Skip to content
GeekWire
  • Home
  • News
    • Cyber Threats
    • Dark Web
    • Hacking
    • IoT
    • Malware
    • OS
    • Vulnerability
  • Security
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Archives
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • Home
  • News
    • Cyber Threats
    • Dark Web
    • Hacking
    • IoT
    • Malware
    • OS
    • Vulnerability
  • Security
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Archives
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Application Security

When Stalkerware Stalks the Enterprise

3 December 2019

Fifty years ago, Cold War spy tradecraft required ingenious, purpose-built spy technologies. These included tiny cameras that photographed …

Tags Application Security, Connected Devices, Data Protection, Endpoint Protection, Stalkerware

Consistent Security Meets Continuous Deployment on Azure

6 November 2019

It wasn’t that long ago when applications were monolithic pieces of software and updating them required a formal software release. Most …

Tags Application Security, Azure, Azure (Microsoft), CI/CD, Cloud Computing

Threat Stack Application Security Monitoring now supported by Python

1 November 2019

Threat Stack, the leader in cloud security and compliance for infrastructure and applications, announced Python support for Threat Stack …

Tags Application Security, Monitoring, Programming, Programming Languages, Python

The (Security) Dangers of Over Confidence

31 October 2019

Per Radware’s 2019 survey findings, the state of web application security is somewhat scattered as organizations are deploying multiple …

Tags Application Security, Bots, Confidence, Cyber Threats, Data Breach

10 Commandments for Securing Microservices

24 October 2019

Here are 10 characteristics to look for when considering protection to data and applications in a service mesh architecture. [You may also …

Tags Application Security, CI/CD, Containers, Google, kubernetes

Chance that flaws will ever be dealt with diminishes the longer they stick around

23 October 2019

More than half of all security findings (56%) are fixed, but a focus on fixing new findings while neglecting aging flaws leads to …

Tags Application Security, CISO, DevSecOps, Programming, Security Pro

The Simple Path to Protecting and Controlling Your Application Data

15 October 2019

Whether you’re a software development team lead at a prestigious financial institution assigned to redact personally identifiable …

Tags Access Controls, Application Security, Cloud Computing, Cloud Security, Data Access

Agile Security Is Now A Reality

15 October 2019

Businesses are looking to optimize and accelerate their Software Development Lifecycle (SDLC), in order to improve their operational …

Tags Agile, Application Security, Containers, Google, kubernetes

6 Steps to Modernize Your On-Premises Identity and Access Management Architecture

2 October 2019

The time has come to modernize your on-premises identity and access management (IAM) system. As organizations of all sizes and across …

Tags Application Development, Application Security, Architecture, On-Premise, Steps

iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps

23 September 2019

Apple users of the world, 13 is your lucky number: iOS 13 has …

Tags Application Development, Application Security, Custom Apps, Mobile Security, Work
Post navigation
Older posts
1 2 … 31 Next →
+ More

NVD

CVE-2019-19797 – read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write. …

15 December 2019

CVE-2014-3536 – CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log …

15 December 2019

CVE-2014-3643 – jersey: XXE via parameter entities not disabled by the jersey SAX parser …

15 December 2019

CVE-2014-3652 – JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL. …

15 December 2019

CVE-2014-3699 – eDeploy has RCE via cPickle deserialization of untrusted data …

15 December 2019

EXPLOITS

FTP Commander Pro 8.03 – Local Stack Overflow

13 December 2019

NVMS 1000 – Directory Traversal

13 December 2019

Bullwark Momentum Series JAWS 1.0 – Directory Traversal

12 December 2019

OpenNetAdmin 18.1.1 – Command Injection Exploit (Metasploit)

12 December 2019

Lenovo Power Management Driver 1.67.17.48 – ‘pmdrvs.sys’ Denial of Service (PoC)

12 December 2019

SECURELIST

Kaspersky Security Bulletin 2019. Statistics

12 December 2019

Story of the year 2019: Cities under ransomware siege

11 December 2019

Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium

10 December 2019

APT review: what the world’s threat actors got up to in 2019

4 December 2019

Corporate security prediction 2020

3 December 2019

Information Cyber Network Enterprise Security News

© 2019 GeekWire | Privacy Policy | We are not responsible for the content of external sites.
Scroll back to top
We use cookies to make the site simpler. Please let us know if you agree our Privacy Policy including cookie policy.Yes, I agree