Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comThere has been an significant increase in PYSA ransomware targeting education institutions in 12 U.S. states and the U.K., according to a joint Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) flash industry alert. ...

Heise Sicherheits NewsDie MyBB-Entwickler haben mehrere Sicherheitslücken in der Forensoftware geschlossen. Eine Lücke gilt als kritisch....

securitymagazine.comAs more people turn to their cellphones for news and information, there becomes an increased need to develop innovative alerts and warning applications (apps). These apps notify the public of a current or imminent event or disaster and provide the public with any necessary actions to keep citizens safe. The latest National Emergency Communications Plan (NECP) Spotlight highlights the successful use of these apps in real-life scenarios across the United States and demonstrates how the NECP’s recommendations promote the development and adoption of new technologies that enhance communication capabilities....

securitymagazine.comThe SolarWinds supply chain attack has, to date, impacted nine government agencies and as many as 100 private sector companies, according to some reports. By the time the full extent of the hack is known, it may be the most widespread security breach on record. But what does this mean for the organizations impacted and is it potentially insurable? In light of the massive cyberattack, we spoke to Seth Rachlin, Executive Vice President and Insurance Lead at Capgemini, to discuss the implications of this attack and the fast-growing cyber insurance market. ...

securitymagazine.comArea 1 Security recently stopped a sophisticated Microsoft Office 365 credential harvesting campaign targeting C-suite executives, high-level assistants, and financial departments across numerous industries, including financial services, insurance, and retail. Further research and analysis of the activity revealed a much larger operation than originally discovered. This included several additional directly-related credential phishing campaigns that targeted the same industries and positions using sophisticated techniques and advanced phishing kits, to bypass Microsoft’s native email defenses and email authentication.  ...

TheHackersNewsA newly discovered glitch in Zoom's screen sharing feature can accidentally leak sensitive information to other attendees in a call, according to the latest findings. Tracked as CVE-2021-28133, the unpatched security vulnerability makes it possible to reveal contents of applications that are not shared, but only briefly, thereby making it harder to exploit it in the wild. It's worth pointing out...

Heise Sicherheits NewsDie Entwickler von Cisco haben in den Router-Modellen RV132W und RV134W eine gefährliche Schwachstelle geschlossen....

securitymagazine.comIt’s simple: If you are using a legacy ecosystem, your compliance is at risk. The fact that your security hasn’t yet been compromised is no evidence of your safety; it really is a case of it being quiet, too quiet. When it comes to security breaches, it’s not a question of if, but when. Whether your household or institutional architecture, the full value of security is only appreciated after disaster has already struck....

securitymagazine.comNearly daily we see new stories of cybercriminals breaching security walls, stealing valuable data, and then holding it hostage in return for money. Companies risk exposing valued customer data as well as their own reputations, placing their credibility in disarray....

securitymagazine.comIt’s all too common to see “fear appeals” used to motivate users to keep their guards up against the vast amount of cybercriminal activity that occurs online daily. The term FUD (Fear, Uncertainty, and Doubt) was originally coined in the 1970s in reference to IBM’s marketing technique of spreading scary rumors about a competitor’s new product. Ever since, it’s been a mainstay used by security practitioners to try to win budget and to scare employees into following the rules laid down by IT. As cybersecurity research Karen Renaud put it in a recent Wall Street Journal piece, “Companies often turn to a powerful emotion to get employees to be vigilant about cybersecurity. They scare them.”...

securitymagazine.comBlending security services, personal relationships and community trust with excellent customer service is a must for professional security officers. But how exactly can security officers create better relationships and gain trust of those they serve?...

Heise Sicherheits NewsZoom-Nutzer können einzelne Fenster des eigenen Geräts teilen. Dabei können kurz andere Fenster aufflackern und deren Inhalt verraten – unter Windows und Linux....

threatpost.comFintech security provider Fiserv acknowledges it used unregistered domain as default email....

threatpost.comIn a new campaign, threat actors are bundling macOS malware in trojanized Apple Xcode developer projects....

TheHackersNewsA pair of critical vulnerabilities in a popular bulletin board software called MyBB could have been chained together to achieve remote code execution (RCE) without the need for prior access to a privileged account. The flaws, which were discovered by independent security researchers Simon Scannell and Carl Smith, were reported to the MyBB Team on February 22, following which it released an...

threatpost.comA glitch in Zoom's screen-sharing feature shows parts of presenters' screens that they did not intend to share - potentially leaking emails or passwords....

threatpost.comThe newly discovered steganography method could be exploited by threat actors to obscure nefarious activity inside photos hosted on the social-media platform....

Heise Sicherheits NewsDas Halbtags-Webinar zum Thema Home-Office hilft bei der Security-Bestandsaufnahme und liefert eine nützliche Checkliste....

securitymagazine.comAccording to multiple sources, crimes targeting Asian Americans have risen dramatically since the beginning of the coronavirus pandemic....

securitymagazine.comArgyle Independent School District is located in Argyle, Texas was looking to implement an emergency communications system across the district for everyday alerts, as well as emergencies, threats or weather events. ...