security

📅 Kalender

< April 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1234567891011121314151617
18
19
20
21
22
23
24
25
26
27
28
29
30
soc

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-Adresse geschuetzt(SSRF) Vulnerability CVE-2026-Adresse geschuetzt(RP4VMs) Use of Hard-coded Credentials Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing […]

Mehr lesen →
soc

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2008-0015 Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability CVE-2020-7796 Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability CVE-2024-7694 TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability CVE-2026-2441 Google Chromium CSS […]

Mehr lesen →
security

Digitale Souveränität gemeinsam gestalten: BSI und Schwarz Digits schließen strategische Partnerschaft

Im Rahmen der Münchner Sicherheitskonferenz haben das BSI und Schwarz Digits, die IT-Sparte der Schwarz Gruppe, eine strategische Kooperation vereinbart. Ziel ist unter anderem die gemeinsame Entwicklung souveräner Cloud-Lösungen, die auch für den Einsatz in der Bundes- und in den Landesverwaltungen nutzbar gemacht werden können.

Mehr lesen →
security

Cyber-Direktorentreffen und Cyber Security Conference in München: Steigender Bedarf nach automatisierter Verteidigung

Die Spitzen der europäischen Cybersicherheitsbehörden haben sich zum Cyber Security Directors‘ Meeting im Rahmen der Munich Cyber Security Conference getroffen. Sie tauschten sich u.a. zu digitaler Souveränität und der Umsetzung der europäischen Regulierungen NIS-2 und CRA sowie der automatisierten Detektion und Abwehr von Cyberangriffen aus.

Mehr lesen →
soc

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-Adresse geschuetzt CVE-2025-Adresse geschuetzt++ Download of Code Without Integrity Check Vulnerability CVE-2025-Adresse geschuetzt CVE-2026-Adresse geschuetzt These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding […]

Mehr lesen →
security

Kimwolf Botnet Swamps Anonymity Network I2P

For the past week, the massive „Internet of Things“ (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to […]

Mehr lesen →