<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: https://vulnerability.isc2.org/ -  presenting 503 Error in Threats</title>
    <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66335#M1024</link>
    <description>&lt;P&gt;I received an email from Cytenna on November 21 of last year, which announced they would end service to ISC2 members on 12-31-2023.&amp;nbsp; I was a long-time subscriber of this service from my "feral, early days" in cybersecurity.&amp;nbsp; The alerts I received were poorly assembled at best, and glacially slow at worst.&amp;nbsp; Cytenna may have been a source, but it was a pitiful source.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that I've participated with &lt;A href="https://www.nationalisacs.org/" target="_blank" rel="noopener"&gt;ISAC&lt;/A&gt;s, &lt;A href="https://www.cisecurity.org/" target="_blank" rel="noopener"&gt;the Center for Internet Security&lt;/A&gt;&amp;nbsp;, SANS (both&amp;nbsp;&lt;A href="https://www.sans.org/newsletters/at-risk/" target="_blank" rel="noopener"&gt;@risk&lt;/A&gt; and &lt;A href="https://isc.sans.edu/" target="_blank" rel="noopener"&gt;Internet Storm Center&lt;/A&gt;), and &lt;A href="https://www.cisa.gov/news-events/cybersecurity-advisories" target="_self"&gt;CISA&lt;/A&gt;, plus less official channels like VXUnderground on Twitter (sorry, no linky!), there's a big difference between their raw, effective alerting structure, and Cytenna's ancillary, meandering reports.&lt;BR /&gt;&lt;BR /&gt;I'm still feral, though.&lt;BR /&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;(my opinion is my own. edited to add CISA)&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jan 2024 19:45:25 GMT</pubDate>
    <dc:creator>ericgeater</dc:creator>
    <dc:date>2024-01-18T19:45:25Z</dc:date>
    <item>
      <title>https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66329#M1020</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is&amp;nbsp;&lt;A href="https://vulnerability.isc2.org/" target="_blank"&gt;https://vulnerability.isc2.org/&lt;/A&gt;&amp;nbsp;down? All I have been getting when I have been checking for days is HTTP 503 error - or have they killed a very useful benefit of CISSP membership?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;KR,&lt;BR /&gt;Wayne&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 17:31:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66329#M1020</guid>
      <dc:creator>Wayne_Evans</dc:creator>
      <dc:date>2024-01-18T17:31:16Z</dc:date>
    </item>
    <item>
      <title>Re: https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66332#M1021</link>
      <description>&lt;P&gt;Confirmed it is down. I have heard nothing about this being discontinued.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1086253963"&gt;@AndreaMoore&lt;/a&gt;&amp;nbsp;might know the right team to check with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 18:27:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66332#M1021</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2024-01-18T18:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66333#M1022</link>
      <description>&lt;DIV class=""&gt;Sounds like it just needs a kick in the pants.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;The complete message coming back is "503 Service Unavailable: Back-end server is at capacity",.&lt;/DIV&gt;</description>
      <pubDate>Thu, 18 Jan 2024 18:37:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66333#M1022</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2024-01-18T18:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66334#M1023</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Hi Wayne,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Vulnerability Central was discontinued as an ISC2 member benefit as of December 31, 2023.&amp;nbsp;&lt;SPAN class="TextRun SCXW3724016 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW3724016 BCX0"&gt;If you are interested in continuing to&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW3724016 BCX0"&gt; receive Vulnerability Central's list of &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW3724016 BCX0"&gt;timely&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW3724016 BCX0"&gt;, curated security notifications as a direct service, &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW3724016 BCX0"&gt;contact&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW3724016 BCX0" data-ccp-charstyle="apple-converted-space" data-ccp-charstyle-defn="{&amp;quot;ObjectId&amp;quot;:&amp;quot;3ae9eef5-60e3-4893-a660-ee680d5f64ed|55&amp;quot;,&amp;quot;ClassId&amp;quot;:1073872969,&amp;quot;Properties&amp;quot;:[469775450,&amp;quot;apple-converted-space&amp;quot;,201340122,&amp;quot;1&amp;quot;,134233614,&amp;quot;true&amp;quot;,469778129,&amp;quot;apple-converted-space&amp;quot;,335572020,&amp;quot;1&amp;quot;,469778324,&amp;quot;Default Paragraph Font&amp;quot;]}"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A class="Hyperlink SCXW3724016 BCX0" href="mailto:dabbondanzio@cytenna.com" target="_blank" rel="noreferrer noopener"&gt;&lt;SPAN class="TextRun Underlined SCXW3724016 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW3724016 BCX0" data-ccp-charstyle="Hyperlink"&gt;dabbondanzio@cytenna.com&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN class="TextRun SCXW3724016 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW3724016 BCX0"&gt;for more information.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 19:05:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66334#M1023</guid>
      <dc:creator>isc2jade</dc:creator>
      <dc:date>2024-01-18T19:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66335#M1024</link>
      <description>&lt;P&gt;I received an email from Cytenna on November 21 of last year, which announced they would end service to ISC2 members on 12-31-2023.&amp;nbsp; I was a long-time subscriber of this service from my "feral, early days" in cybersecurity.&amp;nbsp; The alerts I received were poorly assembled at best, and glacially slow at worst.&amp;nbsp; Cytenna may have been a source, but it was a pitiful source.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that I've participated with &lt;A href="https://www.nationalisacs.org/" target="_blank" rel="noopener"&gt;ISAC&lt;/A&gt;s, &lt;A href="https://www.cisecurity.org/" target="_blank" rel="noopener"&gt;the Center for Internet Security&lt;/A&gt;&amp;nbsp;, SANS (both&amp;nbsp;&lt;A href="https://www.sans.org/newsletters/at-risk/" target="_blank" rel="noopener"&gt;@risk&lt;/A&gt; and &lt;A href="https://isc.sans.edu/" target="_blank" rel="noopener"&gt;Internet Storm Center&lt;/A&gt;), and &lt;A href="https://www.cisa.gov/news-events/cybersecurity-advisories" target="_self"&gt;CISA&lt;/A&gt;, plus less official channels like VXUnderground on Twitter (sorry, no linky!), there's a big difference between their raw, effective alerting structure, and Cytenna's ancillary, meandering reports.&lt;BR /&gt;&lt;BR /&gt;I'm still feral, though.&lt;BR /&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;(my opinion is my own. edited to add CISA)&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 19:45:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66335#M1024</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2024-01-18T19:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66336#M1025</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1630140649"&gt;@isc2jade&lt;/a&gt;&amp;nbsp;You might consider adding a placeholder page that informs people that it is not longer offered and direct them to other options...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 19:40:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66336#M1025</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2024-01-18T19:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66338#M1026</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;Now that I've participated with &lt;A href="https://www.nationalisacs.org/" target="_blank" rel="noopener"&gt;ISAC&lt;/A&gt;s, &lt;A href="https://www.cisecurity.org/" target="_blank" rel="noopener"&gt;the Center for Internet Security&lt;/A&gt;&amp;nbsp;, SANS (both&amp;nbsp;&lt;A href="https://www.sans.org/newsletters/at-risk/" target="_blank" rel="noopener"&gt;@risk&lt;/A&gt; and &lt;A href="https://isc.sans.edu/" target="_blank" rel="noopener"&gt;Internet Storm Center&lt;/A&gt;),&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I would consider SANS Internet Storm Center the best source, in particular the morning podcasts with Johannes Ullrich. Like you, I found Cytenna quite lacking - I mean their current current HTTPS cert is expired.&amp;nbsp;This industry is full of snakeoil.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 20:30:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66338#M1026</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2024-01-18T20:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66339#M1027</link>
      <description>&lt;P&gt;I must have missed the memo about the discontinued benefit - Thank you for confirming @isc2jade that it is no longer available.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;Yes there are some great sources there that you list - I will adapt my TTPs (tactics, Techniques &amp;amp; procedures)&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Have great day all &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 21:47:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66339#M1027</guid>
      <dc:creator>Wayne_Evans</dc:creator>
      <dc:date>2024-01-18T21:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: https://vulnerability.isc2.org/ -  presenting 503 Error</title>
      <link>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66360#M1030</link>
      <description>&lt;P&gt;There's another consideration which would follow your hardware technical debt:&amp;nbsp; do you currently have channels to advisories from their manufacturers?&amp;nbsp; If you have Megusta backup appliances, Sinsalpor network devices, Nolacara server systems, or Bromatonta cellular infrastructure, have you subscribed to any alert notification systems those companies may have available?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not that companies always do a better job of disseminating alerts which address their own equipment, but that's what you pay for support for, in my mind's eye.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 13:30:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/https-vulnerability-isc2-org-presenting-503-Error/m-p/66360#M1030</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2024-01-19T13:30:32Z</dc:date>
    </item>
  </channel>
</rss>

