Translate
Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)
Tag Archives: Security
Vulnerabilities in Lenovo UEFI and Dell notebooks
[German]Another brief summary of security vulnerabilities in devices. At the end of July 2025, Lenovo notebooks reported vulnerabilities that could be closed via UEFI updates. And in Dell notebooks, a vulnerability called ReVault was found in the ControlVault3 firmware for … Continue reading
Warning of attacks on SonicWall firewalls (SSL VPNs)
[German]Someone among the blog readership who relies on SonicWall. There have been reports for days that attacks on SonicWall firewalls are being observed. It seems to relate to the SSL VPN function of the Gen 7 SonicWall firewalls. It is … Continue reading
Microsoft Exchange Server Hybrid at risk by CVE-2025-53786
[German]Another note for administrators of Microsoft Exchange Server hybrid configurations. Microsoft points out that these configurations are at risk from an Elevation of Privilege vulnerability (CVE-2025-53786). However, there is a hotfix to eliminate this vulnerability in these hybrid configurations and … Continue reading
OneDrive Personal also syncs business data. Is this a problem?
[German]Quick survey for administrators among my blog readers: Is there a problem with OneDrive, and how are you dealing with it? In July 2025, Microsoft began allowing OneDrive Personal users to synchronize OneDrive for Business as well. How are you … Continue reading
Critical vulnerabilities (CVE-2025-54948, CVE-2025-54987) in Trend Micro Apex One
[German]Brief information for administrators who use the Trend Micro Apex One security solution under Windows. The manufacturer has issued a security notice about a critical vulnerability that probably affects all versions and is also under attack. There is a Fix, … Continue reading
Posted in Security, Software, Windows
Tagged Security, Software, Trend Micro, Update
Leave a comment
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Microsoft Recall still collect credit card data and passwords (July 2025)
[German]Is it a surprise? No, it's not a surprise, but rather to be expected. The Recall spyware feature that Microsoft is pushing onto Windows systems continues to collect sensitive information such as credit card details and passwords. And this despite … Continue reading
New insights on SharePoint Gate: Microsoft uses employees from China for maintenance
[German]Since the SharePoint disaster in July 2025, in which vulnerabilities were exploited, there have been new revelations almost every day. It has been speculated that suspected Chinese hackers were able to access internal descriptions of zero-day vulnerabilities in Microsoft SharePoint … Continue reading
Nextron finds previously unknown plague backdoor in Linux
[German]Security researchers from Nextron Research have identified a previously undocumented PAM-based backdoor while searching for unknown threats with YARA rules. This backdoor, dubbed Plague by the security researchers, can be persistently installed on Linux systems by attackers and grants persistent … Continue reading
Security incident at Logitech: Phishing-Mails has been send to partners
[German]There has been a security incident at Logitech. Logitech partners recently received a fraudulent email warning of the risk of an attack on a MetaMask wallet, but the message containing a phishing link. Logitech has now confirmed that an incident … Continue reading
Microsoft investigates whether SharePoint 0-day was leaked to hackers in advance
[German]Did suspected Chinese hackers gain access to internal descriptions of zero-day vulnerabilities in Microsoft SharePoint Server before they were exploited last weekend? Microsoft is investigating whether there was a leak in internal systems where such information is stored.


