News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Microsoft patch report
Tenable news

In August 2020, Microsoft again patched over 100 CVEs and repaired 120 CVEs, including 17 critical vulnerabilities. For the first time in three months, two vulnerabilities were reported that were exploited "in the wild". CVE-2020-1380 is a remote code execution vulnerability in Microsoft's scripting engine. It is caused by the way Internet Explorer's memory handles objects. To exploit this vulnerability, an attacker would have to induce a victim to visit a website with exploit code or to open a malicious document that contains an embedded ActiveX control. This would be the ...

Read more

Ransomware attacks on SMBs
Eset_News

ESET: ransomware attacks target small and medium-sized businesses. IT security has a lot of catching up to do, especially in the SME sector. German medium-sized companies are the engine of innovation in the economy. According to the Federal Association of SMEs, 99,5 percent of companies in Germany are small and medium-sized enterprises (SMEs). They often fail to recognize their importance and neglect the topic of IT security. For this reason, many cyber criminals have adapted their arsenals to precisely these companies. Their attack methods range from Denial-of-Service (DDoS) attacks, which lead to hours of downtime and high revenue losses, to malware attacks, especially with ransomware. Successful blackmail Trojan attacks can ...

Read more

GDPR compliant messenger
News B2B Cyber ​​Security

According to the manufacturer, the GDPR-compliant stashcat messenger is currently used by companies, in authorities and schools, in the healthcare sector, by the police and the armed forces - wherever confidential data is involved. In total, the messenger is used by around 800.000 users - the spectrum ranges from schoolchildren, parents, teachers and doctors to authorities with the police and the armed forces. Matching articles on the topic

Read more

Updates: Aagon tool instead of WSUS
News B2B Cyber ​​Security

Aagon with the ACMP CAWUM tool takes care of the necessary patches and updates and thus of the necessary IT security in the home office and in the company. In the home office in particular, the work computers must always contain all important and security-relevant updates. Because there is no firewall structure there, as is the case in the system landscape within the company, and so the home office can quickly develop into a gateway for malicious software or unwanted scouts. Aagon provides a remedy with the ACMP CAWUM tool, which takes care of the required patches and updates and thus the necessary ...

Read more

Long-term test 19 Endpoint Security Solutions
News B2B Cyber ​​Security

AV-Comparatives publishes long-term antivirus test reports for 19 Endpoint Security Solutions. The English-language comparison report on business and enterprise security endpoint solutions checks the protection performance of the products over a period of 4 months. The independent, ISO-certified security test laboratory AV-Comparatives has published its Security Test Report for business solutions. It is the most comprehensive comparison report to date of the available business and enterprise endpoint security solutions in the IT security industry. The threat landscape continues to evolve rapidly and presents antivirus providers with new challenges. The test report shows how security products have adapted to these and how the protection performance has improved over the years. Long-term test over 4 months The ...

Read more

Attack on 4.000 databases
Eset_News

“Meow” attacks delete nearly 4.000 unsecured databases. The attackers and their intentions are so far unknown, but they are again showing the risks of inadequate data security. In the past few days, thousands of unsecured databases have been automatically attacked and the stored data has been deleted. The attacks are known as "Meow" attacks because the data is overwritten with the character string "Meow", among other things. In addition, no explanation is left for the data destruction. As a search in Shodan shows, the "Meow" attacks have spread in the past few days. Almost 4.000 databases have now been deleted. More than 97% of attacks ...

Read more

Software development creates weak points
Trend Micro News

Trend Micro introduces the application security risks and safeguards. Developers who work in traditional development teams tend to think about security after the fact because they focus too much on building applications and meeting deadlines. Applications play an integral role today and many businesses and users rely on a wide range of applications for work, education, entertainment, retail, and other purposes. Therefore, development teams play a key role in ensuring that applications provide users with a high level of usability, performance, and security from threat actors who ...

Read more

Hypervisor introspection as open source
Bitdefender_News

Bitdefender makes HVI available as open source. This enables hypervisor introspection to be used for other purposes besides IT security. The publication takes place within the framework of the Xen Project. Bitdefender provides HVI (Hypervisor Introspection) as open source. The cybersecurity company, which protects over 500 million systems worldwide, is making one of its groundbreaking technologies freely available to the open source community. HVI uses the position of the hypervisors between the underlying hardware and the virtualized operating systems of the servers and desktops. The technology examines the memory in real time for signs of memory-based ...

Read more

Mac hack via Office macros
News B2B Cyber ​​Security

Der Spiegel (spiegel.de) reports how a recent Mac hack shows how easily the Office package can be attacked on a Mac and thus also endanger companies - even if Office runs more under Windows there. Mac hacker Patrick Wardle has now presented his experiment in the virtual edition of the Black Hat IT security conference, which normally takes place every summer in Las Vegas. His attack on the Mac is actually a classic of the Windows hacks - namely the spread of malware via prepared office macros. The hack Wardle shows the black hat audience does not trigger a macro warning. He…

Read more

Hackers take advantage of Covid 19
Checkpoint News

Check Point's 2020 semi-annual report shows how hackers took advantage of the Covid 19 pandemic and attacked the global economy, politics or healthcare. Check Point® Software Technologies, a leading global provider of cyber security solutions, has published its IT security report for the first half of 2020. It provides an overview of how cyber criminals of all kinds misused the COVID-19 pandemic for their illegal purposes. They attacked all sectors, whether business, politics, health care, industry, telecommunications, critical infrastructures or consumers. Phishing attacks, with Corona as a topic, increased enormously: from under 5000 per week in February to 200 per ...

Read more