Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Software

How to train your Ghidra

9 December 2022

Brief introduction to setting up Ghidra, and then configuring it with a familiar UI and shortcuts, so that you would not need to re-learn …

Tags GHIDRA, Malware, Researchers tools, Software

OpenTIP, command line edition

11 August 2022

We released Python-based command line tools for our OpenTIP service that also implement a client class that you can reuse in your own …

Tags Linux, Microsoft Windows, Researchers tools, Software

CVE-2022-0847 aka Dirty Pipe vulnerability in Linux kernel

14 March 2022

Exploit for CVE-2022-0847 (Dirty Pipe) vulnerability in Linux kernel is available online. Kaspersky solutions detect and prevent …

Tags Linux, Software, Vulnerabilities, Vulnerabilities and exploits

Extracting type information from Go binaries

27 October 2021

Go programs may contain hundreds of calls, it is obviously impractical to manually look up each type using a hex editor. So, there is the …

Tags Malware Descriptions, Reverse-Engineering, Security Conference, Software

GReAT thoughts: Awesome IDA Pro plugins

21 July 2020

In the second ‘GReAT Ideas. Powered by SAS’ webinar, I’ll be talking about awesome IDA Pro plugins that I regularly use. This article …

Tags Featured, Malware, Security technology, Software

Cybersecurity Research During the Coronavirus Outbreak and After

20 February 2020

It is about two and half years since we first open-sourced a tool for remote digital forensics called Bitscout. Today, I am happy to …

Tags Digital Forensics, Linux, Security technology, Software

How we developed our simple Harbour decompiler

20 December 2019

There were no readily available tools to analyze how the program written in Harbour works. So, we wrote our own. We hope this decompiler …

Tags Malware, Software

Ransomware: two pieces of good news

25 September 2019

Nowadays, cybercriminals have a thousand and one ways of creating and spreading ransomware. However, those fighting ransomware are not …

Tags Encryption, Malware Statistics, Ransomware, Software

Radisys’ Open 5G Software seed code contribution to accelerate the O-RAN ecosystem

4 July 2019

Radisys Corporation, a global leader of open telecom solutions, announced that it is contributing its Open 5G Software seed code to the …

Tags 5G, Software

1 in 10 open source components downloaded in 2018 had a known security vulnerability

26 June 2019

This year’s Sonatype report reveals the best practices exhibited by exemplary open source software projects and commercial application …

Tags Open Source, Software, Sonatype

Top 8 Best Web Security and Hacking Software for Security Professionals in 2019

25 June 2019

Hacking software is not only used by hackers for criminal activities but it’s equally used by white hat hackers and security …

Tags Best, Hacking Tools, Network Security, Software, Software Security

OpenSSH adds protection against Spectre, Meltdown, RAMBleed

24 June 2019

OpenSSH, a widely used suite of programs for secure (SSH protocol-based) remote login, has been equipped with protection against …

Tags Authentication, Meltdown, RAMBleed, Software, Spectre

Millions of Dell PCs vulnerable to attack, due to a flaw in bundled system-health software

21 June 2019

Millions of Dell PCs and laptops running Windows are vulnerable to attack via a high severity security hole, that could be exploited by …

Tags Microsoft, OS, PCs, Software, Windows

Dell fixes high-risk vulnerability in pre-installed SupportAssist software

21 June 2019

Dell pushed out fixes for a high-risk vulnerability in its pre-installed SupportAssist software and urges users who don’t have auto …

Tags Microsoft, OS, PCs, Security Pro, Software
Older posts
Page1 Page2 … Page30 Next →
Cookie-Free

NVD

  • CVE-2023-24060 – Haven 5d15944 allows Server-Side Request Forgery (SSRF) via the feed[url]= Feeds functiona …27 January 2023
  • CVE-2023-22740 – Discourse is an open source platform for community discussion. Versions prior to 3.1.0.bet …27 January 2023
  • CVE-2020-36659 – In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not chec …27 January 2023
  • CVE-2020-36658 – In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by d …27 January 2023
  • CVE-2022-40718 – This vulnerability allows network-adjacent attackers to execute arbitrary code on affected …26 January 2023
  • CVE-2022-40719 – This vulnerability allows network-adjacent attackers to execute arbitrary commands on affe …26 January 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
  • How much security is enough?9 January 2023
  • BlueNoroff introduces new methods bypassing MoTW27 December 2022
  • Ransomware and wiper signed with stolen certificates22 December 2022
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »