{"id":679,"date":"2023-07-20T14:24:24","date_gmt":"2023-07-20T12:24:24","guid":{"rendered":"https:\/\/kroener-online.de\/?p=679"},"modified":"2023-07-20T14:24:24","modified_gmt":"2023-07-20T12:24:24","slug":"gegen-cyberangriffe-microsoft-gewaehrt-cloudkunden-zugriff-auf-protokolldaten-golem-de","status":"publish","type":"post","link":"https:\/\/kroener-online.de\/?p=679","title":{"rendered":"Gegen Cyberangriffe: Microsoft gew\u00e4hrt Cloudkunden Zugriff auf Protokolldaten &#8211; Golem.de"},"content":{"rendered":"<p>Nach heftiger Kritik will Microsoft Kunden seiner Clouddienste bald ohne Zusatzkosten Zugriff auf Protokolldaten gew\u00e4hren.<br \/>\n\u2014 Weiterlesen <a href=\"https:\/\/www.golem.de\/news\/gegen-cyberangriffe-microsoft-gewaehrt-cloudkunden-zugriff-auf-protokolldaten-2307-176012.html\">www.golem.de\/news\/gegen-cyberangriffe-microsoft-gewaehrt-cloudkunden-zugriff-auf-protokolldaten-2307-176012.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nach heftiger Kritik will Microsoft Kunden seiner Clouddienste bald ohne Zusatzkosten Zugriff auf Protokolldaten gew\u00e4hren. \u2014 Weiterlesen www.golem.de\/news\/gegen-cyberangriffe-microsoft-gewaehrt-cloudkunden-zugriff-auf-protokolldaten-2307-176012.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-679","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pac17Y-aX","jetpack-related-posts":[{"id":683,"url":"https:\/\/kroener-online.de\/?p=683","url_meta":{"origin":679,"position":0},"title":"Schl\u00fcssel gestohlen: China-Hacker hatten Zugriff auf pers\u00f6nliche Microsoft-Konten &#8211; Golem.de","author":"volker.kroener","date":"23. Juli 2023","format":false,"excerpt":"Mit einem gestohlenen Signaturschl\u00fcssel konnten chinesische Hacker in noch weitaus mehr Microsoft-Konten eindringen, als bisher bekannt war. \u2014 Weiterlesen www.golem.de\/news\/schluessel-gestohlen-china-hacker-hatten-zugriff-auf-persoenliche-microsoft-konten-2307-176075.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":681,"url":"https:\/\/kroener-online.de\/?p=681","url_meta":{"origin":679,"position":1},"title":"Kampf gegen Cyberangriffe: Google sperrt Mitarbeitern den Internetzugang &#8211; Golem.de","author":"volker.kroener","date":"20. Juli 2023","format":false,"excerpt":"Um sich vor Cyberangriffen auf die eigene Infrastruktur zu sch\u00fctzen, testet Google, wie produktiv seine Mitarbeiter ohne Internet sind. \u2014 Weiterlesen www.golem.de\/news\/kampf-gegen-cyberangriffe-google-sperrt-mitarbeitern-den-internetzugang-2307-176007.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":822,"url":"https:\/\/kroener-online.de\/?p=822","url_meta":{"origin":679,"position":2},"title":"Betrugsmasche: Falscher Microsoft-Mitarbeiter wollte 14.000 Euro abbuchen &#8211; Golem.de","author":"volker.kroener","date":"19. April 2024","format":false,"excerpt":"Der angebliche Microsoft-Mitarbeiter hatte einen M\u00fcnsteraner dazu verleitet, ihm Zugriff auf sein Bankkonto zu gew\u00e4hren. Die Bank hat das Schlimmste verhindern k\u00f6nnen. \u2014 Weiterlesen www.golem.de\/news\/betrugsmasche-falscher-microsoft-mitarbeiter-wollte-14-000-euro-abbuchen-2404-184352.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":800,"url":"https:\/\/kroener-online.de\/?p=800","url_meta":{"origin":679,"position":3},"title":"Cyberangriffe auch auf die Kliniken Lippstadt, Erwitte und Gesecke &#8211; Top-Themen IT-Sicherheit &#038; Kritis &#8211; Publisher &#8211; Krankenhaus-IT Journal Online","author":"volker.kroener","date":"4. Februar 2024","format":false,"excerpt":"Wie die Kreispolizeibeh\u00f6rde in Soest Gesdtern Abend mitteilte gab es einen Cyberangriff auf die IT Infrastruktur des Dreifaltigkeits Hospitals in Lippstadt. Betroffen von diesem Angriff sind auch die dazugeh\u00f6rigen Krankenh\u00e4user in Erwitte und Geseke. \u2014 Weiterlesen www.krankenhaus-it.de\/item.3039\/cyberangriffe-auch-auf-die-kliniken-lippstadt-erwitte-und-gesecke.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":778,"url":"https:\/\/kroener-online.de\/?p=778","url_meta":{"origin":679,"position":4},"title":"Google-Konten in Gefahr: Exploit erlaubt b\u00f6swilligen Zugriff trotz Passwort-Reset &#8211; Golem.de","author":"volker.kroener","date":"4. Januar 2024","format":false,"excerpt":"Durch eine Schwachstelle in einem OAuth-Endpunkt k\u00f6nnen sich Cyberkriminelle dauerhaft Zugriff auf das Google-Konto einer Zielperson verschaffen. \u2014 Weiterlesen www.golem.de\/news\/google-konten-in-gefahr-exploit-erlaubt-boeswilligen-zugriff-trotz-passwort-reset-2401-180763.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":831,"url":"https:\/\/kroener-online.de\/?p=831","url_meta":{"origin":679,"position":5},"title":"Kein Klick erforderlich: Outlook-L\u00fccke verschafft Angreifern Zugriff per E-Mail &#8211; Golem.de","author":"volker.kroener","date":"11. Juli 2024","format":false,"excerpt":"Durch die Sicherheitsl\u00fccke k\u00f6nnen Angreifer auf einem Zielsystem Schadcode ausf\u00fchren. Je nach Absender braucht es daf\u00fcr keinerlei Nutzerinteraktion. \u2014 Weiterlesen www.golem.de\/news\/kein-klick-erforderlich-outlook-luecke-verschafft-angreifern-zugriff-per-e-mail-2407-186930.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=679"}],"version-history":[{"count":0,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/679\/revisions"}],"wp:attachment":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}