Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Security Trends

Three Ways to Align with the White House’s Cybersecurity Recommendations

15 July 2022

The global pandemic and more recent geo-political events have brought an even greater focus on the threat of cyber attacks on individuals …

Tags IT, Recommendations, Security Pro, Security Trends, White

Unifying Security and Development

8 July 2022

The responsibility of training developers in secure coding best practices usually falls on security practitioners. Security practitioners …

Tags Development, IT, News, Security Pro, Security Trends

A Look Back at the Executive Order on Cybersecurity

12 May 2022

It has officially been one year since the release of the Biden administration’s Executive Order on Cybersecurity, which outlines security …

Tags Executive Order, IT, News, Security Pro, Security Trends

What Is Software Supply Chain Security?

12 May 2022

Most software today isn’t developed entirely from scratch. Instead, developers rely on a range of third-party resources to create their …

Tags Is, IT, Security Pro, Security Trends, Software Supply Chain

Coded for Safety

6 May 2022

Ready to secure government applications? Start with Zero …

Tags IT, News, Safety, Security Pro, Security Trends

NASCIO and the Challenge of Cybersecurity

26 April 2022

My name is Claire Bailey, the Vice President of Government Affairs at Veracode. My team recently asked me to describe technology policy, …

Tags Challenge, IT, News, Security Pro, Security Trends

Testing OWASP’s Top 10 API Security Vulnerabilities (Part 1)

6 April 2022

Application Programming Interface (API) attacks are set to become one of the most prevalent cyberattacks with a broad target range. By …

Tags IT, Methodologies, Security Pro, Security Trends, Testing

Spring4Shell Vulnerability vs Log4Shell Vulnerability

2 April 2022

On March 29, 2022, details of a zero-day vulnerability in Spring Framework (CVE-2022-22965) were …

Tags IT, Log4Shell, Security Trends, Spring4Shell, Vulnerability

Shifting Log4j Discovery Right

22 March 2022

You hear a lot about shifting your application security (AppSec) left – in other words, shifting AppSec to the beginning of the software …

Tags Discovery, IT, Log4j, Security Pro, Security Trends

SQL Injection in Today’s Landscape

17 February 2022

What is SQL injection? A SQL injection flaw allows for an attacker to modify or inject SQL syntax into the request to make the application …

Tags IT, Landscapes, Security Pro, Security Trends, SQL Injection

3 Critical Software Development Security Trends and Best Practices

15 February 2022

It seems as if we’re encountering new cyber threats every day — and the severity of their impact is growing. We now routinely deal with …

Tags Best Practices, Critical, IT, Security Pro, Security Trends

Announcing the 12th Volume of Our State of Software Security Report

8 February 2022

The 12th volume of our annual State of Software Security (SOSS) report is now live! Rather than examining a single year of activity …

Tags IT, Security Pro, Security Trends, Software Security, States

Dummy Blog Item

26 November 2021

…

Tags Blogs, IT, News, Security Pro, Security Trends

Champion Spotlight: Damian Sniezek

18 November 2021

This interview was cross-posted from the Veracode Community. With his third consecutive championship in the Secure Coding Challenge – the …

Tags IT, News, Security Pro, Security Trends, Spotlight
Post navigation
Older posts
Page1 Page2 … Page13 Next →
Cookie-Free

NVD

  • CVE-2022-2736 – A vulnerability was found in SourceCodester Company Website CMS. It has been classified as …11 August 2022
  • CVE-2022-2770 – A vulnerability, which was classified as critical, was found in SourceCodester Simple Onli …11 August 2022
  • CVE-2022-20244 – In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This …11 August 2022
  • CVE-2022-20372 – In exynos5_i2c_irq of (TBD), there is a possible out of bounds write due to a use after fr …11 August 2022
  • CVE-2022-20403 – Product: AndroidVersions: Android kernelAndroid ID: A-207975764References: N/A …11 August 2022
  • CVE-2022-35665 – Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 1 …11 August 2022

EXPLOITS

  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »