Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cyber Attack

Major CrackDown – Police Hacked Exclu ‘secure’ Cybercriminal Message Platform

8 February 2023

The police and the Public Prosecution Service in the Netherlands have been able to gain access to data from a crypto communication service …

Tags Cyber Attack, Cyber Security News, Cybercriminals, Hacked, Messages

CERT-UA Alerts Ukrainian State Authorities of Remcos Software-Fueled Cyber Attacks

8 February 2023

The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert warning of cyber attacks against state authorities in the …

Tags Alerts, Cyber Attack, IT, News, States

Financial Institutions Are Suffering From Increasingly Sophisticated Cyberattacks, According to Contrast Security

7 February 2023

, Feb. 7, 2023 /PRNewswire/ — Contrast Security (Contrast), the code security platform built for developers and trusted by security, today …

Tags Cloud, Contrast Security, Cyber Attack, Financial Institutions, IT

Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm

7 February 2023

The first-ever Linux variant of the Clop ransomware has been detected in the wild, but with a faulty encryption algorithm that has made it …

Tags Algorithms, Cyber Attack, Encryption, Linux, OS

VMware Finds No Evidence of 0-Day in Ongoing ESXiArgs Ransomware Spree

7 February 2023

VMware on Monday said it found no evidence that threat actors are leveraging an unknown security flaw, i.e., a zero-day, in its software as …

Tags 0-Day, Cyber Attack, Evidence, Ransomware, Virtualization

Top 10 Endpoint Security Best Practices That Help Prevent Cyberattacks

6 February 2023

Check out our top 10 endpoint security best practices that will keep you safe and help prevent cyberattacks. Setting foot into only one of …

Tags Best Practices, Cyber Attack, Endpoint Security, Help, Prevent

Anonymous Leaks 128 GB of Data from Russian ISP Convex

6 February 2023

Caxxii, an affiliate of Anonymous hacktivists, has released 128 GB of documents revealing the Russian government’s illegal surveillance …

Tags Anonymous, Cyber Attack, Data, Hacking News, Russian

GuLoader Malware Using Malicious NSIS Executable to Target E-Commerce Industry

6 February 2023

E-commerce industries in South Korea and the U.S. are at the receiving end of an ongoing GuLoader malware campaign, cybersecurity firm …

Tags Cyber Attack, E-Commerce, Executable, Industry, Malicious

Feds Confirm Cyberattack Caused Nation’s Critical Suicide Helpline Outage

5 February 2023

Federal officials have confirmed that a cyberattack caused a nearly day-long outage of the United States’s 988 mental health helpline on …

Tags Cyber Attack, IT, News, Outages, Suicide

Feds Say Cyberattack Caused Suicide Helpline’s Outage

4 February 2023

A cyberattack caused a nearly daylong outage of the nation’s new 988 mental health helpline late last year, federal officials told The …

Tags Cyber Attack, IT, News, Outages, Suicide

Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

4 February 2023

Threat actors have managed to get their hands on two shady applications that were uploaded to the app stores managed by both Google and …

Tags Apple, Cyber Attack, Fakes, Investments, Malware

Iran-Backed Actor Behind ‘Holy Souls’ Cyberattack on Charlie Hebdo, Microsoft Says

3 February 2023

The January attack was in retaliation for the satirical French magazine’s decision to launch a cartoon contest to lampoon Iran’s Supreme …

Tags Actors, Cloud, Cyber Attack, IT, Microsoft

New DDoS-as-a-Service Platform Attacking Medical Institutions

3 February 2023

These botnets are typically created by infiltrating vulnerable IoT devices, including routers and IP cameras, and grouping them into a …

Tags Cyber Attack, Cyber Security News, Medical, New, Platforms

Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

3 February 2023

TrickGate is a transformative packer that has managed to evade detection for several years. This is because it periodically undergoes …

Tags Cyber Attack, Cyber Security News, Cyber Threats, Deploy, Emotet
Older posts
Page1 Page2 … Page154 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »