Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cyber Threats

Hackers infect popular 3CX communications application with malware

30 March 2023

warnings about the breach on Wednesday. CrowdStrike believes the hackers behind the breach are associated with a North Korean state-backed …

Tags CrowdStrike, Cyber, Cyber Threats, Hacking, SentinelOne

Hackers Claim to Dox Russian ‘War Criminal,’ Convince His Wife to Do ‘Patriotic Photoshoot’

30 March 2023

The hacked information contained the colonel’s personal information, including pictures of government documents, his phone number, the …

Tags Claim, Criminals, Cyber Threats, Dox, Hacking

Cyberwarfare leaks show Russian army is adopting mindset of secret police

30 March 2023

A consortium of media outlets have published a bombshell investigation about Russia’s cyber-capabilities, based on a rare leak of …

Tags Cyber Threats, Cyberwar, Cyberwarfare, Espionage, Europe

‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics

30 March 2023

The inconspicuous office is in Moscow’s north-eastern suburbs. A sign …

Tags Cyber Threats, Cyberwar, Espionage, Europe, Hacking

A Distro-Hopper’s Guide to Hacking on Linux for Beginners

30 March 2023

In this guide, I share my personal journey through distro-hopping and offer advice to beginners about hacking and cybersecurity on …

Tags Beginners, Cyber Threats, Developers, Guides, Hacking

Hacker Returns $200 Million Stolen from Euler Finance

28 March 2023

The London, England-based decentralized lending platform Euler Finance had offered a $1 million reward to anyone who could reveal the …

Tags Cyber Threats, Finances, Hacking, Million, Returns

Microsoft Launches AI-driven’ Security Copilot’ to Help Companies Fight Hacking Attempts

28 March 2023

Microsoft Microsoft continues to integrate new artificial intelligence technology into its products and today announced a cybersecurity …

Tags Companies, Cyber Threats, Fight, Hacking, Help

Hackers changed tactics, went cross-platform in 2022, says Trend Micro

28 March 2023

Payouts from ransomware victims declined by 38% in 2022, prompting hackers to adopt more professional and corporate tactics to ensure …

Tags Cyber Threats, Hacking, IT, News, Trend Micro

Hey, Siri: Hackers Can Control Smart Devices Using Inaudible Sounds

28 March 2023

A technique, dubbed the “Near-Ultrasound Inaudible Trojan” (NUIT), allows an attacker to exploit smartphones and smart speakers over the …

Tags Cyber Threats, Hacking, Siri, Sounds, Using

Hackers Earned $1,035,000 for Exploiting 27 Zero-Days at Pwn2Own Vancouver

28 March 2023

After the finale of Pwn2Own Vancouver 2023, the Masters of Pwn, Synacktiv (@Synacktiv), received $1,035,000 (plus a car) for their amazing …

Tags Bug Bounty, Cyber Security News, Cyber Threats, Hacking, Vancouver

UK police reveal they are running fake DDoS-for-hire sites to collect details on cybercriminals

27 March 2023

Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry …

Tags Cyber Threats, DDoS, DDoS-for-hire, Denial of Service, Security Pro

Hackers Exploited Critical Microsoft Outlook Vulnerability To Gain Exchange Server Access

27 March 2023

In response to a recent vulnerability identified in Outlook, Microsoft recently published a proper guide for its customers to help them …

Tags Access, Critical, Cyber Threats, Exchange Server, Hacking

Hackers Inject Weaponized JavaScript (JS) on 51,000 Websites

25 March 2023

a widespread campaign of harmful JavaScript (JS) injections. The campaign aims to redirect unsuspecting victims to dangerous content, …

Tags Cyber Security News, Cyber Threats, Hacking, JS, Malware

Hackers Weaponized and Exploited Over 55 Zero-days in Microsoft, Google, and Apple

22 March 2023

Researchers state that hackers are still targeting zero-day vulnerabilities in malicious campaigns. It has been reported that most of these …

Tags Cyber Security News, Cyber Threats, Google, Hacking, Zero Days
Older posts
Page1 Page2 … Page674 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-28727 – Panasonic AiSEG2 versions 2.00J through 2.93A allows adjacent attackers bypass authenticat …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • Judging Management System v1.0 – Remote Code Execution (RCE)31 March 2023
  • Bludit 3-14-1 Plugin ‘UploadPlugin’ – Remote Code Execution (RCE) (Authenticated)31 March 2023
  • rconfig 3.9.7 – Sql Injection (Authenticated)31 March 2023
  • Spitfire CMS 1.0.475 – PHP Object Injection31 March 2023
  • Senayan Library Management System v9.0.0 – SQL Injection31 March 2023
  • EQ Enterprise management system v2.2.0 – SQL Injection31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »