News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Russia-Ukraine War: Complex Cyberespionage 
Russia-Ukraine War: Complex Cyberespionage

The war in Ukraine is also a cyber war that promotes cyber espionage. Bitdefender Labs discover recent attacks on the Elephant framework. Attacks also take place through phishing with the download of supposed Bitdefender AV software. A summary of current cyber espionage. Companies in the attacked country or in supporting nations connected to Ukraine are threatened by classic IT attack mechanisms, the perpetrators of which are politically motivated this time. In addition to deleting information, these include espionage. The Bitdefender Labs have analyzed the sophisticated attack mechanisms of the so-called Elephant Framework used for this. Cyber ​​war worsens global cybersecurity posture Threat intelligence experts…

Read more

RedLine Stealer exploits Internet Explorer vulnerability
Bitdefender_News

Global campaign - Germany hardest hit after India: Password thief RedLine Stealer steals confidential login information from Internet Explorer users. The outdated browser is vulnerable to a dangerous vulnerability. Bitdefender Labs is currently observing an intensive campaign to deploy malicious code using the RIG exploit kit. Among other things, the attackers distribute the password thief RedLine Stealer to exfiltrate sensitive credentials such as passwords, credit card information, crypto wallets, and VPN login details. After India, Germany is the country most affected by the global campaign, which has increased significantly in intensity since the beginning of April. RIG exploit kit for Internet Explorer Cyber ​​criminals distribute exploit kit…

Read more

GravityZone XDR for more cyber resilience
GravityZone XDR for more cyber resilience

Bitdefender introduces its new GravityZone Extended Detection and Response (XDR) for more cyber resilience. Correlation of data from endpoints, production applications, cloud environments, identity sources and network data in a single action view. As a native XDR solution, Bitdefender's new GravityZone XDR captures the IT security situation in a comprehensive context. To do this, it correlates different warning messages. From the moment of installation, cyber security officers have ready-to-use analytics tools to prioritize incidents. Thanks to automated processes, they can contain attacks and receive the necessary instructions. As a result, IT security teams can identify risks more efficiently and better, as well as reduce the dwell time of...

Read more

Protection against supply chain attacks in SMEs 
Protection against supply chain attacks in SMEs

Attacks on the supply chain - the supply chain - for software (and for hardware) from IT also threaten small and medium-sized companies. Updates for services and software represent an increasingly dangerous vulnerability, especially since cybercriminals hope that hijacking an update will spread the attacks to numerous victims. In addition to upgrading their cyber defenses, small and medium-sized businesses should also review their supply chains for sourcing software, hardware, and updates. Unfortunately, attacks on the supply chain are often effective An attack on the IT supply chain aims to disrupt the production process…

Read more

IT security in times of the Ukraine war
IT security in times of the Ukraine war

It is still unclear whether a real cyber conflict will be added to the analogous Ukraine war – if such a conflict can be precisely defined at all. In any case, the current armed conflict poses a risk for the IT security of companies, even if it remains to be seen how the further risk situation will develop. In order to protect themselves effectively, companies should, on the one hand, keep an eye on current dangers and, on the other hand, follow security standards even more strictly. The company's own risk potential is measured by the geographic, business or even digital proximity of an organization to Ukraine. A defense...

Read more

Some security vulnerabilities in Wyze Cam IoT camera cannot be fixed
Bitdefender_News

Bitdefender has discovered security vulnerabilities in Wyze CAM IP video cameras. Attackers can bypass the authentication process, gain complete control over the device and read information and configuration data from the camera's SD card and install other malicious code. An update closes the gap from the Wyze Cam V2. However, patching is not possible for the first version of the camera. Surveillance cameras deliver sensitive content and the evaluation of the data is subject to strict data protection regulations. Some security gaps that allow access to recorded videos therefore not only endanger the security of a building,…

Read more

Malware and online scams use Ukraine war as a stepping stone
Malware and online scams use Ukraine war as a stepping stone

Bitdefender Labs is seeing increased malware shipments and online scams related to the Ukraine war. Remote access Trojans in attachments end up in manufacturing companies. 42% of the Ukraine variant of the “Nigerian Prince” scam ended up in German mailboxes. Cyberwar is a dominant IT aspect of the current conflict. Spam free riders are currently sending their emails outside of the countries directly involved. The more violent the clashes in Ukraine, the higher the number of online fraud or malware dispatches via e-mails. The perfidious goal of the criminals: They want to take advantage of the humanitarian crisis and the general willingness to help people. Remote Access Trojan “Agent Tesla” Bitdefender Labs observed in…

Read more

Anti-Hacker Therapy: Cyber ​​Security in Healthcare
Anti-Hacker Therapy: Cyber ​​Security in Healthcare

Healthcare continues to be one of the most hacked areas. It is therefore time to catch up on homework that has been put off for a long time in order to face the new demands and risks of a digitized and protected healthcare system. Comprehensive IT security technologies, possible funding and strong partners can initiate the therapy that seems more necessary than ever in view of the current crisis situation. Complex, often outdated and heterogeneous IT and technology and a lack of security strategy make hospitals, for example, a worthwhile target for hackers who can be blackmailed. Because a failure of the systems is not an...

Read more

Log4j requires cyber defense staying power
Bitdefender_News

Log4j is and remains a dangerous vulnerability almost three months after its disclosure. And even if no attacks are running yet, IT security officers should assume that the cybercriminals have gained access to IT systems. By Cristian Avram, Senior Solution Architect at Bitdefender. In order to effectively defend against imminent attacks, it will therefore be necessary in the coming months to immediately localize and close weak points and to monitor one's own IT and network traffic. Log4j: a long-term load Hackers can remotely execute code via the widely used Log4J login library. The on…

Read more

How hackers infect computers with ransomware
How hackers infect computers with ransomware

Bitdefender details typical gateways for extortion attacks and five ways small business hackers infect machines with ransomware: pirated software, phishing, supply chain, IoT, and tech support scams. Ransomware attacks are now commonplace. Most of the time, companies are targeted by the attackers, because this is where the big money beckons. But that doesn't mean that private users aren't safe. Cyber ​​criminals rely on mass and continuous income from smaller amounts. Such attacks against consumers are increasing. The potential victims should therefore know the most important attack vectors. 5 Pathways of a Typical Ransomware Attack…

Read more