Skip to content
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Mitigation

Microsoft Launches Phase 2 Mitigation for Zerologon Flaw

11 February 2021

Microsoft has released phase two mitigation for the critical Zerologon vulnerability disclosed in August 2020. CVE-2020-1472 is an …

Tags Flaws, Launches, Microsoft, Mitigation, Zerologon

Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)

10 February 2021

Microsoft addressed a critical remote code execution vulnerability affecting the Netlogon protocol (CVE-2020-1472) on August 11, 2020. …

Tags Launches, Microsoft, Mitigation, Netlogon, Security Pro

OWASP Mobile Top 10 Vulnerabilities and Mitigation Strategies

27 December 2020

The OWASP Mobile Top 10 list is a great resource for app developers who want to create secure apps. That’s because many mobile apps are …

Tags IT, Mitigation, Mobile, OWASP, Security Pro

#EdgeLive: Stopping API Attacks with Bot Mitigation

11 November 2020

Attacks on APIs can be mitigated with efficient bot management. Speaking on a panel session moderated by Mark Schimmelbusch at the Akamai …

Tags Attacks, Bots, IT, Mitigation, News

Keep It Simple: Choosing the Right DDoS Mitigation Strategy

9 September 2020

The cyber industry offers a plenitude of DDoS mitigation solutions. Competition may be misleading as providers highlight terms such as …

Tags DDoS, Mitigation, Security Pro, Simple, Strategy

Designing DDoS Mitigation Solutions for Simplicity & Speed

21 July 2020

Given the key aspect of DDoS mitigation is accurate detection and fast mitigation, in some scenarios over designing the solution can lead …

Tags DDoS attacks, Designing, Mitigation, Simplicity, Solutions

Why You Should Reconsider DDoS Mitigation from Public Cloud Providers

16 July 2020

When you opt for your provider’s DDoS mitigation service, you are protected against common L3-L4 DDoS attacks. More sophisticated attack …

Tags DDoS, DDoS attacks, Mitigation, Providers, Why

Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw

8 July 2020

Researchers have found a way to bypass F5 Networks mitigation for the actively exploited BIG-IP vulnerability, and hackers already used it. …

Tags Bypass, Cyber Threats, F5, Hacking, Mitigation

6,000 F5 Networks Customers Still Potentially Vulnerable, After Mitigation Bypass: Patch Now Updated

8 July 2020

The fallout from a deeply critical (CVSS 10) security flaw in F5 Networks’ BIG-IP tool  continues, after security firm CRITICALSTART …

Tags Bypass, Customers, Mitigation, Now, Patch

6,000 F5 Networks Customers Still Potentially Vulnerable, After Mitigation Bypass

8 July 2020

The fallout from a deeply critical (CVSS 10) security flaw in F5 Networks’ BIG-IP tool — widely used by some of the world’s biggest …

Tags Bypass, Customers, F5 Networks, Mitigation, Vulnerable

Oracle Scoring, Detection, and Mitigation Cloud Service Provides Communications Security

19 June 2020

Oracle has launched the Oracle Communications Security Shield (OCSS) Cloud, a real-time communications security solution. Built on Oracle …

Tags Communications, Detection, Mitigation, Oracle, Oracle (Company)

What To Consider When Evaluating DDoS Mitigation Services

11 June 2020

In this video, Dileep Mishra, a Radware Sales Engineer, discusses three key factors to consider when evaluating DDoS mitigation services: …

Tags DDoS, DDoS attacks, Mitigation, Security Pro, Services
Post navigation
Older posts
Page1 Page2 … Page5 Next →
Cookie-Free

NVD

CVE-2021-27314 – SQL injection in admin.php in doctor appointment system 1.0 allows an unauthenticated atta …

5 March 2021

CVE-2019-18351 – An issue was discovered in channels/chan_sip.c in Sangoma Asterisk through 13.29.1, throug …

5 March 2021

CVE-2020-36255 – An issue was discovered in IdentityModel (aka ScottBrady.IdentityModel) before 1.3.0. The …

5 March 2021

CVE-2020-5148 – SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP’s in the …

5 March 2021

CVE-2021-27963 – SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g …

5 March 2021

CVE-2021-27964 – SonLogger before 6.4.1 is affected by Unauthenticated Arbitrary File Upload. An attacker c …

5 March 2021

EXPLOITS

Textpattern 4.8.3 – Remote code execution (Authenticated) (2)

4 March 2021

Web Based Quiz System 1.0 – ‘eid’ Union Based Sql Injection (Authenticated)

4 March 2021

Online Ordering System 1.0 – Blind SQL Injection (Unauthenticated)

4 March 2021

Textpattern CMS 4.9.0-dev – ‘Excerpt’ Persistent Cross-Site Scripting (XSS)

4 March 2021

Textpattern CMS 4.8.4 – ‘Comments’ Persistent Cross-Site Scripting (XSS)

4 March 2021

Online Ordering System 1.0 – Arbitrary File Upload to Remote Code Execution

4 March 2021

SECURELIST

Zero-day vulnerabilities in Microsoft Exchange Server

4 March 2021

Mobile malware evolution 2020

1 March 2021

The state of stalkerware in 2020

26 February 2021

Lazarus targets defense industry with ThreatNeedle

25 February 2021

DDoS attacks in Q4 2020

16 February 2021

Spam and phishing in 2020

15 February 2021

Information Cyber Network Enterprise Security News

© 2021 GeekWire | Privacy Policy | Cookie-Free | We are not responsible for the content of external sites.