Tag Archives: Software

Microsoft 365 app will simply be called Microsoft 365 Copilot from 2025

[German]To "improve the user experience", Microsoft plans to rename their Copilot application. Yesterday, Microsoft announced that the Microsoft 365 app will simply be renamed Microsoft 365 Copilot from January 2025. Advertising

Posted in Software | Tagged , | Leave a comment

Advertising

Attention: Email forwarding stops after restarting a Domino server from 13. Dec. 2024

[German]A short addendum from Friday, December 13, 2024, which may be relevant for administrators of an IBM Domino server. A reader pointed out to me that these servers require special attention with regard to a possible restart. Because after the … Continue reading

Posted in issue, Software | Tagged , | Leave a comment

Skoda: Vulnerability in MIB3 infotainment allows malware injection via BlueTooth

[German]Security researchers have taken a closer look at the infotainment system in Skoda vehicles (belongs to Volkswagen car manufacturer group). They discovered several vulnerabilities that could allow attackers to remotely trigger certain functions on the vehicle and track the location … Continue reading

Posted in devices, Security, Software | Tagged , , | Leave a comment

German CERT also warns of massive wave of attacks on Citrix Netscaler gateways (Dec. 2024)

[German]A few days ago, I warned in the blog post Massive wave of attacks on Citrix Netscaler gateways since 5, and 6, Dec. 2024? about a massive wave of attempted attacks on Citrix Netscaler gateways since around Dec. 5, 2024. … Continue reading

Posted in devices, Security, Software | Tagged , , | Leave a comment

Vulnerabilities in Netwrix PingCastle Pro/Enterprise (Nov. 2024)

[German]Brief information for administrators and IT service providers who use PingCastle (now part of Netwrix) to analyze Active Directory security. Due to vulnerabilities in the code, older versions of the Enterprise and Pro editions of the tool should no longer … Continue reading

Posted in Security, Software | Tagged , | Leave a comment
Advertising

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


3CX V18 with NFR license: Update to V20 mandatory since Nov. 15, 2024

[German]Brief information for IT supporters who use 3CX as a telephone system. The provider has probably significantly reduced the functionalities of 3CX version 18 in the NFR license as of 15 November 2024. Anyone wishing to use the full functionality … Continue reading

Posted in issue, Software | Tagged | Leave a comment

Advertising

CISA warns about attacks on 0 day vulnerability in Palo Alto Networks firewalls

[German]An unpatched vulnerability (0-day) exist in the firewalls of Palo Alto Networks. The management interface can be accessed via this vulnerability. This 0-day vulneability is already being exploited for attacks. Both the BSI and the US authority CISA have issued … Continue reading

Posted in devices, Security | Tagged , | Leave a comment

Vulnerability in CrushFTP; update recommended

[German]Quick note to users who use CrushFTP. A blog reader has informed me that a serious vulnerability has been discovered ans has been made public on November 11, 2024. However, there are updates in which this vulnerability, for which no … Continue reading

Posted in Security, Software | Tagged , | Leave a comment

Advertising

Script to prevent forced switch from Classic Outlook to New Outlook

[German]Microsoft wants to switch certain Microsoft 365 user groups from Outlook Classic to the new Outlook app from the beginning of 2025. A reader has written a "remediation script" to prevent this. I'll present it here, maybe someone can use … Continue reading

Posted in Office, Software, Windows | Tagged , | 1 Comment

Google uncovers vulnerability in SQLite with AI

[German]They do exist, useful examples of AI applications. The Project Zero team has now explained how it unleashed a Large Language Model (LLM) on software for vulnerability analysis in the "Big Sleep" project (the successor to "Naptime"). This uncovered a … Continue reading

Posted in Security, Software | Tagged , | Leave a comment