Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
Heise Sicherheits NewsLaut CERT Bund läuft eine Mining-Schadsoftware auf "mindestens 600 Exchange-Servern". Administratoren sollten auch bereits gepatchte Maschinen checken....

threatpost.comThe American Rescue Act is the latest zeitgeisty lure being circulated in an email campaign....

threatpost.comA new Mimecast update reveals the SolarWinds hackers accessed several "limited" source code repositories....

threatpost.comResearchers say China-linked APTs lure victims with bogus Huawei career pages in what they dub ‘Operation Diànxùn’....

securitymagazine.comMeet Kevin Bocek, who is responsible for security strategy and threat intelligence at Venafi. He brings more than 16 years of experience in IT security with leading security and privacy leaders, including RSA Security, Thales, PGP Corporation, IronKey, CipherCloud, NCipher, and Xcert. Most recently, Bocek led the investigation that identified Secretary Hillary Clinton’s email server did not use digital certificates and encryption for the first three months of term. Here, we talk to Bocek about a topic he is passionate about: machine identity management. ...

securitymagazine.comGoogle has released an update for its Chrome web browser that fixes five security flaws, including a zero-day vulnerability known to be exploited by malicious actors. The bugs affect Windows, macOS and Linux versions of the browser. ...

securitymagazine.comVectra AI released its global survey of 1,112 security professionals working in mid to large sized organizations using Microsoft Office 365. The results confirm that the COVID-19 pandemic has accelerated cloud migration and digital transformation amongst 88% of companies and that 71% of Microsoft Office 365 deployments have suffered an account takeover of a legitimate user’s account, not once, but on average seven times in the last year. ...

threatpost.comInsider Risk Management builds a framework around the new paradigm of "risk tolerance," aiming to give security teams the visibility and context around data activity to protect that data, without putting rigid constraints on users....

securitymagazine.comHP Inc. released its new Quarterly Threat Insights Report, providing analysis of real-world attacks against customers worldwide. The report found that 29% of malware captured was previously unknown* – due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection. 88% of malware was delivered by email into users’ inboxes, in many cases having bypassed gateway filters. It took 8.8 days, on average, for threats to become known by hash to antivirus engines – giving hackers over a week’s ‘head-start’ to further their campaigns....

securitymagazine.comTo mark the anniversary of the shift to remote work due to the pandemic, Randori surveyed 400 security decision-makers to understand how the community was impacted and how they’ve responded to the security challenges of the COVID-19 era. Here are the key findings from the report....

Heise Sicherheits NewsÜberblick über die Inhalte und die Umsetzung der IT-Grundschutz-Methodik des BSI, inklusive Prüfung zum Grundschutz-Praktiker. Vergünstigt bis 29.3....

TheHackersNewsEmail security firm Mimecast on Tuesday revealed that the state-sponsored SolarWinds hackers who broke into its internal network also downloaded source code out of a limited number of repositories. "The threat actor did access a subset of email addresses and other contact information and hashed and salted credentials," the company said in a write-up detailing its investigation, adding the...

Heise Sicherheits NewsLaut einer Studie können Angreifer in den meisten Unternehmen Office-365-Konten übernehmen. Manager überschätzen die eigenen Sicherheitsfähigkeiten meist....

TheHackersNewsIt's not every day that one of the best-known independent cybersecurity individuals joins a cybersecurity company. The two are generally on opposite sides of the coin, with little crossover. After all, they're usually concerned with different parts of the cybersecurity puzzle – one providing platforms and tools to defend organizations, the other keeping them accountable and looking for blind...

Heise Sicherheits NewsAngreifer könnten Server und Workstations mit IBM AIX attackieren. Eine Lücke gilt als kritisch....

TheHackersNewsA Florida teen accused of masterminding the hacks of several high-profile Twitter accounts last summer as part of a widespread cryptocurrency scam pled guilty to fraud charges in exchange for a three-year prison sentence. Graham Ivan Clark, 18, will also serve an additional three years on probation. The development comes after the U.S. Department of Justice (DoJ) charged Mason Sheppard (aka...

TheHackersNewsApple may be changing the way it delivers security patches to its devices running iOS and iPadOS mobile operating systems. According to code spotted in iOS 14.5, the iPhone maker is reportedly working on a method for delivering security fixes independently of other OS updates. The changes were first reported by the 9to5Mac website. <!--adsense--> While Google's Android has had monthly security...

securitymagazine.comLearn how to give healthcare security staff the tools they need to perform their varied job functions to the best of their ability, while maintaining safety and security for staff and patients, and encouraging a solid, trustworthy, honest and long-term security team....

securitymagazine.comVideoconferencing has been around for a surprisingly long time.  In fact, the first call involving both audio and video links has been traced all the way back to 1927 in a call that took place between officials in Washington, DC and the president of AT&T in New York. Although it was laughably primitive by current standards, electronic conferencing technology has never stopped growing in either refinement or use. ...

securitymagazine.comOur Lady of Perpetual Help Parish in Grove City, Ohio is comprised of seven buildings, which includes the church, preschool, elementary school, rectory, storage garage, athletic building and modular classrooms. With 28 exterior doors now encompassing the fully renovated church, school and preschool, the parish knew it was time for a substantial security upgrade....

Weiter