Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
TheHackersNewsA high-level manager and systems administrator associated with the FIN7 threat actor has been sentenced to 10 years in prison, the U.S. Department of Justice announced Friday. Fedir Hladyr, a 35-year-old Ukrainian national, is said to have played a crucial role in a criminal scheme that compromised tens of millions of debit and credit cards, in addition to aggregating the stolen information,...

TheHackersNewsPeople talk about the cybersecurity job market like it's a monolith, but there are a number of different roles within cybersecurity, depending not only on your skill level and experience but on what you like to do. In fact, Cybercrime Magazine came up with a list of 50 cybersecurity job titles, while CyberSN, a recruiting organization, came up with its own list of 45 cybersecurity job categories...

threatpost.comTwo cyberattack campaigns are making the rounds using unique social-engineering techniques....

threatpost.comA malicious ‘Jungle Run’ app tricked security protections to make it into the Apple App Store, scamming users out of money with a casino-like functionality....

threatpost.comWidely deployed platforms from Citrix, Fortinet, Pulse Secure, Synacor and VMware are all in the crosshairs of APT29, bent on stealing credentials and more....

securitymagazine.comWearables provide public health and security teams onboard Royal Caribbean with a solid means of contact tracing, but the future may be in facial recognition....

threatpost.comMatt Bromiley, senior principal consultant with Mandiant, offers checklists for how small- and medium-sized businesses (SMBs) can identify and clear ProxyLogon Microsoft Exchange infections....

securitymagazine.comGeraldine Hart, currently the Suffolk County Police commissioner, will become Hofstra University’s next Director of Public Safety in June....

Heise Sicherheits NewsDie Firma Positive Technologies, die viel über die Management Engine (ME) in Intel-CPUs veröffentlicht hat, soll Beihilfe zu russischen Cyberattacken leisten....

threatpost.comThe zero-day flaw research group has revised its disclosure of the technical details of vulnerabilities in the hopes of speeding up the release and adoption of fixes....

Heise Sicherheits NewsEs gibt wichtige Sicherheitsupdates für Netzwerkgeräte mit Junos OS....

TheHackersNewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued an advisory warning of multiple vulnerabilities in the OpENer EtherNet/IP stack that could expose industrial systems to denial-of-service (DoS) attacks, data leaks, and remote code execution. All OpENer commits and versions prior to February 10, 2021, are affected, although there are no known public exploits that...

Heise Sicherheits NewsWeil Anwendungen und Betriebssysteme beispielsweise Links oft nicht ausreichend überprüfen, warnen Sicherheitsforscher vor möglichen Schadcode-Attacken....

Heise Sicherheits NewsGoogles Entwickler haben eine gegen verschiedene Attacken abgesicherte Ausgabe des Webbrowsers Chrome veröffentlicht....

TheHackersNewsThe U.S. and U.K. on Thursday formally attributed the supply chain attack of IT infrastructure management company SolarWinds with "high confidence" to government operatives working for Russia's Foreign Intelligence Service (SVR). "Russia's pattern of malign behaviour around the world – whether in cyberspace, in election interference or in the aggressive operations of their intelligence services...

securitymagazine.comUntangle’s SD-WAN Router introduces WireGuard VPN integration to provide organizations an encrypted VPN connection to help organizations quickly set up a VPN connection between their security gateway and SD-WAN Router, resulting in a fast-performing virtual network connection....

securitymagazine.comComodo’s security operations center (SOC)-as-a-Platform (SOCaaP) integrates endpoint, network, and cloud security (correlating events from both the endpoint and network) and offers white-labeled co-managed threat detection and response services....

securitymagazine.comBenchmarking your security program against others in your sector can prove extremely valuable for your organization and key stakeholders....

securitymagazine.comThe DTEX InTERCEPT 6.5 platform brings together the capabilities of user and entity behavior analytics (UEBA), endpoint data loss prevention (DLP), digital forensics and insider threat management into a cloud-native platform to empower customers to mitigate the risk of data and IP loss....

securitymagazine.comVideo storage is an important consideration in any surveillance project while simultaneously being one of the most overlooked. Let’s face it: storage does not exactly provide the “wow factor” of analytics or 4K image quality, but it is the backbone on which entire video security systems are built. If you cannot retrieve and review footage in a timely manner, all the other shiny features you have incorporated into your security surveillance solution is for naught....

Weiter