Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cyber Threats

RansomHouse claims to have stolen at least 450GB of AMD’s data

30 June 2022

AMD is investigating the claim that the RansomHouse extortion group has its hands on more than 450GB of the company’s data. AMD’s …

Tags AMD, Cyber Crime, Cyber Threats, Hacking, RansomHouse

APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor

28 June 2022

Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack campaign that targets unpatched Microsoft …

Tags APT, Backdoors, Cyber Attack, Cyber Threats, Hacking

Harmony Dangles A $1M Bug Bounty For Hackers Who Stole $100M In Cryptocurrency

27 June 2022

Startup blockchain company Harmony has posted a $1 million bounty reward on Twitter for the return of stolen crypto funds. The company says …

Tags Cryptocurrency, Cyber Threats, Hacking, Harmony, IT

Hacking gets dangerously real: 8 cybersecurity predictions to watch out for

27 June 2022

Zero trust troubles and more ransomware regulation also make tech analyst Gartner’s list of factors you need to plan …

Tags Cyber Threats, Hacking, IT, News

Hackers Delivered a Lockbit Ransomware Through Fake Copyright Claim E-mail

27 June 2022

One of the interesting tricks used by LockBit affiliates is disguising their malware as copyright claims in order to trick users into …

Tags Claim, Copyrights, Cyber Threats, Fakes, Hacking

Hackers Used Mitel Zero-Day Flaw To Target VOIP Appliances

27 June 2022

On Linux-based Mitel MiVoice VOIP appliances, hackers have used zero-day exploits to hack into the systems. These attempts appear to be the …

Tags Appliances, Cyber Attack, Cyber Threats, Flaws, Hacking

Hackers Exploit Harmony’s Horizon Blockchain Bridge to Steal $100 Million

25 June 2022

The main bridge of layer-1 blockchain between Binance Chain, Ethereum, and Bitcoin was exploited, but the BTC bridge isn’t impacted. …

Tags Bridges, Cyber Threats, Hacking, Hacking News, Horizon

ISPs Helped Hackers to Infect Smartphones with Hermit Spyware

25 June 2022

It was reported by the Google Threat Analysis Group (TAG) that highly sophisticated spyware known as Hermit has been discovered. There are …

Tags Attackers, Cyber Threats, Google, Hacking, Smartphones

CISA: Hackers Continue to Exploit Log4Shell in Unpatched VMware Servers

24 June 2022

VMware released patches related to Log4Shell, a vulnerability in a popular Java framework that left countless servers at risk, in December …

Tags Actors, Cyber, Cyber Threats, Hacking, Malicious

Ransomware Hacker Spotted Using Zero-Day Exploit on Business Phone VoIP Device

24 June 2022

To spread ransomware to a company, a hacker resorted to using a previously unknown vulnerability in a business phone VoIP device. The …

Tags Cyber Threats, Hacking, Mitel, Ransomware, Security Pro

Microsoft Compares Russian Hacks of Ukraine to Assassination That Started World War I

24 June 2022

“The recorded history of every war typically includes an account of the first shots fired and who witnessed them,” Brad Smith, …

Tags Assassination, Cyber Threats, Hacking, Hacks, IT

Hackers Exploit Mitel VoIP Zero-Day Bug to Deploy Ransomware

24 June 2022

A suspected ransomware intrusion against an unnamed target leveraged a Mitel VoIP appliance as an entry point to achieve remote code …

Tags Bug, Cyber Threats, Deploy, Hacking, Mitel

CISA: Hackers are still using Log4Shell to breach networks, so patch your systems

24 June 2022

Patch your systems, says cybersecurity agency, because attackers are using these …

Tags CISA, Cyber Threats, Hacking, IT, Log4Shell

#InfosecurityEurope2022: Lawyers Update Security for New Ways of Working

23 June 2022

…

Tags Actions, Cyber Threats, Hacking, Humans, Lawyers
Post navigation
Older posts
Page1 Page2 … Page628 Next →
Cookie-Free

NVD

  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022
  • CVE-2022-26135 – A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenti …30 June 2022
  • CVE-2021-40643 – EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail opti …30 June 2022
  • CVE-2022-34835 – In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based b …30 June 2022
  • CVE-2017-20121 – A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as cr …30 June 2022
  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Avantune Genialcloud ProJ 10 – Cross-Site Scripting (XSS)14 June 2022
  • Real Player 16.0.3.51 – ‘external::Import()’ Directory Traversal to Remote Code Execution (RCE)14 June 2022
  • Real Player v.20.0.8.310 G2 Control – ‘DoGoToURL()’ Remote Code Execution (RCE)14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »