Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Internet of Things

Software Deployment Best Practices in the Azure Cloud

31 January 2023

Cloud deployment is the process of deploying and managing applications, services, and infrastructure in a cloud computing environment. …

Tags Big Data, Contributors, Internet of Things, IT, Thought Leaders

Securing IoT with Microsoft Defender for IoT sensors

26 January 2023

Protecting the devices that run your production facilities is increasingly important. How can we secure single-purpose …

Tags Infrastructure Development, Internet of Things, IoT, IT, Networking

How Does a Service Mesh Impact Your Cloud Costs? A FinOps Perspective

25 January 2023

A service mesh is a configurable infrastructure layer for microservices-based applications that makes communication between service …

Tags Big Data, Contributors, How, Impact, Internet of Things

Why most IoT cybersecurity strategies give zero hope for zero trust

23 January 2023

IoT remains the biggest hurdle in achieving an effective zero-trust security posture across an organization. In this Help Net Security …

Tags CISO, Internet of Things, IoT, IT, Why

The Cloud is Heading to an Entirely New Formation in 2023

9 January 2023

The relationship between developers and the cloud was practically love at first sight. For years, migration to the cloud in countless …

Tags Big Data, Contributors, Internet of Things, IT, New

An Internet of Things technology: current tendencies in IoT outsourcing

23 December 2022

Entrepreneurs are interested in involving and immersing their customers in the experience with their products. The Internet of Things is a …

Tags Awareness, Internet of Things, IoT, IT, News

Study: Consumer security savvy is way behind IoT threat landscape

20 December 2022

Study: Consumer security savvy is way behind IoT threat landscape A new Comcast study hints at a major risk to businesses, governments and …

Tags Consumers, Internet of Things, IoT, IT, Study

How IEC 62443 and Other Regulatory Requirements Help Enable IoT Security

15 December 2022

As the US Government Accountability Office warns, “internet-connected technologies can improve services, but face risks of …

Tags Enable, Help, How, Internet of Things, IoT

Top industrial IoT security solutions

13 December 2022

From safety to where? Find out the right way to turn with this comprehensive analysis of seven options for your …

Tags Azure Sphere, Internet of Things, IoT, IT, Softwares

Zerobot: New Botnet Campaign Exploits Vulnerabilities

8 December 2022

Recently, a Go-based botnet, Zerobot, was seen spreading in the wild. It took advantage of nearly two dozen different security …

Tags Botnets, Internet of Things, Malware, Security Pro, Vulnerability

How IoT is changing the threat landscape for businesses

8 December 2022

Paul Keely, Chief Cloud Officer at Open Systems, talks about how organizations that employ IoT technology have improved their business …

Tags How, Internet of Things, IoT, IT, Open Systems

New Go-based botnet Zerobot exploits dozens of flaws

7 December 2022

Researchers discovered a new Go-based botnet called Zerobot that exploits two dozen security vulnerabilities IoT devices. Fortinet …

Tags Internet of Things, IT, Malware, New, News

New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network

7 December 2022

A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security …

Tags Botnets, FortiGuard, Fortinet, Internet of Things, IoT

SiriusXM Vulnerability Lets Hackers Remotely Unlock and Start Connected Cars

5 December 2022

Cybersecurity researchers have discovered a security vulnerability that exposes cars from Honda, Nissan, Infiniti, and Acura to remote …

Tags Cyber Threats, Hacking, Internet of Things, Malware, Security Pro
Older posts
Page1 Page2 … Page20 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »