Blogs
Links
Archives
Categories
Social networks
Awards
Sponsors
(Paypal-Donations)Recent Comments
- EP on Edge version 124.0.2478.51 causes issues with http pages
- GM on Windows Server 2016: AD problems after updates KB5034862 and KB5034767 (Feb. 2024)
- José Roberto on Google account blocked and police action because of toddler photos for the doctor
- Anonymous on WSUS displays all Windows 11 clients as Windows 10 Enterprise
- GordK on Windows 10: Workaround for jumping explorer view
Meta
Recent Comments
- EP on Edge version 124.0.2478.51 causes issues with http pages
- GM on Windows Server 2016: AD problems after updates KB5034862 and KB5034767 (Feb. 2024)
- José Roberto on Google account blocked and police action because of toddler photos for the doctor
- Anonymous on WSUS displays all Windows 11 clients as Windows 10 Enterprise
- GordK on Windows 10: Workaround for jumping explorer view
Archives
Categories
Meta
Tag Archives: device
Security update to FRITZ!OS 7.57 (7.31) closes serious vulnerability
[German]The Berlin-based German manufacturer of routers, AVM, has released its FRITZ.OS version 7.57 for eligible FRITZ!Box models on September 4, 2023. AVM only writes that this firmware update is a necessary stability and security update. It is therefore unclear which … Continue reading
Advertising
Malicious firmware "Horse Shell" exposed as backdoor for TP-Link routers
[German]Security researchers from Check Point Research (CRP) have discovered a backdoor called "Horse Shell" while analyzing cyberattacks on European institutions. This was injected as firmware on TP-Link routers by a Chinese state-sponsored APT group called "Camaro Dragon." Check Point Research … Continue reading
How to find weak passwords in Active Directory and eliminate them with PowerShell
[Sponsored Post]Weak or compromised passwords are a known gateway for attackers. If you are able to identify which users in Active Directory (AD) are threatened by this, then PowerShell can help to remedy it. However, PowerShell scripts cannot eliminate basic AD deficits, other tools are needed for this. More ...
RCE vulnerability in Cisco SPA112 2-port phone adapter, drop that device
[German]US provider Cisco warns in a message about a critical vulnerability in one of its phone adapters. This vulnerability allows an attacker to take control of the device. Unfortunately, affected users can only dispose of this phone adapter, since the … Continue reading
Advertising
Monitors on Dell Thunderbolt docking station not active after reboot
[German]Quick note to owners and administrators of Dell docking stations connected to notebooks via Thunderbolt. A reader informed me about problems with the WD22TB4, in connection with Dell notebooks (5530, 5430, 5431). After a reboot, monitors attached to the docking … Continue reading
BlackLotus UEFI bootkit bypasses Secure Boot in Windows 11
[German]Security researchers from ESET have discovered a malware in the wild that hijacks the UEFI and has been christened BlackLotus. BlackLotus is believed to be the first UEFI bootkit malware in the wild that can bypass Secure Boot on Windows … Continue reading
Advertising
HP PC BIOS Security Updates (Feb. 2023)
[German]Vendor HP published a security article on February 21, 2023, addressing BIOS updates for HP systems. Potential time-of-check to time-of-use (TOCTOU) vulnerabilities in the BIOS of certain HP PC products have been identified, allowing for arbitrary code execution, denial of … Continue reading
New Jabra headset issues (e.g. Engage 75) with MS Teams (Jan./Feb. 2023).
[German]Another note for administrators and users of Jabra headsets (e.g. Jabra Engage 75) who use them in a corporate environment with Microsoft Teams. After there were already problems in connection with Microsoft Teams in December 2022, which were fixed via … Continue reading
Issues restoring backups due to VDM with Intel Core i5 11th generation CPUs
[German]Unusual experience reported to me by a blog reader. He suddenly found himself facing the problem of not being able to write back a backup he had made on his Acer Swift 3 with an 11th generation Intel Core i5. … Continue reading
Advertising
German white hat hackers buys US military biometrics equipment with Afghanistan biometric database at auction
[German]German white hacker organization purchased several used U.S. military biometrics devices at auction through an online auction platform (presumably eBay). During the forensic investigation, it became obvious that the military and the manufacturer used irresponsible handling. Data located on the … Continue reading
Keyboard Corsair K100 mysteriously auto typing characters and texts – it's not a keylogger or malware – blame the firmware
[German]Users of a mechanical Corsair K100 keyboard complain that it "types" words or sentences by itself. However, the fears of some users that a keylogger or a malware is causing that behavior are not true. According to the manufacturer, it … Continue reading