Author: wordpress

[UPDATE] [mittel] Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen

Ein lokaler Angreifer kann mehrere Schwachstellen in unterschiedlichen Intel Prozessoren ausnutzen, um Informationen offenzulegen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung…

Banshee Radio: Nokia liefert Mobilfunk-in-a-Box an US Marines

Nokia vertieft seine Beziehungen zu den USA weiter. Für den Kriegsfall liefert das Unternehmen moderne Mobilfunkausrüstung als privates Netzwerk. (Nokia, Server) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Banshee Radio: Nokia liefert Mobilfunk-in-a-Box an…

AI Is Already in Your Org—Are You Securing It All?

It’s been impossible to avoid the buzz around generative AI, especially since ChatGPT took the world by storm. And while tools like DeepSeek, Mistral, and LLaMA are reshaping the open-source frontier, one thing is certain: generative AI is here to…

Critical 0-Day in Windows DWM Enables Privilege Escalation

Microsoft has disclosed a significant security vulnerability (CVE-2025-30400) affecting the Windows Desktop Window Manager (DWM) that is actively being exploited in the wild. The flaw, rated as “Important” with a CVSS score of 7.8, allows attackers with local access to…

Insider risk management needs a human strategy

Insider risk is not just about bad actors. Most of the time, it’s about mistakes. Someone sends a sensitive file to the wrong address, or uploads a document to their personal cloud to work from home. In many cases, there…

Cerbos: Open-source, scalable authorization solution

Cerbos is an open-source solution designed to simplify and modernize access control for cloud-native, microservice-based applications. Instead of hardcoding authorization logic into your application, Cerbos lets you write flexible, context-aware access policies using a YAML syntax. These policies are managed…

IT Security News Hourly Summary 2025-05-14 06h : 3 posts

3 posts were published in the last hour 4:4 : Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network 4:4 : Ransomware spreads faster, not smarter 3:34 : CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution

European Vulnerability Database goes live, but who benefits?

The European Union Agency for Cybersecurity (ENISA) has unveiled the European Vulnerability Database (EUVD), an initiative under the NIS2 Directive aimed at enhancing digital security across the EU. The database serves as a centralized repository offering aggregated and actionable information…

Ransomware spreads faster, not smarter

The fall of two of the most dominant ransomware syndicates, LockBit and AlphV, triggered a power vacuum across the cybercriminal landscape, acccording to a Black Kite survey. In their place, dozens of new actors emerged, many of them lacking the…