Category Archives: Security

Operations Endgame, DanaBot-Net and Raptor disrupt infrastructure for ransomware attacks and more

[German]Law enforcement officers seized 300 servers and 650 domains used for ransomware attacks this week in Operation Endgame. As a result, cybercriminal networks were dismantled, funds confiscated and some suspects arrested. Further actions against cybercriminals were carried out with the … Continue reading

Posted in Security | Tagged | Leave a comment

BadSuccessor: Abusing dMSA to elevate privileges in Active Directory

[German]Delegated Managed Service Accounts (dMSAs) have been introduced in Windows Server 2025. These are service accounts for the Active Directory (AD) that are intended to enable new functions. Security researchers have now discovered that by misusing dMSAs, attackers can take … Continue reading

Posted in Security, Windows | Tagged , , | Leave a comment

Law enforcement officials seized Lumma Stealer infrastructure (May 2025)

[German]Law enforcement officials seize Lumma Stealer infrastructure (May 2025)In a coordinated operation, US law enforcement officials have seized the infrastructure (C & C servers) of the Lumma infostealer and paralyzed its function. The malware is responsible for numerous cyberattacks on … Continue reading

Posted in Security | Tagged | Leave a comment

Volkswagen hack via OTP bypass; access to personal vehicle data

[German]A frustrated buyer of a used VW vehicle was unable to register for Connected Car because the data was sent to the previous owner. So he took a closer look and was able to determine the server access data through … Continue reading

Posted in Cloud, Security, Software | Tagged , , , | Leave a comment

Windows 10/11: Defender can be deactivated with a simple tool (Defendnot)

[German]Microsoft has built an interface (API) into Windows 10 and Windows 11 that allows manufacturers of antivirus software to disable Microsoft Defender when they install it. Some people (including a blog reader) have now shown how to deactivate Windows Defender … Continue reading

Posted in issue, Security, Software, Windows | Tagged , , , | 2 Comments

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Windows: Bitlocker encryption via Bitpixie (CVE-2023-21563) leveraged

[German] The Bitlocker encryption used by Microsoft for Windows for data storage devices can be bypassed by software via the Bitpixie vulnerability (CVE-2023-21563) if certain boundary conditions apply. A security researcher has shown how the master key can be read … Continue reading

Posted in Security, Windows | Tagged , , | Leave a comment

Microsoft confirms Bitlocker boot problems after Windows 10/11 May 2025 update

[German]Update KB5058379 for Windows 10 22H2 from May 13, 2025 causes the operating system to request the Bitlocker recovery key on boot and hang on some systems. Windows 11 also appears to be affected. Microsoft has now confirmed the bug … Continue reading

Posted in issue, Security, Update, Windows | Tagged , , , | 9 Comments

Out-of-band updates for Windows 11 24H2 LTSC and Windows Server 2008/R2 (May 2025)

[German]A small addendum for administrators of Windows Server 2008/R2. There were out-of-band updates for these operating system versions on May 13, 2025 to close security gaps. And for Windows 11 24H2 Enterprise LTSC, Microsoft has probably also released a special … Continue reading

Posted in General, Security, Update, Windows | Tagged , , | Leave a comment

Proofpoint acquires German e-mail security provider Hornetsecurity

[German]On May 15, 2025, the security company Proofpoint announced its intention to acquire the German provider Hornetsecurity GmbH. The company is active in the field of email security and SPAM protection for domains.

Posted in Security, Software | Tagged , | Leave a comment

Belgian court: The TCF framework is not GDPR-compliant

[German]A Belgian court has now ruled on a complaint by data protectionists regarding the TCF framework. The judges consider the TCF framework to be non-compliant with the GDPR. This poses a problem for the online advertising industry around Microsoft, Google … Continue reading

Posted in General, Security | Tagged , | Leave a comment