Zum Inhalt springen
ITtechNews
  • Datenschutzbeauftragter & Skillset
  • Externer ISB/CISO und NIS2/27001 Consulting
  • Blog IT-Security
  • Datenschutzerklärung
  • Impressum
Suche
ITtechNews
Menü schließen
  • Datenschutzbeauftragter & Skillset
  • Externer ISB/CISO und NIS2/27001 Consulting
  • Blog IT-Security
  • Datenschutzerklärung
  • Impressum
ITtechNews
Suche Menü umschalten

Apple iOS 14.8 Update dringend installieren

Von Michael14. September 202116. Dezember 2025Uncategorized

Kurz vor dem Release von iOS 15 hat Apple heute noch ein wichtiges Security-Update veröffentlicht.Es gibt wohl mehrere Zero-Day Exploits, deshalb schnellstmöglich die Geräte aktualisieren.

Angriffsszenario:
Sophos Link
Apple Sicherheitshinweis

Beitragsnavigation

Microsoft Exchange Zero Day Schwachstelle
Apple iOS 17.5 released

RSS Golem Security News

  • Webserver gefährdet: 18 Jahre alte Sicherheitslücke in Nginx entdeckt 15. Mai 2026
    Nginx-Webserver sollen sich durch eine seit 2008 präsente Lücke zum Absturz bringen lassen. Manchmal ist wohl auch eine Schadcodeausführung möglich. (Sicherheitslücke, Server-Applikationen)
  • (g+) .NET-Binarys mit dnSpy analysieren: Patchen statt Raten 15. Mai 2026
    Wer Intermediate Language mit dnSpy lesen und behutsam verändern kann, gewinnt einen Blick auf Code, der sonst verborgen bleibt. (Softwareentwicklung, Malware)
  • Mithilfe von Mythos Preview: Forscher entwickeln Exploit für Apples M5-Hardware 15. Mai 2026
    Durch den Einsatz von Mythos hat es nur sechs Tage gedauert, bis Apples Memory Integrity Enforcement umgangen werden konnte. (KI, Apple)
  • Fragnesia: Schon wieder gefährliche Root-Lücke im Linux-Kernel 15. Mai 2026
    Dirty Frag und Copy Fail beschäftigen bereits unzählige Linux-Admins. Die nächste Root-Lücke ist bereits identifiziert - und die Patches sind spät dran. (Sicherheitslücke, Linux-Kernel)
  • Google: 15 GByte Gratisspeicher nur noch gegen Telefonnummer? 15. Mai 2026
    Google ist mit 15 GByte Gratisspeicher bislang großzügiger als etwa Apple. Das könnte sich in Zukunft ändern. (Google, Gmail)
  • Zero-Click-Lücke in Outlook: Angreifer können Systeme per E-Mail kompromittieren 15. Mai 2026
    Das bloße Senden einer E-Mail reicht aus, um über Microsoft Outlook Schadcode zur Ausführung zu bringen. Ein Klick auf einen Link ist nicht nötig. (Sicherheitslücke, Microsoft)
  • Wildtierabwehr: Wolfsroboter gegen Bärenangriffe werden knapp 15. Mai 2026
    In Japan ist die Zahl der Bärenangriffe stark gestiegen. Der Hersteller der schützenden Wolfsroboter kommt mit der Produktion nicht hinterher. (Roboter, Security)

RSS CERT EU

  • 2026-006: Critical Vulnerability in PAN-OS 6. Mai 2026
    On 6 May 2026, Palo Alto published a security advisory addressing a critical vulnerability affecting PAN-OS. This vulnerability allows an unauthenticated attacker to execute arbitrary code with root privileges. Palo Alto observed limited exploitation of this vulnerability. It is strongly recommended updating affected appliances as soon as patches will be available, and to apply workarounds […]
  • 2026-005: High Vulnerability in the Linux Kernel ("Copy Fail") 30. April 2026
    On 29 April 2026, a high local privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-31431 and named "Copy Fail", was publicly disclosed. The vulnerability affects every mainstream Linux distributions shipping a kernel built since 2017. A public proof-of-concept exploit has been released. As of the date of this advisory, no distribution has shipped […]
  • 2026-004: Critical Vulnerability in SharePoint Exploited 25. März 2026
    On 17 March 2026, Microsoft updated one of its January 2026 security advisories related to a remote code execution vulnerability in Microsoft SharePoint. Specifically, Microsoft raised the CVSS score and changed the FAQ section to indicate that the vulnerability could be exploited by an unauthenticated attacker. This vulnerability was added in the CISA's Known Exploited […]
  • 2026-003: Multiple Vulnerabilities in Citrix NetScaler and Citrix ADC 23. März 2026
    On 23 March 2026, Citrix published a security advisory addressing multiple vulnerabilities affecting NetScaler ADC and NetScaler Gateway. These vulnerabilities may lead to sensitive information disclosure and user session mix-up under specific configurations. At the time of writing, there is no public evidence of active exploitation. It is strongly recommended updating affected gateways, prioritising internet-facing […]
  • 2026-002: Multiple Vulnerabilities in Cisco Products 26. Februar 2026
    On 25 February 2026, Cisco released security advisories addressing multiple high and critical severity vulnerabilities in Cisco Catalyst SD-WAN controllers and Cisco SD-WAN Manager. If exploited, these vulnerabilities could allow attackers to gain administrative access to compromised systems. It is recommended to capture forensic evidence, hunt for indicators of compromise, and apply updates as soon […]
  • 2026-001: Critical vulnerabilities in Ivanti EPMM 30. Januar 2026
    On 29 January 2026, Ivanti released a security advisory addressing two critical vulnerabilities in their EPMM products. An attacker could exploit those flaws to achieve unauthenticated remote code execution on the vulnerable device. One of these vulnerabilities have been exploited in a limited number of cases.
  • 2025-042: Critical Vulnerability in Cisco Secure Email and Web Manager 18. Dezember 2025
    On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. It is recommended to follow Cisco's recommendations to check whether vulnerable appliances have been compromised, and to remediate the issue. There is no patch available for this vulnerability yet.
  • 2025-041: Critical Security Vulnerability in React Server Components 4. Dezember 2025
    On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests. It is recommended to update all affected component packages and any frameworks that integrate them.
  • 2025-040: Critical Vulnerability in Windows Server Update Service (WSUS) 24. Oktober 2025
    On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulnerability. It is recommended to update as soon as possible.
  • 2025-039: High Severity Vulnerability in FortiOS 15. Oktober 2025
    On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product. It is recommended updating affected products.
© 2026 ITtechNews.