Skip to content
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Hacking

Hackers exploit websites to give them excellent SEO before deploying malware

1 March 2021

Cyberattackers have turned to search engine optimization (SEO) techniques to deploy malware payloads to as many victims as possible. …

Tags Cyber Threats, Hacking, IT, News

Hackers release a new jailbreak tool for almost every iPhone

1 March 2021

An iPhone hacking team has released a new jailbreak tool for almost every iPhone, including the most recent models, by using the same …

Tags Android, Cyber Threats, Google, Hacking, iOS 13

Hackers tied to Russia’s GRU targeted the US grid for years

27 February 2021

For all the nation-state hacker groups that have targeted the United States power grid—and even successfully breached American electric …

Tags Cyber Threats, GRU, Hacking, IT, News

Unprotected Private Key Allows Remote Hacking of PLCs

27 February 2021

Industrial associations have been cautioned for this present week that a critical authentication bypass vulnerability can permit hackers to …

Tags Cyber Threats, Hacking, IT, Private Key, Remote

Hackers using malicious Firefox extension to phish Gmail credentials

26 February 2021

For years, China has been accused of spying on minorities, activities, and journalists but according to researchers, the country’s spying …

Tags China, Cyber Threats, Extensions, Gmail, Hacking

Announcing the First-Ever Veracode Hacker Games

25 February 2021

“Destroying things is much easier than making them.” This quote from The Hunger Games rings true in software; developers spend months …

Tags Cyber Threats, Games, Hacking, Security Pro, Veracode

Digital Threat Actors: Organized Criminals

25 February 2021

Whenever there is an opportunity or a racket to run, organized criminals will naturally appear. And appear they have over the last …

Tags Criminals, Cyber Threats, Digital, Hacking, Ransomware

NSA Tools used by Chinese APT Hackers Before it Released Online

25 February 2021

Check Point Research team revealed that the China-linked APT31 group known as Zirconium, used a tool dubbed Jian, which is a replica of NSA …

Tags APT, Chinese, Cyber Threats, Hacking, NSA

McDonald’s Secretive Intel Team Spies on ‘Fight for $15’ Workers, Internal Documents Show

24 February 2021

“The idea was to figure out their strategy, counter it, and find out where the key players are, and who they know” According to documents …

Tags Cyber Threats, Documents, Hacking, Intel, Internals

Hackers Tied to Russia’s GRU Targeted the US Grid for Years

24 February 2021

On Wednesday, industrial cybersecurity firm Dragos published its annual report on the state of industrial control systems security, which …

Tags Cyber Threats, Grids, GRU, Hacking, Targeted

Aircraft-Maker Bombardier Breached by Accellion FTA Hackers

24 February 2021

Canadian aircraft manufacturer Bombardier has become the latest victim of a campaign targeting customers of a legacy file transfer …

Tags Accellion, Bombardier, Cyber Threats, Hacking, IT

FIN11 cybercrime group is behind recent wave of attacks on FTA servers

23 February 2021

FireEye experts linked a series of attacks targeting Accellion File Transfer Appliance (FTA) servers to the cybercrime group UNC2546, aka …

Tags Attacks, Cyber Threats, FireEye, Hacking, Ransomware
Post navigation
Older posts
Page1 Page2 … Page547 Next →
Cookie-Free

NVD

CVE-2021-27225 – In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integrat …

1 March 2021

CVE-2021-25122 – When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0 …

1 March 2021

CVE-2021-25329 – The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9. …

1 March 2021

CVE-2020-7929 – A user authorized to perform database queries may trigger denial of service by issuing spe …

1 March 2021

CVE-2020-9479 – When loading a UDF, a specially crafted zip file could allow files to be placed outside of …

1 March 2021

CVE-2021-25829 – An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE …

1 March 2021

EXPLOITS

Covid-19 Contact Tracing System 1.0 – Remote Code Execution (Unauthenticated)

1 March 2021

Online Catering Reservation System 1.0 – Remote Code Execution (Unauthenticated)

1 March 2021

VMware vCenter Server 7.0 – Unauthenticated File Upload

1 March 2021

WiFi Mouse 1.7.8.5 – Remote Code Execution

1 March 2021

FortiLogger 4.4.2.2 – Unauthenticated Arbitrary File Upload (Metasploit)

1 March 2021

Remote Desktop Web Access – Authentication Timing Attack (Metasploit Module)

26 February 2021

SECURELIST

Mobile malware evolution 2020

1 March 2021

The state of stalkerware in 2020

26 February 2021

Lazarus targets defense industry with ThreatNeedle

25 February 2021

DDoS attacks in Q4 2020

16 February 2021

Spam and phishing in 2020

15 February 2021

How kids coped with COVID-hit winter holidays

4 February 2021

Information Cyber Network Enterprise Security News

© 2021 GeekWire | Privacy Policy | Cookie-Free | We are not responsible for the content of external sites.