Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comAllied Universal can officially complete its acquisition of G4S - ending what was a long takeover journey with multiple bids from companies around the globe. ...

TheHackersNewsIn what's likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been leaked on a popular cybercrime forum for free—which was harvested by hackers in 2019 using a Facebook vulnerability. The leaked data includes full names, Facebook IDs, mobile numbers, locations, email addresses, gender, occupation, city, country,...

TheHackersNewsA hacking group related to a Chinese-speaking threat actor has been linked to an advanced cyberespionage campaign targeting government and military organizations in Vietnam. The attacks have been attributed with low confidence to the advanced persistent threat (APT) called Cycldek (or Goblin Panda, Hellsing, APT 27, and Conimes), which is known for using spear-phishing techniques to compromise...

TheHackersNewsA new spear-phishing campaign is targeting professionals on LinkedIn with weaponized job offers in an attempt to infect targets with a sophisticated backdoor trojan called "more_eggs." To increase the odds of success, the phishing lures take advantage of malicious ZIP archive files that have the same name as that of the victims' job titles taken from their LinkedIn profiles. "For example, if the...

securitymagazine.comAs a young boy, Frank Figliuzzi had a sense of right and wrong, good and bad. He was so interested in criminal justice that at the age of 11, he wrote a letter to the head of the Federal Bureau of Investigation (FBI) asking for advice on a career in the field....

securitymagazine.comWhen it comes to intelligent video surveillance in particular, AI-driven products are beginning to unlock new functionality, and even change the role video surveillance plays for companies. From better sensors to higher resolution cameras to more efficient processing units, we're seeing an unparalleled convergence of hardware and software. And that's creating new opportunities for everything from intelligent threat detection to personalized customer experiences. We're just at the beginning of this journey, but it's clear that best practices are changing. Seemingly in real-time, security professionals are reimagining how they'll build their teams, structure engagements and define their value. We're all still building the playbook as we use it, but here are four new, unspoken "rules" for the new world of security - and how they'll continue to evolve thanks to AI....

TheHackersNewsThe data is in. According to IBM Security's 2020 Cost of a Data Breach Report, there is a 50% increase in cloud usage for enterprises across all industries. The number of threats targeting cloud services, predominantly collaboration services like Office 365, has increased 630%. Moreover, 75% of respondents report that discovery and recovery time from data breaches has significantly increased due...

TheHackersNewsMany enterprises rely on more than one security tool to protect their technology assets, devices, and networks. This is particularly true for organizations that use hybrid systems or a combination of cloud and local applications. Likewise, companies whose networks include a multitude of smartphones and IoT devices are likely to deploy multiple security solutions suitable for different scenarios....

TheHackersNewsApps on Android have been able to infer the presence of specific apps, or even collect the full list of installed apps on the device. What's more, an app can also set to be notified when a new app is installed. Apart from all the usual concerns about misuse of such a data grab, the information can be abused by a potentially harmful app to fingerprint other installed apps, check for the presence...

TheHackersNewsA North Korean government-backed campaign targeting cybersecurity researchers with malware has re-emerged with new tactics in their arsenal as part of a fresh social engineering attack. In an update shared on Wednesday, Google's Threat Analysis Group said the attackers behind the operation set up a fake security company called SecuriElite and a slew of social media accounts across Twitter and...

threatpost.comThree security vulnerabilities in the Fortinet SSL VPN are being used to gain a foothold within networks before moving laterally and carrying out recon....

threatpost.comActivision is warning that cyberattackers are disguising malware -- a remote-access trojan (RAT) -- in cheat programs....

threatpost.comJohn Hammond, security researcher with Huntress, takes a deep-dive into a malware's technical and coding aspects....

securitymagazine.comVirginia lawmakers unanimously approved a bill HB2031 that would restrict facial recognition technology for local law enforcement....

threatpost.comAttackers are impersonating the stock-trading broker using fake websites to steal credentials as well as sending emails with malicious tax files....

securitymagazine.comFor a loosely connected, globally distributed system with no central governing authority, the Internet is remarkably dependable. Robust enough to cope with the unexpected, it features back-up capabilities ranging from redundant network paths to virtual servers that compensate for physical hardware failures....

securitymagazine.comCISA has issued supplemental direction to Emergency Directive (ED) 21-02: Mitigate Microsoft Exchange On-Premises Product Vulnerabilities providing additional forensic triage and server hardening, requirements for federal agencies. Specifically, this update directs federal departments and agencies to run newly developed tools —Microsoft’s Test-ProxyLogon.ps1 script and Safety Scanner MSER—to investigate whether their Microsoft Exchange Servers have been compromised.  ...

threatpost.comA vast majority of companies in a global survey from Microsoft report being a victim of a firmware-focused cyberattack, but defense spending lags, but defense spending lags....

threatpost.comSome legacy models of QNAP network attached storage devices are vulnerable to remote unauthenticated attacks because of two unpatched vulnerabilities....

threatpost.comThe ransomware gang exfiltrated 40 gigabytes of data from the fashion house, including HR and salary details....