security

📅 Kalender

< May 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1234567891011
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
security

Who is the Kimwolf Botmaster “Dort”?

In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world’s largest and most disruptive botnet. Since then, the person in control of Kimwolf — who goes by the handle „Dort“ — has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks […]

Mehr lesen →
soc

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2022-20775 Cisco Catalyst SD-WAN Path Traversal Vulnerability CVE-2026-20127 Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the […]

Mehr lesen →
security

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand’s real website, and […]

Mehr lesen →
soc

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-Adresse geschuetzt(SSRF) Vulnerability CVE-2026-Adresse geschuetzt(RP4VMs) Use of Hard-coded Credentials Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing […]

Mehr lesen →
security

Digitale Souveränität gemeinsam gestalten: BSI und Schwarz Digits schließen strategische Partnerschaft

Im Rahmen der Münchner Sicherheitskonferenz haben das BSI und Schwarz Digits, die IT-Sparte der Schwarz Gruppe, eine strategische Kooperation vereinbart. Ziel ist unter anderem die gemeinsame Entwicklung souveräner Cloud-Lösungen, die auch für den Einsatz in der Bundes- und in den Landesverwaltungen nutzbar gemacht werden können.

Mehr lesen →
security

Cyber-Direktorentreffen und Cyber Security Conference in München: Steigender Bedarf nach automatisierter Verteidigung

Die Spitzen der europäischen Cybersicherheitsbehörden haben sich zum Cyber Security Directors‘ Meeting im Rahmen der Munich Cyber Security Conference getroffen. Sie tauschten sich u.a. zu digitaler Souveränität und der Umsetzung der europäischen Regulierungen NIS-2 und CRA sowie der automatisierten Detektion und Abwehr von Cyberangriffen aus.

Mehr lesen →
security

Kimwolf Botnet Swamps Anonymity Network I2P

For the past week, the massive „Internet of Things“ (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to […]

Mehr lesen →