Category Archives: Security

Thunderbird 102.3.1 released

[German]The developers of Thunderbird have released another update of the email client to version 102.3.1 on September 28, 2022. It is a bug-fix update, which should fix a number of problems and vulnerabilities.

Posted in Security, Software, Update | Tagged | Leave a comment

Barracuda Networks: Spam filter/virus scan blocks mails globally (September 29, 2022)

[German]Brief notification for administrators who use a mail protection / security solution from Barracuda Networks in an enterprise environment. Since tonight (September 29, 2022) there seems to be a problem that emails get stuck in their spam filters (Email Security … Continue reading

Posted in issue, Security, Software | Tagged , , | 10 Comments

Chrome 106.0.5249.61/62 released

[German]Google has released the update of Google Chrome 106.0.5249.61 for Mac/Linux and Chrome 106.0.5249.61/62 for Windows on September 28, 2022. It is a new development branch, with the update fixing 20 vulnerabilities.

Posted in browser, Linux, macOS, Security, Update, Windows | Tagged | 1 Comment

Malware trend August 2022: Emotet no more #1

[German]CheckPoint has released its Global Threat Index for August 2022, a top list of malware infections. Surprisingly for me, the previously frequently mentioned Emotet ransomware has been displaced from the top spot it held in previous months. Now, a malware … Continue reading

Posted in Security | Tagged | Leave a comment

HP printers: Critical vulnerability (Sept. 2022)

[German]HP has published a warning about a buffer overflow vulnerability in the firmware of various printer models (Inkjet, Laserjet Pro and HP PageWide Pro printers) on September 21, 2022. One vulnerability even potentially allows remote code execution (RCE). Firmware updates … Continue reading

Posted in devices, Security | Tagged , | 1 Comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Sophos XG Firewall: RCE vulnerability (CVE-2022-3236)

[German]Vendor Sophos warns about a remote code execution vulnerability in its firewall. There is a code injection vulnerability in the Sophos XG Firewall user portal and web admin (UTM products not affected). This vulnerability is already being exploited in a … Continue reading

Posted in Security, Software | Tagged , | Leave a comment

WhatsApp: Two vulnerabilities allow remote code execution

[German]Meta subsidiary WhatsApp warns about two vulnerabilities in its apps for Android and iOS that put users' security at risk. Both vulnerabilities allow remote code execution – so the apps should be updated promptly.

Posted in Security, Software | Tagged , | Leave a comment

Windows 11 strengthens SMB traffic protection

[German]Microsoft is starting to improve protection for the SMB protocol in Windows 11. Thus, Microsoft has introduced a delay between SMB authentications in Windows 11 (in Insider Previews). This is intended to prevent spying on SMB traffic. There is also … Continue reading

Posted in Security, Windows | Tagged , | Leave a comment

17 year old arrested in England for Uber hack, member of Lapsus$ group?

[German]In the last few days, I reported on various hacks at the ride service provider Uber, at Rockstar Games, and so on. A hacker with the alias Tea Pot claims to be only 18 years old and to have penetrated … Continue reading

Posted in Security | Tagged | Leave a comment

How to find weak passwords in Active Directory and eliminate them with PowerShell

Advertising – Weak or compromised passwords are a known gateway for attackers. If you are able to identify which users in Active Directory (AD) are threatened by this, then PowerShell can help to remedy it. However, PowerShell scripts cannot eliminate … Continue reading

Posted in Security, Software | Tagged , , | Leave a comment