Category Archives: Software

'Man in the Prompt' browser attack on LLMs

[German]Large Language Models (LLMs) can be attacked via prompts in order to elicit unauthorized data from the models. Man-in-the-prompt browser attacks could also be used to manipulate AI requests from users and use them for criminal activities. Advertising

Posted in Security, Software | Tagged , | Leave a comment

Advertising

Over 28,000 unpatched hybrid Exchange instances (CVE-2025-53786) still online

[German]Microsoft Exchange Server hybrid configurations are vulnerable to the elevation of privilege vulnerability CVE-2025-53786. Over 28,000 instances are still unpatched. The US CISA has given authorities until Monday, August 11, 2025, to patch the vulnerability. Here is an overview Advertising

Posted in Security, Software | Tagged , | Leave a comment

Warning of attacks on SonicWall firewalls (SSL VPNs)

[German]Someone among the blog readership who relies on SonicWall. There have been reports for days that attacks on SonicWall firewalls are being observed. It seems to relate to the SSL VPN function of the Gen 7 SonicWall firewalls. It is … Continue reading

Posted in devices, Security, Software | Tagged , , | Leave a comment

Microsoft Exchange Server Hybrid at risk by CVE-2025-53786

[German]Another note for administrators of Microsoft Exchange Server hybrid configurations. Microsoft points out that these configurations are at risk from an Elevation of Privilege vulnerability (CVE-2025-53786). However, there is a hotfix to eliminate this vulnerability in these hybrid configurations and … Continue reading

Posted in Cloud, Security, Software | Tagged , | Leave a comment

Critical vulnerabilities (CVE-2025-54948, CVE-2025-54987) in Trend Micro Apex One

[German]Brief information for administrators who use the Trend Micro Apex One security solution under Windows. The manufacturer has issued a security notice about a critical vulnerability that probably affects all versions and is also under attack. There is a Fix, … Continue reading

Posted in Security, Software, Windows | Tagged , , , | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


New insights on SharePoint Gate: Microsoft uses employees from China for maintenance

[German]Since the SharePoint disaster in July 2025, in which vulnerabilities were exploited, there have been new revelations almost every day. It has been speculated that suspected Chinese hackers were able to access internal descriptions of zero-day vulnerabilities in Microsoft SharePoint … Continue reading

Posted in Security, Software | Tagged , , , | Leave a comment

Microsoft investigates whether SharePoint 0-day was leaked to hackers in advance

[German]Did suspected Chinese hackers gain access to internal descriptions of zero-day vulnerabilities in Microsoft SharePoint Server before they were exploited last weekend? Microsoft is investigating whether there was a leak in internal systems where such information is stored. Advertising

Posted in Security, Software | Tagged , | Leave a comment

Comparison of Microsoft Defender for Office 365 and third-party ICES software

[German]How does Microsoft Defender actually compare to third-party ICES solutions for protecting Microsoft Office 365? ICES solutions can be integrated into Microsoft Defender for Office 365. I recently came across an overview from Microsoft with a comparison. Advertising

Posted in Security, Software | Tagged , , | Leave a comment

Advertising

Check Windows for outdated libcurl libraries in programs

[German]I mentioned this before in my blog: Microsoft often ships the cURL library with outdated versions that have security vulnerabilities. Software packages also come with ancient libcurl files. How can I check whether there are any legacy issues lurking on … Continue reading

Posted in Security, Software | Tagged , | 1 Comment

Sharepoint Server 0-Day vulnerability: over 400 victims, Warlock ransomware infections

[German]The extent of the observed wave of attacks on 0-day vulnerabilities in Microsoft SharePoint is slowly becoming apparent. Microsoft has now released emergency updates for SharePoint Server. However, it is now known that over 400 organizations have probably been compromised. … Continue reading

Posted in Security, Software | Tagged , | Leave a comment