Archiv für Februar 2026

📄

Patch Tuesday, February 2026 Edition

Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six „zero-day“ vulnerabilities that attackers are already exploiting in the wild.

Mehr lesen →
📄

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps

The purpose of this Alert is to amplify Poland’s Computer Emergency Response Team (CERT Polska’s) Energy Sector Incident Report published on Jan. 30, 2026, and highlight key mitigations for Energy Sector stakeholders.  In December 2025, a malicious cyber actor(s) targeted and compromised operational technology (OT) and industrial control systems (ICS) in Poland’s Energy Sector—specifically renewable […]

Mehr lesen →
📄

CISA Adds Six Known Exploited Vulnerabilities to Catalog

CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) […]

Mehr lesen →
📄

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2025-Adresse geschuetzt CVE-2026-Adresse geschuetzt These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited […]

Mehr lesen →
📄

Update from the IFPA on opt-out policy

The IFPA has been monitoring the impact of opt-outs on competition results and on TD feedback about pressure from players. Given those impacts and the IFPA’s focus on competitive result integrit

Mehr lesen →
📄

Neues Verfahren bewahrt Zertifizierung bei Software-Updates

Mit einem neuen Verfahren ermöglicht das BSI künftig, Software auch nach Updates ohne erneute Zertifizierung als konform auszuweisen. Damit können Hersteller deutlich schneller sicherheitsrelevante Updates ausspielen und gleichzeitig die Zertifizierung ihres Produktes beibehalten. Voraussetzung dafür ist eine Zertifizierung nach der TR-03185.

Mehr lesen →