Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Threat Intelligence

Analyzing and remediating a malware infested T95 TV box from Amazon

31 January 2023

A couple of weeks ago, security news outlets made their rounds reporting on an Android TV box available on Amazon that came pre-installed …

Tags Amazon, Android, Google, Mobile Development, Threat Intelligence

ThreatConnect Extends Threat Intelligence Platform to Enable Threat Intelligence Operations (TI Ops)

25 January 2023

ThreatConnect announced today the release of ThreatConnect Platform v7.0, the industry’s first threat intelligence platform designed …

Tags Enable, Operations, Ops, Platforms, Threat Intelligence

6 Steps To Build A Successful Threat Intelligence Program

20 January 2023

Cyber security has been a critical concern for organizations, especially with the ever-increasing number of cyber …

Tags Builds, Privacy, Programs, Steps, Threat Intelligence

Heimdal Cyber-Security & Threat Intelligence Report 2023

17 January 2023

Marked by significant geopolitical shifts and unrest, 2022 has galvanized the cybersecurity landscape as well; war-profiteering fueled by …

Tags Cybersecurity News, IT, News, Threat Intelligence

The Era of Cyber Threat Intelligence Sharing

22 December 2022

We spent forty years defending ourselves as individuals. Trying to outsmart cybercriminals, outpower them, and when all our efforts failed, …

Tags Cyber Crime, Cyber Threat Intelligence, IT, Sharing, Threat Intelligence

Threat Intelligence Through Web Scraping

19 December 2022

Bright Data CEO Or Lenchner discusses how security teams are utilizing public Web data networks to safeguard their organizations from …

Tags Cloud, IT, News, Threat Intelligence, Web Scraping

How XDR Helps Protect Critical Infrastructure

7 December 2022

Critical infrastructure is important for societal existence, growth, and development. Societies are reliant on the services provided by …

Tags Compliance, File Integrity Monitoring, How, Protect, Threat Intelligence

Credential Access via Information Stealers

18 November 2022

Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the …

Tags Access, Information, IT, Security Pro, Threat Intelligence

How Information Stealers Get User Credentials

18 November 2022

Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the …

Tags Get, How, Information, IT, Threat Intelligence

Threat hunting with MITRE ATT&CK and Wazuh

18 November 2022

Wazuh is an open source unified XDR and SIEM platform. The Wazuh solution is made up of a single universal agent that is deployed on …

Tags ATT&CK, IT, MITRE, Threat Intelligence, Threats

This was 3rd Quarter 2022 — A Cybersecurity Look Back

15 November 2022

The third quarter of 2022 included all four universal cyberattack drivers: war, religion, politics and …

Tags IT, News, Quarter, Security Pro, Threat Intelligence

Microsoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland

11 November 2022

Microsoft on Thursday attributed the recent spate of ransomware incidents targeting transportation and logistics sectors in Ukraine and …

Tags Industroyer, Malware, Poland, Prestige, Threat Intelligence

Majority of Security Managers Lack Threat Intelligence Skills

10 November 2022

Seventy-three percent of IT security managers have said they lack necessary threat intelligence (TI) skills, and 55% believe their threat …

Tags IT, Managers, News, Skills, Threat Intelligence

LookingGlass, Federal Defense Customer Expand Threat Intelligence Contract; Bryan Ware Quoted

3 November 2022

Under the renewed contract, the company said Wednesday it will broaden optimization of threat intelligence in support of government cyber …

Tags Customers, Federal, IT, News, Threat Intelligence
Older posts
Page1 Page2 … Page28 Next →
Cookie-Free

NVD

  • CVE-2023-23924 – Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on …1 February 2023
  • CVE-2022-48161 – Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via th …1 February 2023
  • CVE-2023-24956 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2023-0341 – A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12 …1 February 2023
  • CVE-2023-24241 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2022-25979 – Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) …31 January 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
  • How much security is enough?9 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »