Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Hack Corporate Email Accounts

1 February 2023

Microsoft on Tuesday said it took steps to disable fake Microsoft Partner Network (MPN) accounts that were used for creating malicious …

Tags Cloud Computing, Emails, IT, Microsoft, OAuth

The future of vulnerability management and patch compliance

1 February 2023

IT departments continue to face immense pressure to get vulnerability and patch management right as threat actors use new and old methods …

Tags CISO, IT, News

70% of CIOs anticipate their involvement in cybersecurity to increase

1 February 2023

77% of CIOs say their role has been elevated due to the state of the economy and they expect this visibility within the organization to …

Tags CIOs, Foundry, IT, News

Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software

1 February 2023

Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months …

Tags AMI, Eclypsium, Security Pro, Supply Chains, Vulnerability

Mix of legacy OT and connected technologies creates security gaps

1 February 2023

Most companies with OT security challenges are implementing systems for detecting and proactively derailing threats, while some are also …

Tags ISG, IT, News, OT

GroupSense VIP Monitoring service enables enterprises to proactively protect executives

1 February 2023

GroupSense’s VIP Monitoring service assesses and monitors high-profile individuals, executive identities, and their extended personal …

Tags IT, Monitoring, News, VIP

OTAVA releases Security as a Service to protect users against all attack vectors

1 February 2023

OTAVA Security as a Service solutions are designed to protect against all attack vectors including malware, phishing, ransomware, …

Tags IT, News, Services

Involta DRaaS+ secures critical business systems and data

1 February 2023

Involta has introduced Disaster Recovery as a Service (DRaaS+), a new, three-tiered model designed to deliver the right service level for …

Tags IT, News

GitHub Reports Code-Signing Certificate Theft in Security Breach

1 February 2023

Although attackers exfiltrated a set of encrypted code-signing certificates, these were password-protected, so there is no possibility of …

Tags Certificates, Cyber Attack, Reports, Security Breach, Theft

ThreatSpike Red makes offensive cybersecurity accessible to more organizations

1 February 2023

ThreatSpike Red helps organisations of all sizes to close the cybersecurity gap by providing continuous unlimited testing and scanning of …

Tags IT, News, Red

How Can Disrupting DNS Communications Thwart a Malware Attack?

1 February 2023

Malware eventually has to exfiltrate the data it accessed. By watching DNS traffic for suspicious activity, organizations can halt the …

Tags Cloud Computing, Communications, DNS, How, Infrastructure Development

Google Fi suffers data breach following T-Mobile hack

1 February 2023

Google LLC has informed customers of Google Fi, the company’s mobile virtual network operator service, that their data may have been …

Tags Cyber, Google Fi, IT, MVNO, T-Mobile

Open-Source Security Index Lists Top Projects

1 February 2023

Two venture investors have launched an index to track the most popular open-source security projects. Learn more …

Tags Developers, GNU, Index, Open Source Projects, Projects

Choosing Check Point as an application security vendor

1 February 2023

Contributed by Diana Polansky, Cloud Security Product Marketing Manager, and Sergio Silva, Product Incubation Manager. When we started to …

Tags Application Security, Check Point, OWASP, RASP, WAF
Older posts
Page1 Page2 … Page16,441 Next →
Cookie-Free

NVD

  • CVE-2023-23924 – Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on …1 February 2023
  • CVE-2022-48161 – Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via th …1 February 2023
  • CVE-2023-24956 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2023-0341 – A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12 …1 February 2023
  • CVE-2023-24241 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2022-25979 – Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) …31 January 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
  • How much security is enough?9 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »