Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

How

How businesses are prioritizing data privacy

30 June 2022

In 2021, the demand for data privacy jobs soared with no indication of slowing down and stemming from the proliferation of new government …

Tags CISO, How, IT, News

How to Master the Kill Chain Before Your Attackers Do

29 June 2022

What do militaries and hackers have in common? They both use structured techniques to achieve their …

Tags Attackers, Chain, How, IT, News

How parents can talk about online safety and personal info protection with their kids

29 June 2022

Gen Zers might seem like digital pros but, they often aren’t armed with enough resources to keep themselves safe online. The FBI reported …

Tags How, IT, News

How SAST Will Improve Your Overall Security: Intro

28 June 2022

Application testing is a process that helps ensure the quality and safety of your software applications, whether the app is for a mobile or …

Tags How, SAST, Security Pro, Vulnerability, XSS

How to Find New Attack Primitives in Microsoft Azure

28 June 2022

Abuse primitives have a longer shelf life than bugs and zero-days and are cheaper to maintain. They’re also much harder for defenders to …

Tags Attacks, Find, How, Hybrid Cloud, New

Top Six Security Bad Habits, and How to Break Them

28 June 2022

Cybercrime is on the rise, and attacks are getting faster, more nuanced and increasingly sophisticated. The number of cyberattack-related …

Tags Bad, Habits, How, IT, News

How MOSIP Uses Ballerina WebSubHub for Event-Driven Integration

28 June 2022

MOSIP provides flexibility in how governments can implement and configure their foundation ID system on top of MOSIP, as shown in Diagram 1 …

Tags Ballerina, Event-Driven, How, Integration, IT

How to Use Microsoft Defender on All Your Devices

27 June 2022

Owners of Windows computers without Microsoft 365 don’t need to sweat; Microsoft is still preinstalling software on Windows to protect …

Tags Devices, How, IT, Microsoft Defender, Use

What Are Shadow IDs, and How Are They Crucial in 2022?

27 June 2022

Just before last Christmas, in a first-of-a-kind case, JPMorgan was fined $200M for employees using non-sanctioned applications for …

Tags Crucial, How, IT, News, Shadow

How to maintain telecom tax compliance using a subscription billing platform

27 June 2022

The Telecommunications industry is one of the most heavily taxed service industries. In countries such as the United States, providers have …

Tags Big Data, Contributors, How, IT, Telecommuting

How to progress towards a cyber-safe nation

27 June 2022

If you look at the world’s biggest data breaches and hacks, it highlights how cybersecurity has become a global phenomenon and that every …

Tags Community, How, IT, News, Singapore

How phishing attacks are becoming more sophisticated

27 June 2022

In this video for Help Net Security, Joshua Crumbaugh, CEO, PhishFirewall, talks about how cybercriminals are taking their phishing attacks …

Tags How, IT, News

How to Move Your WhatsApp Chats Across Devices and Apps

25 June 2022

Since early 2016, WhatsApp has protected messages and conversations sent in its app with end-to-end encryption. This means that nobody …

Tags Apps, Chats, Devices, How, Mobile

How secure is your digital supply chain?

24 June 2022

With tens of millions of employees working from home and billions of consumers purchasing goods on their phones from anywhere, protecting …

Tags How, IT, News
Post navigation
Older posts
Page1 Page2 … Page342 Next →
Cookie-Free

NVD

  • CVE-2022-34835 – In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based b …30 June 2022
  • CVE-2017-20121 – A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as cr …30 June 2022
  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022
  • CVE-2017-20123 – A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This aff …30 June 2022
  • CVE-2017-20124 – A vulnerability classified as critical has been found in Online Hotel Booking System Pro P …30 June 2022
  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022

EXPLOITS

  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • Old Age Home Management System 1.0 – SQLi Authentication Bypass14 June 2022
  • ChurchCRM 4.4.5 – SQLi14 June 2022
  • Sourcegraph Gitserver 3.36.3 – Remote Code Execution (RCE)14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »