News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Countries of origin of cybercriminals
B2B Cyber ​​Security ShortNews

In our current era, crime is increasingly moving digital, with the number of cyber threats increasing dramatically in recent years. To identify the countries with the highest levels of cybercrime, a research team has now developed the first World Cybercrime Index. At the top of this index, which identifies countries with the highest levels of cybercrime, are countries such as Russia, Ukraine, China, the USA and Nigeria. Surprisingly, the United Kingdom is also in the top ten. For Germany and other European countries this means that they...

Read more

Worldwide campaign against government authorities discovered 
B2B Cyber ​​Security ShortNews

Kaspersky experts have uncovered a cyber espionage campaign targeting government agencies worldwide. As part of the campaign, more than 30 malware dropper samples are used - some with text changes to make the samples more difficult to detect. New DuneQuixote cyber espionage campaign targets government entities worldwide Kaspersky researchers have discovered an ongoing malicious campaign initially targeting a government entity in the Middle East. Further investigation revealed that more than 30 malware dropper samples were actively used in this campaign and the victim group was reportedly expanded to APAC, Europe and North America. Disguised droppers as the first attack The first droppers of the malware…

Read more

Microsoft forgets its own passwords on freely accessible servers 
B2B Cyber ​​Security ShortNews

Microsoft has fixed a major security error: despite an external warning, a large number of codes, scripts and configuration files with passwords, keys and login information for accessing services for the search engine Bing were lying on an unprotected server in Azure for weeks. As the technology portal TechCrunch reports, security researchers Can Yoleri, Murat Özfidan and Egemen Koçhisarlı from SOCRadar reported that they found internal information about Microsoft's Bing search engine on an open server in Azure. The specialists usually look for vulnerabilities that could be attacked. In this case there was no hurdle for immediate...

Read more

Europol: End-to-end encryption blocks police work
B2B Cyber ​​Security ShortNews

Europol is warning industry and governments that end-to-end encryption in digital media will significantly hinder law enforcement. Meta has just introduced end-to-end encryption on the Facebook messenger platform. According to Europol, violations remain hidden and encrypted. European police chiefs are calling on industry and governments to take urgent action to ensure public safety across all social media platforms. Privacy measures currently in place, such as end-to-end encryption, will prevent tech companies from noticing any breaches on their platforms. Law enforcement agencies cannot preserve evidence. Additionally, this limits law enforcement agencies' ability to obtain this evidence and...

Read more

Another successful cyber attack on the University of Düsseldorf
B2B Cyber ​​Security ShortNews

For the second time, the Heinrich Heine University Düsseldorf (HHU) has to inform the public that its systems were hacked, data was leaked and there was access to the e-exam system including exam questions and answers. The current data theft occurred barely 11 months after the last one. Hackers had access to the systems as early as May 2023. There was an information technology (IT) security incident at Heinrich Heine University Düsseldorf (HHU). As a result, a large amount of data could be viewed and parts of it also downloaded. The attack was quickly recognized and stopped. The HHU wants the…

Read more

Recognize and understand lateral movement
B2B Cyber ​​Security ShortNews

Threat actors gain access to a company application through phishing or exploiting unpatched vulnerabilities, assume the identity of a legitimate user and use lateral movement to penetrate ever deeper into various parts of the network. There they can exfiltrate data, paralyze and manipulate systems and databases or carry out other attacks. The threat actors do not strike directly, but rather try to operate in the background unnoticed for as long as possible. The goal of most cyber criminals is to steal or encrypt data in order to extort ransom money - i.e. ransomware attacks. The more time the attackers go unnoticed...

Read more

Researcher: Cracked Cisco appliance and installed Doom on it 
B2B Cyber ​​Security ShortNews

Security researcher Aaron Thacker actually just wanted to build a server out of a Cisco appliance. He discovered a vulnerability in the web-based management interface of the Cisco Integrated Management Controller. He then installed Doom and played it as a demo in the management console. Security researcher Aaron Thacker only managed to hack a Cisco C195 Email Security Appliance, but the vulnerability affects a whole range of Cisco devices. Thacker just wanted to build a server out of the appliance and discovered the vulnerability during the conversion. He then started a chain of attacks: He changed the BIOS,…

Read more

Quantum-safe encryption
B2B Cyber ​​Security ShortNews

A provider of solutions that seamlessly extend Privileged Access Management (PAM) now offers effective protection against threats in the post-quantum computing era: quantum-safe encryption of secrets and credentials. Quantum-safe encryption on the Secret Server complies with NIST standards and enables organizations to protect critical credentials from access by quantum computers using one of four NIST-recommended asymmetric algorithms, CRYSTALS-Kyber. According to the Cybersecurity & Infrastructure Security Agency (CISA), “quantum computing opens up exciting new possibilities. However, the consequences of this new technology also include threats to…

Read more

New Russian malware Kapeka discovered
B2B Cyber ​​Security ShortNews

The security experts at WithSecure have exposed Kapeka. The new malware appears to have ties to the Russian hacker group Sandworm. Several factors clearly indicate that the development and use of the malware are related to the Russia-Ukraine war: the timing, the locations, and the likely connection to the Russian Sandworm group. Threat intelligence researchers at WithSecure™ (formerly F-Secure Business) have discovered a novel malware that has been used in attacks on targets in Central and Eastern Europe since at least mid-2022. The malware, called Kapeka, can be linked to a group called Sandworm. Sandworm...

Read more

Lancom LCOS with root password vulnerability 
B2B Cyber ​​Security ShortNews

Lancom and the BSI report a configuration bug for the LCOS operating system: A vulnerability with the CVSS value of 6.8 can enable the acquisition of administrator rights. An update is available. The messages on the Lancom website and on the BSI website are not entirely compliant. Both report a vulnerability from LCOS version 10.80 RU1 onwards, but while Lancom sees no danger: “Unauthorized access to the router via the WAN (Internet) is not possible due to this security gap”, the BSI uses the note in its heading: “ Vulnerability allows Erlangen…

Read more