Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

SOC 2

Appgate achieves SOC 2 Type 2 certification

7 May 2022

Appgate announced it has achieved SOC 2 Type 2 certification for its entire portfolio. With the completed examination, Appgate offers SOC 2 …

Tags IT, News, SOC 2, Types

ThreatConnect announces 6.5 platform release and achieves SOC 2 compliance

15 April 2022

ThreatConnect is announcing the achievement of SOC2 compliance and the release of ThreatConnect 6.5. This release introduces new …

Tags IT, News, SOC 2

Tackling SOC 2 in 2022? Start Here

7 April 2022

This article will introduce the SOC 2 framework and explore best practices for compliance, also explored in strongDM’s comprehensive SOC …

Tags IT, Open Source, Open Source Software, SOC 2, Sponsored

Getting Your SOC 2 Compliance as a SaaS Company

17 February 2022

If you haven’t heard of the term, you will soon enough. SOC 2, meaning System and Organization Controls 2, is an auditing procedure …

Tags Compliance, IT, News, SOC 2
Cookie-Free

NVD

  • CVE-2022-28394 – EOL Product CVE – Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 …27 May 2022
  • CVE-2022-30687 – Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that cou …27 May 2022
  • CVE-2022-30700 – An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a …27 May 2022
  • CVE-2022-30701 – An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as …27 May 2022
  • CVE-2022-1898 – Use After Free in GitHub repository vim/vim prior to 8.2. …27 May 2022
  • CVE-2022-1907 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022
  • T-Soft E-Commerce 4 – ‘UrunAdi’ Stored Cross-Site Scripting (XSS)17 May 2022
  • Survey Sparrow Enterprise Survey Software 2022 – Stored Cross-Site Scripting (XSS)17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News