{"id":776,"date":"2024-01-04T16:05:18","date_gmt":"2024-01-04T15:05:18","guid":{"rendered":"https:\/\/kroener-online.de\/?p=776"},"modified":"2024-01-04T16:05:18","modified_gmt":"2024-01-04T15:05:18","slug":"deutschland-auf-platz-3-millionen-von-ssh-servern-anfaellig-fuer-terrapin-angriff-golem-de","status":"publish","type":"post","link":"https:\/\/kroener-online.de\/?p=776","title":{"rendered":"Deutschland auf Platz 3: Millionen von SSH-Servern anf\u00e4llig f\u00fcr Terrapin-Angriff &#8211; Golem.de"},"content":{"rendered":"<p>Allein in Deutschland gibt es mehr als eine Million \u00fcber das Internet erreichbare SSH-Server, die nicht gegen Terrapin gepatcht sind.<br \/>\n\u2014 Weiterlesen <a href=\"https:\/\/www.golem.de\/news\/deutschland-auf-platz-3-millionen-von-ssh-servern-anfaellig-fuer-terrapin-angriff-2401-180805.html\">www.golem.de\/news\/deutschland-auf-platz-3-millionen-von-ssh-servern-anfaellig-fuer-terrapin-angriff-2401-180805.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Allein in Deutschland gibt es mehr als eine Million \u00fcber das Internet erreichbare SSH-Server, die nicht gegen Terrapin gepatcht sind. \u2014 Weiterlesen www.golem.de\/news\/deutschland-auf-platz-3-millionen-von-ssh-servern-anfaellig-fuer-terrapin-angriff-2401-180805.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-776","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pac17Y-cw","jetpack-related-posts":[{"id":684,"url":"https:\/\/kroener-online.de\/?p=684","url_meta":{"origin":776,"position":0},"title":"Auch in Deutschland: Tausende von Citrix-Servern sind ungepatcht und angreifbar &#8211; Golem.de","author":"volker.kroener","date":"24. Juli 2023","format":false,"excerpt":"Etwa 15.000 \u00fcber das Internet erreichbare Citrix-Server sind trotz verf\u00fcgbarer Patches nicht vor bekannten Sicherheitsl\u00fccken gesch\u00fctzt. \u2014 Weiterlesen www.golem.de\/news\/auch-in-deutschland-tausende-von-citrix-servern-sind-ungepatcht-und-angreifbar-2307-176090.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":645,"url":"https:\/\/kroener-online.de\/?p=645","url_meta":{"origin":776,"position":1},"title":"Microsoft 365 in Deutschland: Outlook und Teams sind wieder down gewesen &#8211; Golem.de","author":"volker.kroener","date":"22. Juni 2023","format":false,"excerpt":"Wenige Wochen nach dem DDoS-Angriff auf Microsoft 365 sind Dienste wie Outlook und Teams ausgefallen \u2013 diesmal ist ein deutscher Standort schuld. \u2014 Weiterlesen www.golem.de\/news\/microsoft-365-in-deutschland-outlook-und-teams-waren-wieder-down-2306-175181.html","rel":"","context":"In &quot;Diverses&quot;","block_context":{"text":"Diverses","link":"https:\/\/kroener-online.de\/?cat=1"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":643,"url":"https:\/\/kroener-online.de\/?p=643","url_meta":{"origin":776,"position":2},"title":"Cyber-Angriff auf Rheinische Post betrifft auch das Handelsblatt | heise online","author":"volker.kroener","date":"22. Juni 2023","format":false,"excerpt":"Das Handelsblatt nutzt Dienste von CircIT der Rheinischen Post Mediengruppe. Der Cyber-Angriff darauf bedingt einen geringeren Umfang der Druckausgabe. \u2014 Weiterlesen www.heise.de\/news\/Cyber-Angriff-auf-Rheinische-Post-betrifft-auch-das-Handelsblatt-9194562.html","rel":"","context":"In &quot;Diverses&quot;","block_context":{"text":"Diverses","link":"https:\/\/kroener-online.de\/?cat=1"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":800,"url":"https:\/\/kroener-online.de\/?p=800","url_meta":{"origin":776,"position":3},"title":"Cyberangriffe auch auf die Kliniken Lippstadt, Erwitte und Gesecke &#8211; Top-Themen IT-Sicherheit &#038; Kritis &#8211; Publisher &#8211; Krankenhaus-IT Journal Online","author":"volker.kroener","date":"4. Februar 2024","format":false,"excerpt":"Wie die Kreispolizeibeh\u00f6rde in Soest Gesdtern Abend mitteilte gab es einen Cyberangriff auf die IT Infrastruktur des Dreifaltigkeits Hospitals in Lippstadt. Betroffen von diesem Angriff sind auch die dazugeh\u00f6rigen Krankenh\u00e4user in Erwitte und Geseke. \u2014 Weiterlesen www.krankenhaus-it.de\/item.3039\/cyberangriffe-auch-auf-die-kliniken-lippstadt-erwitte-und-gesecke.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":811,"url":"https:\/\/kroener-online.de\/?p=811","url_meta":{"origin":776,"position":4},"title":"Daten und Backups verschl\u00fcsselt: Verbraucherzentrale Hessen best\u00e4tigt Cyberangriff &#8211; Golem.de","author":"volker.kroener","date":"27. Februar 2024","format":false,"excerpt":"Derzeit ist die Verbraucherzentrale nur eingeschr\u00e4nkt erreichbar. Den Angreifern ist es gelungen, Daten auf Servern und Back-up-Systemen zu verschl\u00fcsseln. \u2014 Weiterlesen www.golem.de\/news\/daten-und-backups-verschluesselt-verbraucherzentrale-hessen-bestaetigt-cyberangriff-2402-182620.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":817,"url":"https:\/\/kroener-online.de\/?p=817","url_meta":{"origin":776,"position":5},"title":"Angriff mit neuer Ransomware: SEXi-Hacker verschl\u00fcsseln ESXi-Server &#8211; Golem.de","author":"volker.kroener","date":"4. April 2024","format":false,"excerpt":"Die neue SEXi-Ransomware ist k\u00fcrzlich in einem Rechenzentrum von Powerhost zum Einsatz gekommen. Betroffene Kundensysteme sind wohl teilweise nicht wiederherstellbar. \u2014 Weiterlesen www.golem.de\/news\/angriff-mit-neuer-ransomware-sexi-hacker-verschluesseln-esxi-server-2404-183825.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=776"}],"version-history":[{"count":0,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/776\/revisions"}],"wp:attachment":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}