Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Requirements

Can’t Fill Open Positions? Rewrite Your Minimum Requirements

25 January 2023

If you or your company can’t find good infosec candidates, consider changing up the qualifications to find more nontraditional …

Tags Cloud, IT, News, Requirements

Industry Coalition Urges Congress to Hold off on SBOMs Requirements for Defense Contractors

2 December 2022

A coalition of cybersecurity industry associations have published an open letter urging the US Congress to delay Software Bill of Materials …

Tags Coalition, Congress, Contractors, Industry, Requirements

Majority of US Defense Contractors Not Meeting Basic Cybersecurity Requirements

30 November 2022

Nearly nine in 10 (87%) of US defense contractors are failing to meet basic cybersecurity regulation requirements, according to research …

Tags Contractors, IT, Meetings, News, Requirements

AWS Lists Services Included in OMB Memo for Event Logging Requirements at EL1 Level

17 October 2022

“Logs from these services need to be enabled in all AWS Regions and accounts that are within scope. Logs should also be shipped to a …

Tags Level, Memo, OMB, Requirements, Services

UK to Place Security Requirements on App Developers and Store Operators

4 May 2022

New proposals to establish security and privacy requirements for app store operators and developers have been published today by the UK …

Tags Operators, Places, Requirements, Stores, UK

Expanding Play’s Target Level API Requirements to Strengthen User Security

6 April 2022

Posted by Krish Vitaldevara, Director, Product Management Google Play helps our developer community distribute the world’s most …

Tags Android, Google, Level, Requirements, Targets

What You Need to Know About PCI DSS 4.0’s New Requirements

1 April 2022

The goal for PCI DSS v4.0 is to “address emerging threats and technologies and enable innovative methods to combat new threats” to …

Tags About, New, PCI DSS, Requirements, You

Verification Scans or Automated Security Requirements: Which Comes First?

31 March 2022

Instead of just testing for weaknesses, a more effective software security program prevents them. This requires a streamlined, automated …

Tags Automated Security, IT, Open Source, Requirements, Verification

ZTNAs Address Requirements VPNs Cannot. Here’s Why.

24 January 2022

I recently hopped on the Lookout podcast to talk about virtual private networks (VPNs) and how they’ve been extended beyond their original …

Tags Address, Lookout, Requirements, Virtual Private Networks, VPN

CTO’s Practical Guide to Comply With CPRA Cybersecurity Requirements

26 October 2021

Upcoming changes in the law If you’re not a privacy geek you may not have noticed that California recently voted to change its two …

Tags CPRA, Guides, IT, News, Requirements

Why Microsoft Is So Hell-Bent On Windows 11 TPM And Cloud Security Requirements

5 October 2021

David Weston, Microsoft director of OS and enterprise security, spoke with CRN about the company’s controversial decisions with Windows 11. …

Tags Is, Microsoft, Requirements, TPM, Why

Virtualization-Based Security Requirements Could Tank Gaming Performance On Windows 11 PCs

2 October 2021

For pre-built systems, Windows 11 will ship with Virtualization-Based Security (VBS) enabled by default, and according to a new report from …

Tags Gaming, IT, PCs, Performance, Requirements

U.S. Homeland Security Pushes New Cybersecurity Requirements For Pipelines After Cyberattack

20 July 2021

This directive comes from the Cybersecurity and Infrastructure Agency which advised the Transportation Security Administration “on …

Tags Cyber Attack, New, Pipelines, Requirements, S

Executive Order Update: NIST Establishes a Definition for Critical Software and Outlines Scan Requirements for Software Source Code

19 July 2021

On May 12, 2021, President Biden announced an executive order to improve the nation’s cybersecurity. The order, which outlines security …

Tags Critical, Definition, NIST, Requirements, Scan
Older posts
Page1 Page2 … Page4 Next →
Cookie-Free

NVD

  • CVE-2023-23924 – Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on …1 February 2023
  • CVE-2022-48161 – Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via th …1 February 2023
  • CVE-2023-24956 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2023-0341 – A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12 …1 February 2023
  • CVE-2023-24241 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2022-25979 – Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) …31 January 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
  • How much security is enough?9 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »