Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Vectors

What Is the Main Vector of Ransomware Attacks?

25 January 2023

Ransomware infiltrates and hinders everything from healthcare organizations to energy distribution pipelines. This is why having an idea of …

Tags Is, IT, Main, Ransomware, Vectors

Royal Ransomware’s Evolving Threat Vectors

22 November 2022

CyberHoot has recently seen the impact of the Royal ransomware.  An MSP had a client who refused security awareness training and someone …

Tags Blogs, IT, News, Threats, Vectors

Mobile, Cloud and Email Are Top Threat Vectors For 2023

29 September 2022

Tech executives consider business email compromise (BEC), ransomware and attacks on cloud management interfaces as the threats most likely …

Tags Cloud, Emails, Mobile, Threats, Vectors

Vector Capital invests $100 million in Malwarebytes to improve cyberprotection for organizations

21 September 2022

Vector Capital announced it will make a strategic $100 million minority investment in Malwarebytes. As part of the transaction, Vector …

Tags Capital, IT, Malwarebytes, News, Vectors

USBs Still a Major OT Infection Vector

17 August 2022

Removable media represents the second greatest threat to operational technology (OT) systems so far this year, according to new data from …

Tags Infections, IT, News, OT, Vectors

Researchers Debut Fresh RCE Vector for Common Google API Tool

9 August 2022

A new vector to exploit a vulnerable version of Google SLO Generator has been uncovered, which facilitates remote code execution (RCE). It …

Tags Commons, Google, Researchers, Tools, Vectors

Vector Capital becomes the majority shareholder of WatchGuard Technologies

6 July 2022

WatchGuard Technologies announced that Vector Capital closed the deal to acquire interests previously owned by other co-investors. Under …

Tags Capital, IT, Technologies, Vectors, WatchGuard

Attackers Increasingly Turning to DDoS as a Ransom Vector

12 August 2021

Nearly half (44%) of organizations have been targeted or fallen victim to a ransom-related distributed denial of service (RDDoS) attack in …

Tags Attackers, DDoS, IT, Ransom, Vectors

Microsoft 365: Most Common Threat Vectors & Defensive Tips

2 June 2021

As more organizations have grown reliant on Microsoft 365, Google Cloud, and Amazon Web Services, cybercriminals have begun to realize that …

Tags Commons, Microsoft 365, Threats, Tips, Vectors

Researchers Explore Active Directory Attack Vectors

3 May 2021

Active Directory is a massive and complex attack surface that has long been a prime target for criminals seeking valuable privileges and …

Tags Active Directory, Attacks, Explore, Researchers, Vectors

Home-Office Photos: A Ripe Cyberattack Vector

3 March 2021

That photo that appears when someone disables his or her Zoom video, or those photos of a remote worker’s home office shared on Instagram …

Tags Cloud Computing, Cloud Security, Cyber Attack, Privacy, Vectors

Was JetBrains Tool an Infection Vector for SolarWinds Hack?

7 January 2021

Reacting to news reports claiming hackers may have used Czech software firm JetBrains’ TeamCity tool as an initial infection vector during …

Tags Hacks, Infections, SolarWinds, Tools, Vectors

VMware Flaw a Vector in SolarWinds Breach?

18 December 2020

U.S. government cybersecurity agencies warned this week that the attackers behind the widespread hacking spree stemming from the compromise …

Tags Breach, Data Breaches, Flaws, SolarWinds, Vectors

A New Risk Vector: The Enterprise of Things

19 October 2020

When FedEx subsidiary TNT Express was hit by ransomware in 2017, its delivery units were crippled and much of its shipping operations …

Tags IT, New, Risks, Things, Vectors
Older posts
Page1 Page2 Page3 Next →
Cookie-Free

NVD

  • CVE-2023-23924 – Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on …1 February 2023
  • CVE-2022-48161 – Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via th …1 February 2023
  • CVE-2023-24956 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2023-0341 – A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12 …1 February 2023
  • CVE-2023-24241 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2022-25979 – Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) …31 January 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
  • How much security is enough?9 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »