Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Articles

API Security: logic-based threats and how to combat them

12 May 2022

APIs bring tremendous value to businesses in every sector. They’re great for promoting collaboration and partnership and allow a kind of …

Tags Articles, IT, News

Article: The Role of DevOps in Cloud Security Management

22 April 2022

Different areas of cloud security must be examined to strengthen security in the cloud versus security of the cloud. This includes …

Tags Application Security, Articles, DevSecOps, Management, Roles

Article: Strategies for Assessing and Prioritizing Security Risks Such as Log4j

28 March 2022

The evolving threat landscape requires a comprehensive approach to mitigation. An effective strategy is built on visibility, assessing …

Tags Application Security, Articles, Cloud Computing, Cloud Security, DevOps

Article: Insights into the Emerging Prevalence of Software Vulnerabilities

25 March 2022

Software Bugs Although there are in-roads regarding self-writing code, software development remains a hands-on human endeavor. Therefore, …

Tags Application Security, Articles, Cloud Computing, Cloud Security, DevOps

Best Security Awareness Advice For Businesses In 2022

4 March 2022

Physical security continues to be crucial for businesses, even in the era of cyber threats. Moreover, the situation has changed after an …

Tags Advice, Articles, Best, Businesses, ERP

Article: Is Docker Secure Enough?

23 February 2022

Docker is a platform most developers are now familiar with. It makes it easier to create, deploy and run your applications in packages …

Tags Application Security, Articles, Cloud Computing, Cloud Security, Containers (Cloud Computing)

Article: InfoQ Mobile and IoT Trends Report 2022

21 February 2022

One of the most compelling InfoQ features are our topic graphs, which synthesizes our understanding of how different topics stack up in the …

Tags Android, Apple, Architecture & Design, Articles, Augmented Reality

Article: An Introduction to Post-quantum Public Key Cryptography

11 February 2022

Though quantum computers are in their initial stage, the research and the speed at which the inventions are taking place can make them …

Tags Articles, Development, Introduction, IT, Privacy

Article: Mitigating Insider Security Threats with Zero Trust

14 January 2022

As ransomware and phishing attacks increase, it is evident that attack vectors can be found on the inside in abundance as opposed to what …

Tags Access Controls, Articles, Development, Insiders, IT

Article: The Next Evolution of the Database Sharding Architecture

12 January 2022

In this article, author Juan Pan discusses the data sharding architecture patterns in a distributed database system. She explains how …

Tags Architecture, Articles, Database Management, Databases, Encryption

Identity Security in 2022: Why Automation, UX, and Best-of-Suite Software Will Lead the Way

7 January 2022

One of the great downfalls of modern business is that security is too often an afterthought. As such, responses to data breaches and …

Tags Articles, Automation, Design, Identity, IT

Research finds vulnerabilities in 97 percent of applications

16 November 2021

Data from 3,900 tests conducted on 2,600 software or systems targets reveals that 97 percent had some form of vulnerability, 30 percent of …

Tags Articles, IT, News, Research, Softwares

Lag between detection and investigation of cloud attacks harms businesses

16 November 2021

New research carried out by ESG for digital forensics platform Cado Security finds that 89 percent of companies have experienced a negative …

Tags Articles, Cloud, Containerization, Digital Forensics, IT

Article: Reducing Cloud Infrastructure Complexity

15 November 2021

Cloud computing adoption has taken the world by storm, and is accelerating unabated. According to Flexera’s annual State of the Cloud …

Tags Architecture & Design, Articles, Automation, Cloud, Cloud Adoption
Post navigation
Older posts
Page1 Page2 … Page207 Next →
Cookie-Free

NVD

  • CVE-2022-1886 – Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. …26 May 2022
  • CVE-2022-29682 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-20809 – Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expresswa …26 May 2022
  • CVE-2022-29683 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-20821 – A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenti …26 May 2022
  • CVE-2022-29684 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022
  • ISaPWN – research on the security of ISaGRAF Runtime23 May 2022
  • Evaluation of cyber activities and the threat landscape in Ukraine17 May 2022
  • HTML attachments in phishing e-mails16 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »