Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Articles

Draft Blog Article to Duplicate

7 February 2023

Title of article Paragraph stating the thesis of the article and supporting points. What Should You …

Tags Advisory, Articles, Blogs, Draft, IT

Article: Data Protection Methods for Federal Organizations and Beyond

18 January 2023

Data loss or theft is a highly probable and ugly eventuality, which is a problem for those in charge of preventing data breaches. Some of …

Tags Application Security, Articles, Beyond, Cloud Computing, Cloud Security

Article: The Importance of Pipeline Quality Gates and How to Implement Them

27 December 2022

A quality gate is an enforced measure built into your pipeline that the software needs to meet before it can proceed to the next step. This …

Tags Articles, Code Quality, Continuous Delivery, Continuous Deployment, Continuous Integration

Article: API Security: From Defense-in-Depth (DiD) To Zero Trust

30 November 2022

Nearly all companies have experienced security incidents but few have an API security policy that includes dedicated API testing and …

Tags Application Security, Articles, Cloud Computing, Cloud Security, DevOps

Article: Who Moved My Code? An Anatomy of Code Obfuscation

9 November 2022

In this article, we introduce the topic of code obfuscation, with emphasis on string obfuscation. Obfuscation is an important practice to …

Tags Anatomy, Application Security, Articles, Codes, Data Privacy

Article: Successfully Integrating Dynamic Security Testing into Your CI/CD Pipeline

21 October 2022

Dynamic security testing tools don’t require advanced cybersecurity knowledge to operate. Integrating DAST into your CI/CD pipeline …

Tags Application Security, Articles, CI/CD, Cloud Computing, Cloud Security

Article: What Does Zero Trust Mean for Kubernetes?

25 August 2022

Zero trust is a powerful security model that’s at the forefront of modern security practices. It’s also a term that is prone to buzz …

Tags Articles, Cloud, Cloud Computing, Cloud Security, DevOps

Business Best Practices For Remote Access Security

23 August 2022

Remote access was valid for a rare few business domains some years ago, but the pandemic changed the picture altogether. Almost every …

Tags Articles, Best Practices, Business, ERP, IT

Article: What Developers Must Know About Zero Trust

4 August 2022

Zero trust solves the problem of open network access by selectively allowing access only to the specific resources a user should be allowed …

Tags About, Application Security, Articles, Cloud Computing, Cloud Security

Article: Managing Kubernetes Secrets with the External Secrets Operator

2 August 2022

Kubernetes secrets is a mechanism that allows sensitive information to be stored in a central repository called etcd, which is a more …

Tags Application Security, Architecture & Design, Articles, Cloud, Cloud Computing

Article: Using DevOps Automation to Combat DevOps Workforce Shortages

13 July 2022

Introduction: Workforce Shortages The well-documented demand for (and shortage of) DevOps engineers is a persistent itch that has remained …

Tags Articles, Cloud Computing, Cloud Security, Combat, DevSecOps

Article: API Friction Complicates Hunting for Cloud Vulnerabilities. SQL Makes it Simple

6 July 2022

APIs can tell you everything about your cloud infrastructure but they’re hard to use and work in different ways. What if you could write …

Tags Amazon, Articles, AWS, Boto, Cloud

Article: Diving into Zero Trust Security

23 June 2022

In 2020, hackers made about 4.2 billion dollars from phishing scams. The current scenario of network security highly depends on the …

Tags Access Controls, Articles, Authentication, Authorization, Cisco

API Security: logic-based threats and how to combat them

12 May 2022

APIs bring tremendous value to businesses in every sector. They’re great for promoting collaboration and partnership and allow a kind of …

Tags Articles, IT, News
Older posts
Page1 Page2 … Page208 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »