Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
threatpost.comThe server for the web-application scripting language was compromised on Sunday....

TheHackersNewsAs many as five vulnerabilities have been uncovered in Ovarro's TBox remote terminal units (RTUs) that, if left unpatched, could open the door for escalating attacks against critical infrastructures, like remote code execution and denial-of-service. "Successful exploitation of these vulnerabilities could result in remote code execution, which may cause a denial-of-service condition," the U.S....

securitymagazine.comAccording to researchers from Texas A&M, New York University and Rutgers who studied data from Suffolk County in Massachusetts, not prosecuting low-level crimes can lead to less crime overall....

securitymagazine.comThe aftermath of the Jan. 6 attack on the United States Capitol has led to the emergence of a new broad, anti-government conspiracy theory spreading on social media that is dovetailing with anti-vaccination and anti-public health extremism, according to a new report by Rutgers’ Miller Center for Community Protection and Resilience....

securitymagazine.comThe fragility of supply chain security in many ways, rests on the shipping container. The incident in the Suez Canal has shed light on vulnerabilities and complexities within the supply chain....

securitymagazine.comThe Awake Security division of Arista Networks has discovered evidence linking the Hades ransomware gang to Hafnium, the state-sponsored threat actor operating from China that Microsoft says is behind the recent Exchange hacks. ...

securitymagazine.comThe Pitkin County courthouse in Colorado is set to open to jury trials for the first full week of April, and the facility has upgraded its physical security measures and guarding in preparation....

TheHackersNewsCybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory. Discovered by Piotr Krysiuk of Symantec's Threat Hunter team, the flaws — tracked as CVE-2020-27170 and CVE-2020-27171 (CVSS...

TheHackersNewsEmail spoofing is a growing problem for an organization's security. Spoofing occurs when a hacker sends an email that appears to have been sent from a trusted source/domain. Email spoofing is not a new concept. Defined as "the forgery of an email address header to make the message appear as if it was sent from a person or location other than the actual sender," it has plagued brands for decades....

Heise Sicherheits NewsDie verbreitete Library wertet Oktalzahlen nicht korrekt aus und interpretiert dadurch unter anderem private Adressen potenziell als öffentlich und umgekehrt....

Heise Sicherheits NewsDie Hintermänner der Ransomware Ziggy haben ein schlechtes Gewissen....

TheHackersNewsNew research into 5G architecture has uncovered a security flaw in its network slicing and virtualized network functions that could be exploited to allow data access and denial of service attacks between different network slices on a mobile operator's 5G network. AdaptiveMobile shared its findings with the GSM Association (GSMA) on February 4, 2021, following which the weaknesses were...

TheHackersNewsIn yet another instance of a software supply chain attack, unidentified actors hacked the official Git server of the PHP programming language and pushed unauthorized updates to insert a secret backdoor into its source code. The two malicious commits were pushed to the self-hosted "php-src" repository hosted on the git.php.net server, illicitly using the names of Rasmus Lerdorf, the author of the...

securitymagazine.comThe recent SolarWinds breach has brought vendor risk management into the spotlight. With 59% of data breaches being traced to third-party vendors and the average enterprise having 67 vendors with privileged access, managing third party risk is no longer optional, says Tony Howlett, Chief Information Security Officer (CISO) of SecureLink. Here, we speak to Howlett about why security and risk professionals need to take control of their third-party exposure and implement safeguards and processes to reduce their vulnerability. ...

securitymagazine.comWhen it comes to most digital initiatives, user experience is a primary focal point. Not only is user experience a critical element in the design process, it also remains pertinent as product evolution keeps pace with business scale. As online interactions have exponentially grown during the pandemic, it has become startlingly clear that seamless and secure user experiences (UX) are necessary for success....

securitymagazine.comNSA released the first video of its new Cybersecurity Collaboration Center speaker series. In these talks, NSA experts will share insights, lessons, and contributions of their cybersecurity work. The Center works with government and industry partners to protect U.S. National Security Systems, the Department of Defense (DoD) and the Defense Industrial Base (DIB)....

securitymagazine.comOne of many consequences of the COVID-19 pandemic is an increase in cybersecurity risks and in the complexity of implementing effective security to protect organizational information and computing infrastructure. As with pre-COVID security threats, well-proven cybersecurity strategies based on user and device authentication remain effective, and they now are more important than ever....

securitymagazine.comAmid the ongoing COVID-19 pandemic, prioritizing employee health, safety, and well-being will continue to be key to building resilience, continuity and operational readiness in 2021 and beyond. Accomplishing this requires a robust communications system across the enterprise....

Heise Sicherheits NewsFür Politiker gehört die Präsenz auf Facebook oder Instagram zum Geschäft. Cyber-Angreifer hatten womöglich die Login-Daten für solche Auftritte im Visier....

TheHackersNewsResearchers have discovered a new information-stealing trojan, which targets Android devices with an onslaught of data-exfiltration capabilities — from collecting browser searches to recording audio and phone calls. While malware on Android has previously taken the guise of copycat apps, which go under names similar to legitimate pieces of software, this sophisticated new malicious app...

Weiter