Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Collaboration

How to Improve Your Board’s Oversight of Digital Transformation Efforts

24 September 2019

In August 2019, the National Association of Corporate Directors (NACD) and Marsh & McLennan Companies (MMC) released a report with …

Tags Business Continuity, C-Suite, CISO, Collaboration, How

The Art of Patch Management

12 September 2019

Malware exists to exploit vulnerabilities discovered in software. Patches exist to fix those …

Tags Arts, Automation, Collaboration, Malware, Risk Management

The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters

27 August 2019

With the upcoming release of the latest “Star Trek” series, “Star Trek: Picard,” we’ve been reflecting on the many characters …

Tags Business Continuity, Characters, CISO, Collaboration, Roles

Box introduces Box Shield with increased security controls and threat protection

21 August 2019

Box has always had to balance the idea of sharing content broadly while protecting it as it moved through the world, but the more you …

Tags Box, Cloud, Collaboration, File-Sharing, Shield

#BHUSA Keynote Encourages Positivity and Collaboration

7 August 2019

Speaking in the opening keynote at Black Hat USA, Dino Dai Zovi, researcher and head of security for the cash app at Square, talked about …

Tags Collaboration, Keynotes

Slack courts enterprises with new mobile-centric security features

6 August 2019

Some of the features are available today, while the rest will launch further down the …

Tags Collaboration, Cyber, Mobile, Slack, Top Stories

Two’s a Party – Why Collaboration Can Help You to Avoid Privacy Pitfalls

19 July 2019

More than a year after coming into effect, the General Data Protection Regulation (GDPR) has transformed the data landscape and its effects …

Tags Collaboration, Help, Party, Pitfalls, Privacy

DevOps and Security: 5 Principles for DevSecOps

18 July 2019

In one sense, it seems crazy to add additional terms to the DevOps portmanteau. A proper DevOps solution should include security, but we …

Tags Authentication, Authorization, Collaboration, DevOps, Principles

Attributes of a Positive DevSecOps Culture

26 June 2019

To understand the current and future state of DevSecOps, we gathered insights from 29 IT professionals in 27 companies. We asked them, …

Tags Attributes, Collaboration, Culture, DevOps, DevSecOps

#Infosec19: Former Lloyd’s CEO Says Collaboration is Key to Future of Cyber Insurance

5 June 2019

Insurers must collaborate more closely with each other and technology firms to improve their understanding of cyber risk and better serve …

Tags Collaboration, Cyber Insurance, Keys

HawkEye Malware Operators Renew Attacks on Business Users

27 May 2019

IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world. In campaigns …

Tags Attacks, Botnets, Business, Collaboration, Cybercrime, Dark Web, Identity Theft, Operators, Users

Five Key Steps to Bring DevOps and Security Teams into Alignment

23 May 2019

Securing DevOps environments is an increasingly important concern for Chief Information Security Officers (CISOs) and security teams. …

Tags Collaboration, DevOps, DevSecOps, Keys, Methodologies, Steps, Surveys, Teams

Set Expectations and Boundaries With Your Security Program to Minimize Risk

25 April 2019

As a consultant, I’ve seen some excellent information security programs over the years — from the latest and greatest technical …

Tags Automation, CISO, Collaboration, Cyber Risk, Endpoint Protection, Expectations, Programs, Risks, Sets

#ISCWest2019: DHS Asks for Collaboration

10 April 2019

Advances in machine learning and artificial intelligence (AI) are driving investments from the Department of Homeland Security (DHS) …

Tags Collaboration, DHS
Older posts
Page1 Page2 … Page14 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1769 – A vulnerability, which was classified as problematic, was found in SourceCodester Grade Po …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Unauthenticated Factory Reset31 March 2023
  • Judging Management System v1.0 – Authentication Bypass31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Remote Command Execution (RCE)31 March 2023
  • Bangresto 1.0 – SQL Injection31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Authentication Bypass31 March 2023
  • Textpattern 4.8.8 – Remote Code Execution (RCE) (Authenticated)31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »