Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Contributors

Ditching the Third Party: Enabling Privacy and Personalization with First-party, AI-ready Data

25 May 2022

Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services …

Tags A.I, Big Data, Contributors, Data, Internet of Things

10 Ways to Make Life Easier for Your Internal IT

24 May 2022

Managing Your Internal IT Your company’s internal IT team is responsible for keeping things running smoothly, and they deserve all the …

Tags A.I, Big Data, Contributors, Internals, Life

Manufacturers’ Top Demands For Quality Software in 2022

18 May 2022

Competing on product quality has never been more urgent as rising raw material and component costs continue to squeeze manufacturers’ …

Tags A.I, Big Data, Contributors, IT, Quality

12 Ways to Secure Remote Authentication for Employees

11 May 2022

Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as …

Tags A.I, Authentication, Big Data, Contributors, Employees

As Data Creation Soars, Today’s Document Migrations Require More Diligence

10 May 2022

Data creation has risen dramatically in recent years and shows no signs of slowing. According to analyst firm IDC, widespread remote work …

Tags Big Data, Contributors, Creation, Data, Documents

Everything You Need to Know About CSPM

5 May 2022

Cloud Security Posture Management Cloud Security Posture Management (CSPM) enables you to secure cloud data and resources. You can …

Tags A.I, About, Big Data, Contributors, Everything

Cloud Growth will Skyrocket in 2022

3 May 2022

This year will be a period of meteoric growth for the cloud industry. Research from Gartner suggests that global spending on public cloud …

Tags Big Data, Cloud, Contributors, Growth, Hybrid Cloud

How Oxylabs delivers data scraping solutions pro-bono to help people hunt for bad actors

27 April 2022

Data scraping solutions When people hear the term data scraping, their first thought is often about how companies use this technology for …

Tags A.I, Big Data, Contributors, How, IT

How Ransomware Authors Target Databases

22 April 2022

Ransomware Database Targeting The scourge of ransomware is undoubtedly the most severe cyber security concern for home users and …

Tags A.I, Authors, Big Data, Contributors, Databases

How to Enable Successful Remote Work Strategy with AI

14 April 2022

The Coronavirus Pandemic has taught us that organizations must have remote work choices. It is no longer possible to work in a digital …

Tags A.I, AI, Big Data, Contributors, Enable

Leading B2B SaaS Comparison Platforms To Consider

13 April 2022

B2B SaaS Comparison Platforms B2B SaaS Comparison Platforms are designed for buyers looking for additional information on a particular …

Tags A.I, Big Data, Comparisons, Contributors, Fintech

Using Data Scraping to Learn What You Need to Know

7 April 2022

How can you know what you don’t know? It sounds like a rhetorical question, but it is in fact a vital component of business …

Tags A.I, Big Data, Contributors, Cryptocurrency, IT

The all-new Stellar Repair for MS SQL – an Efficient Tool to Fix SQL Database Corruption

6 April 2022

SQL database corruption is not uncommon. There are many reasons for SQL database corruption, such as virus infection, bugs in the SQL …

Tags Big Data, Contributors, Corruption, Databases, Efficient

How BI Tools Help Data Scientists

31 March 2022

Many data scientists prefer to use open-source framework to code scripts; after all, it’s something they already trust to work. Business …

Tags A.I, Big Data, Business Intelligence, Contributors, Help
Post navigation
Older posts
Page1 Page2 … Page84 Next →
Cookie-Free

NVD

  • CVE-2022-29660 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022
  • CVE-2022-29685 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-29661 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-29686 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-29662 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022
  • CVE-2022-29687 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022
  • ISaPWN – research on the security of ISaGRAF Runtime23 May 2022
  • Evaluation of cyber activities and the threat landscape in Ukraine17 May 2022
  • HTML attachments in phishing e-mails16 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »