Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

IoT

Fronton IOT Botnet Packs Disinformation Punch

24 May 2022

A fresh look at the Fronton DDoS-focused botnet reveals the criminal tool has more capabilities than previously known. The Fronton botnet …

Tags Botnets, Disinformation, Governments, IoT, Malware

Eseye Infinity empowers customers to scale and evolve their IoT deployment

24 May 2022

Eseye launched its next generation ‘mission control’ IoT connectivity platform, Infinity. The Eseye Infinity IoT Platform delivers a …

Tags Infinity, IoT, IT, News

Linux Trojan XorDdos Attacks Surge, Targeting Cloud, IoT

23 May 2022

Analysts have seen a massive spike in malicious activity by the XorDdos trojan in the last six months, against Linux cloud and IoT …

Tags Attacks, IoT, Linux Trojan, Surge, Targeting

Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns

23 May 2022

Fronton, a distributed denial-of-service (DDoS) botnet that came to light in March 2020, is much more powerful than previously thought, per …

Tags Botnets, Campaigns, Disinformation, IoT, Malware

Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

19 May 2022

Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect their …

Tags Attackers, Cars, Flaws, IoT, Unlock

Attackers Can Unlock Tesla Cars by Exploiting Bluetooth Flaws

19 May 2022

Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect their …

Tags Attackers, Cars, Flaws, IoT, Unlock

The Growing Threat of Ransom DDoS Attacks Requires Effective Prevention and Mitigation

18 May 2022

Essentially, ransom DDoS attacks are just DDoS with a ransom demand but a sudden increase in these attacks is no Bueno and bad for …

Tags Attacks, Botnets, Cyber Crime, DDoS, IoT

Sternum integrates with Kibana and Grafana to enhance IoT protection

6 May 2022

Sternum announced new integrations with Kibana and Grafana, two open-source data analysis and visualization tools. The integration allows …

Tags Cloud Computing, Elastic.co, Grafana, IoT, IT

Variscite enhances IoT and edge security with over-the-air software updates

5 May 2022

Variscite announced it has enhanced security options for IoT and edge devices built with Variscite SoMs. Integrations with Variscite and …

Tags IoT, IT, News

What Should I Know About Defending IoT Attack Surfaces?

4 May 2022

The Internet of Things needs to be part of the overall corporate information security policy to prevent adversaries from using these …

Tags About, Attacks, IoT, IT, News

Implement NIST IoT cybersecurity guidelines early

26 April 2022

Users can easily know if a product complies with the Restriction of Hazardous Substances Directive (RoHS) or Underwriters Laboratory (UL) …

Tags IoT, IT, News, NIST

QNAP warns of new bugs in its Network Attached Storage devices

22 April 2022

QNAP, the makers of Networked Attached Storage (NAS) devices that are especially popular with home and small business users, has issued a …

Tags Apache, IoT, IT, QNAP, Security Pro

CISA Alert on ICS, SCADA Devices Highlights Growing Enterprise IoT Security Risks

15 April 2022

Omdia Senior Analyst Hollie Hennessy says the new threat to multiple ICS and SCADA devices underscores the importance of a rapid response …

Tags Alerts, CISA, Devices, ICS, IoT

Intertrust Adds Security for IoT Devices in Zero-Trust Architectures to Intertrust Platform

13 April 2022

SAN FRANCISCO, April 7, 2022 /PRNewswire/ — Intertrust, a leading provider in trusted distributed computing, today announced the company …

Tags Architecture, Cloud Computing, Devices, IoT, Platforms
Post navigation
Older posts
Page1 Page2 … Page143 Next →
Cookie-Free

NVD

  • CVE-2021-42859 – A memory leak issue was discovered in Mini-XML v3.2 that could cause a denial of service. …26 May 2022
  • CVE-2022-29666 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022
  • CVE-2021-42860 – A stack buffer overflow exists in Mini-XML v3.2. When inputting an unformed XML string to …26 May 2022
  • CVE-2022-29667 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022
  • CVE-2022-29720 – 74cmsSE v3.5.1 was discovered to contain an arbitrary file read vulnerability via the comp …26 May 2022
  • CVE-2022-29669 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • T-Soft E-Commerce 4 – ‘UrunAdi’ Stored Cross-Site Scripting (XSS)17 May 2022
  • Survey Sparrow Enterprise Survey Software 2022 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SDT-CW3B1 1.1.0 – OS Command Injection17 May 2022

SECURELIST

  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022
  • ISaPWN – research on the security of ISaGRAF Runtime23 May 2022
  • Evaluation of cyber activities and the threat landscape in Ukraine17 May 2022
  • HTML attachments in phishing e-mails16 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »