News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Again vulnerabilities in Android 11, 12, 13
B2B Cyber ​​Security ShortNews

Android published a new list of over 40 vulnerabilities for Android 11, 12 and 13 in May. The good news: there are no critical vulnerabilities. The bad: apart from one gap, all others are considered highly dangerous. The first manufacturers are already rolling out the updates. Users should check the update area of ​​the smartphone more often and possibly initiate the update manually. In Google's security bulletin for May there is again a very long list of security problems. They cover the areas of frame, system, kernel or graphics. Almost all of the listed vulnerabilities are classified by Google...

Read more

Chrome seals 7 highly dangerous gaps
B2B Cyber ​​Security ShortNews

Chrome's bug bounty program is worth it: programmers and specialists reported 7 highly dangerous vulnerabilities to Google and received a reward. Google also immediately provides the updates for users. Sole proprietorships and SMEs should be prepared to click one more time. The latest Chrome update contains 7 updates for high-risk vulnerabilities. In companies, the admins ensure that Chrome remains up to date. Individual companies and SMEs should definitely click in the help area - the further update happens automatically. Work PCs often run through and as long as the browser is not closed and restarted...

Read more

Zoom: Highly Dangerous Vulnerabilities
B2B Cyber ​​Security ShortNews

An update is recommended for users of Zoom clients on various systems. Of the currently reported vulnerabilities, two are classified as highly dangerous and three others as moderately dangerous. Zoom provides appropriate security updates for Android, iOS, Linux, macOS and Windows. The vulnerabilities reported by Zoom are 8.3 and 7.2 according to CVSS. These are not considered critical, but should be patched immediately. Zoom provides suitable patches or software updates for this. Vulnerabilities with CVSS 8.3 and 7.2 The first vulnerability with CVSS 8.3 concerns the “Incorrect implementation of trust boundary for SMB in Zoom clients”…

Read more

Indispensable: patch automation for endpoints
Essential: Patch automation for endpoints

Patching endpoints is one of the most important, but also one of the most time-consuming activities of IT departments. Automation solutions reduce the effort considerably, but not every tool delivers what it promises. Five features that provide real relief. Patching often feels like Sisyphean work for IT departments, especially updating third-party applications. There are usually a few dozen of these in the company, which causes a veritable flood of patches. Each one has to be tested on different systems and then gradually rolled out to thousands of computers - without patch automation, that's...

Read more

Splunk rolls out 12 security patches - 9 are 'High'
B2B Cyber ​​Security ShortNews

Manufacturer Splunk has to fill a lot of gaps with security patches in its planned 3-month updates. Of the 12 updates listed, Splunk 9 rates itself as Highly Dangerous. In addition, there are 2 third-party updates that are also classified as Highly Dangerous. The list of security patches for Splunk Enterprise products is long. In addition to the vulnerabilities published months ago, there are another 12 vulnerabilities and an additional 2 vulnerabilities from third parties in the planned, quarterly patch list. Right now, administrators and CISOs should pay attention to the published list that 9 of the 12 vulnerabilities are...

Read more

Trend Micro Apex One: Patches for critical vulnerabilities
Trend Micro News

Trend Micro is informing its customers that important security updates for vulnerabilities are available for the Apex One platform. The company itself classifies some updates as critical. Common Vulnerability Scoring System Version 3.0 (CVSS v3) scores range from 6,7 to 9,1 out of 10. Organizations deploying Apex One 2019 (on-prem) or Apex One SaaS protection should consider Trend's latest security alerts Take micros seriously. There is a whole series of patches for security vulnerabilities. Some of the gaps are classified as High or even Critical. However, you can…

Read more

Dangerous vulnerabilities in Thunderbird and Firefox
B2B Cyber ​​Security ShortNews

Mozilla publishes new vulnerabilities in Thunderbird, Firefox and Firefox ESR and rates them as Important. Users or company admins should ensure quick updates, as there is a risk that malicious code can be executed. In the list of vulnerabilities, these are all classified as “high” in terms of danger. After that, only Critical comes as the highest level. Mozilla defines it this way: “Vulnerabilities can be used to collect sensitive data from websites in other windows or to inject data or code into these websites, requiring no more than normal browsing actions.” It sounds…

Read more

CVE hotspots at a glance
CVE hotspots at a glance

Spotlights at a glance: WatchGuard launches new CVE overview page. Single point of contact for WatchGuard users, MSPs and channel partners lists important information about potential security vulnerabilities. With the new CVE overview page, WatchGuard's Product Security Incident Response Team (PSIRT) has created a platform that is specifically aimed at all users, MSPs and channel partners of WatchGuard products. This lists currently known vulnerabilities and vulnerabilities (Common Vulnerabilities and Exposures, CVE) in detail and offers further information on how to deal with these anomalies - across the entire WatchGuard portfolio. In addition,…

Read more

Log4j: Kaspersky registers 30.000 scans for vulnerabilities
Log4j Log4shell

Although the Apache Foundation released a patch shortly after the discovery of Log4j / Log4Shell, this vulnerability continues to pose a major threat to consumers and businesses. Kaspersky products blocked 30.562 attack attempts in the first three weeks of January. The vulnerability is extremely attractive to cyber criminals as it is easy to exploit and allows them to take complete control over the victim's system. Log4j: Kaspersky already blocked over 150.000 attacks Since initial reporting, Kaspersky products have detected and blocked 154.098 attempts to scan and attack devices by targeting…

Read more

Dangerous contaminated sites: old unpatched vulnerabilities
Dangerous contaminated sites: old unpatched vulnerabilities

Unpatched software vulnerabilities remain attractive targets for cyber criminals long after they have been discovered. The contaminated sites do not resolve themselves. An analysis by Barracuda shows how dangerous this can be. It can be a fatal fallacy to believe that identified software vulnerabilities are no longer dangerous. Anyone who is careless and thinks to wait before closing the gateway, which is urgently needed, because there are currently much more important things to do within their own IT infrastructure, is vastly mistaken. Because it is precisely this negligence that many hackers rely on and look one more time where ...

Read more