Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)
Category Archives: Security
UEFI firmware bug compromises over 70 Lenovo notebooks (July 2022)
[German]Note for blog readers who use Lenovo (and IBM) notebooks. Security researchers from ESET have found serious vulnerabilities in the UEFI firmware of Lenovo notebooks that allow the operating system to be hijacked in the early boot phase. Lenovo has … Continue reading
Patchday: Microsoft Office Updates (July 12, 2022)
[German]On July 12, 2022 (second Tuesday of the month, Microsoft Patchday), Microsoft released several security-related updates for still-supported Microsoft Office versions and other products. Here is an overview of the available updates.
Windows 7/Server 2008R2; Windows 8.1/Server 2012R2: Updates (July 12 2022)
[German]Microsoft has also released security updates for Windows 7 and 8.1 as well as for the Windows Server counterparts 2008 R2 and 2012/R2 on Patchday. Here is an overview of these updates for Windows 7/8.1 and the corresponding Windows Server … Continue reading
Posted in Security, Update, Windows
Tagged Patchday 7.2022, Security, Windows 7, Windows 8.1, Windows Server
2 Comments
Patchday: Windows 11/Server 2022-Updates (July 12, 2022)
[German]On July 12 (second Tuesday of the month, Patchday at Microsoft), Microsoft also released a cumulative update for Windows 11, which will be released on October 5, 2021. The update is supposed to fix various problems. In addition, Windows Server … Continue reading
Posted in Security, Update, Windows
Tagged Patchday 7.2022, Security, Update, Windows 11, Windows Server 2022
1 Comment
Patchday: Windows 10-Updates (July 12 2022)
[German]On July 12, 2022 (second Tuesday of the month, Patchday at Microsoft), several cumulative updates were released for the supported Windows 10 builds (from RTM version to the current version). Here are some details about each security update.
Posted in Security, Update, Windows
Tagged Patchday 7.2022, Security, Update, Windows 10
Leave a comment
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Microsoft Security Update Summary (July 12, 2022)
[German]On July 12, 2022, Microsoft released security updates for Windows clients and servers, for Office, etc. – as well as for other products – were released. The security updates also eliminate 84 vulnerabilities, including one 0-day. Below is a compact … Continue reading
Posted in Office, Security, Update, Windows
Tagged Office, Patchday 7.2022, Security, Update, Windows
Leave a comment
Defense: Windows task scheduling as an attack vector
[German]Attackers use Windows task scheduling as a technique and create tasks (scheduled tasks) there to infiltrate a victim's machine. The Qualys research team has investigated a number of ways attackers can hide such scheduled tasks. This paper describes three new … Continue reading
QNAP warns of Checkmate ransomware attacks on its NAS (July 2022)
[German]Taiwanese manufacturer QNAP has issued a warning as of July 7, 2022 that a new Checkmate ransomware attacks its NAS units via SMB services accessible via the Internet. Presumably, weak passwords will then have their credentials cracked via brute-force attack … Continue reading
Microsoft does not want to block macros in Office by default after all
[German]Macros in Office are a gateway for malware like Dridex, Emotet, Trickbot, Qbot, etc. Microsoft had plans to disable macros in Office 365 by default. Now this idea seems to have been scrapped again, macros will not be blocked by … Continue reading
Ransomware group ALPHV (Blackcat) with new extortion techniques (searchable database)
[German]The ransomware group ALPHV (also known as Blackcat) seems to be breaking new ground in extortion techniques. In the past, victims have already been threatened with the publication of captured data in order to get them to pay a ransom. … Continue reading


