Tag Archives: Software

S/4 HANA – Reduce license costs and optimize compliance

[German]When converting to S/4HANA and the new SAP licensing model, strategic optimization of user authorizations is essential. What do companies need to consider when optimizing their authorization management?

Posted in Software | Tagged , | Leave a comment

Windows 11 24H2: Azure Virtual Desktop (AVD) App Attach fails

[German]Brief information for administrators in the blog readership who use Azure Virtual Desktop (AVD) and are migrating clients to Windows 11. Under Windows 11 24H2 there is a problem that the App Attach feature of Azure Virtual Desktop (AVD) does … Continue reading

Posted in Cloud, issue, Software, Windows | Tagged , , , | Leave a comment

Windows 11 24H2 and Windows Server 2025 has Kerb3961

[German]Brief note for administrators of clients with Windows 11 24H2.clients and Windows Server 2025 hosts. Microsoft has integrated the Kerb3961 library into these operating systems. This is a refactoring of the Kerberos cryptography engine in a separate library and shall … Continue reading

Posted in Security, Software, Windows | Tagged , , , | Leave a comment

ASUS Armoury Crate vulnerability CVE-2025-3464 allows admin privileges in Windows

[German]Brief information for readers who use ASUS Armoury Crate on their Windows systems. The vulnerability CVE-2025-3464 in the software allows an attacker to gain administrator privileges under Windows. ASUS has since updated the software to close the vulnerabilities.

Posted in Security, Software, Windows | Tagged , , , | Leave a comment

Problem with Bitwarden instances (June 16, 2025)

[German]A short note for administrators in companies that use Bitwarden as a password manager in their environment. A change to the backend may cause problems with Bitwarden instances.

Posted in issue, Software | Tagged , | 1 Comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


EchoLeak: First AI 0-Click vulnerability in Microsoft Copilot

[German]Security researchers have discovered the first zero-click vulnerability in an AI application. Unsurprisingly for me, this concerns Microsoft 365 Copilot. Attackers could use this vulnerability, known as EchoLeak, to force Microsoft 365 Copilot to exfiltrate data.

Posted in Security, Software | Tagged , , | Leave a comment

Acronis Cyber Protect vulnerabilities jeopardize Linux and Windows systems

[German]Acronis Cyber Protect security vulnerabilities endanger Windows systemsShort note for users who use Acronis Cyber Protect in a Windows environment. There is a current security warning from the German Federal Office for Information Security (BSI). Several vulnerabilities in the product … Continue reading

Posted in Linux, Security, Software, Update, Windows | Tagged , , , , , | Leave a comment

ConnectWise updates server certificates, update your software before June 10, 2025

[German]Does anyone use software from ConnectWise (e.g. ScreenConnect)? This evening I received an email from a blog reader pointing out an announcement from ConnectWise that is quite urgent. By tomorrow, June 10, 2025, 15:00 CET, users must update the provider's … Continue reading

Posted in Security, Software | Tagged , | Leave a comment

Microsoft Authenticator: Warning to safe passwords before the password feature will be disabled

[German]Microsoft Authenticator is a free app that allows you to log in to online accounts without using a password. Instead, options such as fingerprint, facial recognition or PIN are used. The app could also store passwords. However, this function will … Continue reading

Posted in Software | Tagged | 1 Comment

Volkswagen hack via OTP bypass; access to personal vehicle data

[German]A frustrated buyer of a used VW vehicle was unable to register for Connected Car because the data was sent to the previous owner. So he took a closer look and was able to determine the server access data through … Continue reading

Posted in Cloud, Security, Software | Tagged , , , | Leave a comment