Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Databases

OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident

25 March 2023

OpenAI on Friday disclosed that a bug in the Redis open source library was responsible for the exposure of other users’ personal …

Tags Bug, ChatGPT, Databases, Exposure, Incident

On-the-Run Hacker Who Allegedly Breached Federal Cop Database Arrested in Florida

16 March 2023

Nicholas Ceraolo, who faces years in prison for allegedly accessing a U.S. federal law enforcement database and other crimes, was still at …

Tags Arrested, Crimes, Databases, Federal, Florida

‘Vile’ Gang Duo Breaches Police Database, Impersonates Officers in Extortion Gambit

15 March 2023

Two gang members are being charged for allegedly threatening to release personal information and impersonating law enforcement in an effort …

Tags Breaches, Cloud Computing, Databases, Duo, Extortion

‘Nobody is Safe’: In Wild Hacking Spree, Hackers Accessed Federal Law Enforcement Database

15 March 2023

Ceraolo was also a member of a hacking group called “ViLE,” according to the prosecutors’ press release. In a screenshot included in …

Tags Cyber Threats, Databases, Federal, Hacking, SIM Swapping

BidenCash Leaks Database with Over 2 Million Stolen Credit Cards

6 March 2023

A database containing over 2 million debit and credit cards was released for free by carding marketplace BidenCash, in celebration of its …

Tags Cybersecurity News, Databases, Leaks, Million, Stolen

Attackers increasingly using transfer.sh to host malicious code

2 March 2023

For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the …

Tags Attackers, Cado Security, Databases, IT, NoSQL

HeadCrab bots pinch 1,000+ Redis servers to mine coins

4 February 2023

A sneaky botnet dubbed HeadCrab that uses bespoke malware to mine for Monero has infected at least 1,200 Redis servers in the last 18 …

Tags Databases, NoSQL, Open Source, Open Source Databases, Open Source Software

Scores of Redis Servers Infested by Sophisticated Custom-Built Malware

3 February 2023

An unknown threat actor has been quietly mining Monero cryptocurrency on open source Redis servers around the world for years, using a …

Tags Cloud Computing, Databases, Malware, NoSQL, Open Source

New HeadCrab Malware Hijacks 1,200 Redis Servers

2 February 2023

Since September 2021, over a thousand vulnerable Redis servers online have been infected by a stealthy malware dubbed “HeadCrab”, …

Tags Databases, Malware, New, NoSQL, Servers

New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers

2 February 2023

At least 1,200 Redis database servers worldwide have been corralled into a botnet using an “elusive and severe threat” dubbed HeadCrab …

Tags Data Safety, Databases, New, Servers, Threats

Cisco Unified CM SQL Injection Flaw Let Attackers Execute Crafted SQL Queries

23 January 2023

Cisco released fixes for Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition to address …

Tags Attackers, Cyber Security News, Databases, Flaws, Let

Database Malware Strikes Hundreds of Vulnerable WordPress Sites

20 January 2023

The first injection redirected users to a spammy sports website, whereas the second one boosted the authority of a spammy casino website in …

Tags Content-management Framework, Cyber Attack, Databases, Sites, Vulnerable

Hackers Use Text-to-SQL Attacks to Break into Your Databases

10 January 2023

Recently, a group of researchers successfully demonstrated a new type of attack that utilizes Text-to-SQL models in order to generate …

Tags Attacks, Cyber Security News, Cyber Threats, Databases, Hacking

Kinsing malware targets Kubernetes environments via misconfigured PostgreSQL

10 January 2023

Kinsing cryptojacking operators are exploiting misconfigured and exposed PostgreSQL servers to access Kubernetes environments. Researchers …

Tags Databases, Open Source, Open Source Databases, Open Source Software, PostgreSQL
Older posts
Page1 Page2 … Page63 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-28727 – Panasonic AiSEG2 versions 2.00J through 2.93A allows adjacent attackers bypass authenticat …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • Judging Management System v1.0 – Remote Code Execution (RCE)31 March 2023
  • Bludit 3-14-1 Plugin ‘UploadPlugin’ – Remote Code Execution (RCE) (Authenticated)31 March 2023
  • rconfig 3.9.7 – Sql Injection (Authenticated)31 March 2023
  • Spitfire CMS 1.0.475 – PHP Object Injection31 March 2023
  • Senayan Library Management System v9.0.0 – SQL Injection31 March 2023
  • EQ Enterprise management system v2.2.0 – SQL Injection31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »