Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
Heise Sicherheits NewsDie Europäische Kommission sowie mehrere EU-Institutionen sollen vergangene Woche einem erfolgreichen Angriff zum Opfer gefallen sein, der nun untersucht wird....

Heise Sicherheits NewsDie ersten Cisco-Updates nach den Feiertagen zielen unter anderem auf die SD-WAN vManage Software und Small Business RV Router. Zwei Lücken gelten als kritisch....

Heise Sicherheits NewsUnter "playstation-sony.eu" bietet ein täuschend echt gestalteter Online-Shop Playstation-5-Konsolen an. Erst eine genauere Analyse entlarvt den Schwindel....

Heise Sicherheits NewsLernen Sie in praktischen Übungen, wie Sie Linux-Server gegen Angriffe absichern – von der Datenverschlüsselung bis zu SELinux. 10% Frühbucherrabatt bis 20.4....

TheHackersNewsThe maintainers of the PHP programming language have issued an update regarding the security incident that came to light late last month, stating that the actors may have gotten hold of a user database containing their passwords to make unauthorized changes to the repository. "We no longer believe the git.php.net server has been compromised. However, it is possible that the master.php.net user...

securitymagazine.comA new CISCO Talos Intelligence report explores how cybercriminals are increasingly abusing the communications platforms that many organizations use to facilitate employee communications. According to the report, communication platforms have allowed attackers to circumvent perimeter security controls and maximize infection capabilities. Over the past year, adversaries are increasingly relying on these platforms as part of the infection process....

securitymagazine.comResearchers at Rapid7 evaluated five areas of cybersecurity that are both critical to secure to continue doing business on and across the internet, and are squarely in the power of CISOs, their IT security staffs, and their internal business partners to address, in their new round of Internet Cyber-Exposure Reports (ICERs). These five facets of internet-facing cyber-exposure and risk include:...

securitymagazine.comCybersecurity is not a one-and-done proposition. Deterring cybersecurity threats and remediating incidents is a complex and never-ending responsibility. Malicious state actors, cybercriminals and corporate espionage are just a few sources of cyberattacks. Each one uses dozens of ever-evolving techniques to overcome security safeguards. ...

TheHackersNewsIn what appears to be a fresh twist in Android malware, users of Gigaset mobile devices are encountering unwanted apps that are being downloaded and installed through a pre-installed system update app. "The culprit installing these malware apps is the Update app, package name com.redstone.ota.ui, which is a pre-installed system app," Malwarebytes researcher Nathan Collier said. "This app is not...

threatpost.comOne Discord network search turned up 20,000 virus results, researchers found.  ...

TheHackersNewsGoogle on Tuesday announced that its open source version of the Android operating system will add support for Rust programming language in a bid to prevent memory safety bugs. To that end, the company has been building parts of the Android Open Source Project (AOSP) with Rust for the past 18 months, with plans in the pipeline to scale this initiative to cover more aspects of the operating system...

Heise Sicherheits NewsDieses Jahr können Interessierte im Livestream mitverfolgen, wie Teilnehmer Betriebssysteme und Software über frisch entdeckte Schwachstellen aufs Korn nehmen....

securitymagazine.comThe National Center for Spectator Sports Safety and Security (NCS4) at The University of Southern Mississippi (USM) recently completed a product operational exercise for an RF-based detection system. The two-part exercise included a demonstration of the technology in the company’s laboratory and observation of it in use at a concert at Ruth Eckerd Hall in Clearwater, Fla....

securitymagazine.comMarcos Christodonte brings decades of experience to the global security leadership role at Unqork....

securitymagazine.comSAP systems running outdated or misconfigured software are exposed to increased risks of malicious attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned. SAP applications help organizations manage critical business processes—such as enterprise resource planning, product lifecycle management, customer relationship management, and supply chain management.  ...

securitymagazine.comNovotel Convention & Spa Antananarivo Hotel has implemented smart locks with digital key and mobile access, along with contactless check-in for convenience and safety....

securitymagazine.comEagle Eye Networks released its new report detailing camera use and insights from cameras connected to the Eagle Eye Networks Cloud Video Management System (VMS). The insights are analyzed from a sample data set of 100,000 cameras in 90 countries around the world. True Cloud, technology improvements, COVID-19, and the need for business intelligence are transforming the video surveillance market....

TheHackersNewsWant to take advantage of excellent cloud services? Amazon Web Services may be the perfect solution, but don't forget about AWS security. Whether you want to use AWS for a few things or everything, you need to protect access to it. Then you can make sure your business can run smoothly. Read on to learn some important AWS security tips. Use Multi-Factor authentication When setting up your AWS...

TheHackersNewsCybersecurity researchers have discovered yet another piece of wormable Android malware—but this time downloadable directly from the official Google Play Store—that's capable of propagating via WhatsApp messages. Disguised as a rogue Netflix app under the name of "FlixOnline," the malware comes with features that allow it to automatically reply to a victim's incoming WhatsApp messages with a...

TheHackersNewsA critical vulnerability in the VMware Carbon Black Cloud Workload appliance could be exploited to bypass authentication and take control of vulnerable systems. Tracked as CVE-2021-21982, the flaw is rated 9.1 out of a maximum of 10 in the CVSS scoring system and affects all versions of the product prior to 1.0.1.  Carbon Black Cloud Workload is a data center security product from VMware that...

Weiter