Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Data

Data on ransomware attacks is ‘fragmented and incomplete’ warns Senate report

25 May 2022

The government lacks comprehensive data on ransomware attacks and suffers from fragmented reporting, according to a new US Senate committee …

Tags Data, IT, News, Senate

Ditching the Third Party: Enabling Privacy and Personalization with First-party, AI-ready Data

25 May 2022

Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services …

Tags A.I, Big Data, Contributors, Data, Internet of Things

Proton Is Trying to Become Google—Without Your Data

25 May 2022

Since its founding in 2014, ProtonMail has become synonymous with user-friendly encrypted email. Now the company is trying to be synonymous …

Tags Data, Is, IT, News, Proton

Senate Report: US Government Lacks Comprehensive Data on Ransomware

24 May 2022

The US government lacks comprehensive data on ransomware attacks, including how much is lost in payments, according to a new report by the …

Tags Data, IT, Ransomware, Senate, US Government

Erez Naveh joins Bright Data as VP of Product

23 May 2022

Bright Data has announced the appointment of Erez Naveh as its VP of Product. In his new role, Naveh will lead the company’s extensive …

Tags Data, IT, News, Products, VP

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

23 May 2022

Compromised credentials and identities, third-party breaches, API attacks, and application exploits are all foundational entry points for …

Tags Breaches, Data, Detect, IT, Recover

How to Protect Your Data When Ransomware Strikes

18 May 2022

Ransomware is not a new attack vector. In fact, the first malware of its kind appeared more than 30 years ago and was distributed via …

Tags Data, How, Lookout, Malware, Protect

Securing Vital Data through a New Age of Cyberattacks

18 May 2022

Global cyberattacks are becoming more widespread. The onslaught of online assaults we’ve seen five months into the year has made putting …

Tags Age, Cyber Attack, Data, IT, New

FBI: E-Tailers, Beware Web Injections for Scraping Credit-Card Data, Backdoors

17 May 2022

Law enforcement is warning about a wave of Web injection attacks on US online retailers that are successfully stealing credit-card …

Tags Backdoors, Data, FBI, Injections, Scraping

Are You Investing in Securing Your Data in the Cloud?

17 May 2022

Gartner predicts that more than 95% of new digital workloads will continue to be deployed on cloud-native platforms by 2025. Robust cloud …

Tags Cloud, Data, Investing, Web Application Firewall, You

Threat Actors Are Stealing Data Now to Decrypt When Quantum Computing Comes

11 May 2022

The technique, called store-now, decrypt later (SNDL), means organizations need to prepare now for post-quantum …

Tags Data, Decrypt, Now, Quantum Computing, Stealing

Concentric AI Raises Series A Funding Led by Ballistic Ventures to Autonomously Secure Business-Critical Data

11 May 2022

SAN JOSE, Calif., May 11, 2022 — Concentric Inc., a leading vendor of intelligent AI-based solutions for protecting business-critical …

Tags AI, Cloud, Data, Secure, Series A Funding

Microsoft fixed RCE flaw in a driver used by Azure Synapse and Data Factory

10 May 2022

Microsoft disclosed a now-fixed vulnerability in Azure Synapse and Azure Data Factory that could have allowed remote code execution. …

Tags Azure, Data, Factory, IT, Microsoft

As Data Creation Soars, Today’s Document Migrations Require More Diligence

10 May 2022

Data creation has risen dramatically in recent years and shows no signs of slowing. According to analyst firm IDC, widespread remote work …

Tags Big Data, Contributors, Creation, Data, Documents
Post navigation
Older posts
Page1 Page2 … Page156 Next →
Cookie-Free

NVD

  • CVE-2022-28394 – EOL Product CVE – Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 …27 May 2022
  • CVE-2022-30687 – Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that cou …27 May 2022
  • CVE-2022-30700 – An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a …27 May 2022
  • CVE-2022-30701 – An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as …27 May 2022
  • CVE-2022-1898 – Use After Free in GitHub repository vim/vim prior to 8.2. …27 May 2022
  • CVE-2022-1907 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • SDT-CW3B1 1.1.0 – OS Command Injection17 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »