Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

World

Critical Infrastructure: Cybersecurity And The World Economy

13 January 2023

You may have noticed that, over the last two years, it seems that cyberattacks are on a steep rise. If so, you aren’t …

Tags Blogs, Critical Infrastructure, Economy, IT, World

BlackProxies Service Gains Notoriety in the Cybercrime World

6 December 2022

Analysts spotted the new platform, reporting that ‘BlackProxies’ is one of the fastest-growing newcomers in the market. Residential …

Tags Cybercrime, Cybersecurity News, IT, Services, World

The Evolution of Application Security in a Cloud-Native World: Q&A with Chris Wysopal

17 August 2022

As technology explodes, so do the threats. Point solutions emerge as security players innovate in order to keep …

Tags Cloud Computing, Cloud-Native, Evolution, Q&A, World

Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World

12 July 2022

The hybrid workplace is here for the long-term, if not forever. Workers like the flexibility, and there are a lot of positives for business …

Tags Endpoint Management, Endpoint Security, Endpoints, IT, World

Inside NIST’s 4 Crypto Algorithms for a Post-Quantum World

7 July 2022

With the world potentially less than a decade away from breaking current encryption around critical data, researchers weigh in on planning …

Tags Algorithms, Cloud, Crypto, IT, World

Mitigate Ransomware in a Remote-First World

21 June 2022

Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid work, this insidious threat …

Tags IT, Lookout, Malware, Ransomware, World

How to Become World Class at Cyber Hygiene

14 June 2022

…

Tags Cyber, How, Hygiene, Risk Management, World

QuSecure Carves Out Space in Quantum Cryptography With Its Vision of a Post-RSA World

24 May 2022

NIST may be on the brink of revealing which post-quantum computing encryption algorithms it is endorsing, solidifying commercial …

Tags Cloud, Quantum Cryptography, Spaces, Vision, World

Quantum Key Distribution for a Post-Quantum World

20 May 2022

New versions of QKD use separate wavelengths on the same fiber, improving cost and efficiency, but distance is still a …

Tags Cloud, Distributions, Keys, Quantum, World

OAuth Security in a Cloud Native World

16 May 2022

These days most software companies use cloud deployment with modern hosting capabilities that make everyone productive, from developers to …

Tags Containers, Containers (Cloud Computing), OAuth, Sponsored, World

CANs Reinvent LANs for an All-Local World

5 May 2022

In an article I wrote over a year ago called “Securing the New Normal of Network Access,” I presented four access scenarios that modern …

Tags IT, News, World

Q&A: How China Is Exporting Tech-Based Authoritarianism Across the World

4 May 2022

The US has to adapt its own policies to counter the push, warns former DocuSign CEO and Under Secretary of State Keith …

Tags China, How, Is, Q&A, World

Why the World Needs a Global Collective Cyber Defense

7 March 2022

Cyberattacks are inevitable in today’s modern digital world. As cyberattacks grow in scale and sophistication, private and public sector …

Tags Collective, Cyber Defense, Global, Why, World

SecOps in a Post-COVID World: 3 Security Trends to Watch

28 February 2022

By now, you’ve probably read loads of articles that discuss the COVID-19 pandemic’s impact on business, politics, the economy and much …

Tags Open Source, Open Source Software, SecOps, Sponsored, World
Older posts
Page1 Page2 … Page21 Next →
Cookie-Free

NVD

  • CVE-2023-24060 – Haven 5d15944 allows Server-Side Request Forgery (SSRF) via the feed[url]= Feeds functiona …27 January 2023
  • CVE-2023-22740 – Discourse is an open source platform for community discussion. Versions prior to 3.1.0.bet …27 January 2023
  • CVE-2020-36659 – In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not chec …27 January 2023
  • CVE-2020-36658 – In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by d …27 January 2023
  • CVE-2022-2712 – In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path tr …27 January 2023
  • CVE-2022-40718 – This vulnerability allows network-adjacent attackers to execute arbitrary code on affected …26 January 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
  • How much security is enough?9 January 2023
  • BlueNoroff introduces new methods bypassing MoTW27 December 2022
  • Ransomware and wiper signed with stolen certificates22 December 2022
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »