toot.blue は、数々の独立したMastodonサーバーのうちのひとつです。サーバーに登録してFediverseのコミュニティに加わってみませんか。
■蒼き象のマストドンサーバー。2017年4月にスタート。AWS上で運用されています。テーマは設けていません。(管理人的には少し時事ネタ多めです)どんな話題でも自由に投稿できますが、人種差別、外国人差別、性差別、民族差別、LGBTQ+差別などの差別発言やヘイト発言は厳禁です。またそうした発言につながるような発言も禁止します。 詳しくはサーバーのルールをお読みになってから参加してください。

サーバーの情報

237
人のアクティブユーザー

#sharepoint

00人投稿本日0件
ProPublica<p><a href="https://newsie.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Used China-Based Engineers to Support Product Recently Hacked by <a href="https://newsie.social/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a><br>==</p><p>Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular <a href="https://newsie.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> software but didn’t mention that it has long used China-based engineers to maintain the product.</p><p><a href="https://newsie.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://newsie.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://newsie.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://newsie.social/tags/Government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Government</span></a> <a href="https://newsie.social/tags/Safety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Safety</span></a> <a href="https://newsie.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> </p><p><a href="https://www.propublica.org/article/microsoft-sharepoint-hack-china-cybersecurity" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">propublica.org/article/microso</span><span class="invisible">ft-sharepoint-hack-china-cybersecurity</span></a></p>
heise Security<p>Microsofts Sharepoint-Lücken: Die Zero-Days, die vielleicht gar keine waren</p><p>Die Angriffe auf Sharepoint-Server nutzten keine neuen sondern bekannte Lücken aus, für die es bereits Patches gab. Ob die geschützt hätten, ist jedoch offen.</p><p><a href="https://www.heise.de/news/Microsofts-Sharepoint-Luecken-Die-Zero-Days-die-vielleicht-gar-keine-waren-10505387.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsofts-Share</span><span class="invisible">point-Luecken-Die-Zero-Days-die-vielleicht-gar-keine-waren-10505387.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
stux⚡<p>Oh wow, someone already made <a href="https://mstdn.social/tags/Metasploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metasploit</span></a> modules that target CVE-2025-53770 and CVE-2025-53771 in the recent <a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> 0-Day vulnerabilities</p>
AAKL<p>Maybe we should change the spelling of "vulnerabilities" to read "Microsoft?" It's hard to pin the worst offenders. There are others, so many more. </p><p>Kaspersky: ToolShell: a story of five vulnerabilities in Microsoft SharePoint <a href="https://securelist.com/toolshell-explained/117045/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securelist.com/toolshell-expla</span><span class="invisible">ined/117045/</span></a> <span class="h-card" translate="no"><a href="https://noc.social/@Kaspersky" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Kaspersky</span></a></span> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a></p>
Miguel Afonso Caetano<p>Hehehe... 🥳🤯🤡😎</p><p>"The US agency responsible for maintaining and designing the nation’s cache of nuclear weapons was among those breached by a hack of Microsoft Corp.’s SharePoint document management software, according to a person with knowledge of the matter.</p><p>No sensitive or classified information is known to have been compromised in the attack on the National Nuclear Security Administration, said the person, who wasn’t authorized to speak publicly and asked not to be identified. The semiautonomous arm of the Energy Department is responsible for producing and dismantling nuclear arms. Other parts of the department were also compromised.<br>(...)<br>The NNSA has a broad mission, which includes providing the Navy with nuclear reactors for submarines and responding to radiological emergencies, among other duties. The agency also plays a key role in counterterrorism and transporting nuclear weapons around the country.</p><p>Hackers were able to breach the agency as part of a 2020 attack on a widely used software program from SolarWinds Corp. A department spokesperson said then that malware had “been isolated to business networks only.”"</p><p><a href="https://www.bloomberg.com/news/articles/2025-07-23/us-nuclear-weapons-agency-breached-in-microsoft-sharepoint-hack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bloomberg.com/news/articles/20</span><span class="invisible">25-07-23/us-nuclear-weapons-agency-breached-in-microsoft-sharepoint-hack</span></a></p><p><a href="https://tldr.nettime.org/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a> <a href="https://tldr.nettime.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberWarfare</span></a> <a href="https://tldr.nettime.org/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://tldr.nettime.org/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://tldr.nettime.org/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SolarWinds</span></a> <a href="https://tldr.nettime.org/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
House Panther :verified_paw:<p>Well, I just heard that nuclear and health agencies’ data has just been compromised as a result of the notorious <a href="https://goblackcat.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> vulnerability. Don’t fucking use <a href="https://goblackcat.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> shit. There’s so many more secure options out there. I wonder why these agencies would expose their SharePoint servers to the public anyways.</p>
Europe Says<p><a href="https://www.europesays.com/2269569/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2269569/</span><span class="invisible"></span></a> Microsoft SharePoint hack affected US Energy Department, nuclear weapons agency <a href="https://pubeurope.com/tags/Energy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Energy</span></a> <a href="https://pubeurope.com/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://pubeurope.com/tags/MicrosoftNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftNews</span></a> <a href="https://pubeurope.com/tags/nuclear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nuclear</span></a> <a href="https://pubeurope.com/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://pubeurope.com/tags/TechNew" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNew</span></a></p>
Hackread.com<p>📢 Microsoft reveals 3 Chinese state-backed hacker groups, including Linen Typhoon, Violet Typhoon, and Storm-2603, are exploiting <a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> flaws, breaching over 100 organisations.</p><p>Read: <a href="https://hackread.com/microsoft-chinese-state-hackers-exploit-sharepoint-flaws/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/microsoft-chinese</span><span class="invisible">-state-hackers-exploit-sharepoint-flaws/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a></p>
heise Security<p>Angriffe auf Microsoft Sharepoint: Das müssen Admins nach dem Patchen tun</p><p>Das Schließen der Lücken genügt gegen die aktuellen Toolshell-Attacken nicht. Schließlich könnten Angreifer längst drin sein. Wir zeigen, wie man sie entdeckt.</p><p><a href="https://www.heise.de/hintergrund/Angriffe-auf-Microsoft-Sharepoint-Das-muessen-Admins-nach-dem-Patchen-tun-10496148.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/hintergrund/Angriffe-</span><span class="invisible">auf-Microsoft-Sharepoint-Das-muessen-Admins-nach-dem-Patchen-tun-10496148.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Hackread.com<p>Hackers are exploiting critical <a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> vulnerabilities to breach global targets, including governments and corporations.</p><p>Read: <a href="https://hackread.com/hackers-exploit-microsoft-sharepoint-flaws-breaches/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/hackers-exploit-m</span><span class="invisible">icrosoft-sharepoint-flaws-breaches/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a></p>
heise Security<p>Update: Neue Version von Sharepoint 2016 behebt Toolshell-Lücke</p><p>Microsoft legt nach und veröffentlicht auch für die 2016er-Ausgabe von Sharepoint einen Flicken. Admins sollten diesen unverzüglich einspielen.</p><p><a href="https://www.heise.de/news/Update-Neue-Version-von-Sharepoint-2016-behebt-Toolshell-Luecke-10495573.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Update-Neue-Vers</span><span class="invisible">ion-von-Sharepoint-2016-behebt-Toolshell-Luecke-10495573.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Schwere Sharepoint-Lücke: Schon am Wochenende 100 Organisationen kompomittiert</p><p>Die Beseitigung der schweren Sharepoint-Sicherheitslücke ist im Gange und derweil wird analysiert, wer sie ausgenutzt hat. Die Zahl der Opfer steigt.</p><p><a href="https://www.heise.de/news/Schwere-Sharepoint-Luecke-Schon-am-Wochenende-100-Organisationen-kompomittiert-10495463.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Schwere-Sharepoi</span><span class="invisible">nt-Luecke-Schon-am-Wochenende-100-Organisationen-kompomittiert-10495463.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Wirtschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wirtschaft</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <span class="h-card" translate="no"><a href="https://feddit.org/c/de_edv" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>de_edv</span></a></span></p>
The Japan Times<p>Microsoft is rushing to stop hackers from wreaking havoc across the globe by exploiting a flaw in its SharePoint document management software. <a href="https://www.japantimes.co.jp/business/2025/07/22/tech/microsoft-hackers-global-havoc/?utm_medium=Social&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">japantimes.co.jp/business/2025</span><span class="invisible">/07/22/tech/microsoft-hackers-global-havoc/?utm_medium=Social&amp;utm_source=mastodon</span></a> <a href="https://mastodon.social/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sharepoint</span></a></p>
Trendy Toots<p>Today's top ten tag trends:</p><p>10: <a href="https://mastodon.social/tags/malcolmjamalwarner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malcolmjamalwarner</span></a><br>9: <a href="https://mastodon.social/tags/MonochromeMonday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MonochromeMonday</span></a><br>8: <a href="https://mastodon.social/tags/PhotoMonday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhotoMonday</span></a><br>7: <a href="https://mastodon.social/tags/sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sharepoint</span></a><br>6: <a href="https://mastodon.social/tags/Fotomontag" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fotomontag</span></a><br>5: <a href="https://mastodon.social/tags/mastobada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mastobada</span></a><br>4: <a href="https://mastodon.social/tags/sommerinterview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sommerinterview</span></a><br>3: <a href="https://mastodon.social/tags/FotoVorschlag" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FotoVorschlag</span></a><br>2: <a href="https://mastodon.social/tags/fortunecookiesforcharacters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fortunecookiesforcharacters</span></a><br>1: <a href="https://mastodon.social/tags/monsterdon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>monsterdon</span></a></p><p><a href="https://mastodon.social/tags/trendytoots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trendytoots</span></a> 📈</p>
Flipboard Tech Desk<p>Microsoft Sharepoint server vulnerability puts an estimated 10,000 organizations at risk.</p><p><span class="h-card" translate="no"><a href="https://flipboard.com/@Engadget" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Engadget</span></a></span> reports: "The software giant released an emergency patch but the flaw is being actively exploited."</p><p><a href="https://flip.it/h6w1pi" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">flip.it/h6w1pi</span><span class="invisible"></span></a></p><p><a href="https://flipboard.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://flipboard.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://flipboard.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://flipboard.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://flipboard.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a></p>
Hackread.com<p>Microsoft confirms active exploits of two SharePoint vulnerabilities, urges immediate patching for on-prem users.</p><p>Read: <a href="https://hackread.com/microsoft-hackers-exploit-sharepoint-flaws-patch-now/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/microsoft-hackers</span><span class="invisible">-exploit-sharepoint-flaws-patch-now/</span></a></p><p><a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mstdn.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://mstdn.social/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a></p>
heise Security<p>Kritische Sharepoint-Sicherheitslücke: Erste Patches für "ToolShell" sind da</p><p>Microsoft hat mittlerweile einen Patch veröffentlicht, Angreifer waren am Wochenende jedoch nicht untätig. Dutzende Sharepoint-Installationen wurden Opfer.</p><p><a href="https://www.heise.de/news/Kritische-Sharepoint-Sicherheitsluecke-Erste-Patches-fuer-ToolShell-sind-da-10493989.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Kritische-Sharep</span><span class="invisible">oint-Sicherheitsluecke-Erste-Patches-fuer-ToolShell-sind-da-10493989.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <span class="h-card" translate="no"><a href="https://feddit.org/c/de_edv" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>de_edv</span></a></span></p>
Europe Says<p><a href="https://www.europesays.com/2262760/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2262760/</span><span class="invisible"></span></a> Microsoft alerts businesses, governments to server software attack <a href="https://pubeurope.com/tags/AlertIssued" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlertIssued</span></a> <a href="https://pubeurope.com/tags/america" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>america</span></a> <a href="https://pubeurope.com/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://pubeurope.com/tags/BUSINESSES" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BUSINESSES</span></a> <a href="https://pubeurope.com/tags/GovernmentAgencies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GovernmentAgencies</span></a> <a href="https://pubeurope.com/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://pubeurope.com/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://pubeurope.com/tags/Organizations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Organizations</span></a> <a href="https://pubeurope.com/tags/PrivateSectorPartners" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivateSectorPartners</span></a> <a href="https://pubeurope.com/tags/ServerSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ServerSoftware</span></a> <a href="https://pubeurope.com/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://pubeurope.com/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://pubeurope.com/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedStates</span></a> <a href="https://pubeurope.com/tags/UnitedStatesOfAmerica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedStatesOfAmerica</span></a> <a href="https://pubeurope.com/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> <a href="https://pubeurope.com/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a></p>
heise Security<p>Microsoft: Angriffe auf neue Sharepoint-Lücke – bislang kein Patch verfügbar</p><p>Microsoft warnt vor aktiven Angriffen auf eine bislang unbekannte Lücke in Sharepoint-Servern und benennt Erste-Hilfe-Maßnahmen für Verteidiger.</p><p><a href="https://www.heise.de/news/Microsoft-Angriffe-auf-neue-Sharepoint-Luecke-bislang-kein-Patch-verfuegbar-10493705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-Angrif</span><span class="invisible">fe-auf-neue-Sharepoint-Luecke-bislang-kein-Patch-verfuegbar-10493705.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Patchday: Microsoft schließt 100.000-$-Lücke in SharePoint aus Hacker-Wettbewerb</p><p>Update-Sammlung veröffentlicht: Um Attacken vorzubeugen, sollten Admins sicherstellen, dass ihre Microsoft-Produkte auf dem aktuellen Stand sind. </p><p><a href="https://www.heise.de/news/Patchday-Microsoft-schliesst-100-000-Luecke-in-SharePoint-aus-Hacker-Wettbewerb-10479811.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Patchday-Microso</span><span class="invisible">ft-schliesst-100-000-Luecke-in-SharePoint-aus-Hacker-Wettbewerb-10479811.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/SQLServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLServer</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>