Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Application

Cloud Native Application Protection Platform: A Utility Knife for Cloud Security Services

15 June 2022

Does the world need another acronym? Probably …

Tags Application, Platforms, Protection, Security Services, Services

Q1 2022 DDoS and Application Attack Activity: An Overview

8 June 2022

The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors dominated the …

Tags Activity, Application, Attacks, Overview, Q1

Research Reveals 75% of CISOs Are Worried Too Many Application Vulnerabilities Leak Into Production, Despite a Multi-Layered Security

2 June 2022

79% of CISOs say continuous runtime vulnerability management is an essential capability to keep up with the expanding complexity of modern …

Tags Application, CISOs, Leaks, Production, Research

Fighting Follina: Application Vulnerabilities and Detection Possibilities

2 June 2022

Although organizations should perform proper risk analysis and patch as soon as practical after there’s a fix for this vulnerability, …

Tags Application, Detection, Fighting, Follina, Security Pro

10 Application Security Best Practices To Follow In 2022

27 May 2022

In recent years, the app development industry has experienced unprecedented growth. Mobile applications and web applications have become an …

Tags Application, Application Security, Automation, Best Practices, Follow

UK Government Cybersecurity Advisory Board Applications Now Open

25 May 2022

Applications for joining the Government Cyber Security Advisory Board are now open. The UK Government Cyber Security Strategy was launched …

Tags Advisory Board, Application, IT, Now, UK Government

Ericom’s New ZTEdge Web Application Isolation Addresses Security Concerns Associated With Third-Party Contractor Application Access

17 May 2022

NEW YORK (PRWEB) MAY 17, 2022 Ericom Software, a leading provider of Zero Trust cloud cybersecurity solutions and developer of the …

Tags Access, Application, Concerns, Contractors, Isolation

Application security testing startup StackHawk raises $20.7M

12 May 2022

Application security testing startup StackHawk Inc. said today it has raised $20.7 million in new funding for product development and …

Tags Application, Auth0, Cloud Computing, CloudBees, Continuous Integration

Hybrid Work Drives Demand for Collaboration, Compliance and Security

3 May 2022

Every organization with cloud-based collaboration tools should be thinking about security, privacy, and compliance. Post-pandemic, digital …

Tags Application, Cloud, Cloud Computing, Collaborations, Compliance

Electron Application Attacks: No Vulnerability Required

27 April 2022

While you may have never heard of “Electron applications,” you most likely use them. Electron technology is in many of today’s most …

Tags Application, Attacks, Cloud Computing, Cloud Security, Github Electron

API Attacks Soar Amid the Growing Application Surface Area

26 April 2022

With Web application programming interface (API) traffic growing quickly, the average cloud-focused company sees three times more …

Tags Application, Attacks, IT, Soar, Surface

Just Because You Don’t Use Log4j or Spring Beans Doesn’t Mean Your Application is Unaffected

20 April 2022

The Spring Framework vulnerability – made public on March 29, 2021 – was caused by unforeseen access to Tomcat’s ClassLoader as a …

Tags Application, Beans, Just, Log4j, Mean

Securing the Stopgap: Controlling Access to SaaS Applications

13 April 2022

The adoption of software-as-a-service (SaaS) applications to help accomplish critical business activities has increased substantially …

Tags Access, Application, Cloud, IT, News

Teleport Machine ID Demo: Securing the Infrastructure and Applications with Robots

6 April 2022

As part of Teleport 9.0, a new feature, Teleport Machine ID was released to help bridge human and machine access which consolidates …

Tags Application, Cloud Services, Compliance, Demos, ID
Post navigation
Older posts
Page1 Page2 … Page27 Next →
Cookie-Free

NVD

  • CVE-2022-31104 – Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime’s implemen …28 June 2022
  • CVE-2022-34132 – Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the …28 June 2022
  • CVE-2022-34133 – Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerab …28 June 2022
  • CVE-2022-34134 – Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) v …28 June 2022
  • CVE-2022-1572 – The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks in …27 June 2022
  • CVE-2022-1904 – The Pricing Tables WordPress Plugin WordPress plugin before 3.2.1 does not sanitise and es …27 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Virtua Software Cobranca 12S – SQLi14 June 2022
  • Marval MSM v14.19.0.12476 – Cross-Site Request Forgery (CSRF)14 June 2022
  • Marval MSM v14.19.0.12476 – Remote Code Execution (RCE) (Authenticated)14 June 2022

SECURELIST

  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022
  • Router security in 20218 June 2022
  • CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction6 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »