Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Mobile Security

Third-Party App Stores Could Be a Red Flag for iOS Security

26 January 2023

Even Apple can’t escape change forever. The famously restrictive company will allow third-party app stores for iOS devices, along with …

Tags Flags, Mobile, Mobile Security, Red, Risk Management

Malwarebytes Mobile Security for Business protects organizations’ mobile devices

26 January 2023

Malwarebytes has announced the upcoming Malwarebytes Mobile Security for Business, extending its endpoint protection capabilities to …

Tags Business, IT, Malwarebytes, Mobile, Mobile Security

NSA Slices Up 5G Mobile Security Risks

14 December 2022

The feds’ mobile service provider guidance details cybersecurity threat vectors associated with 5G network …

Tags 5G, Mobile, Mobile Security, NSA, Risks

Xiaomi Phone Bug Allowed Payment Forgery

16 August 2022

Smartphone maker Xiaomi, the world’s number three phone maker behind Apple and Samsung, reported it has patched a high-severity flaw in …

Tags Bug, Forgery, Mobile, Mobile Security, Payments

Google Boots Multiple Malware-laced Android Apps from Marketplace

18 July 2022

Google has removed eight apps from its Google Play store that were propagating a new variant of the Joker spyware, but not before they …

Tags Android, Boots, Malware, Marketplace, Mobile Security

Leaky Access Tokens Exposed Amazon Photos of Users

29 June 2022

The Amazon Photos app for Android insufficiently protected user access tokens, according to a blog post published on Wednesday. …

Tags Amazon, Exposed, Mobile, Mobile Security, Privacy

Overview of Top Mobile Security Threats in 2022

28 June 2022

Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical …

Tags IT, Mobile, Mobile Security, Overview, Threats

Kazakh Govt. Used Spyware Against Protesters

21 June 2022

An agent of the Kazakhstan government has been using enterprise-grade spyware against domestic targets, according to Lookout research …

Tags Malware, Mobile, Mobile Security, Protesters, Spyware

Mozilla: Lack of Security Protections in Mental-Health Apps Is ‘Creepy’

3 May 2022

Popular apps to support people’s psychological and spiritual well-being can harm them by sharing their personal and sensitive data with …

Tags Apps, Is, Mental Health, Mobile Security, Mozilla

‘CatalanGate’ Spyware Infections Tied to NSO Group

19 April 2022

An unknown zero-click exploit in Apple’s iMessage was used by Israeli-based NSO Group to plant either Pegasus or Candiru malware on …

Tags Infections, Malware, Mobile, Mobile Security, Spyware

Switching to 5G? Know Your Integrated Security Controls

12 April 2022

5G is a big leap in mobile technology. It presents enterprises and service providers with capabilities for advanced applications, content …

Tags Cloud Computing, Cloud Security, Integrated, Mobile, Mobile Security

Google Play Bitten by Sharkbot Info-stealer ‘AV Solution’

8 April 2022

Researchers have found the info-stealing Android malware Sharkbot lurking unsuspected in the depths of the Google Play store under the …

Tags Google Play, IT, Malware, Mobile, Mobile Security

Mobile security startup Zimperium acquired by Liberty Strategic Capital for $525M

29 March 2022

Former U.S. Treasury Secretary Steven Mnuchin, the founder and managing partner of Liberty Strategic Capital, will become the chair of …

Tags IT, Mobile, Mobile Security, News, Zimperium

IAM Secures the New, Perimeter-less Reality

23 March 2022

Necessity may be the mother of invention, and it also drives change. To remain competitive in 2021, companies had to transform …

Tags IAM, Mobile, Mobile Security, Network, New
Older posts
Page1 Page2 … Page39 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »