Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Big Data

Microsoft Security Copilot is the AI-ssential tool for cybersecurity experts

29 March 2023

Meet Microsoft Security Copilot, your new GPT-4 powered chatbot for cybersecurity. The ChatGPT-like AI assistant leverages …

Tags AI, Artificial Intelligence, Big Data, Copilot, IT

A roadmap to zero-trust maturity: 6 key insights from Forrester

28 March 2023

Once an enterprise decides to go all-in on zero trust, it usually starts strong, only to hit barriers no one saw coming. This makes a …

Tags A.I, Big Data, Contributors, Forrester, IT

Cloud Services can Enrich Your Business’s Efficiency: A Thorough Overview

21 March 2023

In today’s digital age, technology has become integral to our lives, surrounding us at every turn. Evading its influence is virtually …

Tags Big Data, Contributors, Efficiency, IT, Overview

Cloud Computing and Render Farms in Architectural Modeling

20 March 2023

If you have a processing task for your computer to undertake, like turning your 2D designs into 3D computer-generated renderings, then your …

Tags A.I, Architectural, Big Data, Contributors, Farms

The silent spreaders: How computer worms can sneak into your system undetected?

20 March 2023

What is a computer worm? It is a type of malware that can cause significant damage to computer systems and networks by replicating itself …

Tags Big Data, Cloud Computing, How, IT, Malware

CrowdStrike report shows identities under siege

16 March 2023

Cyberattacks exploiting gaps in cloud infrastructure — to steal credentials, identities and data — skyrocketed in 2022, growing 95%, …

Tags Big Data, Contributors, CrowdStrike, IT, Thought Leaders

Top Tools for Your Cloud Data Security Stack in 2023

15 March 2023

Cloud data security is a crucial aspect of safeguarding sensitive data stored in cloud environments from unauthorized access, theft, and …

Tags Big Data, Cloud Computing, Cloud Data, Stacks, Tools

Enabling a Work-from-Anywhere Culture Starts with 5G

14 March 2023

Work-from-anywhere has been an enduring theme since the onset of the pandemic, with 35% of surveyed Americans working remotely five days …

Tags 5G, Big Data, Contributors, Culture, Internet of Things

Common DevOps Misconceptions: It’s Not A Role, But A Culture

9 March 2023

Common DevOps Misconceptions 86% of businesses say it’s important for their company to develop and produce new software fast to win …

Tags Big Data, Commons, Contributors, Culture, DevOps

A Guide to Using XDR Threat Protection to Stop Data Breaches

8 March 2023

Data breaches are becoming more common every day. Last year, there were 1,802 data breaches that affected over 420 million …

Tags Big Data, Guides, Stop, Using, XDR

Breaking Barriers with the Cloud: How Computing is Unlocking New Business Horizons

7 March 2023

The ever-increasing rate of global cloud adoption is enough to predict that cloud computing will soon become the need of the hour. Whether …

Tags Big Data, Business, Cloud, Computing, Contributors

Three Ways to Save Your Organization on Cloud Costs in 2023 

6 March 2023

Organization on Cloud Costs Organizations of all sizes are currently navigating their plans to avoid the recent surge in cyber-attacks and …

Tags Big Data, Contributors, Internet of Things, IT, Organizations

What is the Future of Cyberattacks in 2030 (and Beyond)?

3 March 2023

The year is 2030. The world is full of smart mega cities, digital surveillance is openly ubiquitous, cash transactions no longer exist, …

Tags Artificial Intelligence (AI), Beyond, Big Data, Cloud Computing, Risk Management

Google Cloud Platform allows data exfiltration without a (forensic) trace

1 March 2023

Attackers can exfiltrate company data stored in Google Cloud Platform (GCP) storage buckets without leaving obvious forensic traces of the …

Tags Big Data, Cloud Computing, Cloud Provider, Google Cloud, IT
Older posts
Page1 Page2 … Page73 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1769 – A vulnerability, which was classified as problematic, was found in SourceCodester Grade Po …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Unauthenticated Factory Reset31 March 2023
  • Judging Management System v1.0 – Authentication Bypass31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Remote Command Execution (RCE)31 March 2023
  • Bangresto 1.0 – SQL Injection31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Authentication Bypass31 March 2023
  • Textpattern 4.8.8 – Remote Code Execution (RCE) (Authenticated)31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »