Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

ChromeLoader Malware Hijacks Browsers With ISO Files

27 May 2022

The malware’s abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and …

Tags Browsers, Cloud, Files, Internet, Malware

5 Best Books To Learn Cyber Security in 2022

27 May 2022

Hello guys, if you want to learn Cyber Security in 2022 and looking for best resources like best books and online courses then you have …

Tags Best, Books, Java, Learn, Programming

Russian Hackers Believed to Be Behind Leak of Hard Brexit Plans

27 May 2022

A group of hackers from Russia could be behind the leak of a list of emails between former director of MI6 Sir Richard Dearlove, Gisela …

Tags Brexit, IT, Leaks, Plans, Russian Hackers

Nearly 100,000 NPM Users’ Credentials Stolen in GitHub OAuth Breach

27 May 2022

Cloud-based repository hosting service GitHub on Friday shared additional details into the theft of GitHub integration OAuth tokens last …

Tags Breach, Credentials, IT, OAuth, Stolen

CISA adds 75 actively exploited bugs to its must-patch list in just a week

27 May 2022

Plenty to keep the security team busy: the US cybersecurity authority is urging everyone to patch a number of software flaws, including …

Tags CISA, IT, News

Scams targeting NFT investors – Week in security with Tony Anscombe

27 May 2022

We have detected unusual activity from your IP address You can continue browsing our website for the next 20 minutes if you pass the …

Tags IT, News, NFT, Scams, Week

GhostTouch: how to remotely control touchscreens with EMI

27 May 2022

Security researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals. A team of …

Tags IT, News

Physical Security Teams’ Impact Is Far-Reaching

27 May 2022

Here’s how physical security teams can integrate with the business to identify better solutions to security …

Tags Cloud, Impact, Is, IT, Physical Security

10 Benefits of Using an Enterprise Service for Your Business

27 May 2022

Microsoft 365 Business connects employees with the people, information, and content they need to get the most out of any device. In …

Tags 5G, A.I, Benefits, Big Data, Business

The Myths of Ransomware Attacks and How To Mitigate Risk

27 May 2022

Today’s modern companies are built on data, which now resides across countless cloud apps. Therefore preventing data loss is essential to …

Tags How-To, Malware, Myths, Ransomware Attacks, Risks

Programming languages: How Google is improving C++ memory safety

27 May 2022

Google’s Chrome team is looking at heap scanning to reduce memory-related security flaws in Chrome’s C++ codebase, but the technique …

Tags C#, Google, How, IT, Programming Languages

Microsoft is rolling out these security settings to protect millions of accounts. Here’s what’s changing

27 May 2022

To thwart password and phishing attacks, Microsoft is rolling out security defaults to a massive number of Azure Active Directory (AD) …

Tags IT, Microsoft, News

Twitter fined $150M after using 2FA phone numbers for marketing

27 May 2022

The Federal Trade Commission (FTC) and the Department of Justice (DOJ) have ordered Twitter to pay a $150M penalty for using users’ …

Tags 2fa, EU-US Privacy Shield, Federal Trade Commission, FTC, Privacy

GitHub saved plaintext passwords of npm users in log files, post mortem reveals

27 May 2022

GitHub has revealed it stored a “number of plaintext user credentials for the npm registry” in internal logs following the integration of …

Tags IT, News
Post navigation
Older posts
Page1 Page2 … Page14,290 Next →
Cookie-Free

NVD

  • CVE-2022-1909 – Cross-site Scripting (XSS) – Stored in GitHub repository causefx/organizr prior to 2.1.220 …27 May 2022
  • CVE-2022-1897 – Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. …27 May 2022
  • CVE-2022-20666 – Multiple vulnerabilities in the web-based management interface of Cisco Common Services Pl …27 May 2022
  • CVE-2022-20667 – Multiple vulnerabilities in the web-based management interface of Cisco Common Services Pl …27 May 2022
  • CVE-2022-20668 – Multiple vulnerabilities in the web-based management interface of Cisco Common Services Pl …27 May 2022
  • CVE-2022-20669 – Multiple vulnerabilities in the web-based management interface of Cisco Common Services Pl …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »