{"id":2907,"date":"2024-08-07T11:03:38","date_gmt":"2024-08-07T09:03:38","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2907"},"modified":"2024-08-20T14:40:51","modified_gmt":"2024-08-20T12:40:51","slug":"bleepingcomputer-com-07-08-2024","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/bleepingcomputer-com-07-08-2024\/","title":{"rendered":"Bleepingcomputer.com &#8211; 07.08.2024"},"content":{"rendered":"\n<p>William Moody und Wolfgang Ettlinger, Cyber Security Experten bei Certitude haben eine eine Microsoft 365 Sicherheitsl\u00fccke entdeckt. Bleepingcomputer.com berichtet \u00fcber unsere Erkenntnisse, die auch an Microsoft \u00fcbermittelt wurden. Der gesamte Artikel ist <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-365-anti-phishing-feature-can-be-bypassed-with-css\/\" data-type=\"link\" data-id=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-365-anti-phishing-feature-can-be-bypassed-with-css\/\" target=\"_blank\" rel=\"noreferrer noopener\">hier<\/a> nachzulesen<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"589\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-1-2.png\" alt=\"\" class=\"wp-image-2952\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-1-2.png 605w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-1-2-300x292.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"93\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-2-1.png\" alt=\"\" class=\"wp-image-2953\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-2-1.png 605w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-2-1-300x46.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"528\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-4-1.png\" alt=\"\" class=\"wp-image-2954\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-4-1.png 605w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-4-1-300x262.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"116\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-5-1.png\" alt=\"\" class=\"wp-image-2955\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-5-1.png 605w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-5-1-300x58.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"217\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-6-1.png\" alt=\"\" class=\"wp-image-2956\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-6-1.png 605w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-6-1-300x108.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"353\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-7-1.png\" alt=\"\" class=\"wp-image-2957\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-7-1.png 605w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild-7-1-300x175.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>William Moody und Wolfgang Ettlinger, Cyber Security Experten bei Certitude haben eine eine Microsoft 365 Sicherheitsl\u00fccke entdeckt. Bleepingcomputer.com berichtet \u00fcber unsere Erkenntnisse, die auch an Microsoft \u00fcbermittelt wurden. Der gesamte Artikel ist hier nachzulesen<\/p>\n","protected":false},"author":12,"featured_media":3012,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126],"tags":[513],"class_list":["post-2907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presse","tag-presse-de"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2907"}],"version-history":[{"count":7,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2907\/revisions"}],"predecessor-version":[{"id":3015,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2907\/revisions\/3015"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/3012"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}