Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Vulnerability

Super FabriXss vulnerability in Microsoft Azure SFX could lead to RCE

31 March 2023

Researchers shared details about a flaw, dubbed Super FabriXss, in Azure Service Fabric Explorer (SFX) that could lead to unauthenticated …

Tags Azure, Azure (Microsoft), Cloud Provider, Security Pro, Vulnerability

The 10 Best Cybersecurity Companies in the UK

30 March 2023

Discover the best cybersecurity companies to protect your business, and learn how to find the top ones that meet your needs. When it comes …

Tags Best, Companies, Infosec, Security Pro, Vulnerability

Clop Ransomware Group Exploits GoAnywhere MFT Flaw

29 March 2023

The ransomware gang known as Clop has been observed exploiting a pre-authentication command injection vulnerability (CVE-2023-0669) in …

Tags Clop Ransomware, Flaws, IT, Security Pro, Vulnerability

Clop Ransomware Exploits Zero-Day Vulnerability to Breach Crown Resorts

29 March 2023

A zero-day vulnerability in Crown Resorts’ GoAnywhere secure file-sharing server has led to a data breach at the largest gambling and …

Tags Breach, Clop Ransomware, Cybersecurity News, Security Pro, Vulnerability

Clop Ransomware Exploits Zero-Day Vulnerability to Breach Crown Resorts.

29 March 2023

A zero-day vulnerability in Crown Resorts’ GoAnywhere secure file-sharing server has led to a data breach at the largest gambling and …

Tags Breach, Clop Ransomware, Cybersecurity News, Security Pro, Vulnerability

Vulnerability discovered in Spring that enables DoS attacks

28 March 2023

…

Tags IT, Latest News, Security Pro, Spring, Vulnerability

Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers

25 March 2023

Microsoft on Friday shared guidance to help customers discover indicators of compromise (IoCs) associated with a recently patched Outlook …

Tags Microsoft Office, Microsoft Outlook, Russian Hackers, Security Pro, Vulnerability

Critical flaw in WooCommerce Payments plugin allows site takeover

24 March 2023

A patch for a critical vulnerability in the WooCommerce Payments plugin for WordPress has been released for over 500,000 websites. On March …

Tags Critical, Payments, Security Pro, Sites, Vulnerability

Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams

23 March 2023

Across all industry sectors, open source software continues to pose a challenge for software security. We’re all aware that vulnerabilities …

Tags Challenge, Cloud Computing, Open Source, Security Pro, Vulnerability

CISA Warns on Unpatched ICS Vulnerabilities Lurking in Critical Infrastructure

22 March 2023

The US Cybersecurity and Infrastructure Security Agency (CISA) this week issued advisories for a total of 49 vulnerabilities in eight …

Tags CISA, Critical Infrastructure, ICS, Security Pro, Vulnerability

10 Vulnerabilities Types to Focus On This Year

22 March 2023

A new Tech Insight report examines how the enterprise attack surface is expanding and how organizations must deal with vulnerabilities in …

Tags Focus, Security Pro, Types, Vulnerability, Year

aCropalypse now! Cropped and redacted images suffer privacy fail on Google Pixel smartphones

22 March 2023

Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry …

Tags Android, Mobile Development, Privacy, Security Pro, Vulnerability

VIN Cybersecurity Exploits and How to Address Them in 2023

22 March 2023

As wireless connectivity grows, it makes many daily activities more convenient, but it also means that cars may be vulnerable to …

Tags Address, How, IT, Security Pro, Vulnerability

From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022

21 March 2023

As many as 55 zero-day vulnerabilities were exploited in the wild in 2022, with most of the flaws discovered in software from Microsoft, …

Tags Cyber Espionage, Ransomware, Security Pro, Vulnerability, Zero-Day Vulnerabilities
Older posts
Page1 Page2 … Page272 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-28727 – Panasonic AiSEG2 versions 2.00J through 2.93A allows adjacent attackers bypass authenticat …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Unauthenticated Factory Reset31 March 2023
  • Judging Management System v1.0 – Authentication Bypass31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Remote Command Execution (RCE)31 March 2023
  • Bangresto 1.0 – SQL Injection31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Authentication Bypass31 March 2023
  • Textpattern 4.8.8 – Remote Code Execution (RCE) (Authenticated)31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »