Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Programming Languages

Python packages with malicious code expose secret AWS credentials

27 June 2022

Sonatype researchers have discovered Python packages that contain malicious code that peek into and expose secret AWS credentials, network …

Tags IT, Programming, Programming Languages, Python, Sonatype

What Are the Most Prevalent Flaws in Your Programming Language?

21 June 2022

A few months ago, we released our 12th annual State of Software Security (SOSS) Report. In our announcement blog, we noted new application …

Tags Flaws, IT, Programming, Programming Languages, Security Pro

GitHub enables the development of functional safety applications by adding support for coding standards AUTOSAR C++ and CERT C++

20 June 2022

The latest innovations in the automotive sector have triggered a massive digital transformation in how vehicles are built. A modern …

Tags C#, CERT, IT, Programming, Programming Languages

Programming languages: How Google is improving C++ memory safety

27 May 2022

Google’s Chrome team is looking at heap scanning to reduce memory-related security flaws in Chrome’s C++ codebase, but the technique …

Tags C#, Google, How, IT, Programming Languages

Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

24 May 2022

Two trojanized Python and PHP packages have been uncovered in what’s yet another instance of a software supply chain attack targeting the …

Tags Malicious, Popular, Programming, Programming Languages, PyPI

What the ECDSA Flaw in Java Means for Enterprises

26 April 2022

This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the …

Tags Flaws, IT, Java, Programming, Programming Languages

Oracle already wins ‘crypto bug of the year’ with Java digital signature bypass

20 April 2022

Java versions 15 to 18 contain a flaw in its ECDSA signature validation that makes it trivial for miscreants to digitally sign files and …

Tags Java, Oracle, Oracle (Company), Programming, Programming Languages

Researchers Connect BlackCat Ransomware with Past BlackMatter Malware Activity

8 April 2022

Cybersecurity researchers have uncovered further links between BlackCat (aka AlphaV) and BlackMatter ransomware families, the former of …

Tags Activity, Connect, Programming, Programming Languages, Ransomware

Popular Ruby Asciidoc toolkit patched against critical vuln – get the update now!

8 April 2022

If you’ve ever written technical documentation to use online, you probably started out by creating it directly in HTML (hypertext markup …

Tags Asciidoc, Popular, Programming, Programming Languages, Ruby

SpringShell Brings Hell to Java Developers

7 April 2022

Logj4Shell brought a lot of misery, the newly discovered SpringShell vulnerability, not to be confused with the totally different Spring …

Tags Developers, IT, Java, Programming, Programming Languages

Java Spring4Shell flaw exploit attempts: These are the industries most affected

7 April 2022

The sector most heavily impacted by the Spring4Shell Java flaw is technology, according to security firm Check Point. Spring4Shell is a bug …

Tags IT, Java, Programming, Programming Languages, Spring4Shell

15-Year-old Security Vulnerability In The PEAR PHP Repository Permits Supply Chain Attack

5 April 2022

PEAR PHP repository has been found to contain a 15-year-old security vulnerability that could provide an attacker with the ability to carry …

Tags Cyber Attack, PHP, Programming, Programming Languages, Repository

Patch now: RCE Spring4shell hits Java Spring framework

31 March 2022

Another Java Remote Code Execution vulnerability has reared its head, this time in the popular Spring Framework and, goodness, it’s a nasty …

Tags Java, Patch, Programming, Programming Languages, Spring

Spring4Shell: No need to panic, but mitigations are advised

31 March 2022

Spring4Shell – seems to only be exploitable in certain configurations. What we know about Spring4Shell so far First and …

Tags Contrast Security, Java, PoC, Programming, Programming Languages
Post navigation
Older posts
Page1 Page2 … Page38 Next →
Cookie-Free

NVD

  • CVE-2022-31104 – Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime’s implemen …28 June 2022
  • CVE-2022-34132 – Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the …28 June 2022
  • CVE-2022-34133 – Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerab …28 June 2022
  • CVE-2022-34134 – Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) v …28 June 2022
  • CVE-2022-1573 – The HTML2WP WordPress plugin through 1.0.0 does not have CSRF check in place when updating …27 June 2022
  • CVE-2022-1913 – The Add Post URL WordPress plugin through 2.1.0 does not have CSRF check in place when upd …27 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Algo 8028 Control Panel – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • HP LaserJet Professional M1210 MFP Series Receive Fax Service – Unquoted Service Path14 June 2022
  • Virtua Software Cobranca 12S – SQLi14 June 2022

SECURELIST

  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022
  • Router security in 20218 June 2022
  • CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction6 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »