Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Simple

Retrospect Cloud for Simple Offsite Data Protection Launched

23 June 2022

Retrospect has announced Retrospect Cloud Storage, a low-cost, high-availability (HA) cloud storage service delivered across 13 global data …

Tags Cloud, Data Protection, IT, Simple, Storage

The Time has Come for a Radically Simple Secure Web Gateway (SWG)

21 June 2022

Perimeter 81 is excited to announce the early availability of our Secure Web Gateway (SWG) Solution. Organizations can now benefit from …

Tags Gateways, Secure, Simple, Web, Web Applications

Quick and Simple: BPFDoor Explained

13 June 2022

BPFDoor isn’t new to the cyberattack game — in fact, it’s gone undetected for years — but PwC researchers discovered the piece of …

Tags Explained, IT, Malware, News, Simple

A Few Simple Ways to Transform Your Cybersecurity Hiring

10 June 2022

Raytheon Intelligence & Space’s Jon Check joins Dark Reading’s Terry Sweeney at Dark Reading News Desk at RSA Conference to talk about how …

Tags Hiring, IT, News, Simple, Transform

Simple Tips to Protect Youself From Being Catfished

16 March 2022

It is a fact that the COVID-19 pandemic forced us to go online whether it be working from home (WFH) or meeting people online. Another …

Tags COVID-19, How-To, Protect, Simple, Tips

4 Simple Steps to a Modernized Threat Intelligence Approach

24 February 2022

Threat intelligence is a critical part of an organization’s cybersecurity strategy, but given how quickly the state of cybersecurity …

Tags Approach, IT, Simple, Steps, Threat Intelligence

Google Cuts User Account Compromises in Half With Simple Change

8 February 2022

The online tech giant auto-enabled two-step verification for more than 150 million users, throwing up steep hurdles against scammers and …

Tags Accounts, Changes, Google, Simple, Users

A Simple 5-Step Framework to Minimize the Risk of a Data Breach

19 November 2021

Today’s businesses run on data. They collect it from customers at every interaction, and they use it to improve efficiency, increase their …

Tags Data Breach, Frameworks, IT, Risks, Simple

A Simple Bug Is Leaving AirTag Users Vulnerable to an Attack

3 October 2021

The hits keep coming to Apple’s bug-bounty program, which security researchers say is slow and inconsistent to respond to its vulnerability …

Tags AirTag, Attacks, Bug, Is, Simple

A Simple Software Fix Could Limit Location Data Sharing

12 August 2021

Location data sharing from wireless carriers has been a major privacy issue in recent years. Marketers, salespeople, and even bounty …

Tags Fix, Limits, Sharing, Simple, Softwares

A Simple 1-Click Compromised Password Reset Feature Coming to Chrome Browser

19 May 2021

Google on Tuesday announced a new feature to its password manager that could be used to change a stolen password automatically with a …

Tags Chrome, Features, Google, Google Chrome, Simple

Cloud-native watering hole attack: Simple and potentially devastating

8 April 2021

In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that …

Tags IT, Malware, News, Simple, Trojan

Ezviz C3X outdoor security camera review: Simple setup, superb features

8 March 2021

Loud siren and strobe ✓Configurable alert zones ✓Well-constructed Cons ✕Voice alert too quiet The Ezviz C3X outdoor security camera …

Tags IT, News, Simple

5 Simple Ways to Secure Online Business Transactions

22 February 2021

The application of technology and the internet in our lives is tremendously excellent. We use the internet for entertainment, …

Tags IT, Secure, Simple, Tips, Transactions
Post navigation
Older posts
Page1 Page2 … Page7 Next →
Cookie-Free

NVD

  • CVE-2022-34835 – In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based b …30 June 2022
  • CVE-2017-20121 – A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as cr …30 June 2022
  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022
  • CVE-2017-20123 – A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This aff …30 June 2022
  • CVE-2017-20124 – A vulnerability classified as critical has been found in Online Hotel Booking System Pro P …30 June 2022
  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Pandora FMS v7.0NG.742 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Algo 8028 Control Panel – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • HP LaserJet Professional M1210 MFP Series Receive Fax Service – Unquoted Service Path14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »