Category Archives: Security

Phishing with appointment invitations targets Office 365 accounts

[German]I'm pick up on a topic that is somehow already known in this form. Owners of Microsoft Office 365 accounts receive appointment invitations that claim that an action needs to be carried out. But in the background is a phisher … Continue reading

Posted in General, Office, Security, Software | Tagged , , | Leave a comment

Microsoft Phishing with MS 365 tenants?

[German]I'd like to discuss an email I allegedly received from Microsoft regarding an "expiring tenant". Something needs to be ordered because the tenant, which has been inactive for more than 200 days, will otherwise expire. Is it a legitimate mail … Continue reading

Posted in Cloud, Security, Software | Tagged , , , | 10 Comments

BadSuccessor: Read up on the dMSA AD privilege increase issue

[German]Recently, security researchers have pointed out a potential vulnerability lurking in the delegated Managed Service Accounts (dMSAs) newly introduced in Windows Server 2025. By abusing dMSAs, attackers can take over any principal in the domain. A security researcher is critical … Continue reading

Posted in Security, Windows | Tagged , | Leave a comment

Excel can't load documents with […] in file name after May 2025 update

[German]On May 13, 2025 (second Tuesday of the month, Microsoft Patchday), Microsoft released several security-related updates for Microsoft Office 2016, as well as the C2R variants (Office 2016-2021 and 365) and other products. In the meantime, I have received some … Continue reading

Posted in issue, Office, Security, Software, Update | Tagged , , , | 3 Comments

The 4 most important password errors that jeopardize security

[German]Even if Information Technology should move towards passwordless logins (passkey & Co.), logins using a user name and password are still widespread. Just as widespread are certain mistakes when choosing passwords, which jeopardizes security. I recently received an overview from … Continue reading

Posted in Security | Tagged | 2 Comments

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Suspected InfoStealer data leak exposes 184 million login data

[German]Security researcher Jeremiah Fowler came across a freely accessible and unprotected database on the Internet. The find was quite something, as a look at the data sets suggests that it was probably data collected by InfoStealer malware. Records containing 184 … Continue reading

Posted in Security | Tagged | 1 Comment

Operations Endgame, DanaBot-Net and Raptor disrupt infrastructure for ransomware attacks and more

[German]Law enforcement officers seized 300 servers and 650 domains used for ransomware attacks this week in Operation Endgame. As a result, cybercriminal networks were dismantled, funds confiscated and some suspects arrested. Further actions against cybercriminals were carried out with the … Continue reading

Posted in Security | Tagged | Leave a comment

BadSuccessor: Abusing dMSA to elevate privileges in Active Directory

[German]Delegated Managed Service Accounts (dMSAs) have been introduced in Windows Server 2025. These are service accounts for the Active Directory (AD) that are intended to enable new functions. Security researchers have now discovered that by misusing dMSAs, attackers can take … Continue reading

Posted in Security, Windows | Tagged , , | Leave a comment

Law enforcement officials seized Lumma Stealer infrastructure (May 2025)

[German]Law enforcement officials seize Lumma Stealer infrastructure (May 2025)In a coordinated operation, US law enforcement officials have seized the infrastructure (C & C servers) of the Lumma infostealer and paralyzed its function. The malware is responsible for numerous cyberattacks on … Continue reading

Posted in Security | Tagged | Leave a comment

Volkswagen hack via OTP bypass; access to personal vehicle data

[German]A frustrated buyer of a used VW vehicle was unable to register for Connected Car because the data was sent to the previous owner. So he took a closer look and was able to determine the server access data through … Continue reading

Posted in Cloud, Security, Software | Tagged , , , | Leave a comment