Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Enable

ThreatConnect Extends Threat Intelligence Platform to Enable Threat Intelligence Operations (TI Ops)

25 January 2023

ThreatConnect announced today the release of ThreatConnect Platform v7.0, the industry’s first threat intelligence platform designed …

Tags Enable, Operations, Ops, Platforms, Threat Intelligence

How to Enable SSL for PostgreSQL Connections

30 December 2022

By default, all PostgreSQL connections are insecure. Here’s how to enable SSL for PostgreSQL connections to improve network …

Tags Connections, Developers, Enable, How, IT

All GitHub Users Will Need to Enable 2FA by the End of 2023

20 December 2022

GitHub recently announced that it will require all users who contribute with code on the platform to enable two-factor …

Tags Cybersecurity News, Enable, End, IT, Users

How IEC 62443 and Other Regulatory Requirements Help Enable IoT Security

15 December 2022

As the US Government Accountability Office warns, “internet-connected technologies can improve services, but face risks of …

Tags Enable, Help, How, Internet of Things, IoT

‘Black Proxies’ Enable Threat Actors to Conduct Malicious Activity

2 December 2022

Threat actors have been spotted using criminal proxy networks to obfuscate their illegal activities by hiding behind hijacked IP addresses …

Tags Activity, Enable, IT, Malicious, Threat Actors

Neosec Introduces Automated Tokenization to Enable Full API Visibility Without Exposure of Sensitive Data

15 November 2022

API discovery and threat-monitoring solution tokenizes API data at its source for secure behavioral analytics, storage, compliance, and …

Tags Automated, Enable, Exposure, Full, Tokenization

Microsoft Looks to Enable Practical Zero-Trust Security With Windows 11

23 September 2022

With the update, Microsoft adds features to allow easier deployment of zero-trust capabilities. Considering the 1.3 billion global Windows …

Tags Cloud, Enable, IT, Microsoft, Windows 11

Enable post-quantum key exchange in QUIC with the s2n-quic library

25 July 2022

At Amazon Web Services (AWS) we prioritize security, performance, and strong encryption in our cloud services. In order to be prepared for …

Tags Amazon, AWS, Enable, Encryption, Malware

Tanium Partners With ScreenMeet to Enable Employees to Securely Connect to Their Remote Desktops

22 June 2022

KIRKLAND, Wash., and SAN FRANCISCO, June 22, 2022 – Tanium, the industry’s only provider of converged endpoint management (XEM), and …

Tags Connect, Desktops, Employees, Enable, Partners

How to Enable Successful Remote Work Strategy with AI

14 April 2022

The Coronavirus Pandemic has taught us that organizations must have remote work choices. It is no longer possible to work in a digital …

Tags A.I, AI, Big Data, Contributors, Enable

Vulnerabilities in Rockwell Automation PLCs Could Enable Stuxnet-Like Attacks

31 March 2022

A security vendor’s recent analysis of Rockwell Automation’s programmable logic controller (PLC) platform has uncovered two serious …

Tags Attacks, Enable, PLCs, Security Pro, Vulnerability

Conversation Hijacking Soars 270% to Enable BEC

17 March 2022

Conversation hijacking attacks, which are typically a precursor to business email compromise (BEC), grew by triple-digits year-on-year in …

Tags BEC, Conversations, Enable, Hijacking, IT

How to Enable Critical Work Management Outside of DevOps

29 October 2021

From industrial control systems to security and crisis management, critical work can strike anywhere and at any time. Here are three use …

Tags Critical, Enable, How, IT, Sponsored

Google to Enable Two-Factor Authentication for 150M More Users

5 October 2021

Google today published updates on how it plans to increase user account security, including a goal to auto-enroll an additional 150 million …

Tags Cloud, Enable, Google, Two-Factor Authentication, Users
Older posts
Page1 Page2 Next →
Cookie-Free

NVD

  • CVE-2023-23924 – Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on …1 February 2023
  • CVE-2022-48161 – Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via th …1 February 2023
  • CVE-2023-24956 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2023-0341 – A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12 …1 February 2023
  • CVE-2023-24241 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2022-25979 – Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) …31 January 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
  • How much security is enough?9 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »