Category Archives: Security

Sequoia: LPE Vulnerability CVE-2021-33909 in Linux

[German]Security researchers from Qualsys have discovered a Local Privilege Escalation (LPE) vulnerability CVE-2021-33909 in the filesystem layer of the Linux kernel. In addition, a second vulnerability CVE-2021-33910 has been discovered. Linux distributions such as Debian, Fedora and Ubuntu are vulnerable … Continue reading

Posted in Linux, Security | Tagged , | Leave a comment

Google Chrome 92.0.4515.107

[German]Google has released Google Chrome 92.0.4515.107 for Windows, Mac and Linux on July 20, 2021. It is an update to version 92 that brings new features, but also fixes 35 vulnerabilities in older browser versions at once. 

Posted in browser, Security, Update | Tagged | Leave a comment

HiveNightmare: New details about Windows vulnerability CVE-2021-36934

[German]Windows 10 has a serious vulnerability CVE-2021-36934 as of version 1809, which allows the Security Accounts Manager (SAM) database to be read via VSS shadow copies. This opens the door for local attackers to gain privileges from administrators and potentially … Continue reading

Posted in Security, Windows | Tagged , , | 3 Comments

Serious vulnerability in printer drivers from HP, Xerox and Samsung

[German]There has been a severe vulnerability CVE-2021-3438 in the printer drivers of the manufacturers HP, Xerox and Samsung (presumably only laser printers) for 16 years, which affects millions of devices. The vulnerability was reported to HP on February 18, 2021, … Continue reading

Posted in devices, Security | Tagged , | 1 Comment

Windows 10 upgrade breaks SAM access rights from 1809 upward, user access possible

[German]It seems that Windows 10 feature updates from version 1809 up to the current version 21H1 change the access rights to the SAM database so that non-administrative users can access it. The cause could be the volume shadow copies (Shadow … Continue reading

Posted in Security, Windows | Tagged , , | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


USA, EU, NATO, Microsoft & Co. Blame China for Hafnium Exchange Hack

[German]At the end of February, beginning of March 2021, there was a massive attack on Microsoft Exchange Server (see Exchange server 0-day exploits are actively exploited), in which many thousands of instances were hacked worldwide. Even then, the attacks were … Continue reading

Posted in Security | Tagged , , | Leave a comment

Windows Hello login bypassed via infrared photo

[German]Security researchers from CyberArk have managed to trick Windows 10's Hello login (also included in Windows 11) in terms of logging in via facial recognition. All they needed was an infrared photo of the face in question, used on a … Continue reading

Posted in Security, Windows | Tagged , | Leave a comment

PrintNightmare: Point-and-Print allows installation of arbitrary files

[German]Regarding the problem, originally called PrintNightmare, that Windows systems are vulnerable via the print spooler service, there is a new warning. A remote print server that can be accessed by unauthorized parties allows arbitrary malicious files to be installed on … Continue reading

Posted in Security, Windows | Tagged , | Leave a comment

DevilsTongue spyware from Israeli company Candiru exploited Windows vulnerabilities

[German]After I just reported about spy Trojans of the Israeli NSO Group on smartphones (see Pegasus spy software of NSO Group on many smartphones), I can also reveal the second case. The Israeli company Candiru exploited vulnerabilities in Windows to … Continue reading

Posted in Security, Windows | Tagged , , | 1 Comment

NSO Group's Pegasus spyware on many smartphones

[German]It started with a leaked list of about 50,000 phone numbers. Investigative research by the media then shed light on the surveillance of smartphone users by governments and private organizations. Numerous people around the world were spied on using Pegasus … Continue reading

Posted in Security | Tagged , , | Leave a comment