Skip to content
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Deploy

BrandPost: The True Cost of Aging Infrastructure: Don’t Wait to Deploy Modern Data Protection

30 January 2021

With the recent rise in cyberattacks and exponential data growth, protecting data has become job #1 for many IT organizations. Their …

Tags Aging, Costs, Deploy, Modern, Waits

Which AppSec Testing Type Should You Deploy First?

26 January 2021

The gold standard for creating an application security (AppSec) program is – and always will be – to follow best practices. By …

Tags Deploy, Methodologies, Testing, Types, You

Malicious Software Infrastructure Easier to Get and Deploy Than Ever

8 January 2021

Simple to use and deploy offensive security tools, making it easier than ever for criminals with little technical know-how to get in on …

Tags C2, Deploy, Get, Malware, Metasploit

Deploy an automated ChatOps solution for remediating Amazon Macie findings

5 January 2021

The amount of data being collected, stored, and processed by Amazon Web Services (AWS) customers is growing at an exponential rate. In …

Tags Amazon, ChatOps, Compliance, Deploy, Slack

Sextortionists Deploy New Spyware

16 December 2020

New spyware has been detected that targets iOS and Android users who patronize illicit sites that typically offer escort services. The …

Tags Deploy, IT, New, News, Spyware

Deploy and Scale DDoS Protection in the Public Cloud

10 November 2020

Cloud environments introduce a significantly large attack surface that requires protection from cyberattacks. [You may also …

Tags Amazon, AWS, Cloud Provider, Cloud Security, Deploy

Malicious Use of SSL Increases as Attackers Deploy Hidden Attacks

10 November 2020

There has been a 260% increase in the use of encrypted traffic to “hide” attacks. New research by Zscaler, analyzing 6.6 billion …

Tags Attackers, Attacks, Deploy, Hidden, Malicious

U.S Gov Warns that Hackers Using Phishing Emails Used to Deploy KONNI Malware using Weaponized Word Documents

19 August 2020

U.S CISA recently noticed that hackers using Phishing Emails to deploy KONNNI malware with the help of weaponized Microsoft word documents. …

Tags Deploy, Documents, Emails, Hacking, Identity Theft

Build, Deploy, Runtime: The 3 Stages of Kubernetes Security

28 July 2020

Kubernetes security is an issue for many organizations. In a 2020 report covered by TechRepublic, 94% of respondents revealed that their …

Tags Builds, Containers, Deploy, Google, kubernetes

Deploy a dashboard for AWS WAF with minimal effort

8 July 2020

The dashboard provides multiple graphs for you to reference, filter, and adjust that are available out-of-the-box. The example in Figure 1 …

Tags Amazon, AWS, Cloud Computing, Deploy, WAF

Blue Mockingbird Hacker Group Attack Windows Machines at Multiple Organizations to Deploy cryptocurrency-mining Malware

26 May 2020

Security researchers from Red Canary discovered potential hacker group Blue Mockingbirddeploying Monero cryptocurrency-mining payloads …

Tags Attacks, Blue, Computer Security, Deploy, Machines

Companies Are Failing to Deploy Key Solution for Email Security

2 April 2020

Business email compromise (BEC) is the most expensive form of online fraud encountered every year, with international losses in excess of …

Tags Companies, Deploy, Email Security, Keys, Solutions
Post navigation
Older posts
Page1 Page2 … Page4 Next →
Cookie-Free

NVD

CVE-2021-23958 – The browser could have been confused into transferring a screen sharing state into another …

26 February 2021

CVE-2020-26200 – A component of Kaspersky custom boot loader allowed loading of untrusted UEFI modules due …

26 February 2021

CVE-2021-21298 – Node-Red is a low-code programming for event-driven applications built using nodejs. Node- …

26 February 2021

CVE-2021-26562 – Out-of-bounds write vulnerability in synoagentregisterd in Synology DiskStation Manager (D …

26 February 2021

CVE-2019-18942 – Micro Focus Solutions Business Manager versions prior to 11.7.1 are vulnerable to stored X …

26 February 2021

CVE-2021-23959 – An XSS bug in internal error pages could have led to various spoofing attacks, including o …

26 February 2021

EXPLOITS

Remote Desktop Web Access – Authentication Timing Attack (Metasploit Module)

26 February 2021

LightCMS 1.3.4 – ‘exclusive’ Stored XSS

26 February 2021

Triconsole 3.75 – Reflected XSS

26 February 2021

Simple Employee Records System 1.0 – File Upload RCE (Unauthenticated)

26 February 2021

Vehicle Parking Management System 1.0 – ‘catename’ Persistent Cross-Site Scripting (XSS)

25 February 2021

ASUS Remote Link 1.1.2.13 – Remote Code Execution

25 February 2021

SECURELIST

The state of stalkerware in 2020

26 February 2021

Lazarus targets defense industry with ThreatNeedle

25 February 2021

DDoS attacks in Q4 2020

16 February 2021

Spam and phishing in 2020

15 February 2021

How kids coped with COVID-hit winter holidays

4 February 2021

Privacy predictions for 2021

28 January 2021

Information Cyber Network Enterprise Security News

© 2021 GeekWire | Privacy Policy | Cookie-Free | We are not responsible for the content of external sites.