Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cloud Computing

New AlienFox toolkit harvests credentials for tens of cloud services

31 March 2023

AlienFox is a novel comprehensive toolset for harvesting credentials for multiple cloud service providers, SentinelLabs reported. AlienFox …

Tags Cloud Computing, IT, Malware, New, News

S3 Ep128: So you want to be a cybercriminal? [Audio + Text]

30 March 2023

DOUG.   Honeypots, patches and the passing of an icon. All that and more on the Naked Security …

Tags Amazon, Apple, Audio, AWS, Cloud Computing

Celebrity Vulnerabilities: Effective Response to Critical Production Threats

30 March 2023

Alyssa Miller, chief information security officer of EpiqGlobal, presented at QCon London about the lessons learned from three major …

Tags Application Security, Architecture & Design, Celebrity, Cloud Computing, Cloud Security

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

30 March 2023

A new “comprehensive toolset” called AlienFox is being distributed on Telegram as a way for threat actors to harvest credentials from API …

Tags Amazon, AWS, Cloud Computing, Cloud Provider, Frameworks

NCA Celebrates Multimillion-Pound Fraud Takedowns

30 March 2023

The UK agency for serious and organized crime has revealed a month-long anti-fraud operation resulted in 290 arrests and the seizure or …

Tags Cloud Computing, Cloud-Native, Fraud, IT, News

How to use Amazon GuardDuty and AWS WAF v2 to automatically block suspicious hosts

29 March 2023

In this post, we’ll share an automation pattern that you can use to automatically detect and block suspicious hosts that are attempting …

Tags Amazon CloudWatch, AWS, Cloud Computing, How, WAF

The Infinite Journey of Zero Trust Is Worth the Cost, Federal Officials Say

29 March 2023

The enactment of zero trust cybersecurity policy — wherein, essentially, users are required to provide credentials at every new access …

Tags Cloud Computing, Cloud Provider, Costs, Events, Federal

Compliance In The Cloud: Why IAM Is Critical

29 March 2023

In this post, I will show you why IAM is critical and essential for compliance in the cloud. Cloud adoption is more and more popular in …

Tags Cloud Computing, Cloud Security, Compliance, Critical, IAM

Bitwarden Announces Secrets Management With a Combination of Open Source, End-to-End Encryption, and Ease of Use

28 March 2023

Bitwarden already protects millions of individuals and businesses by securing their online credentials and critical information. Today, …

Tags Bitwarden, Cloud Computing, Encryption, End-to-End, Malware

Cops use fake DDoS services to take aim at wannabe cybercriminals

28 March 2023

The UK’s National Crime Agency (NCA) has recently announced work that it’s been doing as an ongoing part of a multinational project …

Tags Cloud Computing, Cloud-Native, Cops, DDoS, DOS

Sinister MacStealer Malware Steals Mac Passwords And Other Private Data

28 March 2023

A highly malicious malware is infecting Intel- and M-powered Macs, stealing sensitive information such as user passwords, credit card info, …

Tags Apple, Cloud Computing, Cloud Storage, iCloud, Keychain

MacStealer MacOS Malware Steals Passwords from iCloud Keychain

28 March 2023

Researchers discovered a new MacOS info-stealer that extracts documents, cookies, and login data from infected devices. MacStealer uses …

Tags Apple, Cloud Computing, Cloud Storage, iCloud, Keychain

New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords

27 March 2023

A new information-stealing malware has set its sights on Apple’s macOS operating system to siphon sensitive information from compromised …

Tags Apple, Cloud Computing, Cloud Storage, Data, iCloud

NCA Harvests Info on DDoS-For-Hire With Fake Booter Sites

27 March 2023

The UK’s National Crime Agency (NCA) has revealed it is running several fake DDoS-for-hire websites in a bid to disrupt this thriving …

Tags Booter, Cloud Computing, Cloud-Native, Fakes, Info
Older posts
Page1 Page2 … Page453 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1769 – A vulnerability, which was classified as problematic, was found in SourceCodester Grade Po …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Unauthenticated Factory Reset31 March 2023
  • Judging Management System v1.0 – Authentication Bypass31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Remote Command Execution (RCE)31 March 2023
  • Bangresto 1.0 – SQL Injection31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Authentication Bypass31 March 2023
  • Textpattern 4.8.8 – Remote Code Execution (RCE) (Authenticated)31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »