Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comGlobal lockdowns, travel restrictions, expansion of remote working arrangements and numerous cancellations of professional programs and events we are now experiencing will have a profound impact on the opportunity to develop your security career through networking....

securitymagazine.comSure, Greek mythology begins with Zeus, Poseidon and Hades divvying up the universe in a game of dice. But they never employed risk management as a methodology to take the future into their own hands. How can security professionals best develop a risk mindset based on probability and rigor rather than intuition and emotion?...

securitymagazine.comIn the midst of the current health crisis, healthcare organizations and workers worldwide have faced a number of challenges. Exposure to the disease, lack of critical medical devices and shortage of healthcare professionals are the top three challenges they face, according to research firm Verdict....

securitymagazine.comGlobal technology association ISACA recently installed its 2020-2021 Board of Directors at its virtual Annual General Meeting, featuring a strong combination of executive expertise and association and chapter leadership experience....

Heise Sicherheits NewsIn seinem Cyber Resilience Report 2020 hat IBM untersucht, was Unternehmen robust gegenüber Angriffen macht....

Heise Sicherheits NewsAngreifer könnten Router von Netgear attackieren und Schadcode ausführen. Abgesicherte Firmware-Versionen sind verfügbar....

threatpost.comAn authentication-bypass vulnerability allows attackers to access network assets without credentials when SAML is enabled on certain firewalls and enterprise VPNs....

threatpost.comMore employees working remotely most likely means an increased reliance on cloud services and applications....

Heise Sicherheits NewsUnter bestimmten Voraussetzungen könnten Angreifer unter anderem Firewalls und Gateways von Palo Alto attackieren....

TheHackersNewsIn what's one of the most innovative hacking campaigns, cybercrime gangs are now hiding malicious code implants in the metadata of image files to covertly steal payment card information entered by visitors on the hacked websites. "We found skimming code hidden within the metadata of an image file (a form of steganography) and surreptitiously loaded by compromised online stores," Malwarebytes...

TheHackersNewsCybersecurity researchers today uncovered new details of watering hole attacks against the Kurdish community in Syria and Turkey for surveillance and intelligence exfiltration purposes. The advanced persistent threat behind the operation, called StrongPity, has retooled with new tactics to control compromised machines, cybersecurity firm Bitdefender said in a report shared with The Hacker...

securitymagazine.comTraditional network management approaches of multiple point products, manual change processes, monolithic policies and data silos no longer work. Business, risk, service and security assurance programs all need to be agile, efficient and anticipate future threats and remedies....

securitymagazine.comThe spread of COVID-19 and the economic and trade disruption the pandemic has caused is prompting port managers to examine new ways to improve risk management and digital processes, according to the latest global ports survey conducted by Remy InfoSource....

securitymagazine.comThe National Security Agency (NSA) and the Department of Homeland Security (DHS) have designated Georgia State University as a National Center of Academic Excellence in Cyber Defense Research and a National Center of Academic Excellence in Cyber Defense Education through 2025....

securitymagazine.comA Russian ransomware group whose leaders were indicted by the Justice Department in December is retaliating against the U.S. government, many of America’s largest companies and a major news organization, identifying employees working from home during the pandemic and attempting to get inside their networks with malware intended to cripple their operations, reports The New York Times. ...

securitymagazine.comVectra® AI released its 2020 Spotlight Report on Healthcare, which shows an upward trend in exploitable behaviors and discredits claims that external threats would lead to increased internal threat activity....

securitymagazine.comCriminal hackers use a variety of techniques to get around current verification protocols involving passwords. Broadly speaking, they fall into three categories....

securitymagazine.comCalifornia has adopted new workplace safety standards to protect agricultural employees who harvest, operate vehicles and do other jobs between sunset and sunrise. ...

securitymagazine.comFBI Director Christopher Wray has named Larissa L. Knapp the assistant director of the Security Division at FBI Headquarters in Washington, D.C....

securitymagazine.comA new white paper from ISACA, ‘Supply Chain Resilience and Continuity: Closing Gaps Exposed in a Global Pandemic’, offers approaches that enterprises can implement to increase the resiliency of their supply chain....

Weiter