News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

North Korean cyber espionage on defense companies
B2B Cyber ​​Security ShortNews

In recent years, North Korea's cyber espionage capabilities have expanded enormously and targeted hacker attacks have been carried out on international companies and authorities. The most recent incidents in which North Korean hackers obtained sensitive information from military and arms companies are particularly explosive. This shows how the internationally isolated regime is increasingly pursuing its military and geopolitical goals through cybercrime. The attacks also raise questions about the cybersecurity of Western countries, which are apparently more vulnerable to such attacks than previously thought. One example of this is the hacker attack on a German arms company. The North Korean hacker group...

Read more

Malware attacked Iranian government networks
B2B Cyber ​​Security ShortNews

Security researchers have uncovered a sophisticated cyberattack targeting Iraqi government networks linked to Iranian state-backed actors. Analysis by Check Point Research (CPR) shows that the malware installer bore the logo of the Iraqi General Secretariat of the Council of Ministers, a deliberate deception. In addition, the compromised servers were found to have links to the domains of the Prime Minister's Office and the Ministry of Foreign Affairs. The malware used bears similarities to known malicious programs used in previous attacks on the governments of Jordan, Lebanon and Pakistan....

Read more

CloudImposer had its sights set on Google Cloud Platform
B2B Cyber ​​Security ShortNews

A critical remote code execution (RCE) vulnerability called CloudImposer could have allowed malicious actors to infect millions of Google Cloud Platform (GCP) servers and customer systems. The Tenable Research Team has discovered a critical remote code execution (RCE) vulnerability called CloudImposer that could have allowed malicious actors to execute code on potentially millions of Google Cloud Platform (GCP) servers and customer systems. The vulnerability indicates a serious security flaw in Google Cloud services, specifically affecting App Engine, Cloud Function, and Cloud Composer. The discovery follows a careful analysis of GCP documentation…

Read more

Intel's security technology TDX is said to have vulnerabilities
B2B Cyber ​​Security ShortNews

​Researchers at the University of Lübeck say they have discovered security vulnerabilities in Intel's TDX security technology. While the researchers warn against this, Intel sees the risk as low and classifies the problem with a low CVSS value. The Intel Trust Domain Extensions, or TDX for short, is a security feature to create an isolated, trustworthy execution environment in cloud environments. On October 8, 2024, researchers at the University of Lübeck published the paper "TDXDown: Single-Stepping and Instruction Counting Attacks against Intel TDX" on Github. In it, they describe two potential vulnerabilities in the defense-in-depth functions of the Intel® Trust Domain Extensions (TDX)....

Read more

OT Security for Cloud, Air-Gapped and Hybrid Environments
B2B Cyber ​​Security ShortNews

A cybersecurity solutions provider has introduced its new SaaS solution for operational technology (OT). It is the first security solution that enables companies to secure complex, heterogeneous OT, IoT/IoMT and IT environments, whether they are fully cloud-based, fully isolated or hybrid. Forescout for OT Security combines proactive security and vulnerability management, threat detection based on Forescout Research – Vedere Labs' proprietary research on threats on unmanaged devices, critical operational monitoring capabilities and comprehensive controls for cloud and on-premises networks. Threat from unmanaged OT and IoT devices "The…

Read more

vishing attacks with AI
B2B Cyber ​​Security ShortNews

People on the phone are extremely vulnerable to AI-powered vishing attacks. The threat posed by such modern technologies is particularly evident when you see how effectively attackers are able to use automated phishing bots. A recent study conducted as part of the DEFCON Social Engineering Village Capture-the-Flag competition has impressively demonstrated how successful these bots can be. As part of the competition, teams of humans and AI bots competed against each other to find out who was better at obtaining sensitive information through vishing. The AI ​​bots demonstrated impressive skills: They held fluent conversations, joked with…

Read more

Data theft: CeranaKeeper abuses Dropbox, OneDrive & Co
B2B Cyber ​​Security ShortNews

The CeranaKeeper threat actor is currently only carrying out data theft in Asia. There, it uses services such as Pastebin, Dropbox, OneDrive and GitHub for data theft. ESET has identified that the attacker uses modified components from the Chinese APT group Mustang Panda and Earth Preta. In a new report, researchers from the ESET Research team describe the tools and activities of a new threat actor called CeranaKeeper, which is linked to China. This actor focuses on the massive exfiltration of data in Southeast Asia. The group is currently most active in Thailand. ESET researchers have been observing since...

Read more

FBI vs. Star Blizzard: Russian APT group loses 100 domains
B2B Cyber ​​Security ShortNews

According to the official announcement of the US Department of Justice, the FBI has severely curtailed the spear phishing efforts of the Russian secret service by seizing 41 Internet domains. Microsoft is taking parallel action against 66 domains. The Russian APT group Star Blizzard is losing more and more parts of its infrastructure. The Department of Justice announced the seizure of 41 Internet domains used by Russian secret service agents and their proxies for computer fraud and abuse in the United States. The department also announced that this was part of the national cybersecurity strategy. The department is also working in parallel with Microsoft to further...

Read more

BSI: Thousands of Exchange servers still vulnerable
B2B Cyber ​​Security ShortNews

The current figures from CERT regarding outdated Microsoft Exchange servers in Germany are alarming. According to the report, 28% of Exchange servers 2016/2019 with open Outlook Web Access (OWA) are on a patch level that is more than six months old. The warnings from CERT - the Computer Emergency Response Team of the BSI are alarming, especially since the issue of unpatched Exchange servers is not new, but an ongoing issue. According to CERT, the patch level for CVE-28-2016 is more than six months old for 2019 percent of Exchange servers 2024/26198 with open Outlook Web Access (OWA). Even more critical is the fact that...

Read more

Root certificate disruption: 80% of Fortune 500 companies affected
B2B Cyber ​​Security ShortNews

The failure of a ServiceNow SSL root certificate caused disruptions at 600 companies. 80 percent of these are said to be Fortune 500 companies. Many users are angry. A comment by Kevin Bocek, Venafi. The failure of a ServiceNow SSL root certificate last week caused widespread disruptions that affected more than 600 customers. 80 percent of Fortune 500 companies rely on ServiceNow to provide critical services. Many users on Reddit have expressed their anger at the impact of the failure. Certificate failure disrupted 600 companies "The failure of the certificate, the…

Read more