Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Management

Cybellum Releases Enhanced SBOM Management and Compliance Oversight for Manufacturers with New Release of its Product Security Platform

26 January 2023

Advanced workflow, approval process, and management dashboard enhance control, distribution, and supervision, while reducing errors and …

Tags Compliance, Management, Manufacturers, Oversight, Products

SaaS Security Posture Management (SSPM) as a Layer in Your Identity Fabric

23 January 2023

The move to SaaS and other cloud tools has put an emphasis on Identity & Access Management (IAM). After all, user identity is one of the …

Tags Fabric, Identity, IT, Layers, Management

Wallarm API Leak Management detects leaked API keys and secrets

23 January 2023

Wallarm has launched the Wallarm API Leak Management solution, an enhanced API security technology designed to help organizations identify …

Tags API keys, IT, Leaks, Management, News

Top Payroll Management Tips and Tricks

19 January 2023

There are various items of information that must be included on all pay stubs, as well as a few optional elements that may be required in …

Tags Awareness, Management, Payroll, Tips, Tricks

What is Business Attack Surface Management?

19 January 2023

Explore how businesses can make internal and external attack surface management (ASM) actionable. …

Tags Attack Surface, Business, IT, Management, News

Vulnerabilities Discovered in Passwordstate Credential Management Solution

23 December 2022

Several critical security vulnerabilities have been found in Passwordstate password management solution. The flaws can be leveraged by a …

Tags Cybersecurity News, IT, Management, Security Pro, Vulnerability

What Is Credential Management?

22 December 2022

The credentials used by an organization are handled by this established form of software known as the credential management system. This …

Tags Access Management, Is, IT, Management, News

Coming to a SOC Near You: New Browsers, ‘Posture’ Management, Virtual Assistants

20 December 2022

Startups are coalescing around effective data loss prevention, reducing data attack surfaces, and viable AI …

Tags Browsers, Internet, Management, Near, New

Axonius Bolsters SaaS Management Offering With New Behavioral Analytics and SaaS User-Device Association Capabilities to Help Teams Address

15 December 2022

, Dec. 15, 2022 /PRNewswire/ — Axonius, the leader in cybersecurity asset management and SaaS management, today announced the release of …

Tags Address, Axonius, Capabilities, Help, Management

How Posture Management Prevents Catastrophic Cloud Breaches

15 December 2022

We’ve all heard about catastrophic cloud breaches. But for every cyberattack reported in the news, many more may never reach the public …

Tags Breaches, How, Hybrid Cloud, Management, Private Cloud

Epic Management Provides Notice of Data Security Incident

14 December 2022

, Dec. 14, 2022 /PRNewswire/ — Epic Management LLC (“Epic”), a healthcare management company, has learned of a data security incident that …

Tags Cloud, Data Security, IT, Management, News

Palo Alto Networks Xpanse Active Attack Surface Management Automatically Remediates Cyber Risks Before They Lead to Cyberattacks

12 December 2022

, Dec. 12, 2022 /PRNewswire/ — Cyberattackers today use highly automated methods to quickly find and exploit weaknesses in target …

Tags Active, Cyber, Cyber Attack, Leads, Management

The Role of Endpoint Security and Management In Threat Detection

30 November 2022

By Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches originate at the endpoint (servers, …

Tags Cyber Security News, Endpoint Security, Management, Roles, Threat Detection

Continuous Exposure Management: Flipping the Script on Cybersecurity

22 November 2022

By Brett Kelsey, CEO, Reveald Hackers recently exploited flaws in the Binance blockchain to steal $570 million and vanish into thin air. At …

Tags Continuous, Cyber Security News, Exposure, Management, Scripts
Older posts
Page1 Page2 … Page49 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »