Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cyber Attack

Cyberattacks via Unpatched Systems Cost Orgs More Than Phishing

29 June 2022

External attacks focused on vulnerabilities are still the most common ways that companies are successfully attacked, according to incident …

Tags Costs, Cyber Attack, Identity Theft, Phishing, Systems

5 Surprising Cyberattacks AI Stopped This Year

29 June 2022

See how these novel, sophisticated, or creative threats used techniques such as living off the land to evade detection from traditional …

Tags AI, Cloud, Cyber Attack, IT, Year

APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor

28 June 2022

Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack campaign that targets unpatched Microsoft …

Tags APT, Backdoors, Cyber Attack, Cyber Threats, Hacking

Iran’s Largest Steel Producer Hit By Crippling Cyberattack

28 June 2022

The targeted company, Khouzestan Steel Company (KSC), has acknowledged the cyberattack but claimed the attack was successfully thwarted. …

Tags Cyber Attack, Iran, Largest, Producer, Steel

Shadow IT Spurs 1 in 3 Cyberattacks

27 June 2022

Cerby platform emerges from stealth mode to let users automate security for applications outside of the standard IT …

Tags Cloud, Cyber Attack, IT, News, Shadow

Cyberattack halted the production at the Iranian state-owned Khuzestan Steel company

27 June 2022

Iranian state-owned Khuzestan Steel Company was hit by a cyber attack that forced the company to halt its production. The Khuzestan Steel …

Tags Cyber Attack, Iran, IT, News, Steel

Hackers Used Mitel Zero-Day Flaw To Target VOIP Appliances

27 June 2022

On Linux-based Mitel MiVoice VOIP appliances, hackers have used zero-day exploits to hack into the systems. These attempts appear to be the …

Tags Appliances, Cyber Attack, Cyber Threats, Flaws, Hacking

Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks

23 June 2022

QNAP, Taiwanese maker of network-attached storage (NAS) devices, on Wednesday said it’s in the process of fixing a critical three-year-old …

Tags Attacks, Computer Hardware, Critical, Cyber Attack, Devices

Europol Busts Phishing Gang Responsible for Millions in Losses

22 June 2022

Europol on Tuesday announced the dismantling of an organized crime group that dabbled in phishing, fraud, scams, and money laundering …

Tags Cyber Attack, Cyber Crime, Gang, Identity Theft, Losses

Network Pentesting Checklist

21 June 2022

Network pentesting is a frequently used and successful method of recognizing security issues in a company’s IT infrastructure. This …

Tags Checklist, Cyber Attack, Ethical Hacking, Network, Pentesting

Chinese-linked APT Hackers Spying Orgs Over 10 Years Using DNS Tunneling To Evade Detection

21 June 2022

Security researchers at SentinelLabs recently discovered that a Chinese-speaking APT adversary has been actively operating all of its …

Tags APT, Cyber Attack, Cyber Crime, Cyber Threats, Detection

Chinese Hackers Exploited Sophos Firewall Zero-Day Flaw to Target South Asian Entity

17 June 2022

A sophisticated Chinese advanced persistent threat (APT) actor exploited a critical security vulnerability in Sophos’ firewall product that …

Tags Asian, Cyber Attack, Entity, Firewalls, Flaws

Hello XD Ransomware Installing Backdoor on Targeted Windows and Linux Systems

13 June 2022

Windows and Linux systems are being targeted by a ransomware variant called HelloXD, with the infections also involving the deployment of a …

Tags Backdoors, Cyber Attack, Hello, Installing, Linux

How To Secure WordPress Website From Cyber Attacks?

10 June 2022

If you own a WordPress website this article is for you because it addresses WordPress security and protection against cyber attacks. …

Tags Content-management Framework, Cyber Attack, Malware, Secure, Websites
Post navigation
Older posts
Page1 Page2 … Page134 Next →
Cookie-Free

NVD

  • CVE-2013-4170 – In general, Ember.js escapes or strips any user-supplied content before inserting it in st …30 June 2022
  • CVE-2021-40663 – deep.assign npm package 0.0.0-alpha.0 is vulnerable to Improperly Controlled Modification …30 June 2022
  • CVE-2021-41506 – Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB78 …30 June 2022
  • CVE-2022-1852 – A NULL pointer dereference flaw was found in the Linux kernel’s KVM mod …30 June 2022
  • CVE-2022-2078 – A vulnerability was found in the Linux kernel’s nft_set_desc_concat_parse() function .This …30 June 2022
  • CVE-2022-33043 – A cross-site scripting (XSS) vulnerability in the batch add function of Urtracker Premium …30 June 2022

EXPLOITS

  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • Old Age Home Management System 1.0 – SQLi Authentication Bypass14 June 2022
  • ChurchCRM 4.4.5 – SQLi14 June 2022
  • Sourcegraph Gitserver 3.36.3 – Remote Code Execution (RCE)14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »