News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Company security packages for MacOS Catalina
AV TEST News

The days when there were only a few thousand MacOS attackers are long gone. As of June 2020, the AV-TEST database has recognized over 240.000 MacOS malware variants. The laboratory has tested 14 current products for their protective effect, system load and usability and can report good results. 14 programs tested - 5 for companies The current test of the 14 products took place in the laboratory from May to June 2020 under the new MacOS Catalina. All products were first tested for their protective effect with new MacOS pests. Then the laboratory checked the system load of the respective security products….

Read more

ESET offers its MSPs new added value
Eset_News

The IT security manufacturer ESET is further expanding its offer for connected managed service providers (MSP). They now benefit from a new Direct Endpoint Management plug-in for the remote and management solutions from SolarWinds. MSP can conveniently manage the ESET products used via SolarWinds RMM and SolarWinds N-Central. ESET has also added its cloud sandboxing solution - ESET Dynamic Threat Defense - to the MSP portfolio. With the extended behavior analysis in a European sandbox cluster, the level of protection of the entire organization increases considerably. "Anyone who thinks of managed security services in the security industry comes to ESET ...

Read more

Attack methods on critical Industry 4.0 environments
Trend Micro News

In collaboration with the Politecnico di Milano (Polytechnic University of Milan), Trend Micro has prepared a research report on new attack methods on critical Industry 4.0 environments. Intelligent manufacturing systems are capable of far more than just performing the tasks for which they are normally used. It is precisely this aspect that makes intelligent manufacturing systems interesting for attackers who, among other things, can try to smuggle malicious code into the system undetected. The potentially weak links in the security chain include the Manufacturing Execution System (MES), human-machine interfaces (HMIs) and individually adaptable IIoT devices. In the endangered systems ...

Read more

Bitdefender creates "Business Solutions Group"
Bitdefender_News

Bitdefender has merged its corporate business into a new "Business Solutions Group" and hired experienced industry executives: Steve Kelley will act as President and Managing Director of the new business unit and Chris Brazdziunas will take on the role of Senior Vice President Product and Service Engineering. The reorganization underscores Bitdefender's focus on the enterprise security market - with its own business unit and a new leadership team reporting directly to CEO Florin Talpes. This should ensure continuous market and product leadership. Bitdefender is a global leader in cybersecurity solutions, protecting over ...

Read more

Quarrel in the underground
Trend Micro News

Underground forums are platforms for cybercriminals on which they offer stolen data or cybercriminal services for sale. However, there also seems to be more and more inconsistencies in the underground, which is increasingly causing trust in criminal providers to decline. Furthermore, such forums are more often broken up by police authorities, which are increasingly taking action against cybercrime. As a result, the focus of activities is increasingly directed towards e-commerce platforms and communication via Discord, which increases the anonymity of users. In addition, the prices for the illegal products and services offered are falling. Despite the…

Read more

EU & US “Privacy Shield” agreement invalid
Uniscon idgard Tüv south

The EU & US “Privacy Shield” agreement has been declared invalid – is it time to emancipate yourself from the US? A comment from Uniscon. On July 12, 2016, the transatlantic data protection agreement between the USA and the EU came into force and was intended to ensure that personal data of European citizens is adequately protected, even if it is transmitted to the USA or stored on cloud storage there. On January 25, 2017, Donald Trump again curtailed the rights of all non-US citizens via a decree and thus secured the US secret services unrestricted…

Read more

Q5: Solution protects websites from bots and credential stuffing
News B2B Cyber ​​Security

F5 protects websites with the new security solution Silverline Shape Defense from the increasing flood of fake Internet traffic. With this new, fully managed service, companies can protect themselves against bots, credential stuffing, scraping and other automated attacks that lead to fraud and abuse. This in turn prevents loss of efficiency, loss of revenue and brand damage. Silverline Shape Defense uses artificial intelligence to determine in real time exactly whether an application request is from a human or a bot. The solution also differentiates between a malicious actor and an authorized person. This approach stops malicious traffic without ...

Read more

Kaspersky: Expert opinion on the Twitter hack
Kaspersky_news

Cyber ​​criminals have succeeded in taking over the Twitter accounts of famous people like Barack Obama or Elon Musk and promoting a supposed cryptocurrency deal in order to steal bitcoins. Twitter is now assuming a social engineering attack on its own employees, which led to the hacked accounts of Elon Musk and Co., as Dmitry Bestuzhev, cybersecurity expert at Kaspersky, had already suspected. Costin Raiu, head of the Global Research and Analysis Team (GReAT) at Kaspersky, assesses the new findings as follows: "Yesterday's attack is possibly one of the worst security incidents on Twitter, if not ...

Read more

Twitter hack: Insiders remain the greatest risk
Exabeam_n

“The key to successfully uncovering such an attack is to be able to identify changes in user behavior.” Comment by Egon Kando, Exabeam “The coordinated social engineering attack on Twitter is unprecedented. What seems clear at this point is that it is an attack based on compromised user data, either by unsuspecting employees or via an allegedly malicious insider on the network. Both of these things often happen, as almost half of all data breaches are caused, consciously or unconsciously, by some type of insider threat. You cannot always trust your own employees. Almost all ...

Read more

Twitter: Did the attackers take advantage of the home work situation?
Bitdefender_News

"Twitter hackers could have done more damage, but wanted a quick buck." Commentary by Liviu Arsene, Senior Digital Threat Analyst at Bitdefender The spectacular attack on prominent Twitter accounts, which are likely to be secured by two-factor authentication, can only indicate a coordinated cyber attack on Twitter's employees and systems. It can be assumed that the attackers exploited the home office context: Employees here are much more likely to fall victim to fraud and spam emails, which then compromise devices and ultimately corporate systems. The Twitter breach could be the result of a spray-and-pray spearphishing campaign that cybercriminals successfully…

Read more