Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)
Tag Archives: Security
Vulnerability in Tesla Open source app TeslaMate may expose user data
[German]A security researcher from Turkey with the alias @Sword_Sec took a closer look at the open-source app TeslaMate (the app has nothing to do with Tesla itself, but is used by Tesla fans for logging). According to Kılıç's investigation, the … Continue reading
Critical vulnerability in Progress OpenEdge / Proalpha ERP
[German]Attention Progress OpenEdge / Proalpha ER users. A critical security vulnerability (CVE-2025-7388 ) has been discovered in the Progress OpenEdge software that allows code to be executed via Java RMI in an administrative context. OpenEdge 12.x and Proalpha 9.x are affected. … Continue reading
Has your Microsoft account been hacked? Do you see any unusual activity in your history? – Part 1
[German]I would like to share some brief information with you, along with a question for our readers. It concerns the activity history of your Microsoft accounts. A blog reader informed me that he suddenly noticed access attempts from unknown IP … Continue reading
Windows 11 24H2: Security issue caused by unattend.xml
[German]Administrators use an unattend.xml file to install and set up Windows. The unattend.xml file can be created using a generator. A blog reader already pointed out to me in July 2025 that using an unattend.xml file in Windows 11 24H2 … Continue reading
Chinese hacker group Salt Typhoon attacks (telecommunications) companies worldwide
[German]The US National Security Agency (NSA) and other US and foreign organizations have issued a security alert. Cyber groups such as Salt Typhoon, which are supported by the Chinese government, are attacking networks worldwide in the areas of telecommunications, government, … Continue reading
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Google requires Android app developers to identify themselves
[German]In light of the large number of harmful Android apps, Google is taking drastic measures for the future. All developers of Android apps must identify themselves to Google if they want their apps to continue running on certified Android devices.
Early termination of support for SonicWall SMA100
[German]Brief information for users of SonicWall 100 Series Secure Access Gateways. As a reader informed me in an email this week, SonicWall appears to be planning to discontinue support for SonicWall SMA100 Series models soon. According to a statement from … Continue reading
Microsoft warns: Ransomware group Storm-0501 attacks (Azure) cloud, demands payments
[German]Microsoft warns of the financially motivated group Storm-0501, which continuously targets cloud instances (Azure) with attacks. If successful, data is extracted, the originals are encrypted, and backups are destroyed. A ransom is then demanded.
CrushFTP vulnerability CVE-2025-54309 is being exploited
[German]Does anyone reading this blog use the CrushFTP program for file transfers? The CVE-2025-54309 vulnerability has been known and fixed since July 2025. Now I've come across a report that hackers are exploiting this vulnerability.
Vulnerabilities in Fortinet FortiWeb; Directus, hack at Salesloft, and more
[German]Fortinet FortiWeb administrators need to take action because there is a vulnerability warning. Users of the Directus website builder also need to take action due to a vulnerability. Here is an overview of various security vulnerabilities in products, as well … Continue reading


