News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

National IT Situation Center
B2B Cyber ​​Security ShortNews

Federal Interior Minister Nancy Faeser recently opened the new National IT Situation Center of the Federal Office for Information Security (BSI) in Bonn. Bitkom President Dr. Ralf Wintergerst: “Cyber ​​attacks are currently one of the biggest threats to our economy and society: Last year, the German economy suffered 206 billion euros in damage through theft of IT equipment and data as well as digital and analogue industrial espionage and sabotage. We welcome the fact that the BSI is improving the conditions for preventing and combating cyber crime with the new National IT Situation Center. So that companies and authorities can protect themselves accordingly,...

Read more

Another cyber attack on the hospital
B2B Cyber ​​Security ShortNews

Hackers have paralyzed the IT system and telecommunications at the Lindenbrunn Hospital in Coppenbrügge (Hameln-Pyrmont district). The unknown perpetrators demanded money to make the systems available again. However, the hospital did not respond to this. How the perpetrators were able to break into the IT systems is being investigated. The hospital reports that patient care is not at risk. However, improvisation is necessary: ​​instead of digital patient files, written files are being created again. “There is currently no indication as to whether patient or resident data is affected,” it says on the hospital’s website. "As part of a…

Read more

Clinic deregistered from emergency care after cyber attack
B2B Cyber ​​Security ShortNews

After a cyber attack, the Dreifaltigkeits Hospital in Lippstadt and two other hospitals are temporarily unable to accept emergencies. After the attack, no one anymore had access to the patient data. “As in other cases, our employees and other experts who are very experienced in these matters are trying to restore the IT systems as quickly as possible,” it says on the hospital’s website. “This necessary process is carried out completely normally and carefully, but requires the time necessary in other cases of cyber attacks. For such cases, there are extensive outage concepts to ensure patient care...

Read more

Identity theft, AI and deep fakes
B2B Cyber ​​Security ShortNews

In the last year, credential interception attacks, such as those exploiting the Citrix NetScaler vulnerability, have resulted in cybercriminal groups having millions of potential logins. In 2024, the number of cyberattacks using stolen or fake digital identities will continue to rise. This circumstance is likely to cause massive problems again in many German companies in 2024. Cybercriminals rely on companies using a wide variety of cloud infrastructures and solutions and thereby losing track of their access and access authorizations. To protect yourself from a flood of cloud-based user account takeovers...

Read more

Go-based malware loader discovered
B2B Cyber ​​Security ShortNews

A cybersecurity company's research team has identified threat actors using a new Go-based malware downloader in two recent attacks. Arctic Wolf Labs calls it “CherryLoader”. This allows attackers to share exploits without recompiling the code. The loader's icon and name were disguised as the note-taking application CherryTree to deceive victims. The attacks examined used CherryLoader to install PrintSpoofer or JuicyPotatoNG. Both are access escalation tools that run a batch file after installation. This allows the attackers to remain on the victim's device. The most important…

Read more

Anydesk hacked – BSI warning
B2B Cyber ​​Security ShortNews

The remote maintenance software provider Anydesk has confirmed that it has fallen victim to a cyber attack. The BSI issued a corresponding warning. In a report from the Federal Office for Information Security (BSI), the authority warns of a possible leak of the source code and certificates. This means there is a risk that data obtained via the Anydesk hack could be used for further attacks on the provider's customers. In this context, man-in-the-middle and supply chain attacks are conceivable. Particularly due to the possibly expired certificates, these could remain unnoticed or, in the worst case, attacks could already have taken place...

Read more

Protection of sensitive data
B2B Cyber ​​Security ShortNews

The global average amount of data an organization generates and stores has grown by 18 percent in the last 42 months. Due to this growth, the average European company has more than 12 million sensitive records. As the amount of data increases, so does the challenge of maintaining a clear overview. A full 98 percent of the companies surveyed in Germany admit that they have considerable difficulties with the visibility of their data. This means they cannot fully understand where their data is stored, who has access to it and how it is used...

Read more

Microsoft abused for phishing
B2B Cyber ​​Security ShortNews

The research department of a cyber security solutions provider has published the Brand Phishing Report for the fourth quarter of 2023. The report highlights the brands most frequently imitated by hackers to steal personal information, user account information or payment data in October, November and December 2023. Microsoft was at the top with 33 percent and overall the technology sector was the most abused industry as Amazon came second with 9 percent, Google third with 8 percent and Apple with 4 percent. “As we move forward from 2023…

Read more

US agency CISA takes Ivanti devices offline
B2B Cyber ​​Security ShortNews

The American Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency order calling on all federal agencies to take Ivanti devices offline. The background to this measure is the discovery of security gaps in network products from the manufacturer Ivanti. The “Ivanti Connect Secure” and “Ivanti Policy Secure” products are affected. CISA published conditions that must be met before the US manufacturer's devices are allowed back on the network. This includes resetting to factory settings and updating to a bug-fixed version. Passwords and certificates also have to be reissued. CISA writes on…

Read more

Secure AWS
B2B Cyber ​​Security ShortNews

Securing software development and operational processes has become increasingly difficult over the last decade. The majority of workloads have moved to the cloud and a greater number of IT professionals are working remotely. Since many companies access Amazon Web Services (AWS), it is important for security experts to know how they can make the infrastructure as secure as possible, because if companies use a cloud-native architecture, it is conceivable that this spanning both cloud and on-premises resources, increasing the attack surface. The demand for a product for…

Read more