IT‑Sicherheits‑Digest (2026-02-27)

Aktuelle Security‑News

heise security

  • Junos OS Evolved: Update außer der Reihe stopft Codeschmuggel-Lücke (2026-02-27 06:49 UTC)
    • Kurz: In Junos OS Evolved der PTX-Serie von Juniper Networks klafft eine kritische Sicherheitslücke. Ein ungeplantes Update schließt sie.
    • Quelle: Link
  • Kommentar: KI-Müll treibt curls Bug-Bounty-Programm vor sich her (2026-02-26 14:34 UTC)
    • Kurz: Erst weg von HackerOne, vier Wochen später zurück – curl reagiert erratisch auf die Flut wertloser und belastender KI-Beiträge.
    • Quelle: Link
  • Betrug über Telegram steigt um 233 Prozent – Fake-Jobs sind das größte Problem (2026-02-26 12:46 UTC)
    • Kurz: Trotz vieler Betrugsversuche auf Meta-Plattformen ist die am schnellsten wachsende Quelle für Scams Telegram. Besonders der Betrug mit Fake-Jobs boomt.
    • Quelle: Link

BleepingComputer

  • Previously harmless Google API keys now expose Gemini AI data (2026-02-26 20:55 UTC)
    • Kurz: Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data. […]
    • Quelle: Link
  • Trend Micro warns of critical Apex One code execution flaws (2026-02-26 17:58 UTC)
    • Kurz: Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. […]
    • Quelle: Link
  • European DYI chain ManoMano data breach impacts 38 million customers (2026-02-26 17:35 UTC)
    • Kurz: DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. […]
    • Quelle: Link

The Hacker News

  • Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown (2026-02-26 18:00 UTC)
    • Kurz: Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. “Instead of relying on traditional ser…
    • Quelle: Link
  • UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor (2026-02-26 15:17 UTC)
    • Kurz: A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is being tracked by Cisco Talos under t…
    • Quelle: Link
  • ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories (2026-02-26 14:28 UTC)
    • Kurz: Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind the scenes, the tactics are sharper. Access happens faster.…
    • Quelle: Link

Neue CVEs (letzte 24h, NVD‑Abgleich)

Fortinet FortiGate (7.4.x)

  • Keine neuen Treffer in den letzten 24h.

Atlassian (Jira/Confluence)

  • Keine neuen Treffer in den letzten 24h.

HPE/Aruba Switches

  • Keine neuen Treffer in den letzten 24h.

VMware ESXi/vCenter (7.x)

  • CVE-2026-22715 — CVSS 5.9 (MEDIUM)
    • Kurz: VMWare Workstation and Fusion contain a logic flaw in the management of network packets. Known attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network …
    • Quelle: Link

Hinweis

  • CVE‑Treffer sind ein Frühwarn‑Check (NVD) und müssen für eure exakten Versionen/Deployments gegengeprüft werden (Vendor Advisory/Patches).