Um alle Funktionen dieser Website optimal nutzen zu können, benötigen Sie JavaScript.
Eine Anleitung, wie Sie JavaScript in Ihrem Browser einschalten, finden Sie hier.

Die aktuelle Sicherheitslage

Im folgenden finden Sie aktuelle Sicherheitsnews als RSS-Feeds von BSI, Heise, TrendMicro und TecTarget. Wenn Sie eine interessante Überschrift sehen – klicken Sie sie an und lassen Sie sich zu dem Artikel auf der Website des jeweiligen Anbieters führen.

Außerdem stellen wir Ihnen hier das Sicherheitsbarometer des DsiN zur Verfügung, dem Sie die aktuelle Bedrohungslage als Ampelsystem mit Hinweisen zu sehr wichtigen Updates entnehmen können. Bitte aktualisieren immer zeitnah Ihr Betriebssystem, also z.B. Windows, sowie die Programme von Adobe, z.B. Reader und FlashPlayer, Ihre installierte Java-Version und die von Ihnen verwendeten Browser.

Sie sind sich unsicher, ob diese immer aktuell erfolgen? Rufen Sie uns an: ITR.NetWork GmbH, 55278 Selzen 0700 - 487 638 00

Nachrichten der von uns selektierten Anbieter

TrendMicro

This Week in Security News: Senate Hearings and Equifax Breaches

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, leaders of six security agencies testified before the Senate Intelligence Committee, the Equifax hack grew in severity, and hackers used the power of Machine Learning to spread...

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 12, 2018

Valentine’s Day was earlier this week, and there was so much love in the air. There was also a lot of love in the Trend Micro world as our teams worked diligently to make sure our customers were protected from this month’s bevy of critical vulnerabilities across several vendors. This week, we focus on Microsoft,...

How Hackers Are Leveraging Machine Learning

Machine learning can be leveraged for both beneficial enterprise purposes as well as malicious activity.Unfortunately, like many advanced and innovative technological processes, machine learning can be leveraged for both beneficial enterprise purposes as well as malicious activity.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 5, 2018

It was a busy week in the cyber security world, but it shouldn’t be surprising given that the 2018 Winter Olympics in Pyeongchang have begun. I shouldn’t blame just the Olympics, but it’s hard not to given the international focus, controversy around the ban of certain athletes and its proximity to a certain country. So...

This Week in Security News: Botnets and Breaches

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, North Korean hackers overtook Adobe, Trend Micro Safety Solutions discovered new a botnet, and the threat of third-party cyber breaches made large corporations rethink their strategy. Read...

Security Glue Between the Silos of Endpoint, Server, Cloud and Network Security Gets More Critical

Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to become Endpoints, as mobile devices proliferated and they were assembled into a collective of being in the category of not-a-server. But as practitioners know, it isn’t...

A Look Back: Reviewing the Worst Cyber Attacks of 2017 and the Lessons Learned

Unsurprisingly, 2017 was another year of record-high attacks and breaches.Hackers aren’t easing up on business or consumer targets anytime soon. So the best course of action for the industry to take is to apply the lessons learned from these attacks to future protection strategies.

How hackers recycle top threats

Just like white hat developers, hackers have been known to reuse and recycle code.Hackers have recycled and repacked older exploits that worked well in the past to create a completely new threat.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 29, 2018

Late last year, Trend Micro introduced its Security Predictions for 2018. One of the predictions stated that digital extortion will be at the core of most cybercriminals’ business model. It’s much more than just ransomware – it is the most successful criminal business model in the current threat landscape. Valuable information is accessible throughout corporate...

This Week in Security News: Magic Quadrants & Global Threats

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Gartner released its Magic Quadrant Leaders, Data Privacy Day gave us a moment to reflect, and U.K. and U.S. governments alike acted to protect their agencies from vulnerabilities....