Zum Inhalt springen
ITtechNews
  • Datenschutzbeauftragter & Skillset
  • Externer ISB/CISO und NIS2/27001 Consulting
  • Blog IT-Security
  • Datenschutzerklärung
  • Impressum
Suche
ITtechNews
Menü schließen
  • Datenschutzbeauftragter & Skillset
  • Externer ISB/CISO und NIS2/27001 Consulting
  • Blog IT-Security
  • Datenschutzerklärung
  • Impressum
ITtechNews
Suche Menü umschalten

Apple iOS 14.8 Update dringend installieren

Von Michael14. September 202116. Dezember 2025Uncategorized

Kurz vor dem Release von iOS 15 hat Apple heute noch ein wichtiges Security-Update veröffentlicht.Es gibt wohl mehrere Zero-Day Exploits, deshalb schnellstmöglich die Geräte aktualisieren.

Angriffsszenario:
Sophos Link
Apple Sicherheitshinweis

Beitragsnavigation

Microsoft Exchange Zero Day Schwachstelle
Apple iOS 17.5 released

RSS Golem Security News

  • Nur schwer löschbar: Android-Malware millionenfach über Google Play verteilt 2. April 2026
    Eine über den Google Play Store verbreitete Android-Malware nutzt alte Lücken aus, um tief ins System einzudringen. Anwender merken davon nichts. (Malware, Virus)
  • Cyberangriff auf Hasbro: Hacker infiltrieren IT von großem Spielwarenkonzern 2. April 2026
    Ein Angreifer ist in die IT-Umgebung von Hasbro eingedrungen. Der Spielwarenhersteller rechnet mit einer Aufarbeitungszeit von mehreren Wochen. (Cybercrime, Cyberwar)
  • Whatsapp warnt: iPhone-Nutzer mit Spyware attackiert 2. April 2026
    Einige iPhone-Nutzer haben kürzlich Warnmeldungen von Whatsapp erhalten. Ihre Geräte sollen mit einer Spyware infiziert worden sein. (Spionage, iPhone)
  • Gigabyte Control Center: Schadcode-Lücke in verbreitetem Hardware-Steuertool 1. April 2026
    Viele Nutzer mit Gigabyte-Hardware verwenden das Gigabyte Control Center. Eine Lücke darin lässt Angreifer unter anderem Schadcode einschleusen. (Sicherheitslücke, Notebook)
  • Kein freies Internet: Russland schränkt VPN-Verbindungen weiter ein 1. April 2026
    IT-Unternehmen drohen Strafen, wenn sie ihre Plattformen für Nutzer mit VPN-Verbindungen nicht einschränken. (Russland, Datenschutz)
  • Vim und Emacs: Claude liefert auf Zuruf gefährliche Schadcode-Exploits 1. April 2026
    Forscher haben Claude mit Fake-Gerüchten dazu verleitet, Exploit-Code für bisher unbekannte Sicherheitslücken in Vim und Emacs zu generieren. (Sicherheitslücke, KI)
  • Schadcode per Klick: Attackierte Chrome-Lücke gefährdet Millionen von Nutzern 1. April 2026
    In Google Chrome klafft eine Sicherheitslücke, mit der sich per Webseitenaufruf Schadcode einschleusen lässt. Angreifer nutzen das bereits aus. (Sicherheitslücke, Browser)

RSS CERT EU

  • 2026-004: Critical Vulnerability in SharePoint Exploited 25. März 2026
    On 17 March 2026, Microsoft updated one of its January 2026 security advisories related to a remote code execution vulnerability in Microsoft SharePoint. Specifically, Microsoft raised the CVSS score and changed the FAQ section to indicate that the vulnerability could be exploited by an unauthenticated attacker. This vulnerability was added in the CISA's Known Exploited […]
  • 2026-003: Multiple Vulnerabilities in Citrix NetScaler and Citrix ADC 23. März 2026
    On 23 March 2026, Citrix published a security advisory addressing multiple vulnerabilities affecting NetScaler ADC and NetScaler Gateway. These vulnerabilities may lead to sensitive information disclosure and user session mix-up under specific configurations. At the time of writing, there is no public evidence of active exploitation. It is strongly recommended updating affected gateways, prioritising internet-facing […]
  • 2026-002: Multiple Vulnerabilities in Cisco Products 26. Februar 2026
    On 25 February 2026, Cisco released security advisories addressing multiple high and critical severity vulnerabilities in Cisco Catalyst SD-WAN controllers and Cisco SD-WAN Manager. If exploited, these vulnerabilities could allow attackers to gain administrative access to compromised systems. It is recommended to capture forensic evidence, hunt for indicators of compromise, and apply updates as soon […]
  • 2026-001: Critical vulnerabilities in Ivanti EPMM 30. Januar 2026
    On 29 January 2026, Ivanti released a security advisory addressing two critical vulnerabilities in their EPMM products. An attacker could exploit those flaws to achieve unauthenticated remote code execution on the vulnerable device. One of these vulnerabilities have been exploited in a limited number of cases.
  • 2025-042: Critical Vulnerability in Cisco Secure Email and Web Manager 18. Dezember 2025
    On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. It is recommended to follow Cisco's recommendations to check whether vulnerable appliances have been compromised, and to remediate the issue. There is no patch available for this vulnerability yet.
  • 2025-041: Critical Security Vulnerability in React Server Components 4. Dezember 2025
    On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests. It is recommended to update all affected component packages and any frameworks that integrate them.
  • 2025-040: Critical Vulnerability in Windows Server Update Service (WSUS) 24. Oktober 2025
    On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulnerability. It is recommended to update as soon as possible.
  • 2025-039: High Severity Vulnerability in FortiOS 15. Oktober 2025
    On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product. It is recommended updating affected products.
  • 2025-038: Critical Vulnerabilities in Veeam Backup 15. Oktober 2025
    On October 14, 2025, Veeam released a security advisory addressing multiple vulnerabilities including 2 critical in its Veeam Backup product. CERT-EU recommends updating affected software as soon as possible and following Veeam implementation best practices.
  • 2025-037: Multiple Vulnerabilities in F5 Products 15. Oktober 2025
    On October 15, 2025, F5 disclosed that a sophisticated nation-state actor breached its systems and maintained long-term persistent access into F5's infrastructure. This included access to BIG-IP product development source code and to information related to security vulnerabilities that had not yet been disclosed nor patched. F5 released patches on the same day to address […]
© 2026 ITtechNews.