thecybersecurity.news
Open in
urlscan Pro
2606:4700:3031::6815:426b
Public Scan
Submission: On July 15 via automatic, source certstream-suspicious — Scanned from GB
Summary
TLS certificate: Issued by WE1 on June 23rd 2024. Valid for: 3 months.
This is the only time thecybersecurity.news was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 2606:4700:303... 2606:4700:3031::6815:426b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
thecybersecurity.news
thecybersecurity.news |
272 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
14 | thecybersecurity.news |
thecybersecurity.news
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
thecybersecurity.news WE1 |
2024-06-23 - 2024-09-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://thecybersecurity.news/
Frame ID: D9BE140D1D6302A5513EAF54F1A14EB3
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
thecybersecurity.news/ |
51 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1ec60de2.css
thecybersecurity.news/sys-lib/cache/wph/ |
272 KB 36 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cropped-Logo.png
thecybersecurity.news/data/2020/07/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
New-HardBit-Ransomware-40-Uses-Passphrase-Protection-to-Evade-Detection-350x263.png
thecybersecurity.news/data/2024/07/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
GB-home-1000x533.jpg
thecybersecurity.news/data/2020/07/ |
99 KB 100 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ATT-Confirms-Data-Breach-Affecting-Nearly-All-Wireless-Customers-350x263.png
thecybersecurity.news/data/2024/07/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
DarkGate-Malware-Exploits-Samba-File-Shares-in-Short-Lived-Campaign-350x263.jpg
thecybersecurity.news/data/2024/07/ |
22 KB 22 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Australian-Defence-Force-Private-and-Husband-Charged-with-Espionage-for-350x263.jpg
thecybersecurity.news/data/2024/07/ |
16 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Critical-Exim-Mail-Server-Vulnerability-Exposes-Millions-to-Malicious-Attachments-350x263.jpg
thecybersecurity.news/data/2024/07/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Ever-Wonder-How-Hackers-Really-Steal-Passwords-Discover-Their-Tactics-350x263.png
thecybersecurity.news/data/2024/07/ |
16 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
US-Seizes-Domains-Used-by-AI-Powered-Russian-Bot-Farm-for-150x150.png
thecybersecurity.news/data/2024/07/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Palo-Alto-Networks-Patches-Critical-Flaw-in-Expedition-Migration-Tool-150x150.png
thecybersecurity.news/data/2024/07/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
60-New-Malicious-Packages-Uncovered-in-NuGet-Supply-Chain-Attack-150x150.png
thecybersecurity.news/data/2024/07/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cropped-favicon-32x32-1-32x32.png
thecybersecurity.news/data/2020/07/ |
1 KB 2 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| maiVars0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
thecybersecurity.news
2606:4700:3031::6815:426b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