security

📅 Kalender

< April 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1234567891011121314151617
18
19
20
21
22
23
24
25
26
27
28
29
30
soc

Fortinet Releases Guidance to Address Ongoing Exploitation of Authentication Bypass Vulnerability CVE-2026-24858

Newly disclosed vulnerability Common Vulnerabilities and Exposures (CVE)-2026-24858 [Common Weakness Enumeration (CWE)-288: Authentication Bypass Using an Alternate Path or Channel] allows malicious actors with a FortiCloud account and a registered device to log in to separate devices registered to other users in FortiOS, FortiManager, FortiWeb, FortiProxy, and FortiAnalyzer, if FortiCloud single sign on (SSO) is […]

Mehr lesen →
soc

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2018-Adresse geschuetzt CVE-2025-Adresse geschuetzt CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt CVE-2026-Adresse geschuetzt These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing […]

Mehr lesen →
soc

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2024-Adresse geschuetzt  This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities […]

Mehr lesen →
security

E-Mail-Sicherheit: BSI untersucht E-Mail-Programme

In unserem E-Mail-Programm lesen, schreiben und verwalten wir all unsere E-Mails. Entsprechend gut müssen sie vor Risiken durch Dritte geschützt werden. Das BSI hat untersucht, inwiefern E-Mail-Programme relevante Eigenschaften, wie Transport- und Inhaltsverschlüsselung oder SPAM-, Phishing- und Tracking-Schutz umsetzen.

Mehr lesen →
security

Untersuchung: BSI identifiziert Verbesserungsbedarf bei Passwortmanagern

Aufgrund der Sensibilität der in Passwortmanagern gespeicherten Daten bestehen hohe Anforderungen an deren IT-Sicherheit. Zur Prüfung der Umsetzung dieser Anforderungen hat das BSI gemeinsam mit dem FZI Forschungszentrum Informatik die IT-Sicherheitseigenschaften von zehn ausgewählten Passwortmanagern untersucht.

Mehr lesen →