{"id":717,"date":"2023-08-18T19:35:58","date_gmt":"2023-08-18T17:35:58","guid":{"rendered":"https:\/\/kroener-online.de\/?p=717"},"modified":"2023-08-18T19:35:58","modified_gmt":"2023-08-18T17:35:58","slug":"rechteausweitung-windows-angriffstechnik-bleibt-oftmals-unerkannt-golem-de","status":"publish","type":"post","link":"https:\/\/kroener-online.de\/?p=717","title":{"rendered":"Rechteausweitung: Windows-Angriffstechnik bleibt oftmals unerkannt &#8211; Golem.de"},"content":{"rendered":"<p>Ein Forscherteam hat auf der Defcon eine Angriffstechnik vorgestellt, mit der sich Hacker unter Windows Systemrechte verschaffen k\u00f6nnen.<br \/>\n\u2014 Weiterlesen <a href=\"https:\/\/www.golem.de\/news\/rechteausweitung-windows-angriffstechnik-bleibt-oftmals-unerkannt-2308-176880.html\">www.golem.de\/news\/rechteausweitung-windows-angriffstechnik-bleibt-oftmals-unerkannt-2308-176880.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ein Forscherteam hat auf der Defcon eine Angriffstechnik vorgestellt, mit der sich Hacker unter Windows Systemrechte verschaffen k\u00f6nnen. \u2014 Weiterlesen www.golem.de\/news\/rechteausweitung-windows-angriffstechnik-bleibt-oftmals-unerkannt-2308-176880.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-717","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pac17Y-bz","jetpack-related-posts":[{"id":692,"url":"https:\/\/kroener-online.de\/?p=692","url_meta":{"origin":717,"position":0},"title":"Patches lassen auf sich warten: Android l\u00e4sst Hackern noch immer eine Menge Zeit &#8211; Golem.de","author":"volker.kroener","date":"31. Juli 2023","format":false,"excerpt":"Unter Android dauert es weiterhin oftmals Monate, bis Sicherheitsl\u00fccken geschlossen sind. \u00c4ltere Ger\u00e4te erhalten h\u00e4ufig gar keine Patches. \u2014 Weiterlesen www.golem.de\/news\/patches-lassen-auf-sich-warten-android-laesst-hackern-noch-immer-eine-menge-zeit-2307-176281.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":631,"url":"https:\/\/kroener-online.de\/?p=631","url_meta":{"origin":717,"position":1},"title":"Wir wurden gehackt\u2026","author":"volker.kroener","date":"7. Juni 2023","format":false,"excerpt":"\u2026immer \u00f6fter erreicht uns eine solche Nachricht von einem Gesch\u00e4ftspartner, und wir beginnen umgehend mit der Bewertung der nun auch f\u00fcr uns entstandenen Situation. Zuerst haben wir ein Sicherheitsereignis, das im Laufe der Untersuchungen zu einem Sicherheitsvorfall werden kann. Welche Systeme sind mit diesem Gesch\u00e4ftspartner verbunden? Kann es zu einer\u2026","rel":"","context":"In &quot;Diverses&quot;","block_context":{"text":"Diverses","link":"https:\/\/kroener-online.de\/?cat=1"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":669,"url":"https:\/\/kroener-online.de\/?p=669","url_meta":{"origin":717,"position":2},"title":"Viele Windows-Systeme ungesch\u00fctzt: UEFI-Bootkit Blacklotus auf Github aufgetaucht &#8211; Golem.de","author":"volker.kroener","date":"14. Juli 2023","format":false,"excerpt":"Die einst teuer verkaufte Malware Blacklotus, mit der sich UEFI Secure Boot umgehen l\u00e4sst, ist inzwischen auf Github zu finden. \u2014 Weiterlesen www.golem.de\/news\/viele-windows-systeme-ungeschuetzt-uefi-bootkit-blacklotus-auf-github-aufgetaucht-2307-175866.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":802,"url":"https:\/\/kroener-online.de\/?p=802","url_meta":{"origin":717,"position":3},"title":"Bootloader-L\u00fccke: Viele Linux-Distributionen sind gef\u00e4hrdet | heise online","author":"volker.kroener","date":"12. Februar 2024","format":false,"excerpt":"Im Bootloader shim, der Secure-Boot auch f\u00fcr nicht-Windows-Betriebssysteme erlaubt, klafft eine Sicherheitsl\u00fccke. \u2014 Weiterlesen www.heise.de\/news\/Bootloader-Luecke-gefaehrdet-viele-Linux-Distributionen-9624201.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":622,"url":"https:\/\/kroener-online.de\/?p=622","url_meta":{"origin":717,"position":4},"title":"iTunes: Sicherheitsl\u00fccke unter Windows schnell patchen","author":"volker.kroener","date":"2. Juni 2023","format":false,"excerpt":"Im Mai hat Apple ein Update f\u00fcr seine Medienverwaltung unter Windows publiziert. Das sollte man flott einspielen, meinen die Entdecker. iTunes: Sicherheitsl\u00fccke unter Windows schnell patchen","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":664,"url":"https:\/\/kroener-online.de\/?p=664","url_meta":{"origin":717,"position":5},"title":"Offene Sicherheitsl\u00fccke: Hacker \u00fcbernehmen Windows-Systeme per Office-Dokument &#8211; Golem.de","author":"volker.kroener","date":"12. Juli 2023","format":false,"excerpt":"Nach einer sehr geringf\u00fcgigen Benutzerinteraktion k\u00f6nnen Hacker Windows-basierte Zielsysteme vollst\u00e4ndig \u00fcbernehmen. \u2014 Weiterlesen www.golem.de\/news\/offene-sicherheitsluecke-hacker-uebernehmen-windows-systeme-per-office-dokument-2307-175791.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=717"}],"version-history":[{"count":0,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/717\/revisions"}],"wp:attachment":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}