In connection with the security incident on September 28, 2023, we have created a page with FAQs where you can find important information. We will update this information regularly to inform you as transparently as possible. Click here for the [...]
On 09/28/2023, a security incident was detected on GWDG systems by internal security systems. This incident is being investigated in detail by the GWDG. Authorities and external security experts have also been informed and are consulted where necessary. So far, [...]
Yesterday, not only a serious vulnerability in AMD’s Zen 2 CPUs was disclosed, but also a very easy-to-use exploit for this vulnerability was published. By exploiting this vulnerability, sensitive data, such as passwords, can be read from other processes and [...]
Message-Id: 202207140924 Time: 14.07.2022 Affected: All GWDG users Impact: Delivery of a phishing e-mail
There is currently another phishing e-mail in circulation. We especially want to draw attention to e-mails where the sender pretends to be a colleague or superior
Message-Id: 202206241420 Time: since 24.06..2022 Affected: All GWDG users Impact: Delivery of a phishing e-mail
There is currently another phishing e-mail in circulation. We especially want to draw attention to e-mails where the sender pretends to be a colleague or
Message-Id: 202205271420 Time: since 27.05.2022 Affected: All GWDG users Impact: Delivery of a phishing e-mail
There is currently another phishing e-mail in circulation. We especially want to draw attention to e-mails where the sender pretends to be a colleague or
Message-Id: 202204281700 Time: since 28.04.2022 Affected: All GWDG users Impact: Delivery of a phishing e-mail
There is currently another phishing e-mail in circulation. We especially want to draw attention to e-mails where the sender pretends to be a colleague or
Message-Id: 202202220935 Time: 22.02.20222 since 09:35 a.m. Affected: All GWDG users Impact: Delivery of Phishing Mail
There is currently another phishing e-mail in circulation.
https://info.gwdg.de/docs/doku.php?id=en:services:it_security:current_phishing-emails:start [...]
Message-Id: 202202172022 Time: 17.02.2022 6 pm until 8 pm Affected: Networkconnection Uni, UMG, GWDG; WLAN on Uni-Campus; Servieces of the GWDG Impact: serveral disconnections possible
The Maintenance of the perimeterfirewall has been completed. [...]
Message-Id: 202202141255 Time: 14.02.20222 since 12:40 p.m. Affected: All GWDG users Impact: Delivery of Phishing Mail
There is currently another phishing e-mail in circulation.
https://info.gwdg.de/docs/doku.php?id=en:services:it_security:current_phishing-emails:start [...]
Message-Id: 202202110946 Time: 11.02.20222 since 09:38 a.m. Affected: All GWDG users Impact: Delivery of Phishing Mail
There is currently another phishing e-mail in circulation.
https://info.gwdg.de/docs/doku.php?id=en:services:it_security:current_phishing-emails:start [...]
Message-Id: 202201190922 Time: 19.01.20222 since 09:22 a.m. Affected: All GWDG users Impact: Delivery of Phishing Mail
There is currently another phishing e-mail in circulation.
https://info.gwdg.de/docs/doku.php?id=en:services:it_security:current_phishing-emails:start [...]
Message-Id: 202201110907 Time: 11.01.20222 since 09:07 a.m. Affected: All GWDG users Impact: Delivery of Phishing Mail
There is currently another phishing e-mail in circulation.
https://info.gwdg.de/docs/doku.php?id=en:services:it_security:current_phishing-emails:start [...]
Message-Id: 202201061959 Time: 06.01.2022 17:00-20:00 Affected: Connections to and from GÖNET Impact: Cancellation of individual connections
Due to problems with disconnections during the last failover of the the last failover of the firewall cluster, additional changes of the active cluster [...]
The Log4j security vulnerability is keeping the Internet and thus all IT service providers on their toes. A software component that is often used in Java applications for processing log messages allows attackers on affected systems to reload and execute