Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
Heise Sicherheits NewsDie Einstellung des Application Guard for Office steigert das Risiko von Cyberattacken. Doch Microsoft nennt Alternativen....

Heise Sicherheits NewsDie freie Krypto-Bibliothek OpenSSL ist in einer neuen Version erschienen. Der Umgang mit Zertifikaten und die Verschlüsselung wurden erweitert....

Heise Sicherheits NewsLernen Sie, Ihre IT zu schützen. Die iX-Workshops sind Schulungen für IT-Professionals, die Ihnen praxisrelevantes Know-how vermitteln....

securitymagazine.comScott Ashworth, a 2023 award recipient of Security magazine's Most Influential People in Security, has joined Google's global security team....

securitymagazine.com CISA and the NCSC jointly released Guidelines for Secure AI System Development to help developers of any systems that use AI make informed cybersecurity decisions at every stage of the development process. ...

securitymagazine.comAccording to a Kapersky report, there were over 30 million phishing attacks in 2023, increasing during holiday online shopping periods....

Heise Sicherheits NewsVon einem Ransomware-Angriff auf die Basler Firma Concevis sind auch Schweizer Bundesbehörden betroffen. Sensible Informationen über Bankkunden sind geleakt....

Heise Sicherheits NewsDie in China verortete Cybergang Chimera soll zwischen 2017 und 2020 Zugang zu NXP-Netzwerken gehabt und vor allem Chipdesigns in die Finger bekommen haben....

securitymagazine.comThe Federal Trade Commission (FTC) has announced plans to better protect consumers from artificial intelligence (AI) voice cloning and fraud....

securitymagazine.com After nine years, Robert Thibodeaux, DefenseStorm's Chief Information Security Officer (CISO), will retire and William Wetherill will step in as the new CISO....

Heise Sicherheits NewsIm Betriebssystem für Synology-Router haben IT-Forscher beim Pwn2Own-Wettbewerb Sicherheitslücken aufgedeckt. Ein Update schließt sie....

Heise Sicherheits NewsEin Ransomware-Angriff legt zwölf Kommunen in Schwaben teilweise lahm. Bürger müssen sich auf Einschränkungen bei kommunalen Dienstleistungen einstellen....

TheHackersNewsModern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must be able to stop threats and restore normal operations as quickly as possible. That’s why it’s essential that these teams not only have the right tools but also understand how to effectively...

TheHackersNewsAn active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality to rope routers and video recorders into a Mirai-based distributed denial-of-service (DDoS) botnet. “The payload targets routers and network video recorder (NVR) devices with default admin credentials and installs Mirai variants when successful,” Akamai said in an advisory...

TheHackersNewsA North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application developed by a Taiwanese multimedia software developer called CyberLink to target downstream customers via a supply chain attack. "This malicious file is a legitimate CyberLink application installer that has been modified to include malicious code that downloads,...

TheHackersNewsA new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows Hello authentication on Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X laptops. The flaws were discovered by researchers at hardware and software product security and offensive research firm Blackwing Intelligence, who found the weaknesses in the fingerprint sensors from Goodix,...

securitymagazine.comMichael Daniel, President & CEO at Cyber Threat Alliance, discusses sharing threat intelligence with other organizations as well as the challenges faced when establishing effective partnerships in the security industry....

securitymagazine.comAs millions of people head to shopping malls and outdoor shopping areas, it is important to maintain vigilance because crime does not take a holiday....

securitymagazine.comWhen employees feel that their boss is watching their every move, it can reduce trust, create resentment and raise concerns about privacy rights. ...

TheHackersNewsNorth Korean threat actors have been linked to two campaigns in which they masquerade as both job recruiters and seekers to distribute malware and obtain unauthorized employment with organizations based in the U.S. and other parts of the world. The activity clusters have been codenamed Contagious Interview and Wagemole, respectively, by Palo Alto Networks Unit 42. While the first set of attacks...

Weiter