Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comTransmit Security has released “The Impact of Passwords on Your Business,” a State of Customer Authentication report that includes customer experience insights based on its survey of 600 U.S. consumers. According to the report findings, organizations are losing potential customers and a substantial amount of revenue due to their dependency on traditional password systems and outdated customer authentication models....

Heise Sicherheits NewsUnbekannte haben versucht, Schadcode in das Git-Repository der Skriptsprache einzugeben, der einen Verweis auf das Unternehmen Zerodium enthält....

securitymagazine.comAcronis released the findings of its second annual Cyber Protection Week survey, which uncovered a dangerous disconnect between the need for organizations to keep their data protected and the ineffective investments they’ve made trying to reach that goal. While 2020 saw companies purchase new systems to enable and secure remote workers during the COVID-19 pandemic, those investments are not paying off. The global survey discovered that 80% of companies now run as many as 10 solutions simultaneously for their data protection and cybersecurity needs – yet more than half of those organizations suffered unexpected downtime last year because of data loss....

securitymagazine.comDeepfakes –mostly falsified videos and images combining the terms “deep learning” and “fake” – weren’t limited in 2019 to the Nixon presentation and were not uncommon before that. But today they are more numerous and realistic-looking and, most important, increasingly dangerous. And there is no better example of that than the warning this month (March 2021) by the FBI that nation-states are virtually certain to use deepfakes to help propagate increasingly misleading campaigns in the U.S. in coming weeks....

threatpost.comPredator-ranked players on Xbox console game version rigged matches with DDoS attacks....

threatpost.comThere could be more than immediately meets the eye with this targeted attack group....

threatpost.comThe server for the web-application scripting language was compromised on Sunday....

TheHackersNewsAs many as five vulnerabilities have been uncovered in Ovarro's TBox remote terminal units (RTUs) that, if left unpatched, could open the door for escalating attacks against critical infrastructures, like remote code execution and denial-of-service. "Successful exploitation of these vulnerabilities could result in remote code execution, which may cause a denial-of-service condition," the U.S....

securitymagazine.comAccording to researchers from Texas A&M, New York University and Rutgers who studied data from Suffolk County in Massachusetts, not prosecuting low-level crimes can lead to less crime overall....

securitymagazine.comThe aftermath of the Jan. 6 attack on the United States Capitol has led to the emergence of a new broad, anti-government conspiracy theory spreading on social media that is dovetailing with anti-vaccination and anti-public health extremism, according to a new report by Rutgers’ Miller Center for Community Protection and Resilience....

securitymagazine.comThe fragility of supply chain security in many ways, rests on the shipping container. The incident in the Suez Canal has shed light on vulnerabilities and complexities within the supply chain....

securitymagazine.comThe Awake Security division of Arista Networks has discovered evidence linking the Hades ransomware gang to Hafnium, the state-sponsored threat actor operating from China that Microsoft says is behind the recent Exchange hacks. ...

securitymagazine.comThe Pitkin County courthouse in Colorado is set to open to jury trials for the first full week of April, and the facility has upgraded its physical security measures and guarding in preparation....

TheHackersNewsCybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory. Discovered by Piotr Krysiuk of Symantec's Threat Hunter team, the flaws — tracked as CVE-2020-27170 and CVE-2020-27171 (CVSS...

TheHackersNewsEmail spoofing is a growing problem for an organization's security. Spoofing occurs when a hacker sends an email that appears to have been sent from a trusted source/domain. Email spoofing is not a new concept. Defined as "the forgery of an email address header to make the message appear as if it was sent from a person or location other than the actual sender," it has plagued brands for decades....

Heise Sicherheits NewsDie verbreitete Library wertet Oktalzahlen nicht korrekt aus und interpretiert dadurch unter anderem private Adressen potenziell als öffentlich und umgekehrt....

Heise Sicherheits NewsDie Hintermänner der Ransomware Ziggy haben ein schlechtes Gewissen....

TheHackersNewsNew research into 5G architecture has uncovered a security flaw in its network slicing and virtualized network functions that could be exploited to allow data access and denial of service attacks between different network slices on a mobile operator's 5G network. AdaptiveMobile shared its findings with the GSM Association (GSMA) on February 4, 2021, following which the weaknesses were...

TheHackersNewsIn yet another instance of a software supply chain attack, unidentified actors hacked the official Git server of the PHP programming language and pushed unauthorized updates to insert a secret backdoor into its source code. The two malicious commits were pushed to the self-hosted "php-src" repository hosted on the git.php.net server, illicitly using the names of Rasmus Lerdorf, the author of the...

securitymagazine.comThe recent SolarWinds breach has brought vendor risk management into the spotlight. With 59% of data breaches being traced to third-party vendors and the average enterprise having 67 vendors with privileged access, managing third party risk is no longer optional, says Tony Howlett, Chief Information Security Officer (CISO) of SecureLink. Here, we speak to Howlett about why security and risk professionals need to take control of their third-party exposure and implement safeguards and processes to reduce their vulnerability. ...