Tag: windows
-
Security-Insider Podcast Folge 105, Teil 1 – Das Support-Ende von Windows 10 aus Sicht eines Systemhauses
Tags: windowsFirst seen on security-insider.de Jump to article: www.security-insider.de/windows-10-umstieg-windows-11-systemhaus-podcast-a-fc58cdada62657d13ede1f8f6e4870b4/
-
Security-Insider Podcast Folge 105, Teil 1 – Das Support-Ende von Windows 10 aus Sicht eines Systemhauses
Tags: windowsFirst seen on security-insider.de Jump to article: www.security-insider.de/windows-10-umstieg-windows-11-systemhaus-podcast-a-fc58cdada62657d13ede1f8f6e4870b4/
-
(g+) Windows-Netzwerke sichern – Teil 1: Active-Directory-Berechtigungen – was für Admins …
Tags: windowsWie sichere ich ein Windows-Firmennetzwerk ab? In unserer Reihe erhalten Admins Antworten auf diese Frage – beginnend mit AD-Berechtigungen. First seen on golem.de Jump to article: www.golem.de/news/windows-netzwerke-sichern-teil-1-active-directory-berechtigungen-was-fuer-admins-wichtig-ist-2510-201038.html
-
(g+) Windows-Netzwerke sichern – Teil 1: Active-Directory-Berechtigungen – was für Admins …
Tags: windowsWie sichere ich ein Windows-Firmennetzwerk ab? In unserer Reihe erhalten Admins Antworten auf diese Frage – beginnend mit AD-Berechtigungen. First seen on golem.de Jump to article: www.golem.de/news/windows-netzwerke-sichern-teil-1-active-directory-berechtigungen-was-fuer-admins-wichtig-ist-2510-201038.html
-
Windows 11 23H2 fällt am 11. November 2025 aus dem Support
Microsoft hat erneut daran erinnert, dass die Versionen Home und Professional von Windows 11 23H2, die nur 24 Monate Support erhalten, ihr End of Life (EOL) im November 2025 erreichen. Nach dem 11. November 2025 erhalten diese Windows 11-Versionen weder … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/12/windows-11-23h2-faellt-am-11-november-2025-aus-dem-support/
-
New Stealit Malware Exploits Node.js Extensions to Target Windows Systems
Security researchers have identified a new, active campaign of the Stealit malware that uses an experimental Node.js feature to infect Windows systems. According to a report from FortiGuard Labs, threat actors are leveraging Node.js’s Single Executable Application (SEA) functionality to package and distribute their malicious payloads. This updated tactic marks a shift from previous Stealit…
-
Windows 11 gets a fresh Start in latest Canary build
Meanwhile, Microsoft resurrects Edit and kills .NET 3.5 SP1 on demand First seen on theregister.com Jump to article: www.theregister.com/2025/10/09/windows_11_canary_build/
-
Windows 11 23H2 Home and Pro reach end of support in 30 days
Microsoft has reminded customers again today that systems running Home and Pro editions of Windows 11 23H2 will stop receiving security updates next month. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/windows-11-23h2-home-and-pro-reach-end-of-support-in-30-days/
-
Stealit Malware Using Node.js to Hide in Fake Game and VPN Installers
Fortinet warns of Stealit, a MaaS infostealer, now targeting Windows systems and evading detection by using Node.js’s SEA feature while hiding in fake game and VPN installers. First seen on hackread.com Jump to article: hackread.com/stealit-malware-node-js-fake-game-vpn-installers/
-
Copilot on Windows can now connect to email, create Office docs
Microsoft has upgraded its AI-powered Copilot digital assistant to connect to email accounts and generate Office documents from prompt outputs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/copilot-on-windows-can-now-connect-to-email-create-office-docs/
-
Copilot on Windows can now connect to email, create Office docs
Microsoft has upgraded its AI-powered Copilot digital assistant to connect to email accounts and generate Office documents from prompt outputs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/copilot-on-windows-can-now-connect-to-email-create-office-docs/
-
Copilot on Windows can now connect to email, create Office docs
Microsoft has upgraded its AI-powered Copilot digital assistant to connect to email accounts and generate Office documents from prompt outputs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/copilot-on-windows-can-now-connect-to-email-create-office-docs/
-
Open-source DFIR Velociraptor was abused in expanding ransomware efforts
Attribution and the ransomware cocktail: Talos links the campaign to Storm-2603, a suspected China-based threat actor, citing matching TTPs like the use of ‘cmd.exe’, disabling Defender protections, creating scheduled tasks, and manipulating Group Policy Objects. The use of multiple ransomware strains in a single operation Warlock, LockBit, and Babuk also bolstered confidence in this attribution.”Talos…
-
Open-source DFIR Velociraptor was abused in expanding ransomware efforts
Attribution and the ransomware cocktail: Talos links the campaign to Storm-2603, a suspected China-based threat actor, citing matching TTPs like the use of ‘cmd.exe’, disabling Defender protections, creating scheduled tasks, and manipulating Group Policy Objects. The use of multiple ransomware strains in a single operation Warlock, LockBit, and Babuk also bolstered confidence in this attribution.”Talos…
-
Droht ein neues WannaCry-Desaster? – Digitaler Weckruf: Sicherheitslücke Windows 10
First seen on security-insider.de Jump to article: www.security-insider.de/digitaler-weckruf-sicherheitsluecke-windows-10-a-cb6776e8b2503219e89f4008b59253c0/
-
Droht ein neues WannaCry-Desaster? – Digitaler Weckruf: Sicherheitslücke Windows 10
First seen on security-insider.de Jump to article: www.security-insider.de/digitaler-weckruf-sicherheitsluecke-windows-10-a-cb6776e8b2503219e89f4008b59253c0/
-
October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after nearly a decade of service. Not far … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/10/october-2025-patch-tuesday-forecast/
-
October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after nearly a decade of service. Not far … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/10/october-2025-patch-tuesday-forecast/
-
October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after nearly a decade of service. Not far … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/10/october-2025-patch-tuesday-forecast/
-
Windows Backup now available for enterprise users
Microsoft announced this week the general availability of Windows Backup for Organizations, a new enterprise-grade backup tool that helps simplify backups and makes the transition to Windows 11 easier. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-windows-backup-now-available-for-enterprise-users/
-
New Chaos-C++ Ransomware Targets Windows by Wiping Data, Stealing Crypto
FortiGuard Labs reveals Chaos-C++, a new Chaos ransomware variant that deletes files over 1.3 GB instead of encrypting them and uses clipboard hijacking to steal cryptocurrency. First seen on hackread.com Jump to article: hackread.com/chaos-c-ransomware-windows-data-crypto/
-
High Number of Windows 10 Users Remain as EndLife Looms
A new report from TeamViewer found that 40% of global endpoints still run Windows 10, just days before security updates and support ends for the operating system First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/windows-10-users-end-of-life/
-
Forscher knackt ChatGPT-Schutzmechanismen und erhält echte Windows-Schlüssel
First seen on t3n.de Jump to article: t3n.de/news/chatgpt-windows-keys-sicherheitsluecke-1696521/
-
High Number of Windows 10 Users Remain as EndLife Looms
A new report from TeamViewer found that 40% of global endpoints still run Windows 10, just days before security updates and support ends for the operating system First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/windows-10-users-end-of-life/
-
Exposure Management Beyond The Endpoint
Tags: advisory, ai, api, attack, breach, business, cisa, cloud, compliance, cve, cyber, cybersecurity, data, detection, edr, endpoint, exploit, identity, infrastructure, intelligence, kev, mssp, risk, service, technology, threat, tool, vulnerability, vulnerability-management, windowsRelying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does. Key takeaways: Long remediation cycles and difficulty prioritizing risk are significant challenges for security teams. Exposure management capabilities bolted onto existing security tools result in dashboard fatigue and…
-
Exposure Management Beyond The Endpoint
Tags: advisory, ai, api, attack, breach, business, cisa, cloud, compliance, cve, cyber, cybersecurity, data, detection, edr, endpoint, exploit, identity, infrastructure, intelligence, kev, mssp, risk, service, technology, threat, tool, vulnerability, vulnerability-management, windowsRelying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does. Key takeaways: Long remediation cycles and difficulty prioritizing risk are significant challenges for security teams. Exposure management capabilities bolted onto existing security tools result in dashboard fatigue and…
-
Exposure Management Beyond The Endpoint
Tags: advisory, ai, api, attack, breach, business, cisa, cloud, compliance, cve, cyber, cybersecurity, data, detection, edr, endpoint, exploit, identity, infrastructure, intelligence, kev, mssp, risk, service, technology, threat, tool, vulnerability, vulnerability-management, windowsRelying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does. Key takeaways: Long remediation cycles and difficulty prioritizing risk are significant challenges for security teams. Exposure management capabilities bolted onto existing security tools result in dashboard fatigue and…
-
Sicherheitsupdate für Falcon Sensor for Windows (CVE-2025-42701, CVE-2025-42706)
Es gibt in den CrowdStrike Falcon Sensoren for Windows zwei Schwachstelle mit mittlerem Score, die durch den Hersteller per Update gepatcht wurden. Momentan entbrennt eine Diskussion, weil CrowdStrike das als “Issue” bezeichnet, während Sicherheitsforscher das Ganze als “Schließen von Sicherheitslücken” … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/09/crowdstrike-sicherheitsupdate-fuer-falcon-sensor-for-windows-cve-2025-42701-cve-2025-42706/
-
Sicherheitsupdate für Falcon Sensor for Windows (CVE-2025-42701, CVE-2025-42706)
Es gibt in den CrowdStrike Falcon Sensoren for Windows zwei Schwachstelle mit mittlerem Score, die durch den Hersteller per Update gepatcht wurden. Momentan entbrennt eine Diskussion, weil CrowdStrike das als “Issue” bezeichnet, während Sicherheitsforscher das Ganze als “Schließen von Sicherheitslücken” … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/09/crowdstrike-sicherheitsupdate-fuer-falcon-sensor-for-windows-cve-2025-42701-cve-2025-42706/
-
CrowdStrike Falcon Windows Sensor Flaw Could Let Attackers Execute Code and Delete Files
CrowdStrike has disclosed two critical vulnerabilities affecting its Falcon sensor for Windows that could enable attackers to delete arbitrary files and potentially compromise system stability. The cybersecurity company released patches for both security flaws in its latest sensor version 7.29, along with hotfixes for earlier versions. Security Vulnerabilities Enable File Deletion Attacks The vulnerabilities, identified…

