Skip to content
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Legacy

#thinkcybersec: Don’t Presume Legacy Tech is a Negative Thing

1 December 2020

Legacy technology is not always as bad as it is commonly believed to be, according to a panel of CISO speakers. Speaking during the Think …

Tags IT, Legacy, News, Tech

Increase in Ransomware Sophistication and Leverage of Legacy Malware Predicted for 2021

18 November 2020

An increase in ransomware sophistication, commodity malware and abuse of legitimate tools are predicted to be the main threats for the next …

Tags IT, Legacy, Malware, News, Ransomware

Trula Hacker Group Uses Custom Malware & Legacy Tools to Attack Government Organizations

29 October 2020

Trula, a sophisticated hacking group also known as Krypton, VenomousBear, Waterbug, Uroburos, or Snakegroup targets government entities, …

Tags Attacks, Customs, Cyber Attack, Governments, Legacy

AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices

27 July 2020

Campaigns   CISA and NCSC have identified two campaigns of activity for QSnatch malware. The first campaign likely began in early 2014 and …

Tags Computer Hardware, Devices, Legacy, Malware, NAS

Zoom Patches Legacy Windows Zero-Day Bug

13 July 2020

Zoom has fixed a zero-day vulnerability announced last week which affects legacy Windows customers. The popular video conferencing platform …

Tags Bugs, Legacy, Microsoft, OS, Patches

Zoom Zero-Day Bug Hits Legacy Windows Users

10 July 2020

Zoom is scrambling to fix another zero-day vulnerability in its Windows client, this time potentially leading to arbitrary remote code …

Tags Bugs, Legacy, Microsoft, OS, Users

How Microsoft Disabled Legacy Authentication Across the Company

9 March 2020

As more organizations adopt modern authentication protocols, legacy authentication poses a growing risk to those who lag behind. The …

Tags Authentication, Disabled, How, Legacy, Microsoft

Sonos Backtracks to Offer Fixes for Legacy Speakers

24 January 2020

Sonos appears to have bowed to customer pressure and will now offer security updates for legacy kit and ensure it can co-exist with newer …

Tags Fixes, Legacy, Offers, Sonos, Speakers

#Infosec19: Complex Legacy IT Problems Can’t Be Solved with Simple Solutions

5 June 2019

“Complex problems cannot be solved with simple solutions.” These were the words of Bobby Ford, VP & Global CISO at Unilever, speaking …

Tags Complex, Legacy, Simple, Solutions

Legacy app whitelist can be abused to bypass latest macOS security features, expert warns

3 June 2019

Malware can bypass protections in macOS Mojave, and potentially access user data as well as the webcam and mic – by exploiting a hole in …

Tags Legacy

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

25 April 2019

The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy …

Tags Attacks, Cybercriminals, Healthcare, Legacy, Machine Learning, Security Pro, Threat Detection, Vectra, Vulnerability

How Machine Learning-Based Security Sees Risk Faster than Legacy Tools

19 February 2019

Machine learning (ML) and artificial intelligence (AI) are in the process of changing almost every aspect of our lives. My last post …

Tags Faster, How, Legacy, Machines, Risks, Tools
Post navigation
Older posts
Page1 Page2 Page3 Next →
Cookie-Free

NVD

CVE-2021-3113 – Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session …

17 January 2021

CVE-2021-23835 – An issue was discovered in flatCore before 2.0.0 build 139. A local file disclosure vulner …

15 January 2021

CVE-2021-0203 – On Juniper Networks EX and QFX5K Series platforms configured with Redundant Trunk Group (R …

15 January 2021

CVE-2021-0222 – A vulnerability in Juniper Networks Junos OS allows an attacker to cause a Denial of Servi …

15 January 2021

CVE-2021-21250 – OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critic …

15 January 2021

CVE-2021-23836 – An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was …

15 January 2021

EXPLOITS

Netsia SEBA+ 0.16.1 – Authentication Bypass and Add Root User (Metasploit)

15 January 2021

E-Learning System 1.0 – Authentication Bypass & RCE POC

15 January 2021

Alumni Management System 1.0 – “Last Name field in Registration page” Stored XSS

15 January 2021

EyesOfNetwork 5.3 – File Upload Remote Code Execution

15 January 2021

Online Hotel Reservation System 1.0 – ‘person’ time-based SQL Injection

15 January 2021

Online Hotel Reservation System 1.0 – Cross-site request forgery (CSRF)

15 January 2021

SECURELIST

Sunburst backdoor – code overlaps with Kazuar

11 January 2021

Digital Footprint Intelligence Report

29 December 2020

How we protect our users against the Sunburst backdoor

23 December 2020

Lazarus covets COVID-19-related intelligence

23 December 2020

Sunburst: connecting the dots in the DNS requests

18 December 2020

The future of cyberconflicts

18 December 2020

Information Cyber Network Enterprise Security News

© 2021 GeekWire | Privacy Policy | Cookie-Free | We are not responsible for the content of external sites.