Zum Inhalt springen
ITtechNews
  • Datenschutzbeauftragter & Skillset
  • Externer ISB/CISO und NIS2/27001 Consulting
  • Blog IT-Security
  • Datenschutzerklärung
  • Impressum
Suche
ITtechNews
Menü schließen
  • Datenschutzbeauftragter & Skillset
  • Externer ISB/CISO und NIS2/27001 Consulting
  • Blog IT-Security
  • Datenschutzerklärung
  • Impressum
ITtechNews
Suche Menü umschalten

Apple iOS 14.8 Update dringend installieren

Von Michael14. September 202116. Dezember 2025Uncategorized

Kurz vor dem Release von iOS 15 hat Apple heute noch ein wichtiges Security-Update veröffentlicht.Es gibt wohl mehrere Zero-Day Exploits, deshalb schnellstmöglich die Geräte aktualisieren.

Angriffsszenario:
Sophos Link
Apple Sicherheitshinweis

Beitragsnavigation

Microsoft Exchange Zero Day Schwachstelle
Apple iOS 17.5 released

RSS Golem Security News

  • KI und Cybersecurity: Curl-Entwickler sieht keine Gefahr durch Mythos 12. Mai 2026
    Nachdem Anthropics KI-Modell Mythos Curl auf Sicherheitslücken überprüft hatte, kam laut dessen Entwickler eine sehr kurze Liste zurück. (KI, Sicherheitslücke)
  • (g+) Heute 17 Uhr live: Stell deine Fragen zu Palantir 12. Mai 2026
    Heute beantwortet IT-Sicherheitsexperte Manuel "HonkHase" Atug live im Video-AMA eure Fragen zu Palantir. Ab 17 Uhr geht es los, sei dabei! (Palantir, Datenschutz)
  • Nach Cyberangriff auf Canvas: E-Learning-Dienstleister hat Hacker offenbar bezahlt 12. Mai 2026
    Schlechtes Vorbild für die Schüler? Dass man Cyberkriminellen kein Lösegeld zahlen sollte, ist eigentlich bekannt. Instructure scheint es dennoch getan zu haben. (Cybercrime, Cyberwar)
  • Pwn2Own versus KI: Zero Day Initiative kann Flut an Anmeldungen nicht bewältigen 12. Mai 2026
    Der Hackerwettbewerb Pwn2Own in Berlin stößt an seine Kapazitätsgrenzen. Zahlreichen Teams wurde bereits abgesagt. Das dürfte vor allem an KI liegen. (KI, Sicherheitslücke)
  • Frustrierende Updates: Wie Microsoft Windows-11-Updates weniger nervig machen will 12. Mai 2026
    "Wenige Dinge sind frustrierender, als sich an den PC zu setzen und festzustellen, dass er ein Update benötigt", schreibt Microsoft. (Peripheriegeräte, Microsoft)
  • Supply-Chain-Angriff: Hunderte von NPM- und PyPI-Paketen kompromittiert 12. Mai 2026
    Die Hackergruppe TeamPCP gräbt sich erneut durch unzählige NPM- und Python-Pakete und verbreitet Schadcode, der vor allem Zugangsdaten sammelt. (Cybercrime, Javascript)
  • Cyberangriff trifft Fahrzeughersteller: Kundendaten von Skoda kompromittiert 12. Mai 2026
    Ein unbekannter Angreifer hat ein von Skoda genutztes Shopsystem infiltriert und konnte auf Kundendaten zugreifen. Auch Zugangsdaten sind betroffen. (Cybercrime, Onlineshop)

RSS CERT EU

  • 2026-006: Critical Vulnerability in PAN-OS 6. Mai 2026
    On 6 May 2026, Palo Alto published a security advisory addressing a critical vulnerability affecting PAN-OS. This vulnerability allows an unauthenticated attacker to execute arbitrary code with root privileges. Palo Alto observed limited exploitation of this vulnerability. It is strongly recommended updating affected appliances as soon as patches will be available, and to apply workarounds […]
  • 2026-005: High Vulnerability in the Linux Kernel ("Copy Fail") 30. April 2026
    On 29 April 2026, a high local privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-31431 and named "Copy Fail", was publicly disclosed. The vulnerability affects every mainstream Linux distributions shipping a kernel built since 2017. A public proof-of-concept exploit has been released. As of the date of this advisory, no distribution has shipped […]
  • 2026-004: Critical Vulnerability in SharePoint Exploited 25. März 2026
    On 17 March 2026, Microsoft updated one of its January 2026 security advisories related to a remote code execution vulnerability in Microsoft SharePoint. Specifically, Microsoft raised the CVSS score and changed the FAQ section to indicate that the vulnerability could be exploited by an unauthenticated attacker. This vulnerability was added in the CISA's Known Exploited […]
  • 2026-003: Multiple Vulnerabilities in Citrix NetScaler and Citrix ADC 23. März 2026
    On 23 March 2026, Citrix published a security advisory addressing multiple vulnerabilities affecting NetScaler ADC and NetScaler Gateway. These vulnerabilities may lead to sensitive information disclosure and user session mix-up under specific configurations. At the time of writing, there is no public evidence of active exploitation. It is strongly recommended updating affected gateways, prioritising internet-facing […]
  • 2026-002: Multiple Vulnerabilities in Cisco Products 26. Februar 2026
    On 25 February 2026, Cisco released security advisories addressing multiple high and critical severity vulnerabilities in Cisco Catalyst SD-WAN controllers and Cisco SD-WAN Manager. If exploited, these vulnerabilities could allow attackers to gain administrative access to compromised systems. It is recommended to capture forensic evidence, hunt for indicators of compromise, and apply updates as soon […]
  • 2026-001: Critical vulnerabilities in Ivanti EPMM 30. Januar 2026
    On 29 January 2026, Ivanti released a security advisory addressing two critical vulnerabilities in their EPMM products. An attacker could exploit those flaws to achieve unauthenticated remote code execution on the vulnerable device. One of these vulnerabilities have been exploited in a limited number of cases.
  • 2025-042: Critical Vulnerability in Cisco Secure Email and Web Manager 18. Dezember 2025
    On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. It is recommended to follow Cisco's recommendations to check whether vulnerable appliances have been compromised, and to remediate the issue. There is no patch available for this vulnerability yet.
  • 2025-041: Critical Security Vulnerability in React Server Components 4. Dezember 2025
    On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests. It is recommended to update all affected component packages and any frameworks that integrate them.
  • 2025-040: Critical Vulnerability in Windows Server Update Service (WSUS) 24. Oktober 2025
    On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulnerability. It is recommended to update as soon as possible.
  • 2025-039: High Severity Vulnerability in FortiOS 15. Oktober 2025
    On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product. It is recommended updating affected products.
© 2026 ITtechNews.