Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cisco Confirms Network Breach After Employee’s Google Account was Hacked

14 August 2022

Cisco has confirmed that its security was successfully breached by Yanluowang Ransomware Gang in May 2022. Networking giant Cisco Systems …

Tags After, Breach, Hacked, Hacking News, Network

How to Create a Secure Folder on Your Phone

14 August 2022

However, you may well want to add a second barrier to entry for anyone who gets past your lock screen—whether it’s friends or relatives …

Tags Create, Folders, How, Secure, Your Phone

Week in review: Cisco hacked, Kali Linux 2022.3 released, Black Hat USA 2022

14 August 2022

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Black Hat USA 2022 coverage Check out …

Tags Cisco, Infrastructure Development, IT, Networking, Week

Killnet Claim They’ve Stolen Employee Data from Lockheed Martin

14 August 2022

The pro-Russia Killnet hacker group claims that the stolen information includes PII data such as email addresses and phone numbers of the …

Tags IT, Lockheed Martin, News

Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer

14 August 2022

Dutch authorities on Friday announced the arrest of a software developer in Amsterdam who is alleged to be working for Tornado Cash, days …

Tags After, Arrested, Cash, Cryptocurrency, Developers

Amazon GuardDuty Introduces Malware Detection

14 August 2022

At the recent re:Inforce security conference, AWS announced the availability of malware detection for Amazon GuardDuty. The new …

Tags Architecture & Design, AWS, Cloud, Cloud Provider, Cloud Security

A New Tractor Jailbreak Rides the Right-to-Repair Wave

14 August 2022

The finding underscores the security implications of right-to-repair. The tractor exploitation Sick Codes uncovered isn’t a remote attack, …

Tags IT, New, News, Tractor, Waves

Killnet claims to have breached Lockheed Martin

14 August 2022

Russian hacker group Killnet claims to have launched a DDoS attack on the aerospace and defense giant Lockheed Martin.  The Moscow Times …

Tags IT, Lockheed Martin, News

ColorTokens partners with Aligned Automation to provide end-to-end solutions for enterprise customers

13 August 2022

ColorTokens has partnered with Aligned Automation, to offer solutions for the journey to digital transformation with the assurance of …

Tags Automation, IT, News

Flaw in the VA Medical Records Platform May Put Patients at Risk

13 August 2022

The department’s records platform, VistA, first instituted in the late 1970s, is lauded as effective, reliable, and even innovative, but …

Tags Flaws, Patients, Platforms, Risks, VA

7 Tips to Protect Your Windows Against Cybercrime

13 August 2022

| Sponsored | Any Windows system has a great basic level of security. But this is not enough to keep you secure from the growing threat of …

Tags Cybercrime, How-To, IT, OS, Protect

Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users

13 August 2022

A pair of reports from cybersecurity firms SEKOIA and Trend Micro sheds light on a new campaign undertaken by a Chinese threat actor named …

Tags Cyber Attack, Linux, Malware, Microsoft, Targets

The Feds Gear Up for a Privacy Crackdown

13 August 2022

For starters, a researcher revealed it is possible to hack into Elon Musk’s Starlink terminals using just $25 worth of hardware. The flaw …

Tags Crackdown, Gears, IT, News, Privacy

Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector

13 August 2022

In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back methodology in order to …

Tags Attacks, Conti, Operators, Ransomware, Styles
Post navigation
Older posts
Page1 Page2 … Page15,010 Next →
Cookie-Free

NVD

  • CVE-2022-20262 – In ActivityManager, there is a possible way to check another process’s capabilities due to …12 August 2022
  • CVE-2022-20279 – In DevicePolicyManager, there is a possible way to determine whether an app is installed, …12 August 2022
  • CVE-2022-20295 – In ContentService, there is a possible way to check if an account exists on the device due …12 August 2022
  • CVE-2022-20311 – In Telecomm, there is a possible disclosure of registered self managed phone accounts due …12 August 2022
  • CVE-2022-20327 – In Wi-Fi, there is a possible way to retrieve the WiFi SSID without location permissions d …12 August 2022
  • CVE-2022-28626 – A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out …12 August 2022

EXPLOITS

  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »