Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

New Hacker Forum Takes Pro-Ukraine Stance

11 August 2022

A new hacker forum is taking a unique political stance to support Ukraine in its war with Russia, entertaining only topics and threat …

Tags Cyber Threats, Forums, Hacking, Hacks, New

S3 Ep95: Slack leak, Github onslaught, and post-quantum crypto [Audio + Text]

11 August 2022

DOUG.  Slack leaks, naughty GitHub code, and post-quantum cryptography. All that, and much more, on the Naked Security …

Tags Amazon, Audio, AWS, Cloud Computing, Cloud Provider

Years after claiming DogWalk wasn’t a vulnerability, Microsoft confirms flaw is being exploited and issues patch

11 August 2022

This week Microsoft finally released a patch for a zero-day security flaw being exploited by hackers, that the company had claimed since …

Tags Microsoft Windows, OS, Security Pro, Vulnerability, Windows

The top identity-based attacks and how to stop them: Part 2

11 August 2022

Part one of this series on identity-based attacks highlighted password spray, credential stuffing and machine-in-the-middle attacks. To …

Tags IT, News

Cisco has been hacked by a ransomware gang

11 August 2022

U.S. networking giant Cisco Systems has been hacked, the company confirmed on Wednesday, after Yanluowang ransomware operators claimed the …

Tags Cisco, Infrastructure Development, IT, MFA, Networking

The Time Is Now for IoT Security Standards

11 August 2022

The Internet of Things industry’s lack of cybersecurity standards is nothing new. We’ve been at this for …

Tags IoT, Is, IT, Now, Security Standards

Photos: Black Hat USA 2022 Arsenal

11 August 2022

At the Black Hat USA 2022 Arsenal by ToolsWatch, researchers showcase their latest open-source tools and products. This year, the Arsenal …

Tags Arsenal, Black Hat USA, Black Hats, IT, News

Meta Just Happens to Expand Messenger’s End-to-End Encryption

11 August 2022

Meanwhile, in a move that Meta says is totally unrelated, the social media giant announced this morning that it is testing expansions of …

Tags Encryption, End-to-End, Just, Malware, Meta

#BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons

11 August 2022

The US Department of Homeland Security (DHS) launched its Cyber Safety Review Board (CSRB) in February 2022, as an effort to help …

Tags Boards, Cyber Safety, Lessons, Log4j, Reviews

Incident Response for Health Care IT: Differences and Drivers

11 August 2022

Incident Response for Health Care IT: Differences and Drivers Threat actors continue to target the health care …

Tags Differences, Drivers, Healthcare, Healthcare Data, Healthcare Industry

Cisco Was Hacked by Yanluowang Ransomware Operators to Stole Internal Data

11 August 2022

Recent reports indicate that in late May Cisco’s corporate network was infected with ransomware from the Yanluowang group. Under the …

Tags Cyber Attack, Data, Hacked, Internals, Operators

Email cyberattacks increased 48% in first half of 2022

11 August 2022

Security researchers identified a 48% increase in cyberattack attempts targeting email accounts in the first six months of 2022. The H2 …

Tags Emails, IT, News

Austin Siders named CIO at the University of Southern Indiana

11 August 2022

Austin Siders has been named Chief Information Officer (CIO) at the University of Southern Indiana (USI). As CIO at USI, Siders will head …

Tags Austin, Indiana, IT, News, University

New Open Source Tools Launched for Adversary Simulation

11 August 2022

The new open source tools are designed to help defense, identity and access management, and security operations center teams discover …

Tags Cloud, IT, New, Open Source Tools, Simulations
Post navigation
Older posts
Newer posts
← Previous Page1 Page2 Page3 … Page14,990 Next →
Cookie-Free

NVD

  • CVE-2022-2736 – A vulnerability was found in SourceCodester Company Website CMS. It has been classified as …11 August 2022
  • CVE-2022-2770 – A vulnerability, which was classified as critical, was found in SourceCodester Simple Onli …11 August 2022
  • CVE-2022-20244 – In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This …11 August 2022
  • CVE-2022-20372 – In exynos5_i2c_irq of (TBD), there is a possible out of bounds write due to a use after fr …11 August 2022
  • CVE-2022-20403 – Product: AndroidVersions: Android kernelAndroid ID: A-207975764References: N/A …11 August 2022
  • CVE-2022-35665 – Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 1 …11 August 2022

EXPLOITS

  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »