Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Themes

Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

19 May 2022

Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 …

Tags Premium, Security Pro, Sites, Takeover, Themes

Active Exploits Hit WordPress Sites Vulnerable to Thrive Themes Flaws

24 March 2021

Attackers are actively exploiting two recently-patched vulnerabilities in a popular suite of tools for WordPress websites from marketing …

Tags Active, Flaws, Sites, Themes, Vulnerable

COVID-19 Vaccine Themes Persist in Fraud Schemes

18 January 2021

Researchers at the security firm Proofpoint are tracking several fraud schemes leveraging COVID-19 vaccine-themed emails. See …

Tags COVID-19, Fraud, IT, Themes, Vaccines

Phishing Email Campaign Uses Updated COVID-19 Theme

23 December 2020

A recently uncovered phishing campaign is spoofing messages from the New York State Department of Labor, claiming to offer $600 as part of …

Tags Campaigns, COVID-19, Email Phishing, IT, Themes

20+ Best Security Company WordPress Themes 2020

21 August 2020

WordPress is the best platform for any type of website, including a security company website. Not only is WordPress easy to use but it also …

Tags Best, Design Tutorials, IT, Themes, UX & UI Design

Customizing Themes for Keycloak

14 August 2020

1. Overview Keycloak is an open-source identity and access management or IAM solution, that can be used as a third-party authorization …

Tags Customizing, Keycloak, OAuth, Spring, Themes

8 Cybersecurity Themes to Expect at Black Hat USA 2020

23 July 2020

While many a security professional currently laments the inability to meet up with peers for real-life security summer camp this year, the …

Tags Black Hat USA, Cloud, Themes

IcedID Banker is Back, Adding Steganography, COVID-19 Theme

18 June 2020

A new version of the IcedID banking trojan has debuted that notably embraces steganography – the practice of hiding code within images …

Tags Banking Trojans, Email Campaigns, Malware, Tactics, Themes

Kali Linux 2020.2 Released – PowerShell by Default, New Packages, New Theme, and More – Update Now !!

13 May 2020

World’s leading Penetration distribution Kali Linux 2020.2 released with new improvements, changes with login, PowerShell by Default, and …

Tags Linux, New, Open Source, OS, Themes

Syrian State-sponsored Hacking Group uses COVID-19 Themes to Attacks Android users

21 April 2020

Lookout researchers have uncovered a mobile surveillance campaign that has used more than 71 malicious Android apps to spy on Syrian users …

Tags Android malware, Attacks, COVID-19, Malware, Themes

Kali Linux Gets New Desktop Environment & Undercover Theme

3 December 2019

Offensive Security, maintainer of the Kali Linux penetration-testing platform, has released a new version of the widely used open source …

Tags Desktop Environments, Kali Linux, New, Themes

Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers

27 November 2019

You can relate this: While working on my laptop, I usually prefer sitting at a corner in the room from where no one should be able to …

Tags Cyber Threats, Hacking, Kali Linux, OS, Themes

Trust, or Lack of It, Is a Key Theme on RSAC Keynote Stage

5 March 2019

RSA CONFERENCE – SAN FRANCISCO – The need for trust — in machines, in systems, and in one another — was a central theme here today, …

Tags Keynotes, Keys, Themes, Trust

Big Themes Set to Emerge at RSA Conference 2019

14 February 2019

With hundreds of sessions, there is a lot to take in at the annual RSA Conference held in San Francisco.  The 2019 event is set to get …

Tags RSA Conference, Sets, Themes
Post navigation
Older posts
Page1 Page2 Next →
Cookie-Free

NVD

  • CVE-2022-20267 – In bluetooth, there is a possible way to enable or disable bluetooth connection without us …12 August 2022
  • CVE-2022-20283 – In Bluetooth, there is a possible out of bounds write due to an integer overflow. This cou …12 August 2022
  • CVE-2022-20299 – In ContentService, there is a possible way to check if the given account exists on the dev …12 August 2022
  • CVE-2022-20315 – In ActivityManager, there is a possible disclosure of installed packages due to a missing …12 August 2022
  • CVE-2022-20331 – In the Framework, there is a possible way to enable a work profile without user consent du …12 August 2022
  • CVE-2022-28630 – A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out …12 August 2022

EXPLOITS

  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »