Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
threatpost.comThreatpost explores 5 big takeaways from 2020 -- and what they mean for 2021....

TheHackersNewsGoogle has patched a bug in its feedback tool incorporated across its services that could be exploited by an attacker to potentially steal screenshots of sensitive Google Docs documents simply by embedding them in a malicious website. The flaw was discovered on July 9 by security researcher Sreeram KL, for which he was awarded $3133.70 as part of Google's Vulnerability Reward Program. <!-...

TheHackersNewsThreat actors have been discovered distributing a new credential stealer written in AutoHotkey (AHK) scripting language as part of an ongoing campaign that started early 2020. Customers of financial institutions in the US and Canada are among the primary targets for credential exfiltration, with a specific focus on banks such as Scotiabank, Royal Bank of Canada, HSBC, Alterna Bank, Capital One,...

securitymagazine.comComputer fraud, or cyber-scamming, is a multi-billion-dollar industry that affects people and organizations around the world. Since the pandemic started, cybersecurity experts have tracked a 400% rise in online scams. The world is evolving at a rapid pace and with everything getting connected and automated scammers are bound to adapt, thrive and succeed. Let’s understand the top five reasons:...

securitymagazine.comIn the years since, the need for uniform security policies and processes across the entire enterprise — from the boardroom to the home office, the assembly line to the warehouse — has become increasingly obvious. To get started, we have created a simple five step program for executives to ensure their organization is protected against the latest threat vectors and increasingly sophisticated cyberattacks....

securitymagazine.comCISA has created a free tool for detecting unusual and potentially malicious activity that threatens users and applications in an Azure/Microsoft O365 environment. The tool is intended for use by incident responders and is narrowly focused on activity that is endemic to the recent identity- and authentication-based attacks seen in multiple sectors....

securitymagazine.comAs society continues to navigate through the ongoing pandemic, hackers are honing in on new targets and new means to access sensitive data. To prepare for 2021, Experian is releasing its eighth annual Data Breach Industry Forecast, which predicts five major threats to watch....

securitymagazine.comThe advancement of interconnectivity and IoT-enabled equipment has brought a variety of new benefits to the enterprise, however, with this enhanced connectivity comes the possibility for risk. Even HVAC systems can be susceptible if they’re not safeguarded. As hackers modify their targets amid IT evolution, the ability to eliminate system vulnerabilities has never been more critical. In this article, we’ll offer guidance on implementing a cybersecurity strategy that encompasses power management for end-to-end solution.  ...

securitymagazine.comEnterprises can increase the value of their access control by using these electronic security systems for more than just managing access at the front door....

threatpost.comIn-depth report looks at how COVID-19 research has become as a juicy new target for organized cybercrime....

threatpost.comFrom attacks on the UVM Health Network that delayed chemotherapy appointments, to ones on public schools that delayed students going back to the classroom, ransomware gangs disrupted organizations to inordinate levels in 2020....

Heise Sicherheits NewsFrühe Cyberoptimisten haben den Hang zu Monopolen im Web übersehen, meint Cory Doctorow. Es gelte, "die befreiende Macht der Technologie" neu zu entdecken....

Heise Sicherheits NewsEin Ransomware-Angriff legt die Funke-Mediengruppe weitgehend lahm. Inzwischen erscheinen umfangreiche Ausgaben und die IT nutzt eine "digitale Waschstraße"....

Heise Sicherheits NewsVerschlüsselungsexperte Bruce Schneier sieht das kaputte "Internet of Things" als Durchbruch der IT-Security, da sie hier mit physischer Sicherheit kollidiert....

Heise Sicherheits NewsBei der Kommunalwahl in Bayern wurde auf Papier gewählt – doch für die Zählung kamen Computer zum Einsatz. Die IT-Sicherheit wurde dabei offenbar ignoriert....

Heise Sicherheits NewsEx-CCC-Sprecher und Wikileaks-Helfer Andy Müller-Maguhn fühlt sich spätestens nach Besuchen bei Julian Assange in London von der CIA dauerhaft überwacht....

Heise Sicherheits NewsEx-CCC-Sprecher und Wikileaks-Helfer Andy Müller-Maguhn fühlt sich spätestens nach Besuchen bei Julian Assange in London von der CIA dauerhaft überwacht....

TheHackersNews21 people have been arrested across the UK as part of a nationwide cyber crackdown targeting customers of WeLeakInfo[.]com, a now-defunct online service that had been previously selling access to data hacked from other websites. The suspects used stolen personal credentials to commit further cyber and fraud offences, the UK National Crime Agency (NCA) said. Of the 21 arrested — all men aged...

TheHackersNewsNew evidence amidst the ongoing probe into the espionage campaign targeting SolarWinds has uncovered an unsuccessful attempt to compromise cybersecurity firm Crowdstrike and access the company's email. The hacking endeavor was reported to the company by Microsoft's Threat Intelligence Center on December 15, which identified a third-party reseller's Microsoft Azure account to be making "abnormal...

TheHackersNewsAn authentication bypass vulnerability in the SolarWinds Orion software may have been leveraged by adversaries as a zero-day to deploy the SUPERNOVA malware in target environments. According to an advisory published yesterday by the CERT Coordination Center, the SolarWinds Orion API that's used to interface with all other Orion system monitoring and management products suffers from a security...