security

📅 Kalender

< February 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1
2
3
4
5
6
7
8
9
1011
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
soc

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2025-Adresse geschuetzt CVE-2026-Adresse geschuetzt These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited […]

Mehr lesen →
security

Neues Verfahren bewahrt Zertifizierung bei Software-Updates

Mit einem neuen Verfahren ermöglicht das BSI künftig, Software auch nach Updates ohne erneute Zertifizierung als konform auszuweisen. Damit können Hersteller deutlich schneller sicherheitsrelevante Updates ausspielen und gleichzeitig die Zertifizierung ihres Produktes beibehalten. Voraussetzung dafür ist eine Zertifizierung nach der TR-03185.

Mehr lesen →
security

Aktuelle Cyberangriffe auf deutsche Unternehmen 2026

Cyberkriminelle machen vor keiner Branche Halt. Schon 2025 wurden zahlreiche Unternehmen, unabhängig von ihrer Größe, Ziel eines Cyber­angriffs. Die Bedrohung wächst auch 2026 und niemand bleibt verschont. Hier finden Sie eine Übersicht der deutschen Unternehmen, die in diesem Jahr gehackt wurden.

Mehr lesen →
soc

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2019-19006 Sangoma FreePBX Improper Authentication Vulnerability CVE-2021-39935 GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability CVE-2025-40551 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability CVE-2025-64328 Sangoma FreePBX OS Command Injection Vulnerability  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) […]

Mehr lesen →
security

Please Don’t Feed the Scattered Lapsus ShinyHunters

A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… Read More »

Mehr lesen →
soc

Fortinet Releases Guidance to Address Ongoing Exploitation of Authentication Bypass Vulnerability CVE-2026-24858

Newly disclosed vulnerability Common Vulnerabilities and Exposures (CVE)-2026-24858 [Common Weakness Enumeration (CWE)-288: Authentication Bypass Using an Alternate Path or Channel] allows malicious actors with a FortiCloud account and a registered device to log in to separate devices registered to other users in FortiOS, FortiManager, FortiWeb, FortiProxy, and FortiAnalyzer, if FortiCloud single sign on (SSO) is […]

Mehr lesen →
soc

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2018-Adresse geschuetzt CVE-2025-Adresse geschuetzt CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing […]

Mehr lesen →
soc

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2024-Adresse geschuetzt  This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities […]

Mehr lesen →