Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
TheHackersNewsEvery company needs help with cybersecurity. No CISO ever said, "I have everything I need and am fully confident that our organization is fully protected against breaches." This is especially true for small and mid-sized enterprises that don't have the luxury of enormous cybersecurity budgets and a deep bench of cybersecurity experts. To address this issue, especially for small and mid-sized...

TheHackersNewsCybersecurity researchers have taken the wraps off a new botnet hijacking Internet-connected smart devices in the wild to perform nefarious tasks, mostly DDoS attacks, and illicit cryptocurrency coin mining. Discovered by Qihoo 360's Netlab security team, the HEH Botnet — written in Go language and armed with a proprietary peer-to-peer (P2P) protocol, spreads via a brute-force attack of the...

Heise Sicherheits NewsEin Security-Experte hat demonstriert, dass sich aufgrund von Fehlern in dem ARM-Chip ein Mac übernehmen lässt. Die Bugs kann Apple nicht mehr fixen....

threatpost.comMicrosoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for the past two weeks....

threatpost.comThe attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest a nation-state actor could be behind the incident....

threatpost.comThe fileless attack uses a phishing campaign that lures victims with information about a workers' compensation claim....

threatpost.comA researcher claims that the issue can be exploited by attackers in order to gain root access....

Heise Sicherheits NewsDer Hersteller von App-gesteuerten BDSM-Sextoys der Marke Cellmate überträgt Nutzerdaten unverschlüsselt und öffnet damit Tor und Tür für Missbrauch....

securitymagazine.comOrganizations are still making deals and mergers and acquisitions. Many are doing virtual deals; but the move comes with security concerns, says Deloitte report....

TheHackersNewsCybersecurity researchers have spotted a rare kind of potentially dangerous malware that targets a machine's booting process to drop persistent malware. The campaign involved the use of a compromised UEFI (or Unified Extensible Firmware Interface) containing a malicious implant, making it the second known public case where a UEFI rootkit has been used in the wild. According to Kaspersky, the...

securitymagazine.comA new report, the 2020 Security Operations Report from Arctic Wolf, is pulling back the curtain on some lesser known trends in their new security operations threat report, which details security trends in operations since the start of the pandemic....

threatpost.comTeam Showcase, a sister plugin, is also vulnerable to the XSS and PHP object-injection bugs -- together they have 66,000 installs....

securitymagazine.comISC West began this week with a keynote from Michael MacKenzie, general manager of IoT connectivity & control services at Amazon Webservices IoT....

threatpost.comThe cryptojacking malware variant builds on the TeamTNT group’s typical approach, with a few new — and sophisticated — extras....

threatpost.comAgentTesla, LimeRAT, W3Cryptolocker and Redline Stealer are now using Paste.nrecom in spear-phishing attacks....

threatpost.comThe MosaicRegressor espionage framework is newly discovered and appears to be the work of Chinese-speaking actors....

securitymagazine.comWhy is having a cybersecurity framework so important?  When it comes to cybersecurity, a framework serves as a system of standards, guidelines, and best practices to manage risks that arise in a digital world. A cybersecurity framework prioritizes a flexible, repeatable and cost-effective approach to promote the protection and resilience of your business; it’s also important to realize that cybersecurity helps with the growth of your business. ...

securitymagazine.comAs with any new disruptive innovation, we must strive to strike a balance between risk and reward. While it’s exciting to ponder the possibilities of a world powered by 5G and an constellation of connected things, we must first establish a secure foundation to support these innovations. A software-based, Zero Trust security framework represents our best chance at securing the Edge from the connected things of tomorrow....

securitymagazine.comSecurity Access Service Edge (SASE) is the latest security trend to hit the world of cybersecurity for enterprises. But unlike meaningless buzzwords, SASE looks set to become an essential toolkit for any cybersecurity framework....

TheHackersNewsAs security professionals who have spent more than a few years in the industry, we know a good challenge when we see one. SaaS and cloud-based technologies are growing rapidly, offering organizations convenience and constant feature refreshes without the need to install and deploy software on-premises. However, even when referred to as 'a game-changer,' many organizations are still highly...