techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.8K
active users

#Patchday

18 posts15 participants1 post today
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/AcronisCyberProtect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AcronisCyberProtect</span></a>: Mehrere teils kritische Sicherheitslücken | Security <a href="https://www.heise.de/news/Acronis-Cyber-Protect-Mehrere-teils-kritische-Sicherheitsluecken-10433266.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Acronis-Cyber-Pr</span><span class="invisible">otect-Mehrere-teils-kritische-Sicherheitsluecken-10433266.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/Acronis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Acronis</span></a></p>
Scripter :verified_flashing:<p>Patchday Android: Angreifer können sich höhere Rechte verschaffen | heise online<br><a href="https://heise.de/-10424643" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-10424643</span><span class="invisible"></span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/Betriebssystem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Betriebssystem</span></a> <a href="https://social.tchncs.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> :android: : Angreifer können sich höhere Rechte verschaffen | Security <a href="https://www.heise.de/news/Patchday-Android-Angreifer-koennen-sich-hoehere-Rechte-verschaffen-10424643.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Patchday-Android</span><span class="invisible">-Angreifer-koennen-sich-hoehere-Rechte-verschaffen-10424643.html</span></a> <a href="https://social.tchncs.de/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> :google:</p>
Marcel SIneM(S)US<p>Angriffe laufen: <a href="https://social.tchncs.de/tags/Connectwise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Connectwise</span></a>, <a href="https://social.tchncs.de/tags/CraftCMS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CraftCMS</span></a> und <a href="https://social.tchncs.de/tags/Asus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Asus</span></a>-Router im Visier | Security <a href="https://www.heise.de/news/Warnung-vor-Angriffen-auf-Connectwise-Craft-CMS-und-Asus-Router-10424978.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Warnung-vor-Angr</span><span class="invisible">iffen-auf-Connectwise-Craft-CMS-und-Asus-Router-10424978.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a></p>
heise online English<p>Security updates: Dell fixes PowerScale OneFS and Bluetooth drivers</p><p>To prevent attacks on Dell computers and NAS systems, the developers have closed security gaps. </p><p><a href="https://www.heise.de/en/news/Security-updates-Dell-fixes-PowerScale-OneFS-and-Bluetooth-drivers-10429454.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Security-upda</span><span class="invisible">tes-Dell-fixes-PowerScale-OneFS-and-Bluetooth-drivers-10429454.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bluetooth</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Sicherheitsupdates: Dell repariert PowerScale OneFS und Bluetooth-Treiber</p><p>Um Attacken auf Computer und NAS-Systeme von Dell vorzubeugen, haben die Entwickler Sicherheitslücken geschlossen. </p><p><a href="https://www.heise.de/news/Sicherheitsupdates-Dell-repariert-PowerScale-OneFS-und-Bluetooth-Treiber-10428636.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitsupdat</span><span class="invisible">es-Dell-repariert-PowerScale-OneFS-und-Bluetooth-Treiber-10428636.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bluetooth</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> :google: stopft attackierte Lücke in <a href="https://social.tchncs.de/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> | Security <a href="https://www.heise.de/news/Google-stopft-attackierte-Luecke-in-Chrome-10423201.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Google-stopft-at</span><span class="invisible">tackierte-Luecke-in-Chrome-10423201.html</span></a> <a href="https://social.tchncs.de/tags/ChromeBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChromeBrowser</span></a> <a href="https://social.tchncs.de/tags/GoogleChrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleChrome</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a></p>
Marcel SIneM(S)US<p>Irgendwie verstehe ich das Problem nicht: Wieso wird etwas auf einen Lautsprecher KOPIERT? 🤔 Es wird doch "nur" gestreamed :mastoshrug: </p><p><a href="https://social.tchncs.de/tags/Sonos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sonos</span></a>-Lautsprecher: Weitere <a href="https://social.tchncs.de/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pwn2Own</span></a>-Lücke gestopft | Security <a href="https://www.heise.de/news/Sonos-Lautsprecher-Weitere-Pwn2Own-Luecke-gestopft-10423249.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sonos-Lautsprech</span><span class="invisible">er-Weitere-Pwn2Own-Luecke-gestopft-10423249.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a></p>
Marcel SIneM(S)US<p>Angreifer können <a href="https://social.tchncs.de/tags/Roundcube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Roundcube</span></a> Webmail mit Schadcode attackieren | Security <a href="https://www.heise.de/news/Kritische-Schadcode-Luecke-bedroht-Roundcube-Webmail-10423965.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Kritische-Schadc</span><span class="invisible">ode-Luecke-bedroht-Roundcube-Webmail-10423965.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/RoundcubeWebmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RoundcubeWebmail</span></a></p>
heise online English<p>Patchday Android: Attackers can gain higher rights</p><p>Important security updates close several gaps in Android 13, 14 and 15. Attackers are targeting devices with Qualcomm processors. </p><p><a href="https://www.heise.de/en/news/Patchday-Android-Attackers-can-gain-higher-rights-10424798.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Patchday-Andr</span><span class="invisible">oid-Attackers-can-gain-higher-rights-10424798.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Mobiles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mobiles</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Qualcomm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Qualcomm</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
techUpdate.io<p>Google schließt gefährliche Android-Sicherheitslücke mit Juni-Update</p><p><a href="https://techupdate.io/android/google-schliesst-gefaehrliche-android-sicherheitsluecke-mit-juni-update/50430/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techupdate.io/android/google-s</span><span class="invisible">chliesst-gefaehrliche-android-sicherheitsluecke-mit-juni-update/50430/</span></a></p><p><a href="https://mastodon.social/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://mastodon.social/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://mastodon.social/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://mastodon.social/tags/securityupdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityupdate</span></a> <a href="https://mastodon.social/tags/patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patchday</span></a></p>
heise Security<p>Patchday Android: Angreifer können sich höhere Rechte verschaffen</p><p>Wichtige Sicherheitsupdates schließen mehrere Lücken in Android 13, 14 und 15. Angreifer attackieren Geräte mit Qualcomm-Prozessor. </p><p><a href="https://www.heise.de/news/Patchday-Android-Angreifer-koennen-sich-hoehere-Rechte-verschaffen-10424643.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Patchday-Android</span><span class="invisible">-Angreifer-koennen-sich-hoehere-Rechte-verschaffen-10424643.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Mobiles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mobiles</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Qualcomm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Qualcomm</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online English<p>Security update: Various attacks on HPE StoreOnce possible</p><p>HPE's backup solution StoreOnce is vulnerable. The developers have closed several security gaps in the current version. </p><p><a href="https://www.heise.de/en/news/Security-update-Various-attacks-on-HPE-StoreOnce-possible-10423541.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Security-upda</span><span class="invisible">te-Various-attacks-on-HPE-StoreOnce-possible-10423541.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Marcel SIneM(S)US<p>Jetzt patchen! Attacken auf Webforen auf <a href="https://social.tchncs.de/tags/vBulletin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vBulletin</span></a>-Basis | Security <a href="https://www.heise.de/news/Jetzt-patchen-Attacken-auf-Webforen-auf-vBulletin-Basis-10421764.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-At</span><span class="invisible">tacken-auf-Webforen-auf-vBulletin-Basis-10421764.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a></p>
Marcel SIneM(S)US<p>Anonymisierendes <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> :tux: : Mini-Softwareupdates in <a href="https://social.tchncs.de/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a> 6.16 | Security <a href="https://www.heise.de/news/Anonymisierendes-Linux-Tails-6-16-mit-Mini-Softwareupdates-10421913.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Anonymisierendes</span><span class="invisible">-Linux-Tails-6-16-mit-Mini-Softwareupdates-10421913.html</span></a> <a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a></p>
heise Security<p>Sicherheitsupdate: Vielfältige Attacken auf HPE StoreOnce möglich</p><p>HPEs Backuplösung StoreOnce ist verwundbar. In der aktuellen Ausgabe haben die Entwickler mehrere Sicherheitslücken geschlossen. </p><p><a href="https://www.heise.de/news/Sicherheitsupdate-Vielfaeltige-Attacken-auf-HPE-StoreOnce-moeglich-10423179.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitsupdat</span><span class="invisible">e-Vielfaeltige-Attacken-auf-HPE-StoreOnce-moeglich-10423179.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online English<p>Patch now! Attacks on web forums based on vBulletin</p><p>Attackers are currently exploiting a critical vulnerability in vBulletin. Updates contain the danger.</p><p><a href="https://www.heise.de/en/news/Patch-now-Attacks-on-web-forums-based-on-vBulletin-10421901.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Patch-now-Att</span><span class="invisible">acks-on-web-forums-based-on-vBulletin-10421901.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Jetzt patchen! Attacken auf Webforen auf vBulletin-Basis</p><p>Derzeit nutzen Angreifer eine kritische Sicherheitslücke in vBulletin aus. Updates dämmen die Gefahr ein.</p><p><a href="https://www.heise.de/news/Jetzt-patchen-Attacken-auf-Webforen-auf-vBulletin-Basis-10421764.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-At</span><span class="invisible">tacken-auf-Webforen-auf-vBulletin-Basis-10421764.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Marcel SIneM(S)US<p>«Ist ein Gerät kompromittiert, helfe nur das Zurücksetzen auf die Werkseinstellung und die manuelle Neukonfiguration.»<br>— Habe schon befürchtet, dass kompromittierte Router dem Elektroschrott zugeführt werden müssten</p><p>Neustart und Firmware-Update zwecklos: Tausende <a href="https://social.tchncs.de/tags/Asus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Asus</span></a>-<a href="https://social.tchncs.de/tags/Router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Router</span></a> kompromittiert | Security <a href="https://www.heise.de/news/Neustart-und-Firmware-Update-zwecklos-Tausende-Asus-Router-kompromittiert-10420221.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Neustart-und-Fir</span><span class="invisible">mware-Update-zwecklos-Tausende-Asus-Router-kompromittiert-10420221.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a></p>
heise online English<p>Malicious code attacks on IBM Db2 and Tivoli Monitoring possible</p><p>Attackers can attack IBM Db2 and Tivoli Monitoring. Security updates close several vulnerabilities. </p><p><a href="https://www.heise.de/en/news/Malicious-code-attacks-on-IBM-Db2-and-Tivoli-Monitoring-possible-10420548.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Malicious-cod</span><span class="invisible">e-attacks-on-IBM-Db2-and-Tivoli-Monitoring-possible-10420548.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>