Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comA new automated data feed that helps defend state and local government computer systems from cyberattacks and rapidly blocks threats across state lines reduced cyber defense time from some three days to less than three minutes in a successful pilot program across four states....

securitymagazine.comThe Federal Aviation Administration (FAA) announced Unmanned Aircraft Systems(UAS) airspace restrictions over additional national security sensitive locations, effective December 30....

securitymagazine.comThe twentieth century saw huge progress in gender equality as increasing numbers of women embarked upon professional career paths. Certainly, in some sectors such as education, medicine and law, women are increasingly prominent in the general workforce and leadership roles, but other industries appear to be a long way off from achieving full equity. Unfortunately, cybersecurity is one such industry with much progress to be made in terms of diversity and gender parity. While cybersecurity is one of the most fast-paced, rapidly evolving modern industries, this evolution does not appear to apply to the number of women involved in the field. ...

securitymagazine.comArkansas Children’s promoted long-time system leader Erin Parker, MBA, CHC, CHPC, CHRC to the position of Senior Vice President and Chief Information Officer. Parker will focus on systems security, infrastructure and digital initiatives for the healthcare organization....

securitymagazine.comNew data from the Center for Disease Control and Prevention (CDC) shows that drug overdose fatalities are at the highest recorded 12-month period. ...

securitymagazine.comAvast found that almost 40% of small business employees think that a staff member who unknowingly clicks a malicious link would be held personally responsible for a data breach, which could be encouraging employees to keep quiet rather than flagging a potential threat....

securitymagazine.comAnti-government extremists known as sovereign citizens present many domestic threats. Read on to learn more about this homeland security threat, along with key issues security leaders and law enforcement should consider exploring to combat the risks....

threatpost.comBlack man sues police, saying he was falsely ID’d by facial recognition, joining other Black Americans falling victim to the technology’s racial bias....

threatpost.comDavid “moose” Wolpoff at Randori explains how hackers pick their targets, and how understanding "hacker logic" can help prioritize defenses....

securitymagazine.comAimbridge Hospitality announced Roy Mellinger as its new Global Chief Information Security Officer....

securitymagazine.comThe Jewish Federation of Greater Pittsburgh received a $1.1 million grant to help enhance security of staff and property. ...

threatpost.comThe Japanese aerospace manufacturer said that starting in June, overseas unauthorized access to its servers may have compromised customer data....

securitymagazine.comAs we say goodbye to 2020 and prepare to ring in 2021, Security's editors put together our annual Top Stories of 2020....

securitymagazine.comMeet Brian Soby - he has held security leadership roles at Salesforce and in the financial tech industry. Prior to founding AppOmni, Soby founded a cloud software security consultancy. He served as Director of Security at Taulia and managed all security functions, including product/application security, compliance, physical security, and corporate information security. Before that, he was the Director of Product Security at Salesforce and a Lead Security Engineer at MITRE. Here, we talk to Soby about how organizations can avoid today's biggest challenges with Software as a Service (SaaS). ...

threatpost.comThreatpost explores 5 big takeaways from 2020 -- and what they mean for 2021....

TheHackersNewsGoogle has patched a bug in its feedback tool incorporated across its services that could be exploited by an attacker to potentially steal screenshots of sensitive Google Docs documents simply by embedding them in a malicious website. The flaw was discovered on July 9 by security researcher Sreeram KL, for which he was awarded $3133.70 as part of Google's Vulnerability Reward Program. <!-...

TheHackersNewsThreat actors have been discovered distributing a new credential stealer written in AutoHotkey (AHK) scripting language as part of an ongoing campaign that started early 2020. Customers of financial institutions in the US and Canada are among the primary targets for credential exfiltration, with a specific focus on banks such as Scotiabank, Royal Bank of Canada, HSBC, Alterna Bank, Capital One,...

securitymagazine.comComputer fraud, or cyber-scamming, is a multi-billion-dollar industry that affects people and organizations around the world. Since the pandemic started, cybersecurity experts have tracked a 400% rise in online scams. The world is evolving at a rapid pace and with everything getting connected and automated scammers are bound to adapt, thrive and succeed. Let’s understand the top five reasons:...

securitymagazine.comIn the years since, the need for uniform security policies and processes across the entire enterprise — from the boardroom to the home office, the assembly line to the warehouse — has become increasingly obvious. To get started, we have created a simple five step program for executives to ensure their organization is protected against the latest threat vectors and increasingly sophisticated cyberattacks....

securitymagazine.comCISA has created a free tool for detecting unusual and potentially malicious activity that threatens users and applications in an Azure/Microsoft O365 environment. The tool is intended for use by incident responders and is narrowly focused on activity that is endemic to the recent identity- and authentication-based attacks seen in multiple sectors....

Weiter