Robuta

https://www.securitymagazine.com/articles/95990-top-25-college-football-teams-found-on-breached-password-lists
Specops researchers analyzed more than 800 million compromised passwords to determine the popularity of Division 1 FBS football programs, and their team...
college football teamspassword liststopfoundbreached
https://www.techmonitor.ai/hardware/data-centres/cbr-roundup-5-major-lists-on-security-iot-fintech-4733634
List: World on alert over cyberterrorism, the steps for IoT digitalisation and the major banks are backing fintech.
cbrroundupmajorlistssecurity
https://www.keepersecurity.com/blog/2017/11/22/survey-says-iot-toys-high-holiday-wish-lists-security-not-much/
IoT toys are high on everyone's wish lists this holiday season. Learn how to keep those devices protected with password security.
survey sayswish listsiottoyshigh
https://docs.oracle.com/en-us/iaas/Content/Network/Concepts/securitylists.htm
Learn how you can use security lists to control traffic with your VCN's resources at the packet level.
security lists
https://openwall.com/lists/oss-security/2011/03/05/9
osssecurityvendorhostingfuture
https://www.openwall.com/lists/oss-security/2017/07/03/1
new memberslinux distrososssecurityaccepting
https://docs.oracle.com/en-us/iaas/Content/Network/Concepts/change-use-securitylist.htm
Change which security lists are used in a particular subnet in a virtual cloud network (VCN).
security listschangingsubnetuses
https://www.elastic.co/docs/api/doc/serverless/group/endpoint-security-lists-api
Lists can be used with detection rule exceptions to define values that prevent a rule from generating alerts. Lists are made up of: List containers: A...
security listsserverless apikibanadocumentation