News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Webinar 03.09.21: Kaspersky Industrial CyberSecurity (KICS)
Kaspersky_news

Every minute counts - industrial cybersecurity has different requirements. For this reason, Kaspersky invites you to a free webinar on the topic of Kaspersky Industrial CyberSecurity (KICS) on September 03, 2021 from 10 a.m. The cyber threat landscape is constantly changing, but the requirements of ICS environments and those of companies in other areas differ significantly. Uninterrupted operation has the highest priority in industrial systems - because here every minute of downtime or error time counts. For this reason, choosing the right consultant and technology partner to protect your systems is more important than ever. And here comes ...

Read more

Blocked more than a million phishing websites
Kaspersky_news

Cyber ​​criminals are still using the Covid-19 topic for themselves, as a current Kaspersky analysis of anonymous data shows. From March 2020 to July 2021, the cybersecurity company's products blocked over a million attempts to visit pandemic-related phishing websites worldwide. A total of 300 websites in Europe have been blocked in the study period since the beginning of the pandemic. Most of the attempts came from Germany: a third of the blocked websites were tried to be accessed from here. Most hits from Germany The most common methods used by cyber criminals to seduce users into disclosing data include fake payment offers and discounted COVID-19 tests. Since…

Read more

Special IIS malware for Windows web servers
Eset_News

Special malicious programs spy out governments and attack online shoppers. ESET publishes white papers on the latest IIS malware threats to Windows web servers. The vulnerabilities in Microsoft Exchange worried many IT administrators at the beginning of the year. Because hackers were able to exploit Microsoft's Internet Information Services (IIS). ESET researchers have now analyzed a total of ten previously unknown malware families that were used as malicious extensions for the IIS web server. These various threats target both government mailboxes and credit card transactions in e-commerce. They can eavesdrop on and manipulate the server's communication. According to…

Read more

Free cloud storage for companies in flood areas
B2B Cyber ​​Security ShortNews

Free cloud storage: ARTEC supports affected companies in the flood areas. Companies that need storage space for their data will now receive free cloud storage with a capacity of up to 1 TB in a secure, ARTEC-owned data center. The flood disaster hit not only private households, but also companies in the regions badly and caused enormous damage. Companies are often faced with a double challenge: On the one hand, direct material damage has occurred, for example through the destruction of buildings, systems, equipment and vehicles or the loss of inventory. On the other hand, important data are often also ...

Read more

Ivanti takes over RiskSense and expands Neurons
ivanti news

Ivanti Acquires RiskSense: Acquisition Helps Customers Proactively Combat Cyber ​​Threats and Ransomware Attacks. RiskSense extends Ivanti Neurons for Patch Intelligence with robust, risk-based functions for prioritizing and eliminating vulnerabilities. Ivanti, the automation platform that discovers, manages, secures and maintains IT assets from the cloud to the edge, announces the acquisition of RiskSense. RiskSense is a pioneer for risk-based and prioritized vulnerability management. The aim of the takeover is to advance the next evolutionary stage in patch management. The bundling of the competencies of Ivanti and RiskSense enables companies to reduce their attack surface, ...

Read more

Microsoft Exchange: Attackers scan for ProxyShell
G Data News

Attackers are currently targeting a number of vulnerabilities known as “ProxyShell”. The vulnerabilities have been closed since April and May. G Data recommends that companies affected patch their Exchange servers immediately. Around the BlackHat security conference, which takes place annually in Las Vegas, security researchers often publish previously unknown security gaps - this year too: three vulnerabilities in Microsoft Exchange are once again causing work in companies that operate an Exchange server locally. The names are: CVE-2021-34473 CVE-2021-34523 CVE-2021-31207 “The attacks by the Hafnium group on local Exchange servers in March of this year ...

Read more

Sophos equips EDR customers with XDR technology free of charge
SophosNews

Sophos has combined its endpoint detection and response solution Intercept X with EDR and its extended detection and response solution XDR in one solution. Customers who use Sophos Security solutions with EDR are currently being converted to the much more extensive XDR technology automatically and as a free service. In addition, the data history in the Sophos Data Lake has been increased from seven to thirty days. Customers who already use endpoint or server EDR now benefit from additional detection and response functions. Detailed threat analysis with Sophos XDR Only recently, Sophos announced the further development of its EDR offering, the availability of the Sophos Data Lake ...

Read more

Technical telephone fraud targets end users and SMEs
AvastNews

Millions of attacks by "technical telephone fraud" in Germany. Avast blocked 2,2 million attack attempts in one year alone and warns of the dangers. Fraudsters are particularly targeting end users and SMEs. Avast, a global leader in digital security and privacy solutions, warns of a continuing wave of tech phone fraud. The cybersecurity experts have recognized and blocked over 2,2 million attempts at the fraud scheme in Germany in the past twelve months. Information on the PC attracts the support hotline There are two types of technical telephone fraud: On the one hand, fraudsters call consumers directly ...

Read more

Automated alerts in SearchLight for domain spoofing
B2B Cyber ​​Security ShortNews

New feature in the cyber threat monitoring tool automates triage and reduces the time required to manage domain spoofing by up to 75%. The SearchLight search engine scans sources in the open, deep and dark web. Cyber ​​threat intelligence provider Digital Shadows has expanded its SearchLightTM monitoring solution to include new features for detecting domain spoofing. From August 2021, users will receive highly filtered, contextualized alerts as soon as a domain is registered under an incorrect brand name. This simplifies triage and allows security teams to react more quickly to potential threats. The time required to manage domain spoofing is reduced by up to ...

Read more

Now we start with 5G and the security priorities 
F5 news

Around half of the mobile network operators are already installing their own 5G network or are planning to do so in concrete terms and are also setting security priorities. This is shown by a worldwide IDG survey of service providers on behalf of F5. Currently, almost no provider has a dedicated 5G core network. Such standalone networks are likely to spring up like mushrooms: 18 percent of the network operators surveyed installed a 2020G standalone core at the end of 5, and a further 29 percent want to follow soon. Of the European participants, 21 percent are working on a 5G standalone core, and a further 21 percent are in the planning phase. Europe is not far behind Asia, ...

Read more