Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comAfter 14 years of finding last-minute goalies, securing locker room doors, and trying to parcel out equal ice time to the skaters, I recently shed the captain’s “C” from the jersey of my recreational hockey team...

securitymagazine.comWhen I speak with candidates who are either leaving government roles or actively looking for a new role, I am often asked what programs or courses related to cybersecurity they could take to improve their marketability....

securitymagazine.comSun Tzu famously said, “all warfare is based on deception.” He could hardly have anticipated how his words would ultimately be substantiated—particularly in the tactics of today’s cybercriminals....

threatpost.comThe flaws have been confirmed by Grandstream, but no firmware update has yet been issued....

threatpost.comThree have been charged in alleged connection with the recent high-profile Twitter hack - including a 17-year-old teen from Florida who is the reported "mastermind" behind the attack....

Heise Sicherheits NewsSchlechte Nachrichten: Forscher entdecken Linux-Versionen einer Schadsoftware der Trickbot-Gang....

securitymagazine.comIn recent years, Enterprise Risk Management has become increasingly focused on cybersecurity risks. While this focus on cyber is understandable, the current COVID crisis has demonstrated that the unpredictable nature of cascading risks requires viewing risk through a much wider risk aperture. One way forward to successfully navigate this new risk frontier is the establishment of a Risk Operations Center (ROC). The ROC enables enterprise and technology leaders to have the continuous monitoring they require to proactively mitigate all cyber issues. Additionally, it fully supports the CISO/cybersecurity leader's principal responsibilities identified by the HBR survey....

TheHackersNewsThe Council of the European Union has imposed its first-ever sanctions against persons or entities involved in various cyber-attacks targeting European citizens, and its member states. The directive has been issued against six individuals and three entities responsible for or involved in various cyber-attacks, out of which some publicly known are 'WannaCry', 'NotPetya', and 'Operation Cloud...

securitymagazine.comCOVID-19 has completely changed our world from six months ago, as we continue to battle the grave health implications, face extended stay at home orders, and grapple with the insurmountable ramifications on our economy. The pandemic has also forever changed the cyber threat landscape, with our workforce becoming more dispersed, and potentially more vulnerable, than ever as organizations switch out of the confines of their offices and move entire data streams to their laptops and home offices. On top of this, Salesforce has announced it is ending its Data Recovery service on July 31st, which is putting all of the data protection responsibilities, and the dire consequences that comes along with it, on the backs of the customer. ...

Heise Sicherheits NewsZoom vergab standardmäßig Passwörter aus 6 Ziffern; und die ließen sich einfach durchprobieren....

Heise Sicherheits NewsÜber Sicherheitslücken in KeePassRPC könnten Angreifer über eine manipulierte Website sämtliche Passwörter aus allen offenen Datenbanken auslesen....

Heise Sicherheits NewsFür die vom 1. bis 6. August online stattfindende Black Hat-Konferenz sind noch Tickets verfügbar. Ab dem 7.8. folgt die virtuelle, diesmal kostenlose Def Con....

Heise Sicherheits NewsDer europäische Rat verhängt Sanktionsmaßnahmen gegen Organisationen und Personen, die an Cyberangriffen beteiligt waren - etwa an WannaCry und NotPetya....

TheHackersNewsSecurity researchers have outlined a new technique that renders a remote timing-based side-channel attack more effective regardless of the network congestion between the adversary and the target server. Remote timing attacks that work over a network connection are predominantly affected by variations in network transmission time (or jitter), which, in turn, depends on the load of the network...

Heise Sicherheits NewsSchwachstellen in den Modulen Group und Hostmaster (Aegir) machen das Content Management Systems Drupal angreifbar....

Heise Sicherheits NewsTwitter hat neue Details zu dem Angriff veröffentlicht, bei dem Hacker Promi-Accounts kapern konnten. Demnach gelangten die per Phishing an interne Tools....

Heise Sicherheits NewsFür die REST API der Plattform ist die Token-basierte Authentifizierung ab November Pflicht und bei anderen Git-Operationen für Mitte 2021 vorgesehen....

securitymagazine.comTo address this current losing war with cyberattackers, the future of cybersecurity requires augmenting the current focus of “indicators of compromise” with “indicators of exposure & warning” in real-time. Where the measure would be to gauge the shift of incident management that would tilt on managing more incidents at warning stages than on compromise stages. It is imperative to build an AI engine to perform this very task as that would be the only way to perform in real-time, scale with the growing nature of cloud as well as to cover the evolving nature to attack scenarios....

securitymagazine.comThe Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of two leading cybersecurity experts to support the agency’s COVID-19 response efforts. Josh Corman is joining CISA as a Visiting Researcher, and Rob Arnold will join CISA’s National Risk Management Center as a Senior Cybersecurity and Risk Management Advisor....

securitymagazine.comA new ECR report, authored by Professor Emeritus Adrian Beck of the University of Leicester, calls for retailers to leverage video analytics more strategically, to control costs, improve operations and increase profitability....

Weiter