Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Analysis

Malware Persistence versus Early Detection: AutoIT and Dridex IoC Expansion Analysis

8 February 2023

AutoIT-compiled malware and Dridex trace their roots to as far back as 2008 and 2014, respectively. As malware variants go, therefore, …

Tags Analysis, Detection, Dridex, Expansion, IT

Hive Ransomware: A Detailed Analysis

1 February 2023

In the Rust variant of Hive Ransomware, attackers must first know the parameters. With this advancement, it is difficult for the researcher …

Tags Analysis, Hive Ransomware, IT, News, Ransomware

AsyncRAT Analysis with ChatGPT

25 January 2023

As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals to stay ahead …

Tags Analysis, ChatGPT, Cyber Threats, Hacking, Malware

Maryland launches state Information Sharing and Analysis Center

17 January 2023

On January 9, the Maryland Information Sharing and Analysis Center (MD-ISAC) was made available to government partners. The center is …

Tags Analysis, Information Sharing, IT, Maryland, News

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

13 January 2023

Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive into …

Tags Analysis, Guides, Intrusion Prevention, SIEM, Systems

New Analysis Reveals Raspberry Robin Can be Repurposed by Other Threat Actors

11 January 2023

A new analysis of Raspberry Robin’s attack infrastructure has revealed that it’s possible for other threat actors to repurpose the …

Tags Analysis, IT, New, Raspberry, Threat Actors

VERT Threat Alert: January 2023 Patch Tuesday Analysis

10 January 2023

Today’s VERT Alert addresses Microsoft’s January 2023 Security Updates. VERT is actively working on coverage for these vulnerabilities …

Tags Alerts, Analysis, IT, Patch Tuesday, Threats

Expert Analysis Reveals Cryptographic Weaknesses in Threema Messaging App

10 January 2023

A comprehensive analysis of the cryptographic protocols used in the Swiss encrypted messaging application Threema has revealed a number of …

Tags Analysis, Apps, Experts, IT, Messaging Apps

Deep Packet Inspection vs. Metadata Analysis of Network Detection & Response (NDR) Solutions

15 November 2022

This article will shed light on the concept of Deep Packet Inspection (DPI) and Metadata Analysis. We will compare both detection …

Tags Analysis, Detection, Metadata, NDR, Network

Finite State hires Larry Pesce as Product Security Research and Analysis Director

9 November 2022

Finite State has hired Larry Pesce as its Product Security Research and Analysis Director. Pesce will serve as a senior consultant, …

Tags Analysis, Directors, IT, Products, Security Research

A Call for Help May Lead to Malware: BazarCall IoC Analysis and Expansion

1 November 2022

More sophisticated BazarCall campaigns have been circulating and delivering ransomware entry points to victims. While the bait still …

Tags Analysis, Calls, Expansion, Help, IT

As Vulnerabilities Soar, Slim.AI Launches ‘Container Intelligence’ to Give In-Depth Analysis on Hundreds of Popular Container Images

25 October 2022

DETROIT, Oct. 25, 2022 /PRNewswire-PRWeb/ — KUBECON + CLOUDNATIVECON NORTH AMERICA — In software supply chain security, knowing your …

Tags AI, Analysis, Launches, Popular, Security Pro

Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1

17 October 2022

Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1 Command & Control (C2) frameworks are a very sensitive …

Tags Analysis, Cobalt Strike, Security Pro, Software Vulnerabilities, Vulnerability

A pathway to the cloud: Analysis of the Reserve Bank of New Zealand’s Guidance on Cyber Resilience

18 July 2022

The Reserve Bank of New Zealand’s (RBNZ’s) Guidance on Cyber Resilience (referred to as “Guidance” in this post) acknowledges the …

Tags Analysis, Financial Services, Guidance, New, New Zealand
Older posts
Page1 Page2 … Page28 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »