Virtualbox 6.1.8, 6.0.22 and 5.2.42 released

Virtualbox[German]Oracle's developers have already released Virtualbox version 6.1.8 (as well as 6.0.22 and 5.2.42) on 15 May 2020. These are maintenance updates, which should fix bugs of earlier versions.

Continue reading

Posted in Virtualization | Tagged , | Leave a comment

Windows: Reverse RDP attacks in third-party software possible

[German]A poorly patched vulnerability CVE-2019-0887 in Windows makes the systems vulnerable to attacks via third-party RDP applications. It could also allow a client used to establish the RDP connection to be attacked by malware on the remote machine.

Continue reading

Posted in Security, Windows | Tagged , | Leave a comment

Microsoft sends a cease and desist to Berlin’s data protection commissioner

[German]Microsoft Germany has send a cease and desist to Berlin's Commissioner for Data Protection and Freedom of Information. An action that leaves many observers somewhat speechless. The warning concerns guidelines for video conferencing, which provide information on test criteria for the safe use (also GDPR) of videoconferencing in companies and public authorities.

Continue reading

Posted in General | Tagged , , | Leave a comment

Windows 10 comes with Network Sniffer pktmgr

[German]Microsoft ships a tool (Packet Monitor) in Windows 10 that allows administrators to monitor and record network traffic. This has only now become more widely known, possibly because the feature was described a few days ago for insiders.

Continue reading

Posted in Windows | Tagged , | Leave a comment

Revil Ransomware hackers release first Trump files

[German]The REvil/Sodinokibi gang has seized files from the US law firm Grubman Shire Meiselas & Sacks and demanded a ransom. Since the law firm is not paying, the first e-mail about US President Donald Trump has now been published.

Continue reading

Posted in Security | Tagged | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Windows 10 V2004: Microsoft started to add 20H2 features

[German]There is new evidence that Microsoft has already begun to integrate features that are scheduled for the autumn update (development branch 20H2) into the Windows 10 version 2004 (May 2020 update), which is expected to be released for general release at the end of May 2020. This means that Windows 10 20H2, which is expected to be released in the fall, will again be a 'minor update'.

Continue reading

Posted in Windows | Tagged | 1 Comment

Vulnerabilities in Symantec Endpoint Protection

[German]There are serious vulnerabilities in older versions (before 14.3) of Endpoint Protection and Endpoint Protection Manager for Windows that allow the system to take over. Symantec has released updates for these products.

Continue reading

Posted in Security, Software | Tagged , | Leave a comment

Three vulnerabilities in Sophos/Cyberoam firewall technology

[German]Security researchers have discovered three vulnerabilities in Cyberoam firewalls (owned by British company Sophos). The vulnerabilities leave millions of devices and, in principle, the entire network vulnerable to security attacks. The products are used in corporate networks and are accessible via the Internet (sometimes with standard credentials).

Continue reading

Posted in devices, Security, Software | Tagged , , | Leave a comment

Zoom outage?

The video conference service Zoom experienced a major outage a few hours ago and the service was no longer available. In the meantime, Zoom seems to have fixed the issue.

Continue reading

Posted in issue | Tagged , | Leave a comment

Security: Finding Passwords in Windows Domains

[German]The takeover of a domain controller by stolen admin passwords is a popular approach of cyber criminals. I stumbled upon an article on Twitter, explaining where attackers could find passwords on SYSVOL and via GPO preferences.

Continue reading

Posted in Security, Windows | Tagged , , | Leave a comment