Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
TheHackersNewsCybersecurity researchers uncovered fresh evidence of an ongoing cyberespionage campaign against Indian defense units and armed forces personnel at least since 2019 with an aim to steal sensitive information. Dubbed "Operation SideCopy" by Indian cybersecurity firm Quick Heal, the attacks have been attributed to an advanced persistent threat (APT) group that has successfully managed to stay...

securitymagazine.comAmazon's smart home security division Ring has unveiled a flying camera that launches if sensors detect a potential home break-in. It is designed to activate only when residents are out, works indoors, and is limited to one floor of a building....

securitymagazine.comUnder the contract, the Port will go through a threat assessment as well as review and update its strategic plan to mitigate pervasive and asymmetrical threats....

Heise Sicherheits NewsUngarische Banken und die dortige Telekom sind Ziel eines massiven DDoS-Angriffs gewesen. Es kam zu Störungen, größere Probleme konnten aber verhindert werden....

Heise Sicherheits NewsLaut BSI wenden sich 50 Prozent der Onliner an die Polizei, wenn sie Bilder sexuellen Kindesmissbrauchs erhalten, bei Hass gegen Migranten sind es 28 Prozent....

TheHackersNewsWhat is the difference between a penetration test and a red team exercise? The common understanding is that a red team exercise is a pen-test on steroids, but what does that mean? While both programs are performed by ethical hackers, whether they are in-house residents or contracted externally, the difference runs deeper. In a nutshell, a pen-test is performed to discover exploitable...

Heise Sicherheits NewsDer Digitalisierungsschub durch Corona hat die Energie von Kriminellen verstärkt aufs Homeoffice gerichtet. Ein Unternehmen will für Angriffe sensibilisieren....

Heise Sicherheits NewsPastebin wird gern von Entwicklern genutzt – allerdings auch für Schadcode und dessen Infrastruktur. Neue Funktionen könnten den Missbrauch weiter befeuern....

Heise Sicherheits NewsEine Artikelserie mit zugehörigem Webinar erklärt an konkreten Beispielen, was bei vielen Cloud-Projekten schief läuft und wie man es besser macht....

Heise Sicherheits NewsReiche Beute haben Unbekannte bei der Kryptogeldbörse Kucoin gemacht: Aus der Hot-Wallet konnten sie Gelder im Wert von über 150 Millionen Euro abziehen....

securitymagazine.comSecurity veteran Matthieu Petrigh launched a new website with training programs on an array of topics dedicated to security professionals and those interested in learning security the he hopes will help others in the industry progress their careers....

securitymagazine.comCybercriminals love a crisis. As most of the workforce continues operating remotely, how can you stop cybercriminals from exploiting your business? Here are four secure ways to manage a distributed workforce....

securitymagazine.comAs September is National Insider Threat Awareness Month, there is no better time than the present to seriously reconsider how we educate America’s next generation of business leaders about these critical intelligence issues. As we wait on MBA programs to catch up to America’s new geopolitical reality, these are the three most important issues business schools, early stage entrepreneurs, and even seasoned pros should consider as they protect their life’s work....

securitymagazine.comAccording to a Mimecast report, businesses now face growing risk from phishing email attacks that prey on people’s political opinions, mirroring the COVID-19 cybercrime surge that preyed on fear....

securitymagazine.comSenior risk and compliance professionals within financial services company’s lack confidence in the security data they are providing to regulators, according to Panaseer's 2020 GRC Peer Report. Results from a global external survey of over 200+ GRC leaders* reveal concerns on data accuracy, request overload, resource-heavy processes and lack of end-to-end automation....

securitymagazine.comTo understand current cloud infrastructure (IaaS) utilization and management practices, SailPoint, in partnership with dimensional research, surveyed executives and governance professionals who are directly involved with IaaS compliance and governance. The report reviews the global research survey which investigates current issues, risks, and challenges with IaaS environments as well as the tools used to manage access and governance of those environments.  In addition, the report found that a large majority (74%) of companies use more than one IaaS provider, with some companies reporting using as many as seven and eight – which can lead to significant security issues....

Heise Sicherheits NewsBesitzer von Netzwerkspeichern (NAS) der Firma Qnap, sollten ihr Gerät aus Sicherheitsgründen auf den aktuellen Stand bringen....

Heise Sicherheits NewsEs gibt wichtige Patches für die Endpoint-Security-Lösung Apex One von Trend Micro....

Heise Sicherheits NewsSicherheitsforscher haben einen Fehler in der Verschlüsselung durch die Ransomware ThunderX entdeckt und bieten nun Hilfe an....

TheHackersNewsMicrosoft's long-lived operating system Windows XP—that still powers over 1% of all laptops and desktop computers worldwide—has had its source code leaked online, allegedly, along with Windows Server 2003. Yes, you heard that right. The source code for Microsoft's 19-year-old operating system was published as a torrent file on notorious bulletin board website 4chan, and it's for the very first...