Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
threatpost.comSecurity researchers and U.S. government authorities alike are urging admins to address Microsoft's critical privilege escalation flaw....

Heise Sicherheits NewsDie mit dem CVSS-Score 10 bewertete Lücke CVE-2020-1472 in Windows Server kann mittels "Zerologon" ausgenutzt werden. Nutzer sollten jetzt updaten....

Heise Sicherheits NewsDer IT-Ausfall an der Uniklinik Düsseldorf hat gravierende Folgen für immer mehr Patienten. Experten gehen von einem Hackerangriff aus....

securitymagazine.comNew research from DataGrail this morning that uncovers how people are using the California Consumer Privacy Act since it went into effect in January 2020 and the data shows people want control of their data and are taking action to restrict the sale of their personal information....

securitymagazine.comNew findings by The App Analyst reveal a privacy bug in Democratic presidential candidate Joe Biden's official campaign app. ...

Heise Sicherheits NewsAuf Citrix ADC und Netscaler Gateways sind offenbar über die Shitrix-Lücke Anfang des Jahres Backdoors installiert worden, durch die Ransomware gelangen kann....

Heise Sicherheits NewsAngreifer könnten Media Encoder von Adobe attackieren und Informationen leaken....

Heise Sicherheits NewsDer Support für Version 1.x der Onlineshop-Software Magento endete im Juni 2020. Eine aktuelle "Magecart"-Angriffskampagne zielt nun auf veraltete Shops....

securitymagazine.comThe School Safety Task Force will review the role of School Resource Officers and present recommendations to further the District’s policy goals of implementing all elements of restorative practices to ensure equitable and safe inclusive schools....

securitymagazine.comThe Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies....

securitymagazine.comOver the weekend, Fairfax, Va. County Public Schools, the 10th largest school district in the country, was hit by Maze ransomware, resulting in an apparent leak of student and faculty data, just days after previous attacks on these two other school systems....

securitymagazine.comEric Cardwell has been named Axio's  Director of Cyber Risk Engineering. Mr. Cardwell will be responsible for addressing cyber risk requirements for industry clients, identifying government and trade association contracts, and driving innovation in the advancement of security and financial controls across the energy and utilities sector....

threatpost.comVulnerabilities ‘that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio....

TheHackersNewsIn a new report into the global cybersecurity industry's exposure on the Dark Web this year, global application security company, ImmuniWeb, uncovered that 97% of leading cybersecurity companies have data leaks or other security incidents exposed on the Dark Web, while on average, there are over 4,000 stolen credentials and other sensitive data exposed per cybersecurity company. Even the...

securitymagazine.comIn the lead-up to the 2020 US elections, the nonpartisan global technology association ISACA surveyed more than 3,000 IT governance, risk, security and audit professionals in the US in January and again in July....

securitymagazine.comDigital Shadows revealed new research looking at the growing problem of company access keys inadvertently exposed during software development. Access keys, and their corresponding secrets, are used by developers to authenticate into other systems....

securitymagazine.comTwo new public safety committees were created this month by University of Utah Chief Safety Officer Marlon Lynch and appointed by U President Ruth Watkins. The Public Safety Advisory Committee and the Independent Review Committee are comprised of students, faculty, and staff from across the institution and are designed to ensure a broad representation of constituents are included in public safety decision-making....

TheHackersNewsThe US Cybersecurity and Infrastructure Security Agency (CISA) issued a new advisory on Monday about a wave of cyberattacks carried by Chinese nation-state actors targeting US government agencies and private entities. "CISA has observed Chinese [Ministry of State Security]-affiliated cyber threat actors operating from the People's Republic of China using commercially available information...

securitymagazine.comWhat are the expectations, technical implementations, and challenges of using cloud security access brokers (CASB)? Cloud Security Alliance's latest study reveal unrealized gaps between the rate of implementation or operation and the effective use of the capabilities within the enterprise....

securitymagazine.comFrom the early days of the web, the concept of authentication has been synonymous with the notion of ‘logging in,’ typically with a username and password. Today, this ubiquity has exploded to the point that the average individual has 191 usernames and passwords acting as one-to-one keys for any website they’ve registered with....

Weiter