mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#exploit

18 Beiträge14 Beteiligte2 Beiträge heute
Marcel SIneM(S)US<p>Schwere <a href="https://social.tchncs.de/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint</span></a>-Lücke: Schon am Wochenende 100 Organisationen kompromittiert | Security <a href="https://www.heise.de/news/Schwere-Sharepoint-Luecke-Schon-am-Wochenende-100-Organisationen-kompomittiert-10495463.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Schwere-Sharepoi</span><span class="invisible">nt-Luecke-Schon-am-Wochenende-100-Organisationen-kompomittiert-10495463.html</span></a> <a href="https://social.tchncs.de/tags/ToolShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ToolShell</span></a> <a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.tchncs.de/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>
Marcel SIneM(S)US<p>Update: Neue Version von <a href="https://social.tchncs.de/tags/Sharepoint2016" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint2016</span></a> behebt <a href="https://social.tchncs.de/tags/Toolshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Toolshell</span></a>-Lücke | Security <a href="https://www.heise.de/news/Update-Neue-Version-von-Sharepoint-2016-behebt-Toolshell-Luecke-10495573.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Update-Neue-Vers</span><span class="invisible">ion-von-Sharepoint-2016-behebt-Toolshell-Luecke-10495573.html</span></a> <a href="https://social.tchncs.de/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint</span></a> <a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a></p>
Marcel SIneM(S)US<p>Angreifer nutzen Sicherheitslücken in hunderten Druckermodellen aus | Security <a href="https://www.heise.de/news/Multifunktionsdrucker-verschiedener-Hersteller-Aktive-Angriffe-auf-Juni-Luecken-10495931.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Multifunktionsdr</span><span class="invisible">ucker-verschiedener-Hersteller-Aktive-Angriffe-auf-Juni-Luecken-10495931.html</span></a> <a href="https://social.tchncs.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>
Marcel SIneM(S)US<p>Angriffe auf <a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.tchncs.de/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint</span></a>: Patchen ist nicht genug | Security <a href="https://www.heise.de/hintergrund/Angriffe-auf-Microsoft-Sharepoint-Das-muessen-Admins-nach-dem-Patchen-tun-10496148.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/hintergrund/Angriffe-</span><span class="invisible">auf-Microsoft-Sharepoint-Das-muessen-Admins-nach-dem-Patchen-tun-10496148.html</span></a> <a href="https://social.tchncs.de/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://social.tchncs.de/tags/IoC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoC</span></a> <a href="https://social.tchncs.de/tags/IndicatorsOfCompromise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IndicatorsOfCompromise</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>
heise online English<p>Three Chinese groups identified as attackers on Sharepoint servers</p><p>An analysis by Microsoft names three different groups from China as the attackers of the latest Sharepoint vulnerability. But it is unlikely to stop there.</p><p><a href="https://www.heise.de/en/news/Three-Chinese-groups-identified-as-attackers-on-Sharepoint-servers-10496605.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Three-Chinese</span><span class="invisible">-groups-identified-as-attackers-on-Sharepoint-servers-10496605.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise online English<p>Attacks on Microsoft Sharepoint: What admins need to do after patching</p><p>Closing the gaps is not enough against the current toolshell attacks. After all, attackers could already be inside. We show you how to detect them.</p><p><a href="https://www.heise.de/en/background/Attacks-on-Microsoft-Sharepoint-What-admins-need-to-do-after-patching-10496515.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/background/Attacks</span><span class="invisible">-on-Microsoft-Sharepoint-What-admins-need-to-do-after-patching-10496515.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise online<p>Drei chinesische Gruppen als Angreifer auf Sharepoint-Server identifiziert</p><p>Eine Analyse von Microsoft nennt drei verschiedene Gruppen aus China als Angreifer auf die jüngste Sharepoint-Lücke. Dabei dürfte es aber nicht bleiben.</p><p><a href="https://www.heise.de/news/Drei-chinesische-Gruppen-als-Angreifer-auf-Sharepoint-Server-identifiziert-10496598.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Drei-chinesische</span><span class="invisible">-Gruppen-als-Angreifer-auf-Sharepoint-Server-identifiziert-10496598.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Angriffe auf Microsoft Sharepoint: Das müssen Admins nach dem Patchen tun</p><p>Das Schließen der Lücken genügt gegen die aktuellen Toolshell-Attacken nicht. Schließlich könnten Angreifer längst drin sein. Wir zeigen, wie man sie entdeckt.</p><p><a href="https://www.heise.de/hintergrund/Angriffe-auf-Microsoft-Sharepoint-Das-muessen-Admins-nach-dem-Patchen-tun-10496148.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/hintergrund/Angriffe-</span><span class="invisible">auf-Microsoft-Sharepoint-Das-muessen-Admins-nach-dem-Patchen-tun-10496148.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Christoffer S.<p>I put together a shorter "Intelligence Brief" regarding the current exploitation of SharePoint in an attempt to aggregate "what we currently know" about the exploitation campaign(s).</p><p><a href="https://cstromblad.com/posts/microsoft-sharepoint-cve-2025-53770/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cstromblad.com/posts/microsoft</span><span class="invisible">-sharepoint-cve-2025-53770/</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://swecyb.com/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://swecyb.com/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://swecyb.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a></p>
heise online English<p>Update: New version of Sharepoint 2016 fixes toolshell vulnerability</p><p>Microsoft is following up and is also releasing a patch for the 2016 edition of Sharepoint. Admins should install this immediately.</p><p><a href="https://www.heise.de/en/news/Update-New-version-of-Sharepoint-2016-fixes-toolshell-vulnerability-10495642.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Update-New-ve</span><span class="invisible">rsion-of-Sharepoint-2016-fixes-toolshell-vulnerability-10495642.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Update: Neue Version von Sharepoint 2016 behebt Toolshell-Lücke</p><p>Microsoft legt nach und veröffentlicht auch für die 2016er-Ausgabe von Sharepoint einen Flicken. Admins sollten diesen unverzüglich einspielen.</p><p><a href="https://www.heise.de/news/Update-Neue-Version-von-Sharepoint-2016-behebt-Toolshell-Luecke-10495573.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Update-Neue-Vers</span><span class="invisible">ion-von-Sharepoint-2016-behebt-Toolshell-Luecke-10495573.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> für <a href="https://social.tchncs.de/tags/CrushFTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrushFTP</span></a>: Ältere Versionen können Admin-Zugriff gewähren | Security <a href="https://www.heise.de/news/CrushFTP-Aeltere-Versionen-koennen-unbefugten-Admin-Zugriff-gewaehren-10495005.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/CrushFTP-Aeltere</span><span class="invisible">-Versionen-koennen-unbefugten-Admin-Zugriff-gewaehren-10495005.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a>: Angriffe auf neue <a href="https://social.tchncs.de/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint</span></a>-Lücke – bislang kein Patch verfügbar | Security <a href="https://www.heise.de/news/Microsoft-Angriffe-auf-neue-Sharepoint-Luecke-bislang-kein-Patch-verfuegbar-10493705.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-Angrif</span><span class="invisible">fe-auf-neue-Sharepoint-Luecke-bislang-kein-Patch-verfuegbar-10493705.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a></p>
packet storm<p>Remote Mouse 3.303 Remote Code Execution <a href="https://packetstorm.news/files/207298" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/207298</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a></p>
Deutschland<p><a href="https://www.europesays.com/de/282311/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/de/282311/</span><span class="invisible"></span></a> Kritische Sharepoint-Sicherheitslücke: Erste Patches für „ToolShell“ sind da <a href="https://pubeurope.com/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> <a href="https://pubeurope.com/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://pubeurope.com/tags/Headlines" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Headlines</span></a> <a href="https://pubeurope.com/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://pubeurope.com/tags/Nachrichten" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nachrichten</span></a> <a href="https://pubeurope.com/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://pubeurope.com/tags/Schlagzeilen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schlagzeilen</span></a> <a href="https://pubeurope.com/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://pubeurope.com/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://pubeurope.com/tags/SharePointServer2016" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePointServer2016</span></a> <a href="https://pubeurope.com/tags/TopNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TopNews</span></a> <a href="https://pubeurope.com/tags/TopMeldungen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TopMeldungen</span></a> <a href="https://pubeurope.com/tags/TopMeldungen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TopMeldungen</span></a> <a href="https://pubeurope.com/tags/TopNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TopNews</span></a></p>
heise online English<p>Critical Sharepoint security vulnerability: First patches are available</p><p>Microsoft has now released a patch, but attackers were not idle over the weekend. Dozens of SharePoint installations fell victim of "ToolShell"</p><p><a href="https://www.heise.de/en/news/Critical-Sharepoint-security-vulnerability-First-patches-are-available-10494099.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Critical-Shar</span><span class="invisible">epoint-security-vulnerability-First-patches-are-available-10494099.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Kritische Sharepoint-Sicherheitslücke: Erste Patches für "ToolShell" sind da</p><p>Microsoft hat mittlerweile einen Patch veröffentlicht, Angreifer waren am Wochenende jedoch nicht untätig. Dutzende Sharepoint-Installationen wurden Opfer.</p><p><a href="https://www.heise.de/news/Kritische-Sharepoint-Sicherheitsluecke-Erste-Patches-fuer-ToolShell-sind-da-10493989.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Kritische-Sharep</span><span class="invisible">oint-Sicherheitsluecke-Erste-Patches-fuer-ToolShell-sind-da-10493989.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <span class="h-card" translate="no"><a href="https://feddit.org/c/de_edv" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>de_edv</span></a></span></p>
Hacker News<p>iMessage integration in Claude can hijack the model to do anything</p><p><a href="https://www.generalanalysis.com/blog/imessage-stripe-exploit" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">generalanalysis.com/blog/imess</span><span class="invisible">age-stripe-exploit</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/iMessage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iMessage</span></a> <a href="https://mastodon.social/tags/Claude" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Claude</span></a> <a href="https://mastodon.social/tags/integration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>integration</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
heise Security<p>Microsoft: Angriffe auf neue Sharepoint-Lücke – bislang kein Patch verfügbar</p><p>Microsoft warnt vor aktiven Angriffen auf eine bislang unbekannte Lücke in Sharepoint-Servern und benennt Erste-Hilfe-Maßnahmen für Verteidiger.</p><p><a href="https://www.heise.de/news/Microsoft-Angriffe-auf-neue-Sharepoint-Luecke-bislang-kein-Patch-verfuegbar-10493705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-Angrif</span><span class="invisible">fe-auf-neue-Sharepoint-Luecke-bislang-kein-Patch-verfuegbar-10493705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Hacker News<p>Wii U SDBoot1 Exploit "paid the beak"</p><p><a href="https://consolebytes.com/wii-u-sdboot1-exploit-paid-the-beak/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">consolebytes.com/wii-u-sdboot1</span><span class="invisible">-exploit-paid-the-beak/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/WiiU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiiU</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/SDBoot1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SDBoot1</span></a> <a href="https://mastodon.social/tags/Gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaming</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ConsoleHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConsoleHacking</span></a></p>