Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comState Superintendent of Education Molly Spearman announced at River Springs Elementary School that the South Carolina Department of Education (SCDE) will purchase and distribute over $33 million worth of personal protective equipment (PPE) and supplies to all eighty one public school districts to support efforts to maintain and return to face to face instruction. ...

securitymagazine.comBusinesses in the UK and U.S. have been ramping up their identity verification processes in order to protect customers during the COVID-19 pandemic. ...

TheHackersNewsA financially-motivated threat actor known for its malware distribution campaigns has evolved its tactics to focus on ransomware and extortion. According to FireEye's Mandiant threat intelligence team, the collective — known as FIN11 — has engaged in a pattern of cybercrime campaigns at least since 2016 that involves monetizing their access to organizations' networks, in addition to deploying...

securitymagazine.comBaylor University in Texas will implement a surge testing program for off-campus students due to the number of surrounding community members the student population interacts with....

Heise Sicherheits NewsSicherheitsfunktionen wie die Software Guard Extensions (SGX) erhalten Verbesserungen, um bisherige Angriffsvektoren zu schließen....

TheHackersNewsManaged Security Services Providers (MSSPs) have it rough. They have the burden of protecting their client organizations from cyberattacks, with clients from different industries, different security stacks, and different support requirements. And everything is in a constant state of flux. MSSPs are turning to multitenant solutions to help reduce the complexity of managing multiple security...

Heise Sicherheits NewsEin Hackerteam hat demonstriert, wie sich der aktuelle Sicherheitschip im Mac knacken lässt – mit einem simplen manipulierten USB-C-Kabel....

Heise Sicherheits NewsSAP-Admins sollten die verfügbaren Sicherheitsupdates zeitnah unter die Lupe nehmen und wo nötig einspielen. Die Risikoeinstufung "High" ist mehrfach vertreten....

Heise Sicherheits NewsIm Flash Player klafft eine kritische Sicherheitslücke. Pünktlich zum Patchday stehen Updates für Windows, Linux, macOS und Chrome OS bereit....

Heise Sicherheits NewsDie Staatsanwaltschaft München hat mehrere Objekte von FinFisher durchsucht, auch im Ausland. Der Verdacht lautet auf illegalen Export von Spähsoftware....

Heise Sicherheits NewsAktive Angriffe auf die zum Patch Tuesday beseitigten, teils kritischen Sicherheitslücken wurden bislang nicht beobachtet. Zügig updaten sollte man dennoch....

TheHackersNewsDays after the US Government took steps to disrupt the notorious TrickBot botnet, a group of cybersecurity and tech companies has detailed a separate coordinated effort to take down the malware's back-end infrastructure. The joint collaboration, which involved Microsoft's Digital Crimes Unit, Lumen's Black Lotus Labs, ESET, Financial Services Information Sharing and Analysis Center (FS-ISAC),...

Heise Sicherheits NewsSicherheitslücken in FortiOS und MobileIron Core & Connector werden mit Zerologon zu einer Exploit-Chain verwoben, warnen CISA und FBI....

Heise Sicherheits NewsExperten haben in velibra, einer "App auf Rezept", Sicherheits- und Datenschutzmängel entdeckt. Sie kritisieren vor allem das Prüfverfahren des BfArM....

TheHackersNewsSince the beginning of this year, organizations' IT staff have faced numerous challenges and an increased workload as a result of the global pandemic and shift to a mainly remote workforce. Supporting end-users that are now working from home has introduced new challenges in troubleshooting since it isn’t as simple as visiting an end user’s desk to resolve issues as they arise. One support issue...

TheHackersNewsMicrosoft has warned about a new strain of mobile ransomware that takes advantage of incoming call notifications and Android's Home button to lock the device behind a ransom note. The findings concern a variant of a known Android ransomware family dubbed "MalLocker.B" which has now resurfaced with new techniques, including a novel means to deliver the ransom demand on infected devices as well as...

TheHackersNewsA team of five security researchers analyzed several Apple online services for three months and found as many as 55 vulnerabilities, 11 of which are critical in severity. The flaws — including 29 high severity, 13 medium severity, and 2 low severity vulnerabilities — could have allowed an attacker to "fully compromise both customer and employee applications, launch a worm capable of...

TheHackersNewsAs businesses are increasingly migrating to the cloud, securing the infrastructure has never been more important. Now according to the latest research, two security flaws in Microsoft's Azure App Services could have enabled a bad actor to carry out server-side request forgery (SSRF) attacks or execute arbitrary code and take over the administration server. "This enables an attacker to quietly...

TheHackersNewsEvery company needs help with cybersecurity. No CISO ever said, "I have everything I need and am fully confident that our organization is fully protected against breaches." This is especially true for small and mid-sized enterprises that don't have the luxury of enormous cybersecurity budgets and a deep bench of cybersecurity experts. To address this issue, especially for small and mid-sized...

TheHackersNewsCybersecurity researchers have taken the wraps off a new botnet hijacking Internet-connected smart devices in the wild to perform nefarious tasks, mostly DDoS attacks, and illicit cryptocurrency coin mining. Discovered by Qihoo 360's Netlab security team, the HEH Botnet — written in Go language and armed with a proprietary peer-to-peer (P2P) protocol, spreads via a brute-force attack of the...

Weiter