Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Identity

Mitek Verified Identity Platform protects customers against identity theft

24 June 2022

Mitek is making it possible for companies to protect customers’ digital experiences from the moment they open an account through their …

Tags Identity, IT, News, Platforms, Verified

Identity and access management startup ConductorOne raises $15M

24 June 2022

Identity and access management startup ConductorOne Inc. has raised $15 million in new funding to enhance product development and increase …

Tags Accel, Cyber, Identity, IT, Startups

Looking for Cyber Insurance? Know Your Eligibility

16 June 202216 June 2022

Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. …

Tags COVID-19, Cyber Insurance, Data Protection, Identity, Identity Management

PIXM partners with Identity Automation to protect educators and learners from targeted phishing attacks

15 June 2022

PIXM announced its partnership with Identity Automation, a digital identity platform for education. Together they will launch PhishID, a …

Tags Automation, Identity, IT, News

Introducing Entitlements: GitHub’s open source Identity and Access Management solution

9 June 2022

We strongly believe in using GitHub to build GitHub, keeping the developer experience streamlined and integrating directly into their …

Tags Access Management, Github, Identity, IT, Open Source Hosting

Gurucul Launches Cloud-Native SOC Platform Pushing the Boundaries of Next-Gen SIEM and XDR with Identity Threat Detection and Response

2 June 2022

Gurucul automating threat detection, investigation and response (TDIR) with advanced analytics, comprehensive threat content, and a …

Tags Cloud Computing, Cloud-Native, Gurucul, Identity, Launches

When and where to use IAM permissions boundaries

1 June 2022

Customers often ask for guidance on permissions boundaries in AWS Identity and Access Management (IAM) and when, where, and how to use …

Tags Amazon, AWS, Cloud Computing, Cloud Provider, Identity

How to use regional SAML endpoints for failover

31 May 2022

. Although this endpoint is highly available, it is hosted in a single AWS Region, us-east-1. This blog post provides recommendations that …

Tags Disaster Recovery, Federation, How, Identity, Resilience

New Open Source Project Brings Consistent Identity Access to Multicloud

20 May 2022

Hexa and IDQL allows organizations using cloud platforms such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform to apply …

Tags Cloud, Identity, Multicloud, New, Open Source Projects

Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future

16 May 2022

A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized …

Tags Decentralized, Digital, Foundation, Identity, Is

Getting started with AWS SSO delegated administration

12 May 2022

Recently, AWS launched the ability to delegate administration of AWS Single Sign-On (AWS SSO) in your AWS Organizations organization to a …

Tags Amazon, AWS, Cloud Computing, Cloud Provider, Identity

Establishing a data perimeter on AWS

10 May 2022

For your sensitive data on AWS, you should implement security controls, including identity and access management, infrastructure security, …

Tags Amazon, AWS, Cloud Computing, Cloud Provider, Identity

Scammer Infects His Own Machine with Spyware, Reveals True Identity

6 May 2022

An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he …

Tags Identity, IT, Machines, Scammers, Spyware

Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale

5 May 2022

As businesses embrace more remote users and a hybrid work model, managing user identity and access is more important than ever. Add …

Tags CISO, Cloud Computing, Cloud Security, Differences, Identity
Post navigation
Older posts
Page1 Page2 … Page28 Next →
Cookie-Free

NVD

  • CVE-2022-34835 – In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based b …30 June 2022
  • CVE-2017-20121 – A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as cr …30 June 2022
  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022
  • CVE-2017-20123 – A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This aff …30 June 2022
  • CVE-2017-20124 – A vulnerability classified as critical has been found in Online Hotel Booking System Pro P …30 June 2022
  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Marval MSM v14.19.0.12476 – Cross-Site Request Forgery (CSRF)14 June 2022
  • Marval MSM v14.19.0.12476 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Avantune Genialcloud ProJ 10 – Cross-Site Scripting (XSS)14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »