Epson disables printers due to "obsolete ink sponges"

Stop - Pixabay[German]Users of a printer from the Japanese manufacturer Epson might experience an unpleasant surprise. On certain devices, a message suddenly appears that a "part in the device" has reached the end of its life. The printer still works, but is deactivated by firmware. For Epson, the reason for the message and the deactivation is the built-in ink sponge, which is full. The deactivation of the printer is probably to prevent ink from leaking out and then causing damage to the customer due to printer ink. The problem with this approach is that it smells of planned obsolescence, since the deactivation of the device is probably done via firmware and based on a counter for the number of printouts.

Continue reading

Posted in devices, issue | Tagged | 2 Comments

Open Cloud: Vulnerability & Security Issue Database

Sicherheit (Pexels, allgemeine Nutzung)Numerous vulnerabilities also lurk in the cloud, and administrators of cloud solutions should address the issue. But where can you get an overview of security risks or even vulnerabilities in relation to the various cloud providers? There is an Open Cloud project, which started at the end of June 2022 and aims to make security vulnerabilities in cloud services public.

Continue reading

Posted in Cloud, Security | Tagged , | Leave a comment

VirusTotal: Google report on malware trends

Sicherheit (Pexels, allgemeine Nutzung)[German]On its VirusTotal  service, Google receives numerous daily submissions of files to check if they are malware. In a new report, "Deception at scale: How malware abuses trust," a team from Google has compiled findings on various techniques malware uses to bypass defenses and make social engineering attacks more effective. This should help security researchers, security professionals and the general public better understand the nature of malicious attacks.

Continue reading

Posted in Security | Tagged | Leave a comment

Hackers send phishing emails via PayPal domains

Sicherheit (Pexels, allgemeine Nutzung)[German]Brief message that I received from CheckPoint. Perhaps one or the other reader has an account with PayPal. Phishing is nothing new in this area – and criminals exploit the trustworthiness of the PayPal brand name to trick mail verification systems and get their victims' money and contact details. Now a new wave of phishing seems to have run, using PayPal domains.

Continue reading

Posted in Security | Tagged | Leave a comment

Thunderbird 102.1.1

[German]The developers of Thunderbird releases another update of the email client on August 8, 2022. This is to fix a number of bugs in the 102 version. The update is also only offered for this branch – not for the old 91 branch.Reihe an Bugs  in der 102er Version beheben. Das Update wird auch nur für diesen Zweig angeboten – nicht für den alten 91er Zweig.

Continue reading

Posted in Software, Update | Tagged | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Twitter data privacy incident (August 2022)

Sicherheit (Pexels, allgemeine Nutzung)[German]Twitter has just confirmed a privacy incident stemming from a vulnerability reported in January 2022. In July 2022, it became known that someone had used this vulnerability to siphon personal data from Twitter users. Here's some information about that incident.

Continue reading

Posted in Security | Tagged | Leave a comment

Some insights about the warning of German BSI against Kaspersky antivirus software

Sicherheit (Pexels, allgemeine Nutzung)[German]I am once again taking up a difficult topic in a review, which has triggered numerous discussions within my Germanblog. It is about the German , BSI's (Federal Office for Information Security) warning against the use of products of the Russian provider Kaspersky. In the meantime, the Higher Regional Court has clarified that the BSI was allowed to warn and that this also falls within its scope. It should be clear to everyone that at least parts of the decision was also politically motivated. Now, in an article for the German broadcasting service Tagesschau, and Bavarian TV service BR has traced how difficult it was for the BSI to make its assessment.

Continue reading

Posted in Security | Tagged | Leave a comment

Microsoft Edge 104.0.1293.47 (August 5, 2022) with security fixes

EdgeMicrosoft has updated the Edge browser in the stable channel to version 104.0.1293.47 as of August 5, 2022. It is a security update that also includes a fix for vulnerabilities while also initiating the 104 development branch.

Continue reading

Posted in browser, Security, Update, Windows | Tagged , | 1 Comment

Lockbit attackers abuse Windows Defender to load Cobalt Strike

Sicherheit (Pexels, allgemeine Nutzung)[German]Security researchers from Sentinel One have discovered an interesting attack path under Windows, which is used by the ransomware gang Lockbit. The group uses Windows Defender in its ransomware construction kit to load the Cobalt Strike test tool and then abuse it. The (unpatched) target system is attacked via the Log4j vulnerability.

Continue reading

Posted in Security, Windows | Tagged , | 1 Comment

Remote access Trojan "Woody Rat" uses Follina exploits to attack Russian organizations

Sicherheit (Pexels, allgemeine Nutzung)[German]Malwarebytes' threat intelligence team has identified a new, technically advanced remote access Trojan. Dubbed "Woody Rat," the Trojan has been in circulation for about a year and targets Russian organizations. Among others, Obyedinyonnaya Aviastroitelnaya Korporatsiya (OAK), an aerospace and defense company majority-owned by the Russian state, has already been targeted by Woody Rat. The Trojan exploits the so-called Follina exploit (CVE-2022-30190), a zero-day vulnerability that can be used to abuse the Microsoft Support Diagnostics utility to download malicious Microsoft Word or Excel documents from the Web.

Continue reading

Posted in Security | Tagged | Leave a comment