Tag: software
-
AWS Client VPN for Windows Vulnerability Could Allow Privilege Escalation
Amazon Web Services has disclosed a critical security vulnerability in its Client VPN software for Windows that could allow non-administrative users to escalate their privileges to root-level access during the installation process. The vulnerability, tracked as CVE-2025-8069, affects multiple versions of the AWS Client VPN client and has been addressed in the latest software update.…
-
Verfassungsbeschwerde gegen Palantir-Einsatz in Bayern eingelegt
Die Gesellschaft für Freiheitsrechte (GFF) hat am 23. Juli 2025 mit Unterstützung vom Chaos Computer Club (CCC) Verfassungsbeschwerde gegen den Palantir-Einsatz in Bayern eingelegt. Worum geht es? Palantir Technologies Inc. ist ein US-amerikanischer Anbieter von Software und Dienstleistungen, der auf … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/07/24/verfassungsbeschwerde-gegen-palantir-einsatz-in-bayern-eingelegt/
-
Exchange 2016/2019 und Skype 2015/2019 bekommen 6 Monate ESU
Kurzer Nachtrag, der für Administratoren von Microsoft Exchange Server 2016/2019 sowie Microsoft Skye for Business 2015 bzw. 2019 interessant sein kann. Diese Software-Varianten sollten eigentlich zum 14. Oktober 2025 aus dem Support fallen. Wer noch nicht auf neuere Versionen umgestiegen … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/07/24/exchange-2016-2019-und-skype-2015-2019-bekommen-6-monate-esu/
-
Brave blocks Windows Recall from screenshotting your browsing activity
Brave Software says its privacy-focused browser will block Microsoft’s Windows Recall from capturing screenshots of Brave windows by default to protect users’ privacy. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/brave-blocks-windows-recall-from-screenshotting-your-browsing-activity/
-
How to harden your Active Directory against Kerberoasting
Kerberoasting gives attackers offline paths to crack service account password, without triggering alerts. Learn from Specops Software how to protect your Active Directory with stronger SPN password policies and reduced attack surfaces. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/how-to-harden-your-active-directory-against-kerberoasting/
-
CISA warns of hackers exploiting SysAid vulnerabilities in attacks
CISA has warned that attackers are actively exploiting two security vulnerabilities in the SysAid IT service management (ITSM) software to hijack administrator accounts. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-sysaid-vulnerabilities-in-attacks/
-
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages
Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks.”As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers,” Matthew Suozzo, Google Open Source…
-
CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF
Tags: access, attack, cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, software, vulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.The vulnerabilities in question are listed below -CVE-2025-2775 (CVSS score: 9.3) – An improper restriction of XML external entity (XXE) reference vulnerability in the First seen…
-
Hacker aus China nutzen neue Sharepoint-Lücke aus
Microsoft hat drei chinesische Hackergruppen identifiziert, die für die Angriffe über die Sicherheitslücke in SharePoint verantwortlich sein sollen.Bei den aktuellen Cyberattacken auf zahlreiche Unternehmen und Behörden führt die Spur Microsoft zufolge nach China. Unter den Angreifern seien bisher drei chinesische Hackergruppen identifiziert worden, teilte der Software-Konzern mit. Zwei davon seien für Aktionen im staatlichen Auftrag…
-
Cisco network access security platform vulnerabilities under active exploitation
The software defects, which have a maximum-severity rating, do not require authentication and allow remote attackers to execute code arbitrarily on the underlying system. First seen on cyberscoop.com Jump to article: cyberscoop.com/cisco-identity-services-engines-active-exploits/
-
CrushFTP zero-day actively exploited at least since July 18
Hackers exploit CrushFTP zero-day, tracked as CVE-2025-54309, to gain admin access via HTTPS when DMZ proxy is off. Threat actors are exploiting a zero-day vulnerability, tracked as CVE-2025-54309 (CVSS score of 9.0), in the managed file transfer software CrushFTP to gain administrative privileges on vulnerable servers via HTTPS. CrushFTP warned of a zero-day that has…
-
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access
Tags: access, cybersecurity, exploit, government, hacker, microsoft, software, vulnerability, zero-dayThe recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation as early as July 7, 2025, according to findings from Check Point Research.The cybersecurity company said it observed first exploitation attempts targeting an unnamed major Western government, with the activity intensifying on July 18 and 19, spanning government, telecommunications, and software First seen on…
-
Jonathan Zanger Named CTO at Check Point to Boost AI Cybersecurity
Check Point Software has appointed Jonathan Zanger as its new Chief Technology Officer, tasking the former Trigo executive with driving the company’s global cybersecurity and AI strategy. Zanger brings over 15 years of experience building and scaling AI-powered cybersecurity platforms. At Trigo, he served as CTO, leading the development of advanced AI and computer vision…
-
File Transfer Flaw Blamed in Health Breach Affecting 233,000
Cierant Corp. Says Cleo MFT Zero-Day Exploit Compromised Health Plan Client Data. A Connecticut-based firm that provides print and electronic document management services to health plans has reported to regulators that an exploit of a vulnerability in file transfer software from third-party vendor Cleo has resulted in a health data compromise affecting nearly 233,000 people.…
-
Hackers Target Zero-Day Vulnerability to Exploit CrushFTP
Attackers Modify File-Transfer Server Software to Display Patched Version Number. Managed file-transfer software developer CrushFTP said a zero-day vulnerability in its tool’s web interface is being actively exploited to gain admin-level access to servers. The company urged immediate updating, saying all versions of its software released since July 1 are patched. First seen on govinfosecurity.com…
-
Attackers Can Exploit Lighthouse Studio RCE Bug to Gain Server Access
Researchers at Assetnote have uncovered a critical remote code execution (RCE) vulnerability in Lighthouse Studio, a widely used survey software developed by Sawtooth Software. This flaw, affecting the Perl CGI scripts that power the web-based survey component, enables unauthenticated attackers to execute arbitrary code on hosting servers simply by accessing a survey link. Vulnerability in…
-
Check Point ernennt Jonathan Zanger zum Chief Technology Officer
Check Point Software Technologies gibt die Ernennung von Jonathan Zanger zum Chief Technology Officer (CTO) bekannt. Zanger wird die globale Cybersicherheits- und KI-Strategie sowie die KI-Zentren von Check Point leiten. Er wird auch die strategische Entwicklung von KI-Innovationen gestalten. Jonathan Zanger verfügt über mehr als 15 Jahre Erfahrung im Aufbau und in der Skalierung von…
-
6 Mythen über Low-Code entlarvt
Tags: softwareDie Low-Code-Anwendungsentwicklung ist weit mehr als eine Spielwiese für Fachbereiche: Sie verändert strukturell, wie Unternehmen Software entwickeln, betreiben und weiterdenken und erhöht ihre Innovationskraft. Laut einer Mendix-Studie setzen 98 Prozent der 2.000 befragten IT-Entscheider Low-Code bereits im Rahmen ihrer Entwicklung ein. Trotz der großen Beliebtheit dieser Technologie halten sich einige Mythen hartnäckig. Sie verhindern eine…
-
Hacker greifen über Microsoft-Lücke an
Über eine Sicherheitslücke in SharePoint haben Hacker zahlreiche Behörden und Unternehmen angegriffen. IT-Sicherheitsexperten schlagen Alarm, weil Behörden und Unternehmen über eine neu entdeckte Schwachstelle in Software von Microsoft angegriffen werden. Betroffen sind demnach lokale Server für das Programm SharePoint zum Teilen von Dateien. Über die Schwachstelle seien Angreifer bereits in Systeme “Dutzender” Organisationen eingedrungen, sowohl in…
-
Is AI here to take or redefine your cybersecurity role?
Tags: ai, attack, automation, business, ceo, cloud, compliance, conference, control, crowdstrike, cyber, cybersecurity, data, governance, intelligence, jobs, monitoring, phishing, risk, skills, soc, software, strategy, technology, threat, training, vulnerability“AI is coming, and will take some jobs, but no need to worry.”That headline ran atop a CSO story published in 2016. Nine years later, the prediction feels closer to coming true, with questions around jobs being replaced or redefined and whether cybersecurity pros should be worried taking on greater nuance, and still hanging in…
-
7-Zip Vulnerability Lets Malicious RAR5 Files Crash Systems
A critical denial-of-service vulnerability has been discovered in 7-Zip that allows attackers to crash systems using specially crafted RAR5 archive files. The vulnerability, tracked as CVE-2025-53816, affects the popular compression software’s RAR5 decoder and can lead to memory corruption and system crashes when processing malicious archives. Technical Details of the Vulnerability Security researcher Jaroslav LobaÄevski…
-
Lokale Admin-Konten: Die Schwachstelle im Verborgenen
Eine neue Analyse von Specops Software offenbart kritische Sicherheitslücken in Unternehmensnetzwerken. Vor allem lokale Admin-Konten geraten zunehmend ins Visier von Angreifern und das oft völlig unbemerkt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/lokale-admin-konten
-
Microsoft beendet die Cloud-Wartung des US-Verteidigungsministeriums durch chinesische Software-Ingenieure
Das ging irgendwie schnell, nachdem Microsoft quasi “mit dem Finger im Honigtopf” erwischt wurde. Eine Woche nach der Meldung von ProPublica sagt Microsoft dass man keinen Ingenieure mehr in China einsetzt, um die Cloud-Systeme des US-Verteidigungsministeriums (DoD) zu warten. Rückblick: … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/07/19/microsoft-beendet-die-cloud-wartung-des-us-verteidigungsministeriums-durch-chinesische-software-ingenieure/
-
Summer Vacation Alert Surfaces More Than 5 Million Unsecured Wi-Fi Networks
Zimperium, a provider of mobile security software, this week published a report that notes more than 5 million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025 First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/summer-vacation-alert-surfaces-more-than-5-million-unsecured-wifi-networks/
-
Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution
Sophos has disclosed three critical security vulnerabilities in its Intercept X for Windows endpoint security solution that could allow attackers to execute arbitrary code and gain system-level privileges on affected systems. The vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, all carry high severity ratings and affect different components of the security software including the updater, Device…
-
Firmware Vulnerabilities Continue to Plague Supply Chain
Four flaws in the basic software for Gigabyte motherboards could allow persistent implants, underscoring problems in the ways firmware is developed and updated. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/firmware-vulnerabilities-plague-supply-chain
-
Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices
Google on Thursday revealed it’s pursuing legal action in New York federal court against 25 unnamed individuals or entities in China for allegedly operating BADBOX 2.0 botnet and residential proxy infrastructure.”The BADBOX 2.0 botnet compromised over 10 million uncertified devices running Android’s open-source software (Android Open Source Project), which lacks Google’s security protections,” First seen…

