Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

IT

Huawei Phones Unlikely to Receive Security Updates as Trade Ban Begins

18 August 2020

Some Huawei phones are set to stop receiving software updates after a US reprieve, which allowed some trade with Huawei, lapsed last week. …

Tags Huawei, IT, Phones, Security Updates, Trade

The SASE Model: A New Approach to Security

18 August 2020

The emerging cloud-delivered service model known as security access service edge, or SASE, is designed to help to simplify security for …

Tags Approach, IT, Models, New, News

Ransomware gang who made $42 million arrested in Ukraine

18 August 2020

Law enforcement in Ukraine has announced today the arrest of a cybercrime gang who they believe has earned more than $42 million from …

Tags IT, News, Ransomware, Ukraine

AI firm exposes 2.5 million sensitive medical records online

18 August 2020

Ransomware Hits Leading US Medical Debt Collector R1 RCM Inc. Further investigation by Fowler brought light to what caused the …

Tags AI, Artificial Intelligence, IT, Leaks, Privacy

Nearly 40% of Firms Fired Staff for Security Policy Breaches

18 August 2020

Almost two-fifths (39%) of British business decision makers have sacked employees because they breached corporate security policy during …

Tags Breaches, Fired, IT, Security Policy, Staff

ISO Warning as #COVID19 Threatens Re-Certification Audits

18 August 2020

Hundreds of thousands of ISO certifications are in danger of lapsing because auditors haven’t been able to visit organizations’ …

Tags Audits, IT, News, Warnings

The Digital Mindset – How to Get Past Today’s Problems to Solve Tomorrow’s

18 August 2020

Digital transformation describes the process where – in theory – companies change their business practices and models to take advantage …

Tags Digital, Get, How, IT, Mindset

Cruise line operator Carnival Corporation suffers a ransomware attack

18 August 2020

The world’s largest cruise line operator Carnival Corporation has disclosed that one of their brands suffered a ransomware attack over …

Tags Carnival, IT, News

Chrome’s upcoming version will protect you from sketchy web forms

18 August 2020

Hackers often steal your personally identifiable data from unsecured web forms. Google is now trying to prevent that through a new feature …

Tags IT, News

How do I select a risk assessment solution for my business?

18 August 2020

To select a suitable risk assessment solution for your business, you need to think about a variety of factors. We’ve talked to several …

Tags CISO, Features, How, IT, RSA Security

US Army report says many North Korean hackers operate from abroad

18 August 2020

North Korea has at least 6,000 hackers and electronic warfare specialists working in its ranks, and many of these are operating abroad in …

Tags IT, News, North, US Army

Why do healthcare organizations have a target on their back?

18 August 2020

Medical records command a high value on the dark web due to the large amount of personal information they hold. Cybercriminals can sell …

Tags IT, News, Why

COVID-19 pandemic: What if ‘herd immunity’ is closer than scientists thought?

18 August 2020

Herd immunity is calculated from the epidemic’s reproductive number – an indicator of how many people each infected person spreads the …

Tags Health, IT, Malware, NYT, Pandemic

Terrascan open source software helps developers build secure cloud infrastructure

18 August 2020

Accurics unveiled a major upgrade to Terrascan, the open source static code analyzer that enables developers to build secure infrastructure …

Tags IT, News
Post navigation
Older posts
Newer posts
← Previous Page1 … Page2,244 Page2,245 Page2,246 … Page2,253 Next →
Cookie-Free

NVD

  • CVE-2022-31104 – Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime’s implemen …28 June 2022
  • CVE-2022-34132 – Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the …28 June 2022
  • CVE-2022-34133 – Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerab …28 June 2022
  • CVE-2022-34134 – Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) v …28 June 2022
  • CVE-2022-1028 – The WordPress Security Firewall, Malware Scanner, Secure Login and Backup plugin before 4. …27 June 2022
  • CVE-2022-1842 – The OpenBook Book Data WordPress plugin through 3.5.2 does not have CSRF check in place wh …27 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • TP-Link Router AX50 firmware 210730 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Pandora FMS v7.0NG.742 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Algo 8028 Control Panel – Remote Code Execution (RCE) (Authenticated)14 June 2022

SECURELIST

  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022
  • Router security in 20218 June 2022
  • CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction6 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »