Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Analysis

A pathway to the cloud: Analysis of the Reserve Bank of New Zealand’s Guidance on Cyber Resilience

18 July 2022

The Reserve Bank of New Zealand’s (RBNZ’s) Guidance on Cyber Resilience (referred to as “Guidance” in this post) acknowledges the …

Tags Analysis, Financial Services, Guidance, New, New Zealand

Countdown to Ransomware: Analysis of Ransomware Attack Timelines

1 June 2022

Intelligence & Analytics May 26, 2022 Black Basta Besting Your Network? This post was written with contributions from Chris Caridi and Kat …

Tags Analysis, Countdown, Incident Response, Malware, Security Services

CISA Releases Analysis of FY21 Risk and Vulnerability Assessments

19 May 2022

CISA has released an analysis and infographic detailing the findings from the 112 Risk and Vulnerability Assessments (RVAs) conducted …

Tags Analysis, CISA, Releases, Risks, Security Pro

Vicarius Nmap Scan Analysis helps security professionals identify high risk assets

22 April 2022

Vicarius released a new free offering—Nmap Scan Analysis—to make vulnerability assessment, prioritization, and remediation available to …

Tags Analysis, IT, News, Nmap, Scan

Researchers Share In-Depth Analysis of PYSA Ransomware Group

18 April 2022

An 18-month-long analysis of the PYSA ransomware operation has revealed that the cybercrime cartel followed a five-stage software …

Tags Analysis, Malware, Ransomware, Researchers, Shares

How to Build a Custom Malware Analysis Sandbox

24 March 2022

Before hunting malware, every researcher needs to find a system where to analyze it. There are several ways to do …

Tags Analysis, Builds, How, Malware, Sandbox

Analysis of leaked Conti files blows lid off ransomware gang

11 March 2022

It was a Ukrainian security specialist who apparently turned the tables on the notorious Russia-based Conti, and leaked the ransomware …

Tags Analysis, Conti, IT, News

Invicti Security Adds Software Composition Analysis to Its Industry- Leading AppSec Platform

28 February 2022

AUSTIN, TX – Feb. 28, 2022 – With headline-grabbing vulnerabilities such as Log4Shell drawing attention to the risks presented by …

Tags Analysis, Composition, IT, Platforms, Softwares

AdaCore GNAT Dynamic Analysis Suite helps customers build critical software systems

23 February 2022

AdaCore released its new GNAT Dynamic Analysis Suite – a bundle of analysis, testing, verification, and code coverage technologies to …

Tags Analysis, Dynamics, IT, News, Suite

Hackers Using New Malware Packer DTPacker to Avoid Analysis, Detection

25 January 2022

A previously undocumented malware packer named DTPacker has been observed distributing multiple remote access trojans (RATs) and …

Tags Analysis, Avoid, Cyber Threats, Detection, Hacking

2022 Forecast: What’s Next for Tech Workers?

28 December 2021

These past two years will stand as the weirdest and wildest any software developer, engineer, architect, or their managers have ever lived …

Tags Analysis, Culture, DevOps, Forecasts, IT

How to Find Dangerous Log4j Libraries

23 December 2021

The Apache log4j logging library has become the COVID-19 of technology. No sooner than we fix one version than another pops up to annoy …

Tags Analysis, Find, How, IT, Libraries

Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory

15 December 2021

The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security …

Tags Analysis, Inventory, Log4j, Security Pro, Vulnerability

Log4Shell: We Are in so Much Trouble

14 December 2021

The open source Java logging library Apache Log4j is used a lot. And, when I say a lot, I mean it’s used in hundreds of …

Tags Analysis, Development, IT, Log4Shell, Tools
Post navigation
Older posts
Page1 Page2 … Page27 Next →
Cookie-Free

NVD

  • CVE-2022-2736 – A vulnerability was found in SourceCodester Company Website CMS. It has been classified as …11 August 2022
  • CVE-2022-2770 – A vulnerability, which was classified as critical, was found in SourceCodester Simple Onli …11 August 2022
  • CVE-2022-20244 – In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This …11 August 2022
  • CVE-2022-20372 – In exynos5_i2c_irq of (TBD), there is a possible out of bounds write due to a use after fr …11 August 2022
  • CVE-2022-20403 – Product: AndroidVersions: Android kernelAndroid ID: A-207975764References: N/A …11 August 2022
  • CVE-2022-35665 – Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 1 …11 August 2022

EXPLOITS

  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »