Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Businesses

Cyber-Insurance Fail: Most Businesses Lack Ransomware Coverage

11 August 2022

Even among businesses with cyber insurance, they lack coverage for basic costs of many cyberattacks, according to a BlackBerry …

Tags Businesses, Coverage, Fail, IT, Ransomware

Businesses should dump Windows for the Linux desktop

10 August 2022

I’ve been preaching the gospel of the Linux desktop for more years than some of you have been alive. However, unless you argue that the …

Tags Businesses, IT, Linux, Microsoft, Windows

Businesses are struggling to balance security and end-user experience

8 August 2022

Modern organizations are challenged by conflicting demands to secure the enterprise while delivering excellent end-user experience, …

Tags Broadcom, Businesses, IT, News

Businesses lack visibility into run-time threats against mobile apps and APIs

4 August 2022

This Help Net Security video reveals how run-time security threats against mobile apps and APIs continue to inflict damage on …

Tags APIs, Businesses, IT, News

Businesses confess: We pass cyberattack costs onto customers

29 July 2022

The costs incurred by organizations suffering data losses continue to go up, and 60 percent of companies surveyed by IBM said they were …

Tags Businesses, IT, News

Emerging H0lyGh0st Ransomware Tied to North Korea

15 July 2022

Microsoft researchers have linked an emerging ransomware threat that already has compromised a number of small-to-mid-sized businesses to …

Tags Businesses, Malware, Microsoft, Ransomware, Targeting

North Korean Hackers Targeting Small and Midsize Businesses with H0lyGh0st Ransomware

15 July 2022

An emerging threat cluster originating from North Korea has been linked to developing and using ransomware in cyberattacks targeting small …

Tags Businesses, Microsoft, North Korea, Ransomware, Small

Businesses are adding more endpoints, but can’t manage them all

14 July 2022

Most enterprises struggle to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired …

Tags Businesses, CISO, IT, News, Ponemon Institute

3 Cyber Threats Resulting From Today’s Technology Choices to Hit Businesses by 2024

5 July 2022

Companies need to consider the cost to disengage from the cloud along with proactive risk management that looks at governance issues …

Tags Businesses, Cloud, Cyber Threats, IT, News

Businesses deal with increasing bot attacks

17 June 2022

Netacea released its report into how businesses are dealing with bot attacks. It reveals one key area where businesses are failing to …

Tags Businesses, IT, News

Researchers Disclose Rooting Backdoor in Mitel IP Phones for Businesses

13 June 2022

Cybersecurity researchers have disclosed details of two medium-security flaws in Mitel 6800/6900 desk phones that, if successfully …

Tags Backdoors, Businesses, Phones, Researchers, Rooting

Businesses are leaving bot attacks unchallenged for almost four months

13 June 2022

Netacea released its report into how businesses are dealing with bot attacks. It reveals one key area where businesses are failing to …

Tags Businesses, IT, News

Cracking the Email Security Code: 12 Best Practices for Small and Midsize Businesses

8 June 2022

It only takes one successful attack to spell disaster. What can you do to protect your …

Tags Best Practices, Businesses, Codes, Cracking, Small

Cybersecurity Automation: How Can Businesses Benefit From It

31 May 2022

Businesses of all sizes are prone to cyberattacks, and this is no longer a taboo. Malicious actors are becoming intelligent, and tools are …

Tags Artificial Intelligence, Benefits, Business, Businesses, How
Post navigation
Older posts
Page1 Page2 … Page26 Next →
Cookie-Free

NVD

  • CVE-2022-20273 – In Bluetooth, there is a possible out of bounds read due to a heap buffer overflow. This c …12 August 2022
  • CVE-2022-20289 – In PackageInstaller, there is a possible way to determine whether an app is installed, wit …12 August 2022
  • CVE-2022-20305 – In ContentService, there is a possible disclosure of available account types due to a miss …12 August 2022
  • CVE-2022-20321 – In Settings, there is a possible way for an application without permissions to read conten …12 August 2022
  • CVE-2022-20338 – In Core Utilities, there is a possible way to craft a malformed Uri object due to improper …12 August 2022
  • CVE-2022-28636 – A potential local arbitrary code execution and a local denial of service (DoS) vulnerabili …12 August 2022

EXPLOITS

  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »