Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Mitigation

How to Fight Bad Bots and Win: Radware’s New Crypto Mitigation Algorithms

20 July 2022

Facing a daily barrage of attacks by bad bots, today’s web application defenses are starting to show their age. The challenge is …

Tags Algorithms, Bots, Crypto, How, Mitigation

Why Enterprise Threat Mitigation Requires Automated, Single-Purpose Tools

14 March 2022

As much as threat mitigation is to a degree a specialist task involving cybersecurity experts, the day to day of threat mitigation often …

Tags Automated, Mitigation, Sysadmins, Threats, Tools

DoD Awards Attivo Networks Contract for Ransomware Mitigation

16 February 2022

FREMONT, Calif.–(BUSINESS WIRE)–Attivo Networks®, the experts in identity security and lateral movement attack prevention, today …

Tags Awards, IT, Mitigation, Network, Ransomware

Federal Reserve releases Synthetic Identity Fraud Mitigation Toolkit to help businesses fight fraud

10 February 2022

The Federal Reserve released a Synthetic Identity Fraud Mitigation Toolkit to provide financial institutions, consumers and businesses with …

Tags Identity Fraud, IT, Mitigation, Synthetic, Toolkits

Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation

6 January 2022

Zero trust, DevSecOps, and agile methodologies are critical in bridging the power of commercial multicloud environments and the security of …

Tags Hybrids, Mitigation, Multicloud, Strategies, Threats

Why Log4j Mitigation Is Fraught With Challenges

17 December 2021

Security teams working to mitigate their organizations’ exposure to the Log4j vulnerability have plenty of challenges to overcome. They …

Tags Challenges, Is, Log4j, Mitigation, Why

How to Navigate the Mitigation of Deepfakes

17 November 2021

Roughly 10 years ago, the world of cybercrime had a celestial alignment. Cybercriminals had already been around for decades, routinely …

Tags Cloud, Deepfakes, How, IT, Mitigation

Smaller ‘Bit and Piece’ DDoS Attacks Slam Servers to Evade Mitigation Systems

12 October 2021

Low-bandwidth distributed denial-of-service (DDoS) attacks increased by a whopping 233% in the first half of 2021 – some 95% of which were …

Tags Attacks, DDoS, Mitigation, Servers, Systems

2021 Cyber Threats, Trends & Mitigation Techniques for Enterprise

30 September 2021

Dustin Brewer, CISM, CSX-P, CDPSE, CEH, is ISACA’s Senior Director, Emerging Technology and Innovation, a role in which he explores and …

Tags Cyber Threats, IT, Mitigation, Techniques, Trends

Microsoft Adds Emergency Threat Mitigation to its Exchange Server Software

27 September 2021

Microsoft has baked a new threat mitigation feature into Exchange Server that will roll out this week as part of its September 2021 …

Tags Emergency, Microsoft, Mitigation, Softwares, Threats

A Master Class on IT Security: Roger Grimes Teaches You Phishing Mitigation

19 August 2021

Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they’re more targeted, more cunning …

Tags Grimes, Identity Theft, Mitigation, Phishing, You

Ransomware Mitigation Steps to Take Now — Or Else

16 August 2021

A proliferation of ransomware attacks has created ripple effects worldwide. Such criminal attacks have since increased in scale and …

Tags DevOps, Features, IT, Methodologies, Mitigation

CISA Offers New Mitigation for PrintNightmare Bug

2 July 2021

The U.S. government has stepped in to offer a mitigation for a critical remote code execution (RCE) vulnerability in the Windows Print …

Tags Bug, CISA, Governments, Mitigation, New

Kinetic Business DDoS Mitigation Service helps customers protect networks from attacks

10 June 2021

Kinetic Business introduced DDoS Mitigation Service, a fully managed service that monitors, detects, validates and mitigates attacks—even …

Tags Business, DDoS, Kinetic, Mitigation, Services
Post navigation
Older posts
Page1 Page2 … Page5 Next →
Cookie-Free

NVD

  • CVE-2022-2745 – A vulnerability, which was classified as critical, was found in SourceCodester Gym Managem …11 August 2022
  • CVE-2022-2773 – A vulnerability was found in SourceCodester Apartment Visitor Management System. It has be …11 August 2022
  • CVE-2022-20247 – In Media, there is a possible out of bounds read due to a heap buffer overflow. This could …11 August 2022
  • CVE-2022-20375 – In LteRrcNrProAsnDecode of LteRrcNr_Codec.c, there is a possible out of bounds read due to …11 August 2022
  • CVE-2022-20406 – Product: AndroidVersions: Android kernelAndroid ID: A-184676385References: N/A …11 August 2022
  • CVE-2022-35668 – Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 1 …11 August 2022

EXPLOITS

  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »