Tag: software
-
(g+) Cybersicherheit: Warum Sicherheitslücken exponentiell wachsen
Eine Security-Spezialistin erklärt uns, warum die Zahl der Software-Sicherheitslücken schneller wächst als der eigentliche Programmcode. First seen on golem.de Jump to article: www.golem.de/news/cybersicherheit-warum-sicherheitsluecken-exponentiell-wachsen-2512-202722.html
-
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, linux, software, vulnerability, windows, xssThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation.The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site scripting (XSS) flaw that affects Windows and Linux versions of the software via First seen on…
-
Schwachstellen in Fluent Bit gefährdeten USInstanzen
Cloud-Anbieter wie AWS, Microsoft oder Google verwenden die Open Source-Software Fluent Bit zur Erfassung von Telemetriedaten (Monitoring). Gleich fünf Schwachstellen in dieser Software hätten die Remote-Übernahme von Containern, die auf den entsprechenden Cloud-Instanzen gehostet wurden, ermöglichet. Nutzer sollten die Software … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/11/30/schwachstellen-in-oss-tool-fluent-bit-gefaehrdete-us-cloud-instanzen/
-
French Football Federation discloses data breach after cyberattack
The French Football Federation (FFF) disclosed a data breach on Friday after attackers used a compromised account to gain access to administrative management software used by football clubs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/french-football-federation-fff-discloses-data-breach-after-cyberattack/
-
Bloody Wolf Threat Actor Expands Activity Across Central Asia
A new Bloody Wolf campaign exploits legitimate remote-administration software for cyber-attacks on government targets in Central Asia First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/bloody-wolf-expands-central-asia/
-
Wie Angreifer das Npm-Ökosystem infiltrierten
Shai-Hulud 2.0 breitet sich rasant aus und legt sensible Entwicklerzugänge offen. Check Point Software Technologies warnt vor einer der schwerwiegendsten Supply-Chain-Kompromittierungen seit Log4j. Dazu haben die Sicherheitsforscher von Check Point eine Analyse zur technischen Vorgehensweise von Shai-Hulud 2 veröffentlicht. Die Shai-Hulud-2.0-Kampagne ist einer der umfangreichsten und schnellsten Npm-Supply-Chain-Angriffe, die in den letzten Jahren beobachtet wurden.…
-
Shai-Hulud 2.0: Wie sich ein Supply-Chain-Wurm weiterentwickelt
Die zweite Welle der Shai-Hulud-Kampagne zeigt, wie sich Angriffe auf die Software-Supply-Chain zu automatisierten, hartnäckigen und hochentwickelten Operationen entwickeln. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/shai-hulud-2-0-wie-sich-ein-supply-chain-wurm-weiterentwickelt/a42977/
-
»manage it« TechTalk: Unveränderliche Speicherkomponenten sind eine wichtige Maßnahme gegen Ransomware-Attacken
Auf dem Security-Event it-sa 2025 kam das Videogespräch mit dem Sicherheitsanbieter Object First leider nicht zustande, das wir dann aber in den Räumen seiner PR-Agentur nachholen durften. Dort haben wir mit dem Director Sales Central EMEA, Florian Kopp, über das Thema Ransomware geredet. Konkret wollten wir wissen, welche Antworten Object First auf die damit einher…
-
Wie Angreifer das npm-Ökosystem infiltrierten
Die Sicherheitsforscher von Check Point Software Technologies haben seine Analyse zur technischen Vorgehensweise von Shai-Hulud 2 veröffentlicht. Die Shai-Hulud 2.0-Kampagne ist einer der umfangreichsten und schnellsten npm-Supply-Chain-Angriffe, die in den letzten Jahren beobachtet wurden. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/angreifer-npm-oekosystem
-
At least 35,000 impacted by Dartmouth College breach through Oracle EBS campaign
More than 35,000 people across multiple states had information stolen by hackers who attacked Dartmouth College during a campaign against a popular line of software from Oracle. First seen on therecord.media Jump to article: therecord.media/dartmouth-data-breach-thousands
-
Dell ControlVault, Lasso, GL.iNet vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed five vulnerabilities in Dell ControlVault 3 firmware and its associated Windows software, four vulnerabilities in Entr'ouvert Lasso, and one vulnerability in GL.iNet Slate AX.The vulnerabilities mentioned in this blog post have been patched by their respective First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/dell-controlvault-lasso-gl-inet-vulnerabilities/
-
How CTEM Helps Cyber Teams to Become More Proactive
How CTEM Helps Cyber Teams to Become More Proactive Software, infrastructure, and third-party services change far faster than quarterly audit cycles, which increases the risk of data and infrastructure exposure. In the UK, just over four in ten businesses and three in ten charities identified a cyber breach or attack in the last 12 months…
-
How CTEM Helps Cyber Teams to Become More Proactive
How CTEM Helps Cyber Teams to Become More Proactive Software, infrastructure, and third-party services change far faster than quarterly audit cycles, which increases the risk of data and infrastructure exposure. In the UK, just over four in ten businesses and three in ten charities identified a cyber breach or attack in the last 12 months…
-
UK Report Proposes Liability For Software Provider Insecurity
A new report from the UK Business and Trade Committee has called for accountability of software providers for cyber flaws amid rising attack costs First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-liability-software-providers/
-
Hackers exploit 3D design software to target game developers, animators
Russia-linked hackers are exploiting 3D design tools to infect animators, game developers and visual effects studios with information-stealing malware, according to new research. First seen on therecord.media Jump to article: therecord.media/hackers-blender-software-malware
-
Hackers exploit 3D design software to target game developers, animators
Russia-linked hackers are exploiting 3D design tools to infect animators, game developers and visual effects studios with information-stealing malware, according to new research. First seen on therecord.media Jump to article: therecord.media/hackers-blender-software-malware
-
ToddyCat APT evolves to target Outlook archives and Microsoft 365 tokens
Outlook in the Crosshairs: Another evolution involves accessing actual mail data. ToddyCat deployed a tool named TCSectorCopya C++ utility that opens the disk as a read-only device and copies Outlook’s offline storage files (OST) sector by sector, bypassing any file-lock mechanisms that Outlook may enforce.Once OST files are extracted, they are fed into XstReader, an…
-
ToddyCat APT evolves to target Outlook archives and Microsoft 365 tokens
Outlook in the Crosshairs: Another evolution involves accessing actual mail data. ToddyCat deployed a tool named TCSectorCopya C++ utility that opens the disk as a read-only device and copies Outlook’s offline storage files (OST) sector by sector, bypassing any file-lock mechanisms that Outlook may enforce.Once OST files are extracted, they are fed into XstReader, an…
-
Check Point deckt Adware-Kampagne ‘GhostAd” in Google-Play auf
Die Sicherheitsforscher von Check Point Software Technologies haben kürzlich eine Adware-Kampagne im App-Store Google-Play aufgedeckt. Als Cleanup- und Emoji-Apps getarnt, trieben über 15 Applikationen dort ihr Unwesen und belasteten sowohl die Batterie als auch das Datenvolumen der Handys. Nach der Installation starteten sie dauerhafte Werbeschleifen im Hintergrund, die sich nicht beenden ließen und sogar nach…
-
Unifying Cloud Strategy to Unlock AI Potential
Talcott Financial Group’s Dalavi on Oracle to Azure Migration and AI Innovation. Talcott Financial Group’s move from a dual-cloud setup to a unified Azure environment is reshaping performance, efficiency and AI readiness, says Sudhakar Dalavi, head of software engineering. He explains how data unification and continuous learning drive the next phase of innovation. First seen…
-
The Cyber Resilience Act and SaaS: Why Compliance is Only Half the Battle
The EU’s Cyber Resilience Act is reshaping global software security expectations, especially for SaaS, where shared responsibility, lifecycle security and strong identity protections are essential as attackers increasingly “log in” instead of breaking in. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/the-cyber-resilience-act-and-saas-why-compliance-is-only-half-the-battle/
-
Securing AI-Generated Code in Enterprise Applications: The New Frontier for AppSec Teams
AI-generated code is reshaping software development and introducing new security risks. Organizations must strengthen governance, expand testing and train developers to ensure AI-assisted coding remains secure and compliant. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/securing-ai-generated-code-in-enterprise-applications-the-new-frontier-for-appsec-teams/
-
Alliances between ransomware groups tied to recent surge in cybercrime
Tags: access, attack, awareness, backup, business, cloud, cybercrime, cybersecurity, data, encryption, exploit, extortion, group, healthcare, incident response, intelligence, law, leak, monitoring, ransom, ransomware, saas, service, software, tactics, theft, threat, vpn, vulnerability, zero-dayRansomware groups change tactics to evade law enforcement: The latest quarterly study from Rapid7 also found that newly forged alliances are leading to a spike in ransomware activity while adding that tactical innovations, from refined extortion to double extortion and use of zero day, are also playing a part in increased malfeasance.The quarter also saw…
-
Securing AI-Generated Code in Enterprise Applications: The New Frontier for AppSec Teams
AI-generated code is reshaping software development and introducing new security risks. Organizations must strengthen governance, expand testing and train developers to ensure AI-assisted coding remains secure and compliant. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/securing-ai-generated-code-in-enterprise-applications-the-new-frontier-for-appsec-teams/
-
Adware-Kampagne ‘GhostAd” im Google Play Store
Check Point Software hat eine umfangreiche Adware-Kampagne im Google Play Store entdeckt. Unter dem Tarnmantel von Cleanup- und Emoji-Apps verbreiteten mehr als 15 Anwendungen die Adware ‘GhostAd”. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ghostad-google-play-store
-
Adware-Kampagne ‘GhostAd” im Google Play Store
Check Point Software hat eine umfangreiche Adware-Kampagne im Google Play Store entdeckt. Unter dem Tarnmantel von Cleanup- und Emoji-Apps verbreiteten mehr als 15 Anwendungen die Adware ‘GhostAd”. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ghostad-google-play-store
-
Understanding the Security of Passkeys
Explore the security of passkeys: how they work, their advantages over passwords, potential risks, and best practices for secure implementation in software development. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/understanding-the-security-of-passkeys/
-
Understanding the Security of Passkeys
Explore the security of passkeys: how they work, their advantages over passwords, potential risks, and best practices for secure implementation in software development. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/understanding-the-security-of-passkeys/
-
MySQL 8.0 fällt am 30. April 2026 aus dem Support
Baut sich ein weiteres Software-Problem in der IT-Landschaft auf? Das Open Source-Datenbanksystem MySQL ist sehr populär und breit im Einsatz. Aber MySQL 8.0 fällt am 30. April 2026 aus dem Support. Andererseits sieht es so aus, dass weniger als einem … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/11/26/mysql-8-0-faellt-am-30-april-2026-aus-dem-support/

