Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cover

Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft

23 June 2022

Bronze Starlight’s use of multiple ransomware families and its victim-targeting suggest there’s more to the group’s activities than …

Tags APT, Chinese, Cover, Theft, Using

Why Your Business Continuity Plan Should Cover Communication and Office Access

25 January 2022

where your company’s digital infrastructure goes offline. Your servers are unreachable, the company website is offline, internal …

Tags Access, Communications, Cover, Incident Response, Offices

P2P coverage market provider Cover Protocol hacked but hacker returns stolen funds

29 December 2020

Peer to peer coverage market provider Cover Protocol has been hacked but in a twist on a traditional hacking story, the hacker has not only …

Tags Cover, Cyber, IT, P2P, Protocols

Leading Global CISO Charged Over Alleged Hack Cover Up

21 August 2020

The complaint alleges that Sullivan tried to pass the incident — in which an AWS database containing personal details of 57 million Uber …

Tags CISO, Cover, Global, Hacks, IT

CISOs: Cyber Insurance Fails to Cover Modern Threats and Remote Workforces

23 July 2020

A large majority of CISOs are seeking additional cyber insurance coverage because of an increase in vulnerabilities resulting from the work …

Tags CISOs, Cover, Modern, Remote, Threats

Can DevSecOps Cover Holes Created by Digital Transformation?

21 May 2020

The success of DevSecOps is very much dependent on the understanding that the role isn’t only technical but also procedural. They are the …

Tags Application Security, CI/CD, Cover, DevOps, Methodologies

How to Cover Your Tracks Every Time You Go Online

12 April 2020

Here we’re going to show you how to cover some of those tracks, or not to leave any in the first place. This isn’t quite the same as going …

Tags Cover, Go, How, Online, Tracks

COVID-19 Could Provide Cover for Domestic Surveillance Expansion

16 March 2020

In the days and months to come, unprecedented global solidarity will emerge as the world battles the COVID-19 outbreak. But experts also …

Tags Coronavirus, Cover, COVID-19, Expansion, Privacy

Cover for ‘cyber’ attacks is risky, complex and people don’t trust us, moan insurers

3 February 2020

FIC 2020 EU companies aren’t taking out insurance against attacks on online assets because the companies selling coverage aren’t organised …

Tags Cover

Criminals Hide Malware Behind Grammy-Winning Cover

29 January 2020

Songs by Ariana Grande, Taylor Swift, and Post Malone are the most popular …

Tags Cover, Criminals, Hide, Malware

A New Playground for Cybercrime: Why Supply Chain Security Must Cover Software Development

24 October 2019

Most organisations see supply chains as providers of physical goods and services. The supply chain management function in these companies …

Tags Cover, Cybercrime, New, Playground, Snyk

Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks

13 September 2019

Facebook and YouTube profiles are at the heart of an ongoing phishing campaign spreading the Astaroth trojan, bent on the eventual …

Tags Brazil, Cofense, Cover, Information Stealer, Phishing Campaign

TSB Offers to Cover APP Fraud Losses

16 April 2019

UK bank TSB has promised to refund any customers that may be hit by so-called “authorized push payment” (APP) fraud, which is on the …

Tags Cover, Fraud, Losses, Offers

Insert Skimmer + Camera Cover PIN Stealer

11 March 2019

Very often the most clever component of your typical ATM skimming attack is the hidden pinhole camera used to record customers entering …

Tags Cameras, Cover, Skimmers
Post navigation
Older posts
Page1 Page2 Next →
Cookie-Free

NVD

  • CVE-2022-34835 – In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based b …30 June 2022
  • CVE-2017-20121 – A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as cr …30 June 2022
  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022
  • CVE-2017-20123 – A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This aff …30 June 2022
  • CVE-2017-20124 – A vulnerability classified as critical has been found in Online Hotel Booking System Pro P …30 June 2022
  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Algo 8028 Control Panel – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • HP LaserJet Professional M1210 MFP Series Receive Fax Service – Unquoted Service Path14 June 2022
  • Virtua Software Cobranca 12S – SQLi14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »