{"id":707,"date":"2023-08-11T16:00:00","date_gmt":"2023-08-11T14:00:00","guid":{"rendered":"https:\/\/kroener-online.de\/?p=707"},"modified":"2023-08-11T16:00:00","modified_gmt":"2023-08-11T14:00:00","slug":"junge-hacker-bewiesen-technisches-know-how-ist-fuer-cyberangriffe-oft-zweitrangig-golem-de","status":"publish","type":"post","link":"https:\/\/kroener-online.de\/?p=707","title":{"rendered":"Junge Hacker bewiesen: Technisches Know-how ist f\u00fcr Cyberangriffe oft zweitrangig &#8211; Golem.de"},"content":{"rendered":"<p>Die Hackergruppe Lapsus$ nahm viele prominente Ziele ins Visier. Technische Fertigkeiten waren daf\u00fcr jedoch gar nicht so entscheidend.<br \/>\n\u2014 Weiterlesen <a href=\"https:\/\/www.golem.de\/news\/junge-hacker-bewiesen-technisches-know-how-ist-fuer-cyberangriffe-oft-zweitrangig-2308-176689.html\">www.golem.de\/news\/junge-hacker-bewiesen-technisches-know-how-ist-fuer-cyberangriffe-oft-zweitrangig-2308-176689.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Die Hackergruppe Lapsus$ nahm viele prominente Ziele ins Visier. Technische Fertigkeiten waren daf\u00fcr jedoch gar nicht so entscheidend. \u2014 Weiterlesen www.golem.de\/news\/junge-hacker-bewiesen-technisches-know-how-ist-fuer-cyberangriffe-oft-zweitrangig-2308-176689.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-707","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pac17Y-bp","jetpack-related-posts":[{"id":679,"url":"https:\/\/kroener-online.de\/?p=679","url_meta":{"origin":707,"position":0},"title":"Gegen Cyberangriffe: Microsoft gew\u00e4hrt Cloudkunden Zugriff auf Protokolldaten &#8211; Golem.de","author":"volker.kroener","date":"20. Juli 2023","format":false,"excerpt":"Nach heftiger Kritik will Microsoft Kunden seiner Clouddienste bald ohne Zusatzkosten Zugriff auf Protokolldaten gew\u00e4hren. \u2014 Weiterlesen www.golem.de\/news\/gegen-cyberangriffe-microsoft-gewaehrt-cloudkunden-zugriff-auf-protokolldaten-2307-176012.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":660,"url":"https:\/\/kroener-online.de\/?p=660","url_meta":{"origin":707,"position":1},"title":"BKA Pr\u00e4sident warnt: Cyberangriffe bedrohen zunehmend Hochschulen und Arztpraxen &#8211; Golem.de","author":"volker.kroener","date":"11. Juli 2023","format":false,"excerpt":"Einrichtungen mit geringen technischen H\u00fcrden sind f\u00fcr Cyberkriminelle besonders attraktive Ziele \u2013 die resultierenden Sch\u00e4den teils massiv. \u2014 Weiterlesen www.golem.de\/news\/bka-praesident-warnt-cyberangriffe-bedrohen-zunehmend-hochschulen-und-arztpraxen-2307-175740.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":681,"url":"https:\/\/kroener-online.de\/?p=681","url_meta":{"origin":707,"position":2},"title":"Kampf gegen Cyberangriffe: Google sperrt Mitarbeitern den Internetzugang &#8211; Golem.de","author":"volker.kroener","date":"20. Juli 2023","format":false,"excerpt":"Um sich vor Cyberangriffen auf die eigene Infrastruktur zu sch\u00fctzen, testet Google, wie produktiv seine Mitarbeiter ohne Internet sind. \u2014 Weiterlesen www.golem.de\/news\/kampf-gegen-cyberangriffe-google-sperrt-mitarbeitern-den-internetzugang-2307-176007.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":800,"url":"https:\/\/kroener-online.de\/?p=800","url_meta":{"origin":707,"position":3},"title":"Cyberangriffe auch auf die Kliniken Lippstadt, Erwitte und Gesecke &#8211; Top-Themen IT-Sicherheit &#038; Kritis &#8211; Publisher &#8211; Krankenhaus-IT Journal Online","author":"volker.kroener","date":"4. Februar 2024","format":false,"excerpt":"Wie die Kreispolizeibeh\u00f6rde in Soest Gesdtern Abend mitteilte gab es einen Cyberangriff auf die IT Infrastruktur des Dreifaltigkeits Hospitals in Lippstadt. Betroffen von diesem Angriff sind auch die dazugeh\u00f6rigen Krankenh\u00e4user in Erwitte und Geseke. \u2014 Weiterlesen www.krankenhaus-it.de\/item.3039\/cyberangriffe-auch-auf-die-kliniken-lippstadt-erwitte-und-gesecke.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":790,"url":"https:\/\/kroener-online.de\/?p=790","url_meta":{"origin":707,"position":4},"title":"Fernwartung: Hacker starten Ransomware-Attacken per Teamviewer &#8211; Golem.de","author":"volker.kroener","date":"19. Januar 2024","format":false,"excerpt":"Wie genau der Erstzugriff per Teamviewer gelingt, ist noch unklar. Vermutet wird, dass unsichere Passw\u00f6rter und bekannte Datenlecks eine Rolle spielen. \u2014 Weiterlesen www.golem.de\/news\/fernwartung-hacker-starten-ransomware-attacken-per-teamviewer-2401-181344.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":701,"url":"https:\/\/kroener-online.de\/?p=701","url_meta":{"origin":707,"position":5},"title":"Seit 2019: Auf macOS fokussierte Hacker haben sich verzehnfacht &#8211; Golem.de","author":"volker.kroener","date":"8. August 2023","format":false,"excerpt":"Die Anzahl cyberkrimineller Akteure, die macOS-Systeme ins Visier nehmen, ist in den letzten vier Jahren um \u00fcber 1.000 Prozent gestiegen. \u2014 Weiterlesen www.golem.de\/news\/seit-2019-auf-macos-fokussierte-hacker-haben-sich-verzehnfacht-2308-176567.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=707"}],"version-history":[{"count":0,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/707\/revisions"}],"wp:attachment":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}