Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Roles

Why Threat Analysis Will Continue to Play a Vital Role in Security

13 July 2022

Today, the cybersecurity industry faces many challenges. Highly skilled attackers, a daily flood of data full of irrelevant information and …

Tags Cybersecurity Jobs, Roles, Security Pro, Threat Analysis, Why

Extend AWS IAM roles to workloads outside of AWS with IAM Roles Anywhere

6 July 2022

AWS Identity and Access Management (IAM) has now made it easier for you to use IAM roles for your workloads that are running outside of …

Tags Amazon, Extend, IAM, Identity, Roles

End-to-End Encryption’s Central Role in Modern Self-Defense

5 July 2022

Studies, including those commissioned by tech giants like Meta, have repeatedly and definitively shown that access to encrypted …

Tags Central, End-to-End, IT, Modern, Roles

#InfosecurityEurope2022: The Critical Yet Often Invisible Role Cryptography Plays in Our Lives

22 June 2022

On the opening day of Infosecurity Europe 2022, Professor Keith Martin delivered a keynote speech focusing on the critical yet often …

Tags Critical, Cryptography, Invisible, IT, Roles

#InfosecurityMagazine2022: The Critical Yet Often Invisible Role Cryptography Plays in Our Lives

22 June 2022

On the opening day of Infosecurity Europe 2022, Professor Keith Martin delivered a keynote speech focusing on the critical yet often …

Tags Critical, Cryptography, Invisible, IT, Roles

Private Investigator Admits Role in Hedge Fund Hack

27 April 2022

…

Tags Hacks, Hedge Funds, IT, Private, Roles

CISA Taps Veteran CISO Bob Lord for Technical Adviser Role

26 April 2022

Lord previously spearheaded security for the Democratic National Committee and held leadership roles at companies including Yahoo, Rapid7, …

Tags Bob Lord, CISA, CISO, Roles, Technical

Article: The Role of DevOps in Cloud Security Management

22 April 2022

Different areas of cloud security must be examined to strengthen security in the cloud versus security of the cloud. This includes …

Tags Application Security, Articles, DevSecOps, Management, Roles

#ISC2Events: Defining Cyber Roles Critical to Tackling Skills Shortage

7 April 2022

The challenges around establishing clearly defined roles and skillsets for the UK cybersecurity industry were discussed by Chris Ensor, …

Tags Critical, Cyber, IT, Roles, Skills Shortage

#SecureLondon: Defining Cyber Roles Critical to Tackling Skills Shortage

7 April 2022

The challenges around establishing clearly defined roles and skillsets for the UK cybersecurity industry were discussed by Chris Ensor, …

Tags Critical, Cyber, IT, Roles, Skills Shortage

Apple Gift Card Scammers Sentenced for Role in $1.5M Fraud

4 April 2022

Two men who engineered a massive gift card scam against Apple have been sentenced to federal prison for a $1.5 million Apple gift card …

Tags Apple, Fraud, Gift Cards, Roles, Scammers

Ukrainian Man Arrested for Alleged Role in Ransomware Attack on Kaseya, Others

11 March 2022

Ukrainian national Yaroslav Vasinskyi was extradited from Poland to the US and charged for his role as a member of the Sodinokibi/REvil …

Tags Arrested, Kaseya, Others, Ransomware Attacks, Roles

Gartner Says the Cybersecurity Leader’s Role Needs to Be Reframed

4 March 2022

The role of cybersecurity leader needs to evolve, as accountability for cyber risk shifts outside IT and an increasingly distributed …

Tags Gartner, IT, News, Roles

Ambient.ai’s Stephanie McReynolds on AI’s Role in Physical Security

14 February 2022

I spoke with Stephanie McReynolds, Head of Marketing at Ambient.ai, about how AI can provide a network of cameras with predictive, …

Tags Ambient, IT, News, Physical Security, Roles
Post navigation
Older posts
Page1 Page2 … Page9 Next →
Cookie-Free

NVD

  • CVE-2022-2747 – A vulnerability was found in SourceCodester Simple Online Book Store and classified as cri …11 August 2022
  • CVE-2022-2776 – A vulnerability classified as problematic has been found in SourceCodester Gym Management …11 August 2022
  • CVE-2022-20249 – In LocaleManager, there is a possible way to determine whether an app is installed, withou …11 August 2022
  • CVE-2022-20377 – In TBD of keymaster_ipc.cpp, there is a possible to force gatekeeper, fingerprint, and fac …11 August 2022
  • CVE-2022-20408 – Product: AndroidVersions: Android kernelAndroid ID: A-204782372References: N/A …11 August 2022
  • CVE-2022-35671 – Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 1 …11 August 2022

EXPLOITS

  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »