Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Vulnerability

Millions of Android Devices Using Broadcom Wi-Fi Chip Can Be Hacked Remotely

7 July 2017

Google has released its latest monthly security update for Android devices, including a serious bug in some Broadcom Wi-Fi chipsets that affects millions of Android devices, as well …

Tags Android, Chips, Devices, Google, Hacked, Hacking News, Mobile Development, Security, Vulnerability

Why Kodi boxes can pose a serious malware threat

7 July 2017

The illegal streaming market is ripe for opportunists looking to make a quick buck. While we’d say it’s always dangerous to engage in this activity, it is particularly …

Tags Check Point, Kodi, Open Source, Open Source Software, Security, Security Updates, Vulnerability

The Real-World Impact of Bug Bounties and Vulnerability Research

6 July 2017

Running the world’s largest vendor agnostic bug bounty program has afforded us the unique opportunity to purchase bugs of all varieties. The submissions to the Zero Day Initiative …

Tags Bug Bounties, Impact, Research, Security, Vulnerability, Zero Day Initiative

New Security Whitepaper Now Available: Use AWS WAF to Mitigate OWASP’s Top 10 Web Application Vulnerabilities

6 July 2017

Today, we released a new security whitepaper: Use AWS WAF to Mitigate OWASP’s Top 10 Web Application Vulnerabilities. Read full news article on AWS Security Blog  

Tags Announcements, Available, New, OWASP, Security, Top 10, Vulnerability, Web Applications, Whitepaper

Google Patches Critical Vulnerabilities in Android

6 July 2017

Media Framework was the most impacted component, with 27 vulnerabilities addressed in it: 10 Critical, 15 High, and 2 Moderate. Read full news article on SecurityWeek  

Tags Android, Google, Mobile, Mobile Development, Mobile Security, Patches, Security, Vulnerability

Scan Windows for Ransomware Vulnerability with This Free Tool

6 July 2017

Ransomware has gained a huge amount of notoriety as of late thanks to two major outbreaks that occurred rather recently. The first is the infamous WannaCry ransomware that …

Tags Design, Design Inspiration, Design Tools, Microsoft, OS, Scan, Security, Tools, Vulnerability

News in brief: cryptocurrency exchange hacked; laptop ban further eased; AA under fire over data breach

5 July 2017

Your daily round-up of some of the other stories in the news Bithumb exchange hacked Hard on the heels of the news that users of Classic Ether Wallet …

Tags Bitcoins, Data Loss, Ethereum, Security, Vulnerability

How did some Ethereum users find themselves with empty wallets?

5 July 2017

On the evening of June 29 (ET), users of Classic Ether Wallet were alerted to the sort of news anyone who invests in cryptocurrencies must dread. It’s not …

Tags Cryptocurrency, Ethereum, How, Security, Vulnerability

Successful RSA cryptosystem hacking shocks computer experts

4 July 2017

, let it be known that RSA is a series of semi prime number series that are part of a challenge to be factorized so that advancements can …

Tags Encryption, Malware, RSA, Security, Vulnerability

Researchers Crack 1024-bit RSA Encryption in GnuPG Crypto Library

4 July 2017

Security boffins have discovered a critical vulnerability in a GnuPG cryptographic library that allowed the researchers to completely break RSA-1024 and successfully extract the secret RSA key to …

Tags Crypto, Cryptography, Hacking News, Library, Researchers, RSA, Security, Vulnerability

Local Root Exploit Found on Lenovo Smartphone

3 July 2017

The remaining two issues, CVE-2017-3749 and CVE-2017-3750, impact the Idea Friend Android and Lenovo Security Android applications, respectively. Read full news article on SecurityWeek  

Tags Lenovo, Local, Mobile, Mobile Security, Root, Security, Smartphones, Vulnerability

Breach at US nuclear plants raises concerns in wake of Petya

3 July 2017

The Petya (or NotPetya) malware hit numerous prominent targets last week but one famous name jumped out of the victim list with eye-scorching immediacy –  the former Ukrainian …

Tags Breach, Malware, Nuclear, Petya, Security, Vulnerability

Important CentOS 7 Linux Kernel Security Update Patches Five Vulnerabilities

1 July 2017

CentOS maintainer Johnny Hughes recently published a new security advisory for user of the CentOS 7 operating system series to inform them about an important kernel security update. …

Tags CentOS, GNU, GNU/Linux, Linux Kernel, Patches, Security, Security Updates, Ubuntu, Vulnerability

The Open-Source Vulnerability that Keeps on Giving (and Taking)

1 July 20171 July 2017

Disclosed in April 2014, Heartbleed is the vulnerability gift that keeps on giving to some — and taking away from others. The latest example of this dynamic vulnerability …

Tags Giving, Heartbleed, Open Source, Security, Vulnerability, Zero Day Vulnerability
Post navigation
Older posts
Newer posts
← Previous Page1 … Page237 Page238 Page239 … Page249 Next →
Cookie-Free

NVD

  • CVE-2022-1909 – Cross-site Scripting (XSS) – Stored in GitHub repository causefx/organizr prior to 2.1.220 …27 May 2022
  • CVE-2022-28394 – EOL Product CVE – Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 …27 May 2022
  • CVE-2022-30687 – Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that cou …27 May 2022
  • CVE-2022-30700 – An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a …27 May 2022
  • CVE-2022-30701 – An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as …27 May 2022
  • CVE-2022-1898 – Use After Free in GitHub repository vim/vim prior to 8.2. …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »