Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comThe results of a global study examining the financial impact of data breaches reveals that the incidents cost companies $3.86 million per breach on average, and that compromised employee accounts were the most expensive root cause....

threatpost.comA new ransomware, VHD, was seen being delivered by the nation-state group's multiplatform malware platform, MATA....

securitymagazine.comAs the financial services industry moves toward an ever-greater dependence on technology, we must always keep an eye on the future to ensure that any new technological advancement or implementation delivers the same, if not better, benefits and risk management capabilities. One emerging area that has garnered a lot of attention in recent years is Distributed Ledger Technology (DLT). While DLT holds great promise, there is currently no clear path around how to implement the technology in a way that addresses documented and evolving security risks.  ...

securitymagazine.comCounterfeiters do not take time off. At its core, counterfeiting preys upon our vulnerabilities and takes advantage of the average customer at any cost. This is particularly true right now during the coronavirus pandemic, the most inconvenient and vulnerable moment in generations. In the midst of mass shortages and colossal demands for certain products, especially in the health field, the counterfeit community has seen a golden opportunity. Over the past few months, tens of millions of new counterfeit products have been seized or identified on the web. These include fraudulent face masks, ventilators, disinfectants and testing kits....

TheHackersNewsCybersecurity researchers today uncovered a completely undetectable Linux malware that exploits undocumented techniques to stay under the radar and targets publicly accessible Docker servers hosted with popular cloud platforms, including AWS, Azure, and Alibaba Cloud. Docker is a popular platform-as-a-service (PaaS) solution for Linux and Windows designed to make it easier for developers to...

threatpost.comDerek Manky, Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs, discusses the top threats and lessons learned from the first half of 2020....

threatpost.comA path traversal vulnerability in the iDRAC technology can allow remote attackers to take over control of server operations....

Heise Sicherheits NewsSchlecht gepflegte Workloads und Authentifizierungsschwächen in Cloud-Umgebungen untergraben die Sicherheit – von beidem gibt es reichlich, meint eine Studie....

Heise Sicherheits NewsZwei Features in den Pro-, Enterprise- und Education-Editionen von Windows 10 stürzen derzeit auf manchen Systemen regelmäßig ab. Fixes sind geplant....

Heise Sicherheits NewsSeit sechs Jahren attackieren unbekannte Angreifer ungepatchte NAS-Geräte von Qnap....

Heise Sicherheits NewsNach der von Garmin erst nach mehreren Tagen bestätigten Cyber-Attacke laufen die Systeme langsam wieder an....

TheHackersNewsCybersecurity agencies in the US and UK yesterday issued a joint advisory about a massive ongoing malware threat infecting Taiwanese company QNAP's network-attached storage (NAS) appliances. Called QSnatch (or Derek), the data-stealing malware is said to have compromised 62,000 devices since reports emerged last October, with a high degree of infection in Western Europe and North America. "...

securitymagazine.comColorado Secretary of State Jena Griswold announced the creation of a new Rapid Response Election Security Cyber Unit (RESCU), a highly-trained team of election security experts who will help protect Colorado’s elections from cyber-attacks, foreign interference, and disinformation campaigns....

securitymagazine.comActing Secretary of Homeland Security Chad F. Wolf recently hosted the inaugural meeting of the Department’s China Working Group. The Group’s purpose is to holistically articulate, prioritize and coordinate the Department’s response to evolving threats to the Homeland posed by the Chinese Communist Party (CCP)....

securitymagazine.comThe New York State Department of Financial Services (DFS) filed charges against First American Title Insurance Company for exposing customer bank account numbers, mortgage and tax records, Social Security Numbers, wire transaction receipts, and drivers’ license images. ...

securitymagazine.comThe National Cyber Security Centre – a part of GCHQ – has announced that Lindy Cameron will become its new Chief Executive Officer (CEO). Her role will include overseeing the organization’s response to hundreds of cyber incidents each year, improving the cyber resilience of the UK’s critical national infrastructure, identifying the risks and opportunities for the UK in emerging technologies and leading the NCSC’s ongoing response to the coronavirus pandemic....

securitymagazine.comThe new COVID-19 Law Lab initiative will gather and share legal documents from over 190 countries across the world to help states establish and implement strong legal frameworks to manage the pandemic. The goal is to ensure that laws protect the health and wellbeing of individuals and communities and that they adhere to international human rights standards, says the World Health Organization (WHO). ...

securitymagazine.comDeloitte’s third edition of the “State of AI in the Enterprise” survey finds businesses are entering a new chapter in AI implementation where early adopters may have to work harder to preserve an edge over their industry peers....

securitymagazine.comAs consumers increasingly turn to online shopping for essential and non-essential goods while at home, fraudsters have adapted their technique to use more sophisticated tactics against consumers, banks and merchants....

securitymagazine.comIn the wake of the Court of Justice of the European Union’s Schrems II judgment, on July 23, 2020, the European Data Protection Board (EDPB) adopted a Frequently Asked Questions document to “provide initial clarification and give preliminary guidance to stakeholders on the use of legal instruments for the transfer of personal data to third countries, including the U.S.” The EDPB stated that the document will be updated, and further guidance provided, as it continues to examine and consider the judgment. The six-page FAQs provides the following guidance....