Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
TheHackersNewsBitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of wallets spanning several blockchain platforms. "Randstorm() is a term we coined to describe a collection of bugs, design decisions, and API changes that, when brought in contact with each other, combine...

TheHackersNewsAn Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive operation for over a decade. Indian security firm under scrutiny, according to an in-depth analysis from SentinelOne, began as an educational startup offering offensive security training programs, while carrying out covert...

TheHackersNewsThe threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by the cybercriminals. “Most of the group’s Phobos variants are distributed by SmokeLoader, a backdoor trojan," security researcher Guilherme Venere said in an...

TheHackersNewsRussian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities. Check Point, which detailed Gamaredon's (aka Aqua Blizzard, Iron Tilden, Primitive Bear, Shuckworm, and Winterflounder) latest tactics, branded the group as engaging in large-scale campaigns that are...

securitymagazine.comAccording to a recent cybersecurity predictions report, the top 2024 risk cited by internal audit leaders is cyber and data security (80%)....

securitymagazine.comA recent cyber threat report found that bots and human fraud farms were responsible for billions of attacks in the first half of 2023 and into Q3....

securitymagazine.comAs third-party threats become increasingly sophisticated, it’s taking more time for organizations to find and remediate third-party risk. ...

TheHackersNewsThreat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead. Cybersecurity company Securonix is tracking the ongoing activity under the name SEO#LURKER. “The malicious advertisement directs the user to a compromised WordPress website gameeweb[.]com, which redirects the...

securitymagazine.comRoshan Navagamuwa has been hired as Executive Vice President (EVP) and Chief Information Officer (CIO) at American International Group (AIG). ...

securitymagazine.comNew research shows organizations using passwordless technologies experience the fewest phishing attacks, are more productive and achieve greater levels of employee satisfaction....

TheHackersNewsThe U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams that make it possible for malicious actors to orchestrate SIM-swapping attacks and port-out fraud. “The rules will help protect consumers from scammers who target data and personal information by covertly swapping SIM cards to a new device or porting phone numbers to...

securitymagazine.comAccording to a recent cybersecurity report by Cisco, 14% of global organizations are ‘fully prepared’ to deploy artificial intelligence (AI)....

securitymagazine.comAccording to a recent cybersecurity report, businesses lost 9% of their revenue over the last 12 months as a direct result of cyberattacks....

securitymagazine.comAccording to a ransomware report, almost half of small and medium businesses (SMBs) and enterprises (46% each) have experienced a ransomware attack....

securitymagazine.comNew research reveals around half of buyers suspected bots snap up in-demand goods before they can get them, forcing many to either pay inflated prices or use bots themselves....

securitymagazine.comA new benchmark study reveals that aligning cybersecurity organization models with business objectives enables talent retention and security program success....

securitymagazine.comHoliday shopping often brings increased risk, and organizations aren’t exempt. According to a recent report, credit card skimming is on the rise....

Heise Sicherheits NewsAuf der Basis von drei Säulen will Microsoft IT-Systeme effektiver vor Cyberattacken schützen. Eine Rolle spielt die Abwehr von Attacken auf KI-Basis....

Heise Sicherheits NewsDurch eine unsichere Weiterleitung können Angreifer SAML-Tokens angemeldeter Nutzer klauen und deren Zugänge übernehmen. VMware stellt Updates bereit....

Heise Sicherheits NewsVon niedrig bis kritisch: Das Common Vulnerability Scoring System (CVSS) hat einen Versionssprung vollzogen....

Weiter