News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Barracuda introduces cloud-native SASE platform

Cloud security specialist Barracuda announces a cloud-native SASE platform that enables companies to control access to data from any device, anytime, anywhere. To achieve SASE convergence, the Barracudas platform combines technologies Secure SD-WAN, Firewall-as-a-Service, Zero Trust Network Access and Secure Web Gateway. In a recent study by Barracuda, more than 80 percent of respondents said that customers have a SASE solution that runs natively with their chosen Infrastructure as a Service (IaaS) cloud provider, a third-party offering that runs another cloud -Solution requires, preferred. Customers only want to use one cloud The new ...

Read more

Data Inspector scans OneDrive and SharePoint for malware
Barracuda News

New Data Classification Features: Barracuda Data Inspector automatically scans OneDrive and SharePoint to find sensitive information and malicious files. With the new Barracuda Data Inspector, the cloud security specialist Barracuda is helping companies to check OneDrive for Business and SharePoint data for sensitive information and malicious files. The Data Inspector takes on this task automatically. Powerful data classification features help identify various types of data such as login information, personal information, credit card information, and more. With the Data Inspector, users can determine where sensitive data is stored and whether it has been shared internally or externally. This information can be used to ...

Read more

Bots make up 40 percent of all Internet traffic
Barracuda News

New Barracuda Study: A Spike in Bot Traffic. Malicious bots make up 40 percent of all Internet traffic. Cloud security specialist Barracuda analyzed bot traffic patterns in the first half of 2021 and found that automated attacks had increased dramatically. The pattern of these attacks and what exactly the bot behavior looks like has now been published by the company in its report Bot attacks: Top Threats and Trends - Insights into the growing number of automated attacks. The report also breaks down live examples and explains measures and technologies that can be used to ward off these types of attacks. Automated bot traffic ...

Read more

Ransomware attacks are increasing by 64 percent worldwide
Barracuda News

Ransomware attacks worldwide increase by 64 percent within a year. Barracuda analyzes attack patterns from August 2020 to July 2021. Cloud security specialist Barracuda has published its annual report on the development of ransomware attacks. The current investigation is already the third report and provides information on ransomware attack patterns that took place between August 2020 and July 2021. Analysis of ransomware incidents The company's analysts identified and analyzed 121 ransomware incidents during the said period. They recorded an increase in attacks of 64 percent compared to the previous year. According to this, cyber criminals have it primarily on municipalities, the healthcare sector and ...

Read more

Dangerous contaminated sites: old unpatched vulnerabilities
Dangerous contaminated sites: old unpatched vulnerabilities

Unpatched software vulnerabilities remain attractive targets for cyber criminals long after they have been discovered. The contaminated sites do not resolve themselves. An analysis by Barracuda shows how dangerous this can be. It can be a fatal fallacy to believe that identified software vulnerabilities are no longer dangerous. Anyone who is careless and thinks to wait before closing the gateway, which is urgently needed, because there are currently much more important things to do within their own IT infrastructure, is vastly mistaken. Because it is precisely this negligence that many hackers rely on and look one more time where ...

Read more

The enemy in your own inbox
The enemy in your own inbox

Attacking email accounts will continue to be one of the most popular methods used by cyber criminals to gain access to sensitive company information. Barracuda best practices for addressing a lack of integration between incident response and web security. Although classics such as compromised email attachments or links still serve their purpose, attackers do not necessarily want to rely on them: social engineering or the use of stolen credentials for planned data theft are far more difficult tactics. And so, inefficient responses to email attacks cost companies billions of dollars each year. Because for many companies, finding, identifying and removing email threats is a ...

Read more

Cryptocurrency and cyber crime

Cryptocurrency and Cybercrime: How Bitcoin and Co. are fueling cyber extortion, BEC and ransomware. Cryptocurrency is a type of currency that is only available in digital form. Due to its decentralized nature and lack of regulation, it has become a preferred means of payment for cyber criminals. Traditionally it has been used for blackmail and ransomware attacks, but hackers have now also started using it for spear phishing, impersonation and business email compromise (BEC) attacks. The following article examines how cybercriminals operate and explains protection strategies. Rise in Bitcoin Price and E-Mail Threats As the price of Bitcoin tends to rise sharply and the public ...

Read more

700 social engineering attacks per company
Barracuda News

The average company is the target of over 700 social engineering attacks annually. Barracuda publishes sixth spear phishing report. The 2021 report shows how email attacks are evolving and who are most affected How are spear phishing attacks developing, what new tricks are cybercriminals using, and who are they specifically targeting? Barracuda's sixth, current report "Spear Phishing: Top Threats and Trends Vol. 6" provides answers to these questions and provides information on the latest spear phishing trends and what companies can do in practice with the help of which technologies in terms of email security not to be left behind in principle. Between May ...

Read more

Counter new attack surfaces through APIs
Counter new attack surfaces through APIs

Application security: Countering new attack surfaces through APIs. Understanding the various threat vectors is essential for companies to be able to adequately protect applications. Applications can be found today in a wide variety of IT environments, from data centers to smartphones, and their number is increasing inexorably. Increased remote work has also meant that more and more applications have to be outsourced to the cloud. This has increased potential risks with regard to application security. Understanding the various threat vectors is therefore essential for companies to be able to adequately protect their applications. Bots as a source of threat Bots are without a doubt ...

Read more

Barracuda is upgrading the Secure Connector
Barracuda is upgrading the Secure Connector

Barracuda upgrades Secure Connector with analysis capabilities from Crosser. The combination ensures scalable and secure connectivity in IIoT environments. Modern IoT analytics and edge intelligence solutions depend on the data collected at the edge of the network. The technology partnership between Barracuda and Crosser addresses both the need for secure connectivity in large, distributed environments and for precise, large-scale analysis. The Crosser Edge Analytics software now runs directly on the Secure Connector - Barracuda's scalable IoT hardware connectivity solution. Crosser designs and develops streaming analysis and integration software for edge, on-premises or the cloud. IIot: Barracuda Secure Connector Barracuda Secure Connector offers ...

Read more