Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cloud Security

CISA Releases Cloud Security Technical Reference Architecture

23 June 2022

CISA has released its Cloud Security (CS) Technical Reference Architecture (TRA) to guide federal civilian departments and agencies in …

Tags CISA, Cloud Computing, Cloud Security, Releases, Technical

What Does Mature Cloud Security Look Like?

20 June 2022

(SPONSORED ARTICLE) Over the past two years, we’ve seen a rapid acceleration of cloud adoption across a spectrum of organizations. …

Tags Cloud Computing, Cloud Security, IT, Likes, Mature

OpenSSF Releases Fuzz Introspector to Improve C/C++ Fuzz Testing Coverage

18 June 2022

The Open Source Security Foundation (OpenSSF) has just released a tool to improve fuzzing coverage by providing actionable insights to …

Tags Application Security, C/C++, Cloud Computing, Cloud Security, Coverage

And the Cloud Security Alliance’s Top Threats for 2022 Are…

10 June 2022

Trouble here, trouble there, it’s trouble, trouble everywhere in cloud security in 2022. We all know that, but the Cloud Security …

Tags Cloud Computing, Cloud Security, Cloud Services, Open Source, Threats

How to Create Identity and Access Governance In and Across Clouds

7 June 2022

In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for …

Tags Access, Cloud Computing, Cloud Security, Create, How

HashiCorp Vault Improves Eventual Consistency with Server-Side Consistent Tokens

26 May 2022

HashiCorp has released Vault 1.10, introducing a number of new features to their secrets and identity management platform. Server-side …

Tags Authentication, Authorization, Cloud Architecture, Cloud Computing, Cloud Security

Amazon EC2 Supports NitroTPM and UEFI Secure Boot

22 May 2022

AWS recently announced the general availability of the UEFI Secure Boot and of NitroTPM, a virtual TPM module for EC2 instances based on …

Tags Architecture & Design, Cloud, Cloud Security, Development, EC2

Closing the Gap Between Application Security and Observability

20 May 2022

When it’s all said and done, application security pros may come to look upon the Log4Shell vulnerability as a gift.   Potentially one …

Tags Cloud Computing, Cloud Security, Gap, Observability, Web Security

Sysdig Open Source Now Includes Cloud Security

17 May 2022

The incident response standard for containers, Sysdig open source, has been extended to the cloud, according to Sysdig, the unified …

Tags Cloud Monitoring, Cloud Security, Developers, GNU, Now

Progress Chef Cloud Security improves security and compliance outcomes for customers

12 May 2022

Progress released Progress Chef Cloud Security, extending DevSecOps with compliance support for native cloud assets and enabling end-to-end …

Tags Chef, Chef (Software), Cloud Computing, Cloud Security, Progress

Cloud Security Management by Deloitte helps organizations secure their cloud environments

11 May 2022

To help U.S. executives concerned about visibility into the security of their cloud workloads and applications, Deloitte has expanded …

Tags Cloud Computing, Cloud Security, Deloitte, IT, Management

Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale

5 May 2022

As businesses embrace more remote users and a hybrid work model, managing user identity and access is more important than ever. Add …

Tags CISO, Cloud Computing, Cloud Security, Differences, Identity

Crowdstrike Ups Its Falcon Cloud Security Game

5 May 2022

Not all cloud security programs are based on open source software. CrowdStrike, a cloud and endpoint security company, offers its Falcon …

Tags Cloud Computing, Cloud Security, Cloud Services, Falcon, Game

Forrester: 96% of Businesses Have Had Cloud Security Probs

4 May 2022

We all know that our clouds are under constant attack, but what Forrester Consulting found in a survey of 154 cloud security …

Tags Businesses, Cloud Computing, Cloud Security, Cloud Services, Forrester
Post navigation
Older posts
Page1 Page2 … Page103 Next →
Cookie-Free

NVD

  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022
  • CVE-2017-20123 – A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This aff …30 June 2022
  • CVE-2017-20124 – A vulnerability classified as critical has been found in Online Hotel Booking System Pro P …30 June 2022
  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022
  • CVE-2022-26135 – A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenti …30 June 2022
  • CVE-2021-40643 – EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail opti …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • phpIPAM 1.4.5 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • TP-Link Router AX50 firmware 210730 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Pandora FMS v7.0NG.742 – Remote Code Execution (RCE) (Authenticated)14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »