Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
threatpost.comA Turkish hacktivist defaced a subdomain of the president-elect's campaign website....

securitymagazine.comKnowBe4 announced it is partnering with the Center for Cyber Safety and Education to launch a Women in Cybersecurity Scholarship to offer $10,000 to be applied to tuition, fees, books and required electronics for the recipient....

securitymagazine.comThe Chemical Security Summit will be hosted by the Cybersecurity and Infrastructure Security Agency (CISA) in collaboration with the Chemical Sector Coordinating Council (SCC). The summit is the signature industry event for chemical representatives across the chemical and interconnected sectors—including energy, communications, transportation, and water—to learn, share perspectives, and engage in dialogue. Securing chemicals in an evolving threat environment requires cross collaboration between facility owners and operators, industry, law enforcement, community members, and all levels of government....

securitymagazine.comFacebook has fixed a critical flaw in the Facebook Messenger for Android messaging app. Natalie Silvanovich of Google’s Project Zero reported the bug to the Facebook bug bounty program. The bug could have allowed a sophisticated attacker logged in on Messenger for Android to simultaneously initiate a call and send an unintended message type to someone logged in on Messenger for Android and another Messenger client (i.e. web browser)....

securitymagazine.comDuring a time where hospitals are already strapped for resources, Mercy Iowa City hospital reported that an internal email compromise and phishing email incident led to the exposure of personal information of some 60,473 individuals....

securitymagazine.comIn preparation of opening a new bus depot in Toronto, Metrolinx staged a mock disaster that included included response from several agencies throughout the city, as well as served to test the company's systems in place....

Heise Sicherheits NewsDie Lage um eine ein Jahr alte Lücke in VPN-Systemen von Fortinet spitzt sich zu. Sicherheitspatches sind schon lange verfügbar....

Heise Sicherheits NewsMicrosoft hat letztes Wochenende Kopien teils bekannter Browser-Extensions wie NordVPN und AdGuard VPN, die zu Werbung umleiteten, aus dem Edge Store entfernt....

Heise Sicherheits NewsErst hatten sich Angreifer Mitarbeiter-Zugänge beim Registrar GoDaddy erschlichen, dann gingen sie damit auf Kryptowährungs-Plattformen los....

securitymagazine.comOver the weekend, the European football club Manchester United was forced to shut down IT systems and confirmed that it had been hit by a sophisticated cyberattack, but said the organization is confident that personal data of fans was not breached and its preparation for such cyberattacks allowed it to react swiftly and efficiently....

TheHackersNewsAt present, web applications have become the top targets for attackers because of potential monetization opportunities. Security breaches on the web application can cost millions. Strikingly, DNS (Domain Name System) related outage and Distributed denial of service (DDoS) lead a negative impact on businesses. Among the wide range of countermeasures, a web application firewall is the first line...

securitymagazine.comIn today's ever changing environment, no organization and enterprise is immune from violence. Whether it is a church, movie theater, mall, or healthcare setting the need to plan for an act of violence, including active shooter events, is of paramount importance. And while public safety situational awareness and vigilance is an absolute must in our modern world, much thought has been given to how to develop plans, procedures, training and technology to stop these acts of violence. Here, we talk to Tim Sulzer, Chief Technology Officer (CTO) of ZeroEyes, about how physical security technology has evolved over the years to help make a difference in situations involving an active shooter or to reduce workplace and gun violence in various settings. ...

securitymagazine.comA report by Baker McKenzie finds that 50% of compliance-leader respondents believe COVID-19 has dramatically increased the risk exposure of their organization....

securitymagazine.comWorking at home poses many challenges. One smart solution for enterprises that continues to help maintain business continuity is Virtual Desktop Infrastructure (VDI). It enables IT organizations to deliver a corporate endpoint experience on relatively inexpensive hardware while maintaining strict IT standards that will provide benefits well into the future. ...

securitymagazine.comThe Principle of Least Privilege is one of the longest standing principles of security. People (as well as applications) should only have access to the things they need to do their job, and nothing else. While being overly permissive may make life a bit easier in the short-term, it can easily come back to haunt you long-term, whether due to a malicious attack, misplaced credentials, or even an honest mistake....

securitymagazine.comMachines are better at speed and scale than humans. But humans have the edge over machines at thinking outside of the box, using their curiosity and creativity to come up with solutions, and reasoning that machines cannot define or replicate. When it comes to security operations, humans and automation are the duo that’s stronger and more effective in partnership than when they’re apart. Using extended detection and response (XDR) can bring these skills to the forefront of the Security Operations Center (SOC), leaving the repeatable, boring tasks to the machines and allowing for these human traits to shine....

threatpost.comAttackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns....

threatpost.comThe critical and important-severity flaws were found by a team at the China-based Tiunfu Cup hacking challenge....

threatpost.comThe information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists....

Heise Sicherheits NewsEin optionales "Out-of-band"-Update für Windows Server beseitigt Kerberos-Probleme, die auf manchen Systemen nach dem letzten Security-Patchday auftraten....

Weiter