Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comAccess to clinical applications and medical information in a digital healthcare environment is vital. Yet, careful consideration must be made to ensure data and systems are protected against unintended or malicious activities. Securing infrastructure and applications is essential and security professionals must not forget about the devices that facilitate, segregate and protect the network....

securitymagazine.comOne of China's most visited cultural sites: the Mausoleum of Qin Shihuangdi in the city of Xi'an needed a comprehensive security alarm upgrade. The site is visited by thousands of people each day and call for an unobtrusive, yet effective intrusion detection system that reliably alerts security staff to potential incidents, while still allowing tourists to see the integrity of the site....

securitymagazine.comIdentity management has become a focal point for enterprise security. With the 2020 COVID-19 pandemic and the scramble to support work-from-home employees, the real threat to business data assets, whether in the enterprise or the cloud, has become unsecured remote access....

Heise Sicherheits NewsIn Zusammenarbeit mit Red Hat und Google will die Linux Foundation die Authentizität von Open-Source-Software sicherstellen. Das stärkt die Sicherheit....

Heise Sicherheits NewsHätte Microsoft den Massenhack von Exchange-Servern mit rascheren Reaktionen verhindern verhindern können? Der Ablauf der Ereignisse wirft Fragen auf....

TheHackersNewsCybersecurity researchers on Wednesday shed light on a new sophisticated backdoor targeting Linux endpoints and servers that's believed to be the work of Chinese nation-state actors. Dubbed "RedXOR" by Intezer, the backdoor masquerades as a polkit daemon, with similarities found between the malware and those previously associated with the Winnti Umbrella (or Axiom) threat group such as ​PWNLNX,...

Heise Sicherheits NewsFür die kostenpflichtige Variante des Plugins "The Plus Addons for Elementor" steht seit dem gestrigen Dienstag ein Update gegen eine kritische Lücke bereit....

Heise Sicherheits NewsAngreifer könnten macOS- und Windows-Computer mit Photoshop attackieren. Sicherheitsupdates stehen zum Download bereit....

securitymagazine.comBloomberg has reported  that a group of hackers have breached a database containing security camera feeds collected by Verkada Inc., a Silicon Valley startup. The database includes live feeds of 150,000 surveillance cameras inside hospitals, organizations, police departments, prisons and schools. ...

securitymagazine.comResearchers from the Counter Threat Unit (CTU) at Secureworks have discovered a possible link to China while examining how SolarWinds servers were used to deploy malware. According to Secureworks' new report, the authentication bypass vulnerability in SolarWinds Orion API, tracked as CVE-2020-10148, that can lead to remote execution of API commands, has been actively exploited by Spiral. When vulnerable servers are detected and exploited, a script capable of writing the SUPERNOVA web shell to disk is deployed using a PowerShell command....

securitymagazine.comHybrid work is emerging as a norm, especially for companies who have a mix of workers whose job requires coming into the office, and those who are able to accomplish their work at home. This hybrid workforce is expected to become more prevalent as 75% of workers want to retain flexibility over their schedule beyond the pandemic. To get some insight into how security executives executives can implement consistent security practices for the new hybrid workforce environment, we spoke to Michael Borromeo, Vice President, Data Protection at Stericycle, the provider of Shred-it information security services....

securitymagazine.comVeritas Technologies revealed new research that highlights the dangers of mis-using instant messaging (IM) and business collaboration tools: 71% of office workers globally – including 68% in the US – admitted to sharing sensitive and business-critical company data using these tools, the survey found....

securitymagazine.combp Alternative Energy wind farms have implemented a number of rugged padlocks to protect the turbines themselves and the junction boxes that house power cables. But not all padlocks are created equal, especially for these critical infrastructure locations which have several challenges, including extreme elements and remote locations....

securitymagazine.comNewly retired Police Chief Steve Parrish is named School Safety Officer of Dothan City Schools in Alabama....

TheHackersNewsThreat actors known for keeping a low profile do so by ceasing operations for prolonged periods in between to evade attracting any attention as well as constantly refining their toolsets to fly below the radar of many detection technologies. One such group is FIN8, a financially motivated threat actor that's back in action after a year-and-a-half hiatus with a powerful version of a backdoor with...

TheHackersNewsMicrosoft on Friday warned of active attacks exploiting unpatched Exchange Servers carried out by multiple threat actors, as the hacking campaign is believed to have infected tens of thousands of businesses, government entities in the U.S., Asia, and Europe. The company said "it continues to see increased use of these vulnerabilities in attacks targeting unpatched systems by multiple malicious...

securitymagazine.comA small, private college in Ohio, Cedarville University implemented its Caring Well, Staying Well plan to help students return to campus safely amid the COVID-19 pandemic. In addition to mandating masks, coordinating outdoor and virtual worship services and other initiatives, Cedarville University deployed Wi-Fi based occupancy sensors to help students and staff reduce crowds and maintain social distancing at its on-campus dining facilities....

securitymagazine.comCanadian government want residents, businesses and communities to prepare for natural disasters and other emergency events that could affect their region....

securitymagazine.comThe new year is upon us, and as such, it is a time to reflect on what worked over the past 12 months, and more importantly, what didn’t work. Organizations all over the world are utilizing applications, operating systems, and IoT devices while their data, and their customer’s data, increasingly lives in the cloud. Organizations should take the beginning of the year as a housekeeping opportunity to assess their systems to set themselves up for success in the new year....

securitymagazine.comAt least 30,000 organizations in the U.S. have been hacked by a Chinese cyber espionage unit, known as "Hafnium." The group is targeting and exploiting security vulnerabilities in Microsoft Exchange Server email software. ...

Weiter