Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Development

Amazon EC2 Supports NitroTPM and UEFI Secure Boot

22 May 2022

AWS recently announced the general availability of the UEFI Secure Boot and of NitroTPM, a virtual TPM module for EC2 instances based on …

Tags Architecture & Design, Cloud, Cloud Security, Development, EC2

Docker Launches Docker Extensions and Docker Desktop for Linux

11 May 2022

At DockerCon 2022, Docker announced a way for developers to tap into Docker Desktop and extend its functionality using a new Extension SDK. …

Tags Development, DevOps, Extensions, IT, Launches

When Security Meets Development: The DevSecOps Conundrum

25 April 2022

The DevSecOps journey is well worth undertaking because it can improve communication, speed up development, and ensure quality …

Tags Development, DevSecOps, IT, News

RDS and Aurora PostgreSQL Vulnerability Leads to AWS Deprecating Many Minor Versions

23 April 2022

A researcher at the security company Lightspin recently explained how she obtained credentials to an internal AWS service using a …

Tags Amazon RDS, Architecture & Design, Aurora, Cloud, Development

Crypto Miners Exploiting VMware Vulnerability in the Wild

21 April 2022

A critical vulnerability affecting VMware Workspace ONE Access and VMware Identity Manager allows malicious actors to remotely execute …

Tags Cloud, Cloud Computing, Crypto, Development, DevOps

Infrastructure-as-Code: Increase Security, Scale Development

6 April 2022

IAC helps reduce development costs, creates efficiency and enables controls for the creation of secure applications and services. While IaC …

Tags Development, Increase, IT, Scale, Sponsored

Presentation: Application-Layer Encryption Basics for Developers

2 April 2022

Transcript Potoczny-Jones: I’m Isaac …

Tags Basics, Developers, Development, DevOps, Methodologies

Hardware Mitigation on Intel, Arm, and AMD CPUs Shown Ineffective Against Spectre v2

28 March 2022

Security researchers from Vrije Universiteit Amsterdam showed the hardware mitigations to Spectre v2 attacks implemented in both Intel and …

Tags AMD, ARM, CPUs, Development, DevOps

Meta Open-sources Browser Extension to Establish Web Code Authenticity

26 March 2022

Originally created to help WhatsApp users verify the authenticity of the WhatsApp code being served to their browsers, Code Verify is a new …

Tags Application Security, Authenticity, Browsers, Codes, Development

Encryption in the Ukrainian War

22 March 2022

Encrypted data communications are at the forefront of a war in which Russia is establishing itself as the second most powerful military in …

Tags Development, Encryption, IT, Malware, Wars

Raytheon Technologies names Barbara Borgonovi as SVP of Corporate Strategy & Development

18 March 2022

Barbara Borgonovi has been named Raytheon Technologiesā€˜ senior vice president of Corporate Strategy & Development, effective April 1, …

Tags Corporate, Development, IT, Strategy, Technologies

AWS WAF Introduces Fraud Control – Account Takeover Prevention

5 March 2022

Amazon recently introduced Fraud Control – Account Takeover Prevention, a new feature of AWS Web Application Firewall to protect login …

Tags Architecture & Design, Cloud, Cloud Security, Development, Fraud

AWS Introduces Managed Prefix List for CloudFront

26 February 2022

AWS recently announced the availability of the AWS managed prefix list for CloudFront. Customers can now limit inbound HTTP/HTTPS traffic …

Tags Architecture & Design, Cloud, Cloud Security, Development, Hybrid Cloud

New CodeGuru Reviewer Features: Detector Library and Security Detectors for Log-Injection Flaws

25 February 2022

Amazon CodeGuru Reviewer is a developer tool that leverages machine learning to detect security defects in code (Java and Python) and …

Tags Architecture & Design, Cloud, Code Reviews, Development, DevOps
Post navigation
Older posts
Page1 Page2 … Page45 Next →
Cookie-Free

NVD

  • CVE-2022-30700 – An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a …27 May 2022
  • CVE-2022-30701 – An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as …27 May 2022
  • CVE-2022-1898 – Use After Free in GitHub repository vim/vim prior to 8.2. …27 May 2022
  • CVE-2022-1907 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022
  • CVE-2022-1908 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022
  • CVE-2022-1909 – Cross-site Scripting (XSS) – Stored in GitHub repository causefx/organizr prior to 2.1.220 …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Survey Sparrow Enterprise Survey Software 2022 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SDT-CW3B1 1.1.0 – OS Command Injection17 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022

SECURELIST

  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »