snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

364
aktive brukere

#sharepoint

74 innlegg61 deltakereett innlegg i dag

🚨 Microsoft got hacked – and that’s not even the worst part.

💥 It’s now confirmed: sensitive data in European clouds can be handed over to US authorities. So how do you protect your team’s files – even when the cloud is no longer safe?
🔐 Cryptomator Hub gives you true end-to-end encryption & zero-knowledge access control.

➡️ Swipe to see how it works.

Im aktuellen Podcast analysieren @sveckert und ich den Weg der Sharepoint-Sicherheitslücke vom Hacker:innen-Contest "Pwn2Own" in Berlin in die Hände des chinesischen Geheimdienstes (und wohl auch anderer staatlicher Spione). Und wir sprechen mit der wunderbaren Vera Bauer über ihre Erfahrungen als Tech-Youtuberin mit Konzernen, Männern und einer dreisten Firma, die ihr Gesicht und ihre Stimme geklaut hat.

frauen-technik.podigee.io/40-n

They Talk Tech – mit Eckert und WolfangelAngriff auf SharePoint & Stimme geklaut – mit “Tech like Vera”Ein Microsoft-Desaster rollt durchs Netz: Eine Lücke in SharePoint wird zur globalen Angriffswelle und hat einen seltsamen Ursprung: einen Hacker-Wettbewerb in Berlin. Was genau passiert ist, warum hunderte Server kompromittiert wurden klären Svea und Eva in dieser Folge. Außerdem zu Gast: Vera Bauer von “Tech like Vera” – YouTuberin, Techniknerd und kritische Stimme im Netz. Vera spricht offen über über Hate, Sexismus und warum sie ausgerechnet ein Video über Nippel machen musste. Und sie erzählt, wie ihre eigene Stimme von einer KI geklaut wurde, für Werbung, die sie nie gemacht hat. Deepfake, ganz real. Zum Schluss wird’s noch persönlich – bei einer kleinen TikTok-Challenge mit Eva. Spoiler: Wir erfahren die Wahrheit über Eva™. Hosts: Svea Eckert & Eva Wolfangel Musik und Produktion Marko Pauli Shownotes https://www.zeit.de/digital/datenschutz/2025-07/sharepoint-sicherheitsluecke-hacker-microsoft-cyberangriff?freebie=c9855b17 https://research.eye.security/sharepoint-under-siege/ https://www.security-insider.de/pwn2own-berlin-2025-ergebnisse-gewinner-schwachstellen-a-8d499492d1a5d4ee46fdc4b4d56b2655/ https://www.youtube.com/@TechlikeVera/videos https://www.ndr.de/fernsehen/sendungen/content-createrin-wird-opfer-von-deepfake,ndrinfo-1286.html https://apnews.com/article/deepfake-denmark-ai-artificial-intelligence-misinformation-73ed761617ebbdb8382086287530a7f6

#BREAKING #ESETResearch has been monitoring the recently discovered #ToolShell zero-day vulnerabilities in #SharePoint Server: CVE-2025-53770 and CVE-2025-53771. SharePoint Online in Microsoft 365 is not impacted. welivesecurity.com/en/eset-res
ESET first detected an attempt to exploit part of the execution chain on July 17 in Germany 🇩🇪. Here, the final #webshell payload was not delivered. The first time we registered the payload was on July 18 in Italy 🇮🇹. We have since seen active ToolShell exploitation all over the world.
We have uncovered several IP addresses that were used in the attacks from July 17 to July 22. The charts show the timeline of the attacks from the three most active of these IP addresses.
ToolShell is being exploited by all sorts of threat actors, from petty cybercriminals to state-sponsored groups, among them China 🇨🇳-aligned #APTs. We expect these attacks to continue taking advantage of unpatched systems.
IoCs available in our GitHub repo: github.com/eset/

Hehehe... 🥳🤯🤡😎

"The US agency responsible for maintaining and designing the nation’s cache of nuclear weapons was among those breached by a hack of Microsoft Corp.’s SharePoint document management software, according to a person with knowledge of the matter.

No sensitive or classified information is known to have been compromised in the attack on the National Nuclear Security Administration, said the person, who wasn’t authorized to speak publicly and asked not to be identified. The semiautonomous arm of the Energy Department is responsible for producing and dismantling nuclear arms. Other parts of the department were also compromised.
(...)
The NNSA has a broad mission, which includes providing the Navy with nuclear reactors for submarines and responding to radiological emergencies, among other duties. The agency also plays a key role in counterterrorism and transporting nuclear weapons around the country.

Hackers were able to breach the agency as part of a 2020 attack on a widely used software program from SolarWinds Corp. A department spokesperson said then that malware had “been isolated to business networks only.”"

bloomberg.com/news/articles/20

Bloomberg · Microsoft SharePoint Hack Sees US Nuclear Weapons Agency BreachedAv Ari Natter