Category Archives: Security

Nextcloud: Data protection bug in Android app?

[German]There appears to be a bug in the Android app for Nextcloud that is not insignificant in terms of data protection. Media content uploads are distributed across different folders belonging to different instances (accounts), even if this is not what … Continue reading

Posted in Android, Cloud, issue, Security | Tagged , , , , | Leave a comment

Microsoft Entra: Update your Conditional Access Policies for Azure DevOps Sign-ins

[German]Administrators in companies that use conditional access policies for Azure DevOps sign-ins in Microsoft Entra need to take action. Starting September 2, 2025, Microsoft Entra will discontinue the application of conditional access policies via Azure Resource Manager for Azure DevOps … Continue reading

Posted in Cloud, Security | Tagged , | Leave a comment

Microsoft will enforce MFA for Azure starting October 1, 2025

[German]Microsoft will introduce multi-factor authentication (MFA) for Azure resource management starting in October 2025. Administrators should respond promptly.

Posted in Cloud, Security | Tagged , | Leave a comment

Firefox 115 ESR: Windows 7/8.1 support until March 2026

[German]The Mozilla developers has announced that they extend the support for Firefox 115 ESR for Windows 7 / 8.x and some macOS versions from September 2025 for another six month to March 2026.

Posted in browser, macOS, Security, Software | Tagged , , | Leave a comment

Vulnerability in Tesla Open source app TeslaMate may expose user data

[German]A security researcher from Turkey with the alias @Sword_Sec took a closer look at the open-source app TeslaMate (the app has nothing to do with Tesla itself, but is used by Tesla fans for logging). According to Kılıç's investigation, the … Continue reading

Posted in Security, Software | Tagged , | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Critical vulnerability in Progress OpenEdge / Proalpha ERP

[German]Attention Progress OpenEdge / Proalpha ER users. A critical security vulnerability (CVE-2025-7388 ) has been discovered in the Progress OpenEdge software that allows code to be executed via Java RMI in an administrative context. OpenEdge 12.x and Proalpha 9.x are affected. … Continue reading

Posted in Security, Software | Tagged , | Leave a comment

Has your Microsoft account been hacked? Do you see any unusual activity in your history? – Part 1

[German]I would like to share some brief information with you, along with a question for our readers. It concerns the activity history of your Microsoft accounts. A blog reader informed me that he suddenly noticed access attempts from unknown IP … Continue reading

Posted in Cloud, issue, Security | Tagged , , | 4 Comments

Windows 11 24H2: Security issue caused by unattend.xml

[German]Administrators use an unattend.xml file to install and set up Windows. The unattend.xml file can be created using a generator. A blog reader already pointed out to me in July 2025 that using an unattend.xml file in Windows 11 24H2 … Continue reading

Posted in General, Security, Windows | Tagged , | 3 Comments

Chinese hacker group Salt Typhoon attacks (telecommunications) companies worldwide

[German]The US National Security Agency (NSA) and other US and foreign organizations have issued a security alert. Cyber groups such as Salt Typhoon, which are supported by the Chinese government, are attacking networks worldwide in the areas of telecommunications, government, … Continue reading

Posted in Security | Tagged | Leave a comment

Google requires Android app developers to identify themselves

[German]In light of the large number of harmful Android apps, Google is taking drastic measures for the future. All developers of Android apps must identify themselves to Google if they want their apps to continue running on certified Android devices.

Posted in Android, Security | Tagged , , | Leave a comment