Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Features

How ML Defense Projects Change Approaches to Data Security

18 May 2022

Today, civilians and foreign allied services alike can come to the aid of a nation through AI data systems. Because these people are …

Tags Changes, Features, How, IT, Machine Learning

Lacework Integrates Kubernetes Features to Enhance Security Across Multi-Cloud Environments

18 May 2022

SAN JOSE, Calif., May 18, 2022 /PRNewswire/ — Lacework, the data-driven cloud security company, today announced new features added to the …

Tags Cloud, Environments, Features, Lacework, Multi-Cloud

Facebook to Terminate some Location Tracking Services and Features

17 May 2022

The social network giant plans the year’s most extensive bulk data deletion, including wiping out users’ location histories. Last year, …

Tags Features, IT, Meta, Privacy, Services

The Great Security Debate: Is Patching Useless?

14 May 2022

“I’ve been in this game for a long time,” security expert Dave Aitel said, prefacing a counter-intuitive argument that patching …

Tags Culture, Debates, Features, Is, Patching

Unused Credentials Key Culprits in Cloud Attacks, Study Says

10 May 2022

It’s an eye-popping statistic: Nearly 99% of identity and access management (IAM) policies are overly permissive, according to a new …

Tags Attacks, Cloud, Cloud Computing, Credentials, Features

Data centers on steel wheels: Can we trust the safety of the railway infrastructure?

9 May 2022

In this interview for Help Net Security, Dimitri van Zantvliet Rozemeijer, CISO at Nederlandse Spoorwegen (Dutch Railways), talks about …

Tags CISO, Data, Features, IT, News

Biden Issues Executive Order Bolstering National Quantum Initiative and Cybersecurity

4 May 2022

President Joe Biden today issued an Executive Order and a National Security Memorandum boosting the national focus on quantum information …

Tags Biden, Features, Initiative, Issues, IT

Good end user passwords begin with a well-enforced password policy

4 May 2022

In this interview with Help Net Security, Lori Österholm, CTO at Specops Software, explains what makes passwords vulnerable and suggests …

Tags Active Directory, Features, Goods, IT, MFA

What Is Zero Trust Network Access (ZTNA)?

2 May 2022

In the first article in this series, we discussed what zero-trust security is and why it matters. In this article, we will take a deep dive …

Tags Features, Infrastructure Development, Is, IT, Networking

Amazon Astro’s Data Protection Features Leave Privacy Experts Concerned

27 April 2022

The home robot requires vast amounts of personal information to …

Tags Amazon, Data Protection, Experts, Features, Privacy

Keep your digital banking safe: Tips for consumers and banks

27 April 2022

In this interview for Help Net Security, Reza Zaheri, CSO at Quantum Metric, talks about digital banking security and what can banks, as …

Tags Features, IT, MFA, News, Tips

Payment Fraud at Record Lows Thanks to Analytics and AI, Visa Says

26 April 2022

Despite a massive increase in online activity during the COVID-19 pandemic, fraud on the Visa payment network is at an all time low, the …

Tags Analytics, Analytics (Cloud Computing), Features, Fraud, IT

Is cybersecurity talent shortage a myth?

25 April 2022

In this interview for Help Net Security, Ricardo Villadiego, CEO at Lumu, explains why he thinks the cybersecurity talent shortage is a …

Tags Features, Is, IT, News

The changing role of the CCO: Champion of innovation and business continuity

19 April 2022

In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of …

Tags Features, IT, Jumio, News
Post navigation
Older posts
Page1 Page2 … Page46 Next →
Cookie-Free

NVD

  • CVE-2022-1909 – Cross-site Scripting (XSS) – Stored in GitHub repository causefx/organizr prior to 2.1.220 …27 May 2022
  • CVE-2022-28394 – EOL Product CVE – Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 …27 May 2022
  • CVE-2022-30687 – Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that cou …27 May 2022
  • CVE-2022-30700 – An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a …27 May 2022
  • CVE-2022-30701 – An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as …27 May 2022
  • CVE-2022-1898 – Use After Free in GitHub repository vim/vim prior to 8.2. …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »