Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Waves

Intelligent Waves and Horizon3.ai join forces to provide security for DoD mission support

14 May 2022

Intelligent Waves announced a strategic collaboration with Horizon3.ai to support next-generation cybersecurity protection in DevOps for …

Tags Intelligent, IT, News, Waves

Ukrainian CERT Warns Citizens of a New Wave of Attacks Distributing Jester Malware

9 May 2022

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of phishing attacks that deploy an information-stealing malware called …

Tags Attacks, CERT, Cyber Attack, New, Waves

Menlo Security: Less Than Three in 10 Organizations Are Equipped to Combat Growing Wave of Web-Based Cyber Threats

18 March 2022

Mountain View, CA, March 16, 2022 – Web malware (47 percent) and ransomware (42 percent) now top the list of security threats that …

Tags Combat, Cyber Threats, Less, Organizations, Waves

Open Source Code: The Next Major Wave of Cyberattacks

21 February 2022

Open source software is ubiquitous. It has become an unequaled driver of technological innovation because organizations that use it don’t …

Tags Cyber Attack, IT, Next, Open Source Code, Waves

Wave of MageCart attacks target hundreds of outdated Magento sites

9 February 2022

Analysts have found the source of a mass breach of over 500 e-commerce stores running the Magento 1 platform and involves a single domain …

Tags IT, Magento, News, Waves

New Wave of Cyber Attacks Target Palestine with Political Bait and Malware

3 February 2022

Cybersecurity researchers have turned the spotlight on a new wave of offensive cyberattacks targeting Palestinian activists and entities …

Tags Cyber Attack, New, Political, Targets, Waves

No Software Required: Raspberry Pi Uses Electromagnetic Waves to Detect Malware

10 January 2022

A team at France’s Research Institute of Computer Science and Random Systems developed a novel way to detect malware that does not require …

Tags Detect, Electromagnetic, Malware, Open Source, Waves

The Next Wave of Log4J Attacks Will Be Brutal

16 December 2021

So far, the vanguard of Log4j hacking has primarily comprised cryptominers, malware that leeches resources off of an affected system to …

Tags Attacks, IT, News, Next, Waves

Intelligent Waves collaborates with Teradici to provide secure environment for government agencies

5 October 2021

Intelligent Waves announced its new strategic collaboration with Teradici to bring a full fidelity, distortion-free, color-accurate user …

Tags Intelligent, IT, News, Waves

GameStop FOMO Inspires a New Wave of Crypto Pump-and-Dumps

13 May 2021

A hundred and fifty years later, a new generation of amateur investors are equally desperate not to miss the next big thing in the finance …

Tags Business, Crypto, GameStop, New, Waves

UK Orgs Told to Prepare for New Wave of Brexit-Related Scams

3 December 2020

Barclays has warned UK businesses that cyber-criminals will target them with scams relating to changing rules at the end of the Brexit …

Tags IT, New, Scams, UK, Waves

Ransomware Wave Targets US Hospitals: What We Know So Far

29 October 2020

This is a developing story and will be updated as we learn new information. US government agencies have issued a joint security advisory …

Tags Hospitals, IT, Ransomware, Targets, Waves

‘DDoS-For-Hire’ Is Fueling a New Wave of Attacks

15 July 2020

On Wednesday, the cybersecurity firm Trend Micro is releasing findings about escalating global turf wars between attacker groups vying to …

Tags Attacks, New, Waves

SurfingAttack – Hackers Use Ultrasonic Waves to Control Voice-controlled Devices Secretly

3 March 2020

Researchers discovered a new attack method dubbed SurfingAttack that enables the attacker to control the voice-controlled device from over …

Tags Cyber Threats, Devices, Hacking, Ultrasonic, Waves
Post navigation
Older posts
Page1 Page2 … Page5 Next →
Cookie-Free

NVD

  • CVE-2022-20672 – Multiple vulnerabilities in the web-based management interface of Cisco Common Services Pl …27 May 2022
  • CVE-2022-28394 – EOL Product CVE – Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 …27 May 2022
  • CVE-2022-20673 – Multiple vulnerabilities in the web-based management interface of Cisco Common Services Pl …27 May 2022
  • CVE-2022-30687 – Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that cou …27 May 2022
  • CVE-2022-20674 – Multiple vulnerabilities in the web-based management interface of Cisco Common Services Pl …27 May 2022
  • CVE-2022-30700 – An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »