Multiple 7-Zip Vulnerabilities Discovered by Talos

By Talos Group 7-Zip is an open-source file archiving application which features optional AES-256 encryption, support for large files, and the ability to use “any compression, conversion or encryption method”. Recently Cisco Talos has discovered multiple exploitable vulnerabilities in 7-Zip. These type of vulnerabilities are especially concerning since vendors may not be aware they are using the affected […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – May 2016

By Talos Group This post is authored by Holger Unterbrink. Patch Tuesday for May 2016 has arrived where Microsoft releases their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 16 bulletins addressing 33 vulnerabilities. Fourteen bulletins are rated critical, addressing vulnerabilities in Edge, Internet Explorer, Office, Graphic Components, VBScript, […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – May 2016

By Talos Group This post is authored by Holger Unterbrink. Patch Tuesday for May 2016 has arrived where Microsoft releases their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 16 bulletins addressing 33 vulnerabilities. Fourteen bulletins are rated critical, addressing vulnerabilities in Edge, Internet Explorer, Office, Graphic Components, VBScript, […]

Source:: Cisco Security Notice

BSI-Umfrage zur Betroffenheit durch Ransomware – 04/2016

BSI-Umfrage zur Betroffenheit durch Ransomware – 04/2016

Locky, Petja und Co. sind hinlänglich in allen Medien aufgegriffen worden. Neben einem Fraunhofer-Institut und einer Neusser Klinik waren auch viele Privatnutzer von einem Verschlüsselungstrojaner betroffen. Doch wie sieht die Lage im Unternehmensumfeld aus? Eine aktuelle Umfrage des BSI zeigt auf, dass etwa ein Drittel aller Unternehmen mit dieser Art digitaler Plage zu kämpfen hat und hatte. 75% der Infektionen erfolgten klassisch über das Einfallstor e-Mail, so dass hier eine verstärkte Aufmerksamkeit angezeigt ist (vgl. unseren Artikel zum Thema).

Den BSI-Report finden Sie vollständig als PDF-Download hier.

Eine Zusammenfassung findet sich bei heise security.

 

Wenn Sie Ihr Netzwerk sicherer machen möchten, freuen wir uns über Ihre Terminvorschläge zum Gespräch unter 02261 9155050 oder auf Ihre e-Mail an vertrieb@oberberg.net

 

 

 

 

 

The Formula One Approach to Security

By TK Keanini Many of today’s systems are built on telemetry, the automated gathering of remote data measurements to gain insights and manage performance and operations. One industry that has been quick to embrace telemetry is auto racing. At the 2016 Australian Grand Prix, Red Bull unleashed their multi-million-dollar car RB12, which is fitted with almost 100 sensors […]

Source:: Cisco Security Notice

The Formula One Approach to Security

By TK Keanini Many of today’s systems are built on telemetry, the automated gathering of remote data measurements to gain insights and manage performance and operations. One industry that has been quick to embrace telemetry is auto racing. At the 2016 Australian Grand Prix, Red Bull unleashed their multi-million-dollar car RB12, which is fitted with almost 100 sensors […]

Source:: Cisco Security Notice