Translate
Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)
Tag Archives: Cloud
Palo Alto Networks Unit 42 Cloud Threat Report Volume 7 (April 2023)
[German]The run on the cloud continues unabated, but the number of vulnerabilities and security threats is steadily increasing. Misconfigurations, weak credentials, lack of authentication, unpatched vulnerabilities and malicious (infected) open source software (OSS) threaten security. Some developers hard-pack credentials into … Continue reading
3 vulnerabilities discovered in MS Azure API management
[German]Security researchers from Israeli security vendor Ermetic have discovered three vulnerabilities in Microsoft's Azure API management. Two server-side request forgery (SSRF) vulnerabilities and an unrestricted file upload issue create risks for the Microsoft cloud environment. The vulnerabilities could be abused … Continue reading
Microsoft 365 Apps are getting a unified cloud.microsoft domain
[German]Brief information for administrators of Microsoft solutions in companies. Microsoft wants to standardize the domain names previously used to access cloud functions, such as outlook.com, live.com, microsoft365.com, office.com, onenote.com, etc., in the future and make them accessible via sub-domains under … Continue reading
Microsoft 365 has been disrupted – apps missing sporadically (April 20, 2023)
[German]There was a disruption of Microsoft 365 services (I got first reports on April 19, 2023) during the last hours. User can't reach apps in Microsoft 365 – the page ist empty. Microsoft investigated that and has now recovered, according … Continue reading
AlienFox: Toolkit to compromise email and web hosting services in the cloud
[German]AlienFox is a toolkit for compromising email and web hosting services. This toolkit is highly modular, comes in multiple versions, and attempts to exploit misconfigurations in the cloud to grab credentials for services such as AWS, Microsoft 365, Google Workspace, … Continue reading
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Citrix Cloud Connector May 2023 upgrade requires new DigiCert G4 root and intermediate certificates
[German]Brief note for administrators who are responsible for the deployment of the Citrix Cloud Connector. Normally, there is no need to worry about an update of this connector. However, in early May 2023, there is a connector update that administrators … Continue reading
Microsoft 365: Outlook.com can't send/receive mails, due to reaching Microsoft's OneDrive file limit
[German]Nasty surprise for Microsoft 365 users who use Microsoft's Outlook.com email service. Users of the free email service may suddenly find that they can no longer receive or send mails. The reason given for the Outlook.com going on strike is … Continue reading
Google Dropcam and Nest Secure reaches End of Live on April 8, 2024
[German]Bad news for users of Google's home automation products like the Nest Thermostats, the Dropcam camera or the Google Secure solutions. Google has announced that their support will be discontinued on April 4, 2024. The solutions in question will then … Continue reading
Windows365 Frontline introduced
[German]Microsoft has just unveiled its Windows365 Frontline – a Windows 11-based system streamed from the cloud. The system is designed to offer a personalized Windows that can be deployed and managed via Microsoft Intune alongside cloud PCs and physical devices. … Continue reading
Bi(n)gBang: Microsoft Azure vulnerability allows Bing search hijacking and Office 365 data theft
[German]A nice case about the risk of the cloud. Microsoft 's Azure may have allowed a misconfiguration of some apps or services. As a result, attackers could potentially inject malicious code into Bing search results pages to manipulate them. It … Continue reading


