Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cloud Software

Phishing campaign targets users of MetaMask software cryptocurrency wallet

23 June 2022

A phishing campaign targeting users of the MetaMask software cryptocurrency wallet is attempting to steal account credentials. Detailed …

Tags Cloud Computing, Cloud Software, Cyber, Identity Theft, Office 365

Voicemail-themed phishing attacks target organisations

21 June 2022

Have you received an email notification that there is a voicemail waiting to be listened to by you? Maybe you would be wise to think …

Tags Cloud Computing, Cloud Software, Identity Theft, Microsoft Office, Microsoft Outlook

Fake voicemail notifications are after Office365, Outlook credentials

21 June 2022

A phishing campaign using fake voicemail notifications has been and is still targeting various US-based organizations, in an attempt to …

Tags Cloud Computing, Cloud Software, Fakes, IT, Office365

VMWare fixes holes that could allow virtual machine escapes

16 February 2022

VMWare’s latest security bulletin doesn’t mince its words about how quickly you should patch: When do I need to …

Tags Cloud Computing, Cloud Software, Virtualization, VMware, vSphere

Nebulon Red Hat Ansible Collection accelerates automation efforts for IT organizations

16 February 2022

Nebulon announced it has developed a Red Hat Ansible collection for smartInfrastructure, which includes a set of modules that customers can …

Tags Ansible, Cloud Computing, Cloud Software, Collections, Configuration Management Software

Google Drive accounted for 50% of malicious Office document downloads

10 February 2022

OneDrive was responsible for 19% while 15% of malicious Microsoft Office documents were downloaded through Sharepoint in 2021. A new report …

Tags Cloud Software, Google News, Malware, Office 365, Offices

Office 365 boosts email security against MITM, downgrade attacks

2 February 2022

Microsoft has added SMTP MTA Strict Transport Security (MTA-STS) support to Exchange Online to ensure Office 365 customers’ email …

Tags Cloud Computing, Cloud Software, IT, MITM, Office 365

Office 365 phishing attack impersonates the US Department of Labor

19 January 2022

A new phishing campaign impersonating the United States Department of Labor asks recipients to submit bids to steal Office 365 …

Tags Cloud Computing, Cloud Software, IT, Labor, Microsoft

US universities targeted by Office 365 phishing attacks

7 December 2021

US universities are being targeted in multiple phishing attacks designed to impersonate college login portals to steal valuable Office 365 …

Tags Cloud Computing, Cloud Software, IT, Microsoft, Office 365

Convincing Microsoft phishing uses fake Office 365 spam alerts

5 December 2021

A persuasive and ongoing series of phishing attacks are using fake Office 365 notifications asking the recipients to review blocked spam …

Tags Cloud Computing, Cloud Software, IT, Microsoft, Office 365

VMware Warns of Newly Discovered Vulnerabilities in vSphere Web Client

25 November 2021

VMware has shipped updates to address two security vulnerabilities in vCenter Server and Cloud Foundation that could be abused by a remote …

Tags Cloud Computing, Cloud Software, Security Pro, vSphere, Vulnerability

Kaspersky’s stolen Amazon SES token used in Office 365 phishing

1 November 2021

Kaspersky said today that a legitimate Amazon Simple Email Service (SES) token issued to a third-party contractor was recently used by …

Tags Amazon, Cloud Computing, Cloud Software, IT, SES

Microsoft called out as big malware hoster – thanks to OneDrive and Office 365 abuse

18 October 2021

Microsoft has been branded as “the world’s best malware hoster for about a decade,” thanks to abuse of the Office 365 and Live platform, as …

Tags Cloud Software, Cloud Storage, IT, OneDrive, Storage

Former Microsoft Security Analyst Claims Office 365 Knowingly Hosted Malware For Years

17 October 2021

Malware on Windows devices has become a real problem in the last few years, specifically with a recent uptick in ransomware. It appears …

Tags Claims, Cloud Computing, Cloud Software, IT, Malware
Post navigation
Older posts
Page1 Page2 … Page25 Next →
Cookie-Free

NVD

  • CVE-2022-34835 – In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based b …30 June 2022
  • CVE-2017-20121 – A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as cr …30 June 2022
  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022
  • CVE-2017-20123 – A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This aff …30 June 2022
  • CVE-2017-20124 – A vulnerability classified as critical has been found in Online Hotel Booking System Pro P …30 June 2022
  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Sourcegraph Gitserver 3.36.3 – Remote Code Execution (RCE)14 June 2022
  • phpIPAM 1.4.5 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • TP-Link Router AX50 firmware 210730 – Remote Code Execution (RCE) (Authenticated)14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »