Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

SoC

Participate in your own rescue: ‘Dual ransomware’ attack highlights security hygiene urgency

14 May 2022

The Biden administration recently issued a laundry list of essential cybersecurity protections for private-sector organizations to …

Tags Conti, Cyber, IT, Karma, SoC

Cadence DRAM verification solution optimizes SoC designs for data center and automotive applications

22 January 2022

Cadence Design Systems announced a new DRAM verification solution, allowing customers to test and optimize system-on-chip (SoC) designs for …

Tags Cadence, DRAM, IT, News, SoC

Cadence Tensilica AI Platform accelerates intelligent SoC development

15 September 2021

Cadence Design Systems unveiled its Tensilica AI Platform for accelerating AI SoC development, including three supporting product families …

Tags AI, Cadence, IT, Platforms, SoC

McAfee expands MVISION XDR with automated threat detection and response

18 May 2021

McAfee Corp. today announced a significant expansion of its MVISION Extended Detection and Response solution by correlating the extensive …

Tags Cyber, Endpoint Security, IT, SASE, SoC

Sigma Rules to Live Your Best SOC Life

2 February 2021

Security Operations is a 24 x 7 job. It does not stop for weekends or holidays or even that much-needed coffee break after the first hour …

Tags Best, Life, Rules, Sigma, SoC

Netenrich debuts its Intelligent Security Operations Center

3 December 2020

Cybersecurity firm Netenrich Inc. today announced the general availability of its Intelligent Security Operations Center that’s aimed at …

Tags AI, Cyber, Intelligent, IT, SoC

Security teams increasingly stressed due to lack of proper tools, executive support

29 July 2020

93% of security professionals lack the tools to detect known security threats, and 92% state they are still in need of the appropriate …

Tags CISO, LogRhythm, Security Operations, SoC, Softwares

Closing the skills gap can minimize the business impact of cyberattacks

23 July 2020

CISOs who are successful at reducing or closing the critical skills gap have the highest probability of minimizing the business impact of …

Tags Coronavirus, Endpoint Security, Security Operations, SoC, Strategy

Security alerts more than doubled in the last 5 years, SecOps teams admit they can’t get to them all

13 July 2020

70% have more than doubled the volume of security alerts in the past five years 99% report high volumes of alerts cause problems for IT …

Tags Cloud, SecOps, Security Operations, SIEM, SoC

SOC team members battle with burnout, overload and chaos

26 June 2020

60% of SOC team members are still considering changing careers or leaving their jobs due to burnout. The survey, conducted in March and …

Tags Investments, Ponemon Institute, SoC, Strategy, Surveys

Siemens acquires UltraSoC to help customers detect, mitigate and eliminate risks throughout the SoC lifecycle

24 June 2020

Siemens has signed an agreement to acquire Cambridge, UK-based UltraSoC Technologies, a provider of instrumentation and analytics solutions …

Tags Siemens, SoC

When SOCs never stop: How to fill the intelligence gaps in security

1 June 2020

Without the right level of insight, these roles can easily be overwhelmed by the sheer volume of alerts and false positives. Filling the …

Tags CISO, Editor'S Choice, How, Security Operations, SoC

Maintaining the SOC in the age of limited resources

27 May 2020

With limited SOC resources, one may think automated alerts and post-breach threat intelligence are the answer to ensuring proper attention …

Tags Editor'S Choice, How-To, Mimecast, Security Operations, SoC

The missing link in your SOC: Secure the mainframe

21 May 2020

Most security analysts need more training to put the security knowledge they already possess into practice to better understand and secure …

Tags BMC Software, Editor'S Choice, Secure, Security Operations, SoC
Post navigation
Older posts
Page1 Page2 … Page5 Next →
Cookie-Free

NVD

  • CVE-2022-1898 – Use After Free in GitHub repository vim/vim prior to 8.2. …27 May 2022
  • CVE-2022-20802 – A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow …27 May 2022
  • CVE-2022-1907 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022
  • CVE-2022-20806 – Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expresswa …27 May 2022
  • CVE-2022-1908 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022
  • CVE-2022-20807 – Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expresswa …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »