Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comSumo Logic released findings from its fifth annual report. ”The Continuous Intelligence Report: The State of Modern Applications, DevSecOps and the Impact of COVID-19” provides an inside look into the state of the modern application technology stack, including changing trends in cloud and application adoption and usage by customers, and the impact of COVID-19 as an accelerant for digital transformation efforts....

securitymagazine.comFew cybersecurity components are as familiar as the next-generation firewall (NGFW) for enterprise protection. Despite this ubiquity, it is common for security teams to operate their NGFW in a suboptimal manner. The TAG Cyber team has observed, for example, that many enterprise teams operate their NGFW more like a traditional firewall. This can result in a reduction of traffic visibility, which in turn degrades prevention, detection, and response....

securitymagazine.comA grand jury has issued two indictments​ charging the Santa Clara County Undersheriff, a previously indicted sheriff’s captain, a local business owner, and the head of Global Security for Apple, Inc. with bribery....

Heise Sicherheits NewsBereits im Juli forderte Spotify einige Nutzer gezielt zur Passwortänderung auf. Den Grund dafür machten Sicherheitsforscher erst jetzt publik....

securitymagazine.comThe Dominican Republic has, since 2003, developed a “New Prison Management Model” which aims to apply the international principles of human rights and the United Nations Mandela Rules – the focus of which is human rights and rehabilitation rather than repression. As part of this initiative, Las Parras Correction and Rehabilitation Centre, commonly known as “La Nueva Victoria” in Guerra, in the Dominican Republic was looking for a technology that would take a humane approach to searches....

threatpost.comBelgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this time to break into a Model X within minutes....

Heise Sicherheits NewsDie Paketverwaltungs-Software erscheint zu ihrem achten Geburtstag in Version 1.2 und legt den Fokus auf Sicherheits-Features durch eine neue Authentifizierung....

Heise Sicherheits NewsSoftware von VMware ist über eine Zero-Day-Lücke attackierbar. Bislang gibt es nur Workarounds zur Absicherung....

TheHackersNewsVMware has released temporary workarounds to address a critical vulnerability in its products that could be exploited by an attacker to take control of an affected system. "A malicious actor with network access to the administrative configurator on port 8443 and a valid password for the configurator admin account can execute commands with unrestricted privileges on the underlying operating...

TheHackersNewsFacebook has patched a bug in its widely installed Messenger app for Android that could have allowed a remote attacker to call unsuspecting targets and listen to them before even they picked up the audio call. The flaw was discovered and reported to Facebook by Natalie Silvanovich of Google's Project Zero bug-hunting team last month on October 6 with a 90-day deadline, and impacts version...

securitymagazine.comGlasscock Independent School District, a public school district located in Garden City, Texas, with hundreds of students across two schools, has embarked on an ongoing security plan to convert to a largely wireless, keyless access-controlled environment, to streamline its security and access at its facilities....

securitymagazine.comOpen-source intelligence (OSINT) is having a moment. Just a few years ago, presentations on OSINT began with a quote from one of a few different senior intelligence community officials who reportedly said that somewhere between 80-90% of valuable information comes from public sources. Many presentations today start similarly, but OSINT no longer needs the validation of government greats. Films like Searching and Don’t f**ck with Cats have introduced the discipline to a wider audience, organizations such as Trace Labs host popular OSINT competitions for the common good, and the investigators associated with the website Bellingcat are now media fixtures....

securitymagazine.comFor most of their existence, the focus of elevator improvements has been on cost and efficiency. While those are still important, new technologies are closing the gap in current building security processes by putting the focus on vertical transportation....

securitymagazine.comThere is an opportunity here for IT teams to stabilize their work-from-home situations while also preparing for the future back in the office, or for many, supporting a hybrid model. Long term solutions are needed for organizational success. There are many steps that can be taken to ensure infrastructure is properly cared for and ready to be used when teams are able to return to the office....

threatpost.comVMware explained it has no patch for a critical escalation-of-privileges bug that impacts both Windows and Linux operating systems and its Workspace One....

threatpost.com‘Vishing’ attack on GoDaddy employees gave fraudsters access to cryptocurrency service domains NiceHash, Liquid....

threatpost.comThe TA416 APT has returned in spear phishing attacks against a range of victims - from the Vatican to diplomats in Africa - with a new Golang version of its PlugX malware loader....

threatpost.comUsers of the music streaming service were targeted by attackers using credential-stuffing approaches....

TheHackersNewsEmotet is one of the most dangerous and widespread malware threats active today. Ever since its discovery in 2014—when Emotet was a standard credential stealer and banking Trojan, the malware has evolved into a modular, polymorphic platform for distributing other kinds of computer viruses. Being constantly under development, Emotet updates itself regularly to improve stealthiness, persistence,...

threatpost.comThe popular U.K. soccer club confirmed an attack but said personal fan data remains secure....

Weiter