Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Use

How IT Teams Can Use ‘Harm Reduction’ for Better Cybersecurity Outcomes

3 August 2022

Copado’s Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical …

Tags Better, How, Outcomes, Teams, Use

North Korean Hackers Use Browser Extension to Spy on Gmail and AOL Accounts

1 August 2022

Cybersecurity firm Volexity spotted new activity from a threat actor (TA) allegedly associated with North Korea and deploying malicious …

Tags Accounts, Browser Extensions, Gmail, Spy, Use

Use AWS Chatbot in Slack to remediate security findings from AWS Security Hub

25 July 2022

You can use AWS Chatbot and its integration with Slack and Amazon Chime to receive and remediate security findings from AWS Security Hub. …

Tags Bots, Chatbots, Hub, Slack, Use

Use Security Hub custom actions to remediate S3 resources based on Macie discovery results

18 July 2022

The amount of data available to be collected, stored and processed within an organization’s AWS environment can grow rapidly and …

Tags Cloud Storage, Hub, S3, Storage, Use

North Korean Maui Ransomware Actively Targeting U.S. Healthcare Organizations

7 July 2022

In a new joint cybersecurity advisory, U.S. cybersecurity and intelligence agencies have warned about the use of Maui ransomware by North …

Tags Actors, Cyber Attack, Health, Providers, Use

FBI: These hackers are targeting healthcare records and IT systems with ‘Maui’ ransomware

7 July 2022

Three US agencies have warned over a lesser unknown ransomware called Maui that has targeted IT services at healthcare and public health …

Tags Cyber Attack, Health, Providers, Targeting, Use

Here today, gone to Maui: That’s your data captured by North Korean ransomware

6 July 2022

For the past year, state-sponsored hackers operating on behalf of North Korea have been using ransomware called Maui to attack healthcare …

Tags Actors, Cyber, Health, Providers, Use

North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US Healthcare Orgs

6 July 2022

The FBI, US Cybersecurity and Infrastructure Security Agency (CISA), and the Treasury Department on Wednesday warned about North Korean …

Tags Actors, Cyber, Healthcare, North, Use

Some Worms Use Their Powers for Good

4 July 2022

Some biological worms are actually not welcome in most gardens. And some cyber worms, it seems, can use their powers for good … Meet …

Tags Goods, IT, News, Use, Worms

Criminals Use Deepfake Videos to Interview for Remote Work

1 July 2022

Security experts are on the alert for the next evolution of social engineering in business settings: deepfake employment …

Tags Criminals, Deepfakes, Interviews, Use, Videos

How to Use Microsoft Defender on All Your Devices

27 June 2022

Owners of Windows computers without Microsoft 365 don’t need to sweat; Microsoft is still preinstalling software on Windows to protect …

Tags Devices, How, IT, Microsoft Defender, Use

Italy Data Protection Authority Warns Websites Against Use of Google Analytics

27 June 2022

Following the footsteps of Austria and France, the Italian Data Protection Authority has become the latest regulator to find the use of …

Tags Data Protection, Italy, Privacy, Use, Websites

Keeping PowerShell: Measures to Use and Embrace

22 June 2022

Cybersecurity authorities from the United States, New Zealand, and the United Kingdom have released a joint Cybersecurity Information Sheet …

Tags IT, Microsoft, News, PowerShell, Use

Use Amazon Cognito to add claims to an identity token for fine-grained authorization

8 June 2022

The users, added by the addUserInfo.py script, are added to this pool. The client ID is used to identify the web client that will connect …

Tags AWS, Claims, Cloud Computing, Cognito, Use
Post navigation
Older posts
Page1 Page2 Page3 Next →
Cookie-Free

NVD

  • CVE-2022-38150 – In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Serve …11 August 2022
  • CVE-2022-2777 – Cross-site Scripting (XSS) – Stored in GitHub repository microweber/microweber prior to 1. …11 August 2022
  • CVE-2022-20241 – In Messaging, there is a possible way to attach a private file to an SMS message due to im …11 August 2022
  • CVE-2022-20369 – In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to imp …11 August 2022
  • CVE-2022-20400 – In cd_CodeMsg of cd_codec.c, there is a possible out of bounds write due to a missing boun …11 August 2022
  • CVE-2022-34262 – Adobe Illustrator versions 26.3.1 (and earlier) and 25.4.6 (and earlier) are affected by a …11 August 2022

EXPLOITS

  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »