Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

How to create stronger passwords by using data-driven feedback

18 May 2017

Even with the disdain heaped on digital passwords, they still manage to survive, and dare I say thrive? Adding insult to injury, “password” Read full news article on …

Tags How

Autonomous Vehicle and Remote Surveillance with the Intel® Edison Platform

18 May 2017

Editorial Note This article is in the Product Showcase section for our sponsors at CodeProject. These articles are intended to provide you with information on products and services …

Tags Autonomous Vehicles, Intermediate, IoT, Node.js, Open Source, Open Source Software, Platforms, Remote, Surveillance

Restaurant App Zomato Says Your Stolen Password Is Fine. But Is It?

18 May 2017

On Thursday, Zomato, a company that makes an app to help find restaurants, announced hackers had stolen 17 million account user details. In its statement, Zomato tried to …

Tags Apps, Cybercrime, Fines, Mobile, Passwords, Restaurants, Stolen, Zomato

‘PATCH Act’ Aims to Help Prevent Cyberattacks

18 May 2017

New legislation calls for an overhaul of the federal government’s software vulnerability disclosure policies following the ransomware outbreak that was fueled by the leak of a stolen National …

Tags Cyber Attack, Help

Cyberattacks Prompt Massive Security Spending Surge

18 May 2017

The fight against cyberattacks has sparked exponential growth in global protection spending, with the cyber security market estimated at $120 billion this year, more than 30 times its …

Tags Cyber Attack, Spending

Information stolen? What now?

18 May 2017

There are several different types of malware that look for interesting information on an infected computer and transmit that information to the threat actor. Identifying and removing the …

Tags How-Tos, Information, Infosec, Keylogger, Malware, Spyware, Trojan

Are you protected against WannaCryptor and other forms of ransomware?

18 May 2017

You don’t need to have a degree in computer science to understand the impact of a globally spread cyberattack. Wreaking havoc in organizations in more than 150 countries, …

Tags Ransomware

How to Update AWS CloudHSM Devices and Client Instances to the Software and Firmware Versions Supported by AWS

18 May 2017

As I explained in my previous Security Blog post, a hardware security module (HSM) is a hardware device designed with the security of your data and cryptographic key …

Tags Clients, Devices, Firmware, How, Instances, NIST, Software, Software Updates, Updates

WannaCry: Ransomware Catastrophe or Failure?

18 May 2017

Wannacry (or WannaCrypt) is being called the “worst cyberattack in history” or at least the “biggest ransomware offensive in history,” Read full news article on dark READING  

Tags Failure, Ransomware, WannaCry

Why Cloud Security Needs Visibility-as-a-Service

18 May 2017

Whether you are a network administrator, security manager, or CIO, how would you feel if you were unable to see and manage major parts of your network environment? …

Tags Cloud Computing, Cloud Computing Security, Cloud Security

Apache Metron Graduates to Top-Level Project

18 May 2017

Hortonworks and Apache announced Metron graduating to a top-level project. Metron is the latest evolution of an all-in-one security telemetry data capture, streaming analytics and response platform whose …

Tags Apache, Apache Software Foundation, Application Security, Big Data, Cloud Computing, Cloud Security, Data Science, Databases, Projects

DDoS Attacks Are in Decline in Number and Size, Akamai Report Finds

18 May 2017

DDoS Attacks Are in Decline in Number and Size, Akamai Report Finds In the security world, there tends to be a constant stream of news about how the …

Tags Akamai, Attacks, DDoS, Size

Have you inadvertently joined a Trump-supporting robot army?

18 May 2017

Last week, we told you about the travails of the US Federal Communications Commission’s comments website, which crashed after John Oliver sent hundreds of thousands of pro-net-neutrality commenters …

Tags Botnets, Data Breach, Data Loss, FCC, Net Neutrality, Privacy

This Guy Phished Over 50 Women Just to Violate Their Privacy

18 May 2017

Some people use consumer spyware to track lovers, girlfriends, or spouses, and monitor their emails or steal their photos. But ordinary citizens also face a slightly less sophisticated …

Tags Cybercrime, Cyberstalking, Online Privacy, Privacy, Tech, Women
Older posts
Newer posts
← Previous Page1 … Page16,382 Page16,383 Page16,384 … Page16,441 Next →
Cookie-Free

NVD

  • CVE-2023-23924 – Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on …1 February 2023
  • CVE-2022-48161 – Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via th …1 February 2023
  • CVE-2023-24956 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2023-0341 – A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12 …1 February 2023
  • CVE-2023-24241 – Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via …1 February 2023
  • CVE-2022-25979 – Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) …31 January 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
  • How much security is enough?9 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »