Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Data Protection

Digital Shadows Weaken Your Attack Surface

28 June 2022

Every tweet, text, bank transaction, Google search and DoorDash order is part of your digital shadow. We all have one, and the contents of …

Tags Attack Surface, Data Protection, Digital Shadows, Security Services, Threat Hunting

Italy Data Protection Authority Warns Websites Against Use of Google Analytics

27 June 2022

Following the footsteps of Austria and France, the Italian Data Protection Authority has become the latest regulator to find the use of …

Tags Data Protection, Italy, Privacy, Use, Websites

Retrospect Cloud for Simple Offsite Data Protection Launched

23 June 2022

Retrospect has announced Retrospect Cloud Storage, a low-cost, high-availability (HA) cloud storage service delivered across 13 global data …

Tags Cloud, Data Protection, IT, Simple, Storage

N-able adds Standby Image feature to its Cove Data Protection solution

22 June 2022

N-able announced it has added a Standby Image feature as part of the company’s recently launched Cove Data Protection solution. With this …

Tags Data Protection, Images, IT, News

Looking for Cyber Insurance? Know Your Eligibility

16 June 202216 June 2022

Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. …

Tags COVID-19, Cyber Insurance, Data Protection, Identity, Identity Management

Why Phishing Is Still the Top Attack Method

8 June 2022

Why Phishing Is Still the Top Attack Method Attackers are known to pore over a company’s website and social channels. Perhaps they spot a …

Tags Attacks, Cybercriminals, Data Breach, Data Breaches, Data Protection

What Is Zero Trust Data Protection?

3 June 2022

As cyberattacks continue to escalate; companies grow their use of tech services outside of their network perimeters and the government and …

Tags Data Protection, Infrastructure Development, Is, Networking, Open Source

Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report

26 May 2022

Every year, the IBM Security X-Force team of cybersecurity experts mines billions of data points to reveal today’s most urgent security …

Tags Application Security, Banking, Banking Security, Cyber Attack, Data Protection

What’s wrong with automotive mobile apps?

25 May 2022

Third party automotive mobile apps, web apps and API clients provide drivers with additional functions but may pose security risks for …

Tags connected car, Data Protection, Internet of Things, Publications

How to Respond to Non-Malicious Data Breaches

23 May 2022

a breaches are malicious. Surely, attackers strike on …

Tags Data Protection, How, Incident Response, Risk Management, Security Services

VeeamON 2022 Opens With Vision For The Future Of Modern Data Protection

17 May 2022

Veeam kicked off its annual user conference, VeeamON 2022, the Modern Data Protection Conference of the Year, delivering a hybrid …

Tags Data Protection, IT, Modern, Storage, Vision

Dark Patterns (Deceptive Design) in Data Protection

11 May 2022

Learn how to identify and stop them from dictating your online choices Photo by Rishabh Dharmani on Unsplash Dark patterns (or deceptive …

Tags Dark Patterns, Data Protection, Design, IT, UX & UI Design

New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

9 May 2022

New DOJ Team Focuses on Ransomware and Cryptocurrency Crime While no security officer would rely on this alone, it’s good to know the …

Tags Advanced Threats, Crimes, Data Protection, Malware, New

The Growing Danger of Data Exfiltration by Third-Party Web Scripts

6 May 2022

Data Protection May 2, 2022 Technologies Useful In the Pandemic Are Challenging Privacy Now Your company likely made many quick decisions …

Tags Data Protection, Risk Management, Scripts, Third-Party, Threat Hunting
Post navigation
Older posts
Page1 Page2 … Page131 Next →
Cookie-Free

NVD

  • CVE-2013-4146 – ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-3414. Reason: This can …30 June 2022
  • CVE-2013-4170 – In general, Ember.js escapes or strips any user-supplied content before inserting it in st …30 June 2022
  • CVE-2021-40663 – deep.assign npm package 0.0.0-alpha.0 is vulnerable to Improperly Controlled Modification …30 June 2022
  • CVE-2021-41506 – Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB78 …30 June 2022
  • CVE-2022-1852 – A NULL pointer dereference flaw was found in the Linux kernel’s KVM mod …30 June 2022
  • CVE-2022-2078 – A vulnerability was found in the Linux kernel’s nft_set_desc_concat_parse() function .This …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Marval MSM v14.19.0.12476 – Cross-Site Request Forgery (CSRF)14 June 2022
  • Marval MSM v14.19.0.12476 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Avantune Genialcloud ProJ 10 – Cross-Site Scripting (XSS)14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »