Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comCybersecurity has always been tremendously important to organizations. But in the current environment, adequate security measures are harder than ever to implement. Many organizations now manage thousands of laptops, mobile devices, and apps. Moreover, these devices and platforms are being used by employees across a variety of settings, including in their homes, in offices, and even while traveling....

securitymagazine.comGeopolitical risks from Myanmar to Central Asia to Sweden are influencing the threat landscape for global enterprises. Companies must carry out systematic and capillary monitoring activities aimed at minimizing risks or, at least, limiting possible impacts....

securitymagazine.comMandiant is currently tracking 12 malware families associated with the exploitation of Pulse Secure VPN devices. These families are related to the circumvention of authentication and backdoor access to these devices, but they are not necessarily related to each other and have been observed in separate investigations. It is likely that multiple actors are responsible for the creation and deployment of these various code families, says Mandiant. ...

securitymagazine.comMI5 has warned about spies luring people on LinkedIn. At least 10,000 U.K. nationals have been approached by fake profiles linked to hostile states, on the professional social network LinkedIn, over the past five years....

securitymagazine.comWith more powerful malware, a tightening regulatory environment, and greater consumer security consciousness raising the stakes for organizational cybersecurity, understanding how personal data monitoring impacts cybersecurity has never been more vital....

threatpost.comThe Mozilla Foundation releases Firefox 88, fixing 13 bugs ranging from high to low severity....

Heise Sicherheits NewsMindestens zwei Gruppen attackieren Pulse Secure VPN-Appliances über eine bislang unbekannte Sicherheitslücke. Patches gibt es bislang keine....

TheHackersNewsResearchers have uncovered a new set of fraudulent Android apps in the Google Play store that were found to hijack SMS message notifications for carrying out billing fraud. The apps in question primarily targeted users in Southwest Asia and the Arabian Peninsula, attracting a total of 700,000 downloads before they were discovered and removed from the platform. The findings were reported...

threatpost.comThe second-largest auto insurance provider in the U.S. has since fixed the vulnerability that exposed information from its website....

securitymagazine.comPaul Nizov has joined digital intelligence company ABBYY as Chief Information Security Officer (CISO)....

securitymagazine.comBrandon Hoffman has been named Intel 471's first Chief Information Security Officer (CISO) reporting to the company's CEO....

TheHackersNewsFor most organizations today, endpoint protection is the primary security concern. This is not unreasonable – endpoints tend to be the weakest points in an environment – but it also misses the forest for the trees. As threat surfaces expand, security professionals are harder pressed to detect threats that target other parts of an environment and can easily miss a real vulnerability by focusing...

TheHackersNewsAn ongoing malvertising campaign tracked as "Tag Barnakle" has been behind the breach of more than 120 ad servers over the past year to sneakily inject code in an attempt to serve malicious advertisements that redirect users to rogue websites, thus exposing victims to scamware or malware. Unlike other operators who set about their task by infiltrating the ad-tech ecosystem using "convincing...

Heise Sicherheits NewsMozilla hat Firefox 88 nebst ESR-Pendant sowie Thunderbird 78.10 veröffentlicht. Im Gepäck haben die Releases unter anderem auch wichtige Schwachstellen-Fixes....

Heise Sicherheits NewsAngreifer könnten Systeme mit der Netzwerkvirtualisierungs-Software VMware NSX-T attackieren....

TheHackersNewsA spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information. Attributing the attack to the Lazarus Group based on similarities to prior tactics adopted by the adversary, researchers from Malwarebytes...

securitymagazine.comThrough observation and analysis of open source information and behavior on multiple closed forums, Intel 471 found actors adopting the use of legitimate big data technology for cybercrime and monetizing the data they obtain on the Chinese-language underground....

securitymagazine.comAs we continue into 2021, it's no secret we are still reeling from the aftermath and impacts that 2020 unleashed across the globe. That's why—now more than ever—it is critical that companies prioritize their duty of care plans, or risk falling behind for good. Below, we speak to Hugh Dunleavy, Senior Vice President, U.S. Operations and Chief Security Officer of Crisis24, a GardaWorld company, about crafting a robust duty of care program....

securitymagazine.comThe response to dis- and misinformation will likely become a critical function for security leaders and risk managers across an enterprise. Find out how disinformation is impacting risk management within organizations and how you can mitigate the risk....

securitymagazine.comThe last year has certainly shown businesses all around the world that they must be prepared for the unexpected. How they manage the unexpected is what separates those that sail through their challenges and those that let them significantly harm the institution. Being prepared starts with establishing an effective incident response program....

Weiter