Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Attackers

How Attackers Move from Azure Active Directory to On-Prem AD

26 May 2022

Microsoft’s Active Directory (AD) continues to be a primary target for attackers, and as reliance on cloud increases, organizations are …

Tags Attackers, How, IT, On-Premise, Open Source

New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message

25 May 2022

Popular video conferencing service Zoom has resolved as many as four security vulnerabilities, which could be exploited to compromise …

Tags Attackers, Flaws, Google, Hacks, Just

Authentication Is Static, Yet Attackers Are Dynamic: Filling the Critical Gap

20 May 2022

To succeed against dynamic cybercriminals, organizations must go multiple steps further and build a learning system that evolves over time …

Tags Attackers, Authentication, Critical, Dynamics, Gap

Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

19 May 2022

Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect their …

Tags Attackers, Cars, Flaws, IoT, Unlock

Attackers Can Unlock Tesla Cars by Exploiting Bluetooth Flaws

19 May 2022

Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect their …

Tags Attackers, Cars, Flaws, IoT, Unlock

Remote work hazards: Attackers exploit weak WiFi, endpoints, and the cloud

17 May 2022

Infoblox unveils a global report examining the state of security concerns, costs, and remedies. As the pandemic and uneven shutdowns …

Tags Attackers, Infoblox, IT, Remote, SASE

Critical Vulnerability in Azure Synapse Let Attackers Control other Customers’ Workspaces

12 May 2022

The Microsoft Azure Synapse service has been identified as unsafe to use, and Orca Security has issued a security advisory for …

Tags Attackers, Let, Security Pro, Vulnerability, Workspaces

Attackers Use Event Logs to Hide Fileless Malware

4 May 2022

Researchers have discovered a malicious campaign utilizing a never-before-seen technique for quietly planting fileless malware on target …

Tags Attackers, Events, Hacks, Hide, Logs

One Small Error by DevOps, One Giant Opening for Attackers

4 May 2022

When you look at breach statistics in today’s cloud-dominated IT world, you can see several examples where a small error made by the …

Tags Attackers, DevOps, Errors, Giant, Methodologies

SolarWinds Attackers Gear Up for Typosquatting Attacks

3 May 2022

The same infrastructure traced back to Russian-speaking threat group Nobelium is being used to set up misspelled domain names, presaging …

Tags Attackers, Attacks, Gears, SolarWinds, Typosquatting

NPM Bug Allowed Attackers to Distribute Malware as Legitimate Packages

27 April 2022

A “logical flaw” has been disclosed in NPM, the default package manager for the Node.js JavaScript runtime environment, that enables …

Tags Attackers, Bug, IT, Malware, Packages

Critical RCE Vulnerability in Google’s VirusTotal Platform Let Attackers Scans Capabilities

26 April 2022

There is a security vulnerability in the VirusTotal platform that has been discovered by researchers, and it has the potential to be …

Tags Attackers, Capabilities, Critical, Let, Platforms

Critical Bug in Everscale Wallet Could’ve Let Attackers Steal Cryptocurrencies

25 April 2022

A security vulnerability has been disclosed in the web version of the Ever Surf wallet that, if successfully weaponized, could allow an …

Tags Attackers, Bug, Critical, Cryptocurrencies, Let

Critical Android Bug Let Attackers to Access Users’ Media and Audio Conversations

25 April 2022

The audio decoders in Qualcomm and MediaTek chips have been reported to contain three security vulnerabilities. Leaving unpatched three of …

Tags Access, Android, Attackers, Audio, Conversations
Post navigation
Older posts
Page1 Page2 … Page22 Next →
Cookie-Free

NVD

  • CVE-2022-29663 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022
  • CVE-2022-29688 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-26857 – Dell OpenManage Enterprise Versions 3.8.3 and prior contain an improper authorization vuln …26 May 2022
  • CVE-2022-30783 – An invalid return code in fuse_kern_mount enables intercepting of libfuse-lite protocol tr …26 May 2022
  • CVE-2021-42692 – There is a stack-overflow vulnerability in tinytoml v0.4 that can cause a crash or DoS. …26 May 2022
  • CVE-2022-29664 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022
  • ISaPWN – research on the security of ISaGRAF Runtime23 May 2022
  • Evaluation of cyber activities and the threat landscape in Ukraine17 May 2022
  • HTML attachments in phishing e-mails16 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »