Skip to content
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Month: February 2018

New Android Malware Family Highlights Evolving Mobile Threat Capabilities

28 February 2018

RedDrop, a new family of malicious software found lurking in dozens of seemingly benign Android applications, is the latest indication of …

Tags Android, Family, Google, Malware, Mobile, Mobile Development, New, Threats

Unprotected AWS Bucket Exposes 50.4 GB of Financial Giant’s Data

28 February 2018

The Cyber Risk Team at Cloud security firm UpGuard has discovered a massive trove of data exposed due to an unprotected Amazon Web Services …

Tags Business, Cloud, Cyber Attack, Data, Financials, Hybrid Cloud, Privacy, Private Cloud, Public Cloud

What Comes Next in the CareFirst Data Breach Case?

28 February 2018

Now that the Supreme Court has declined to review a case stemming from a 2014 cyberattack on CareFirst Blue Cross Blue Shield, what comes …

Tags Cases, Data Breach, Next

Can Blockchain Challenge ‘FANG’ Tech Giants For Control Over Our Data?

28 February 2018

We’ve been giving tech giants free rein over our data for far too long. It is genius on their …

Tags Blockchains, Challenges, Data, Tech

IPv6, 5G and Mesh Networks Heightening Law Enforcement Challenges, Says Australian Government

28 February 2018

In a submission to the Joint Committee on Law Enforcement’s inquiry into Impact of new and emerging information and communications …

Tags 5G, Challenges, Cybercrime, Government, Ipv6, Law Enforcement, Laws, Network

Attackers Using Memcached Servers to Amplify DDoS Attacks

28 February 2018

There is a new threat vector for Distributed Denial of Service (DDoS) attacks that is now taking aim at global service providers. Multiple …

Tags Arbor Networks, Attacks, Databases, DDoS, Memcached, Open Source, Open Source Databases, Open Source Software, Servers

You can use a VPN to battle ISP net neutrality abuse

28 February 2018

VPN: Why you should hide your IP address on cnet Best VPN services The CNET VPN Directory lists many of the most popular VPN Services …

Tags VPN

Off-The-Shelf Hacker: Before ‘Open Source,’ There Was Unix

28 February 2018

We all celebrated the 20-year anniversary of open source a couple of weeks ago. No doubt, the concept brought countless opportunities for …

Tags Culture, Fortran, Global, Linux, Minix, Op-Ed, Open Hardware, Open Source OS, Source

Cyber attackers flood memcached servers with amplified DDoS attacks

28 February 2018

Misconfigured memcached servers on internet data center (IDC) networks are being increasingly abused to conduct amplification attacks …

Tags Arbor Networks, Databases, DDoS, DDoS attacks, Memcached, Open Source, Open Source Databases, Open Source Software, Servers

Cybersecurity M&A Roundup: PhishMe, Phantom Acquired

28 February 2018

Cybersecurity M&A Roundup: PhishMe, Phantom Acquired PhishMe Becomes ‘Cofense’ After It’s Purchased; Splunk Buys Phantom Mathew …

Tags M&A, Phantom, PhishMe, Roundup

How to Turn Off Facebook’s Face Recognition Features

28 February 2018

more and more Facebook users started seeing a notification about how the social network uses its facial recognition technology. When …

Tags Face Recognition, Features, How, Turn, Web Development

FTC Settles with Venmo on Security Allegations

28 February 2018

The Federal Trade Commission has reached a settlement with Venmo, a PayPal company, regarding allegations that the company misrepresented …

Tags FTC, Venmo
Post navigation
Older posts
Page1 Page2 … Page188 Next →
Cookie-Free

NVD

CVE-2020-4889 – IBM Spectrum Scale 5.0.0 through 5.0.5.4 and 5.1.0 could allow a local user to poison log …

26 January 2021

CVE-2018-10344 – ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or indivi …

26 January 2021

CVE-2019-11305 – ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or indivi …

26 January 2021

CVE-2020-13188 – ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or indivi …

26 January 2021

CVE-2020-13204 – ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or indivi …

26 January 2021

CVE-2020-13220 – ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or indivi …

26 January 2021

EXPLOITS

Openlitespeed Web Server 1.7.8 – Command Injection (Authenticated)

27 January 2021

STVS ProVision 5.9.10 – Cross-Site Request Forgery (Add Admin)

27 January 2021

STVS ProVision 5.9.10 – File Disclosure (Authenticated)

27 January 2021

Oracle WebLogic Server 12.2.1.0 – RCE (Unauthenticated)

26 January 2021

Tenda AC5 AC1200 Wireless – ‘WiFi Name & Password’ Stored Cross Site Scripting

26 January 2021

Simple College Website 1.0 – ‘full’ Stored Cross Site Scripting

26 January 2021

SECURELIST

Sunburst backdoor – code overlaps with Kazuar

11 January 2021

Digital Footprint Intelligence Report

29 December 2020

How we protect our users against the Sunburst backdoor

23 December 2020

Lazarus covets COVID-19-related intelligence

23 December 2020

Sunburst: connecting the dots in the DNS requests

18 December 2020

The future of cyberconflicts

18 December 2020

Information Cyber Network Enterprise Security News

© 2021 GeekWire | Privacy Policy | Cookie-Free | We are not responsible for the content of external sites.