Category Archives: Software

Multiple vulnerabilities in OpenSSH (Feb. 2025)

[German]Security experts from Qualys TRU have discovered two vulnerabilities in the OpenSSH software. In addition, an advisory on another vulnerability was published on February 11, 2024. OpenSSL 3.4, 3.3 and 3.2 are affected by this vulnerability, although upgrades to newer … Continue reading

Posted in Security, Software | Tagged , , | Leave a comment

Advertising

Microsoft has adjusted the DKIM value for signing emails in Office 365

[German]Quick note for administrators of Microsoft Office 365 (or MS365) systems. Microsoft has adjusted the DKIM value for signing emails without much notice. Advertising

Posted in Cloud, Software | Tagged , | Leave a comment

Firefox 115 ESR: Windows 7/8.1 Support till September 2025

[German]Mozilla Firefox 115 ESR still runs on Windows 7 / 8.1 and has been in extended support for some time. It was previously known that the developers wanted to support this browser version until March 2025. The Mozilla developers have … Continue reading

Posted in browser, Security, Software, Update | Tagged , , | Leave a comment

FSLogix 25.02 (3.25.202.4223)

[German]Short addendum from last week – on February 12, 2025, Microsoft released a FXLogix update to 25.02 (3.25.202.4223). The release notes state that – among other things – the cache should now be deleted cleanly. Could solve some problems in … Continue reading

Posted in Software, Update | Tagged , | Leave a comment

Windows: Task scheduler entries are deactivated – claim …

[German]A German blog reader contacted me a few days ago with a strange observation. The reader uses a backup solution that is launched cyclically via the Windows task scheduler. Since December 2024, however, the reader has noticed that the tasks … Continue reading

Posted in issue, Software, Windows | Tagged , , | Leave a comment
Advertising

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Microsoft 365 EOL announcements for 2025 – 2026

[German]Microsoft has recently made some announcements for functions in Microsoft 365 for March and April 2025 – 2026. The SharePoint add-ins will cease operation from 2026, and Azure ACS will also be discontinued. Here is a brief overview of what … Continue reading

Posted in Cloud, Office, Software | Tagged , , | Leave a comment

Advertising

Microsoft Security Update Summary (February 11, 2025)

[German]On February 11, 2025, Microsoft released security updates for Windows clients and servers, for Office – and for other products. The security updates eliminate 55 vulnerabilities (CVEs), three of which are classified as critical and four as 0-day. Below is … Continue reading

Posted in Office, Security, Software, Update, Windows | Tagged , , , , | Leave a comment

Exchange Server 2019: 2025 H1 Cumulative Update (CU15) released

[German]Microsoft has released the 2025 H1 Cumulative Update for Exchange Server 2019 on February 10, 2024. The CU15 is the last cumulative update for this Exchange version, which will then be withdrawn from support in October 2025. The CU15 contains … Continue reading

Posted in Software, Update | Tagged , | Leave a comment

Advertising

Are contacts are suddenly deleted in Microsoft 365?

[German]I have recently received an information from a blog reader who is struggling with the fact that some of his users' Microsoft 365 accounts are sporadically deleting contacts. Advertising

Posted in Cloud, issue, Office, Software | Tagged , , | Leave a comment

Attackers use ASP. NET key to spread malware

[German]In December 2024, the Microsoft Threat Intelligence team observed limited activity from an unknown attacker using a publicly available, static ASP. NET machine key to inject malicious code and deploy the Godzilla post-exploitation framework. Advertising

Posted in Security, Software | Tagged , | Leave a comment