’ profiles, Browsing and interaction data,
Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


CINT AB

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, IP addresses, Privacy
choices, Browsing and interaction data, Device identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


GOOGLE ADVERTISING PRODUCTS

Cookie duration: 396 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


GFK GMBH

Cookie duration: 730 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, User-provided data, Device
identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


REVJET

Cookie duration: 730 (days).

Data collected and processed: Non-precise location data, IP addresses, Users’
profiles, Privacy choices, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


PROTECTED MEDIA LTD

Doesn't use cookies.

Data collected and processed: Device characteristics, IP addresses,
Probabilistic identifiers, Browsing and interaction data, Device identifiers

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


CLINCH LABS LTD

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Probabilistic identifiers, Users’ profiles, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ORACLE DATA CLOUD - MOAT

Doesn't use cookies.

Data collected and processed: Non-precise location data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


HEARTS AND SCIENCE MÜNCHEN GMBH

Cookie duration: 60 (days).

Data collected and processed: IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


AMAZON ADVERTISING

Cookie duration: 396 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Users’ profiles,
Privacy choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MOLOCO, INC.

Cookie duration: 730 (days).

Data collected and processed: Device characteristics, Non-precise location data,
IP addresses, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADTRIBA GMBH

Cookie duration: 730 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Privacy choices,
Browsing and interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


OBJECTIVE PARTNERS BV

Cookie duration: 90 (days).

Data collected and processed: Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ENSIGHTEN

Cookie duration: 1825 (days).

Data collected and processed: Device characteristics, IP addresses, Privacy
choices, Browsing and interaction data, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Legitimate interesthelp_outline


EBAY INC

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, IP addresses, Privacy
choices

more




View details | Storage details | Privacy policylaunch
Consent


HURRA COMMUNICATIONS GMBH

Cookie duration: 366 (days).

Data collected and processed: Authentication-derived identifiers, Device
characteristics, Non-precise location data, IP addresses, Probabilistic
identifiers, Precise location data, Browsing and interaction data, Device
identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent

Ad partners

help_outline


AKAMAI

Privacy policylaunch
Consent


META

Privacy policylaunch
Consent


AUNICA

Privacy policylaunch
Consent


BOOKING.COM

Privacy policylaunch
Consent


C3 METRICS

Privacy policylaunch
Consent


IBM

Privacy policylaunch
Consent


EVIDON

Privacy policylaunch
Consent


INTELLIAD

Privacy policylaunch
Consent


DSTILLERY

Privacy policylaunch
Consent


MEDIAMATH

Privacy policylaunch
Consent


ZMS

Privacy policylaunch
Consent


OMNICOM MEDIA GROUP

Privacy policylaunch
Consent


RESONATE

Privacy policylaunch
Consent


SOJERN

Privacy policylaunch
Consent


TRADEDOUBLER AB

Privacy policylaunch
Consent


TRUSTARC

Privacy policylaunch
Consent


TRUEFFECT

Privacy policylaunch
Consent


TRAVEL DATA COLLECTIVE

Privacy policylaunch
Consent


ADVOLUTION.CONTROL

Privacy policylaunch
Consent


LIFESTREET

Privacy policylaunch
Consent


ADMAXIM

Privacy policylaunch
Consent


BATCH MEDIA

Privacy policylaunch
Consent


VODAFONE GMBH

Privacy policylaunch
Consent


MAGNITE

Privacy policylaunch
Consent


SCENESTEALER

Privacy policylaunch
Consent


NETQUEST

Privacy policylaunch
Consent


MANAGE.COM

Privacy policylaunch
Consent


CLOUDFLARE

Privacy policylaunch
Consent


SALESFORCE DMP

Privacy policylaunch
Consent


NETFLIX

Privacy policylaunch
Consent


MACROMILL GROUP

Privacy policylaunch
Consent


EBUILDERS

Privacy policylaunch
Consent


APPLOVIN CORP.

Privacy policylaunch
Consent


FRACTIONAL MEDIA

Privacy policylaunch
Consent


RACKSPACE

Privacy policylaunch
Consent


LIFTOFF

Privacy policylaunch
Consent


MSI-ACI

Privacy policylaunch
Consent


NAVEGG

Privacy policylaunch
Consent


ADMEDO

Privacy policylaunch
Consent


KOCHAVA

Privacy policylaunch
Consent


MOBITRANS

Privacy policylaunch
Consent


ADEX

Privacy policylaunch
Consent


IMPACT

Privacy policylaunch
Consent


SPOTAD

Privacy policylaunch
Consent


AARKI

Privacy policylaunch
Consent


SFR

Privacy policylaunch
Consent


CABLATO

Privacy policylaunch
Consent


WAYSTACK

Privacy policylaunch
Consent


TRESENSA

Privacy policylaunch
Consent


GSKINNER

Privacy policylaunch
Consent


CUBED

Privacy policylaunch
Consent


OPTOMATON

Privacy policylaunch
Consent


ANALIGHTS

Privacy policylaunch
Consent


DENTSU AEGIS NETWORK

Privacy policylaunch
Consent


DIGISEG

Privacy policylaunch
Consent


HAENSEL AMS

Privacy policylaunch
Consent


BDSK HANDELS GMBH & CO. KG

Privacy policylaunch
Consent


MARKETING SCIENCE CONSULTING GROUP, INC.

Privacy policylaunch
Consent


DENTSU

Privacy policylaunch
Consent


KOBLER

Privacy policylaunch
Consent


WIDESPACE

Privacy policylaunch
Consent


VIMEO

Privacy policylaunch
Consent

Accept all



Confirm choices

Close

BDOW!
Shares