Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cloud

Cloud diversification brings complex data management challenges

31 March 2023

As IT infrastructure becomes more diverse, organizations face the challenge of integrating data management and control, according to …

Tags Cloud, IT, News, Nutanix

Automatic Updates Deliver Malicious 3CX ‘Upgrades’ to Enterprises

30 March 2023

In a Solar Winds-like attack, compromised, digitally signed versions of 3CX DesktopApp are landing on user systems via the vendor’s …

Tags 3CX, Automatic Updates, Cloud, IT, Malicious

Organizations Reassess Cyber Insurance as Self-Insurance Strategies Emerge

30 March 2023

Risk reassessment is shaking up the cybersecurity insurance market, leading some organizations to consider their options, including …

Tags Cloud, Cyber Insurance, IT, Organizations, Strategies

Socura Launches Managed SASE (MSASE) Service

30 March 2023

SASE it is still an emergent and complex technology that the majority of MSSPs do not offer in 2023. Socura is one of the first UK security …

Tags Cloud, Launches, Managed, SASE, Services

Stop Blaming the End User for Security Risk

30 March 2023

Don’t count on securing end users for system security. Instead, focus on better securing the systems — make them closed by default and …

Tags Cloud, End User, IT, Security Risks, Stop

Spera Takes Aim at Identity Security Posture Management

30 March 2023

ISPM is a combination of identity attack surface management, and risk reduction, as well as identity threat prevention, detection, and …

Tags Cloud, Identity, IT, Management, News

Spira Takes Aim at Identity Security Posture Management

30 March 2023

ISPM is a combination of identity attack surface management, and risk reduction, as well as identity threat prevention, detection, and …

Tags Cloud, Identity, IT, Management, News

Top Tech Talent Warns on AI’s Threat to Human Existence in Open Letter

29 March 2023

Musk, Wozniak, and Yang are among more than a thousand tech leaders asking for time to establish human safety parameters around …

Tags Cloud, Humans, Open Letter, Tech Talent, Threats

Phishing Emails Up a Whopping 569% in 2022

29 March 2023

Credential phishing emails are the clear favorite of threat actors, with a 478% spike last year, new research …

Tags Cloud, IT, News, Phishing Emails

Cybersecurity Investment and M&A Activity Slowed in Q1, 2023

29 March 2023

Financial activity in the cybersecurity industry declined sharply in the first quarter of 2023 compared to the same period in 2022, and …

Tags Activity, Cloud, Investments, M&A, Q1

Using Observability to Power a Smarter Cybersecurity Strategy

29 March 2023

When it comes to security, you can’t protect what you can’t see. That’s why organizations that can visualize and understand their data are …

Tags Cloud, Cybersecurity Strategy, Observability, Power, Using

The CISO Mantra: Get Ready to Do More With Less

29 March 2023

At first blush, that sounds as if I squeezed people harder than ever. But it was just the …

Tags CISO, Cloud, Get, Less, Ready

Just 1% of Cloud Permissions Are Actively Used

29 March 2023

A surge in workload identities, super admins and “over-permissioning” is driving increased cyber risk for organizations running cloud …

Tags Cloud, IT, Just, News, Permissions

How Does Data Literacy Enhance Data Security?

29 March 2023

With the rise in cloud-based security concerns and other issues, organizations must improve data literacy across the …

Tags Cloud, Data Literacy, Data Security, How, IT
Older posts
Page1 Page2 … Page346 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-28727 – Panasonic AiSEG2 versions 2.00J through 2.93A allows adjacent attackers bypass authenticat …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • Judging Management System v1.0 – Remote Code Execution (RCE)31 March 2023
  • Bludit 3-14-1 Plugin ‘UploadPlugin’ – Remote Code Execution (RCE) (Authenticated)31 March 2023
  • rconfig 3.9.7 – Sql Injection (Authenticated)31 March 2023
  • Spitfire CMS 1.0.475 – PHP Object Injection31 March 2023
  • Senayan Library Management System v9.0.0 – SQL Injection31 March 2023
  • EQ Enterprise management system v2.2.0 – SQL Injection31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »