News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Hacker groups: Another German university attacked
B2B Cyber ​​Security ShortNews

Some APT groups have specialized in the education sector, as systems there are often outdated or access is easier to obtain. Now Furtwangen University (HFU) has also been hit. The University of Kaiserslautern was hit in July and, according to the attacker, over 240 GB of data was stolen. Furtwangen University (HFU) doesn’t have much to report. There is currently only a meager indication on the homepage that the school has been relatively paralyzed by a cyber attack. Students and schools only find the note: “Dear students and prospective students, dear...

Read more

Malware HijackLoader uses evasion techniques to attack
B2B Cyber ​​Security ShortNews

The HijackLoader downloader is becoming increasingly popular among threat actors, which is why analysts from the ThreatLabZ team have now examined this malware, which has been appearing since July 2023, in more detail. Due to its modular architecture, the loader is able to use a variety of modules for code injection and execution. Based on Zscaler telemetry data, it can be concluded that HijackLoader poses a high threat potential as it can be used to load various malware families such as Danabot, SystemBC and RedLine Stealer. It uses embedded modules for code injection, which enable flexibility and...

Read more

Defend Storm-0558 attacks with machine learning
B2B Cyber ​​Security ShortNews

Cybersecurity systems based on machine learning identify attacks by detecting deviations from normality. According to security specialists at Exeon, this could have prevented the attack by the APT group Storm-0558. According to the Swiss security specialists at Exeon, the attack by the suspected Chinese hacker group Storm-0558 on a large number of government agencies and other organizations could have been prevented. The attackers had stolen a signing key from Microsoft. They were then able to use this to issue working access tokens for Outlook Web Access (OWA) and Outlook.com and hack emails and their attachments. An error in the…

Read more

NDR: Faster response to cyber threats
B2B Cyber ​​Security ShortNews

NETSCOUT's new generation Omnis Cyber ​​Intelligence (OCI) solution helps detect threats in real time. The Network Detection and Response (NDR) solution reduces response time. NETSCOUT, a leading provider of enterprise performance management, carrier service assurance, cybersecurity and DDoS protection solutions, announced its next-generation Omnis Cyber ​​Intelligence (OCI) solution. OCI is an advanced Network Detection and Response (NDR) solution that leverages highly scalable Deep Packet Inspection (DPI) and multiple methods to detect threats at the origin of packet capture. This is used for real-time threat detection and enables historical investigation…

Read more

Forensics of real cyber attacks reveals attackers' tactics
SophosNews

Detailed investigation of the cases taken over by the Sophos Incident Response Team shows that attackers spend less and less time in the infiltrated network before launching their attack. This is the analysis of the Sophos Active Adversary Report for Tech Leaders 2023. They also need less than a day to access the Active Directory. The majority of ransomware attacks take place outside of business hours. Sophos today releases its Active Adversary Report for Tech Leaders 2023. The report provides a detailed look at attacker behavior and tools in the first half of 2023. On…

Read more

Ransomware group 8base threatens SMEs
B2B Cyber ​​Security ShortNews

8base is one of the most active ransomware groups. This summer she focused on small and medium-sized companies. Due to low security budgets and more cybersecurity deficiencies, SMEs often quickly fall victim to attackers. 8base first appeared on the scene in March 2022 and since June 2023 the group has been more active than ever before. Accordingly, it is now important to act and protect yourself from an attack by criminals, says Anish Bogati, Logpoint Security Research Engineer. An explosive mix In general, SMEs are more likely to struggle with low security budgets and cybersecurity deficiencies...

Read more

ALPHV: Casinos and hotels in Las Vegas paralyzed by hack
B2B Cyber ​​Security ShortNews

MGM Resorts, a U.S. operator of hotels and casinos, was recently hit by a ransomware attack that disabled multiple systems at some of its key Las Vegas locations, bringing operations to a halt at several Las Vegas casinos and hotels brought. MGM Resorts, which operates many of Las Vegas' most popular casinos and hotels including the Bellagio, is still dealing with the aftermath of the attack. At the beginning of last week, hackers significantly disrupted operations, leading to casino closures. Through the attack...

Read more

Cyber ​​threat: Rhysida ransomware
B2B Cyber ​​Security ShortNews

Rhysida ransomware's tactics and techniques are similar to those of the infamous Vice Society ransomware gang. Experts suspect that Vice Society is using its own variant of ransomware. Security researchers from the Threat Intelligence Department of Check Point® Software Technologies Ltd. (NASDAQ: CHKP) link the malware to a notorious ransomware gang. The procedures are the same in many ways, as Check Point's Incident Response Team reported. This doesn't mean that Vice Society is using the new ransomware exclusively, but probably mainly. Attacks on Healthcare and Education Vice Society is one of the most aggressive ransomware gangs so far since 2021…

Read more

Hospitality industry: Attacks on booking platform
Bitdefender_News

Cybercriminals stole the credit card details, personal information and passwords of customers of the restaurant booking platform IRM-NG. Bitdefender has published the latest research results from a cyber criminal campaign currently underway on the IRM-NG booking platform used in the hotel and hospitality industry. The attackers use vulnerabilities in the platform in combination with backdoors and techniques to bypass password validation on the end device and thus steal credit card data, passwords and customers' personal data. Security gap still exists Bitdefender has not received any response from the manufacturer Resort Data Processing (RDP) to its information for months. The vulnerability still exists and…

Read more

Invest in post-quantum cryptography
B2B Cyber ​​Security ShortNews

Google is already using a quantum-safe encryption process (post-quantum cryptography) in its latest version of the Chrome browser. Companies should do the same. The quantum-safe key encapsulation process in the Chrome browser protects the exchange of symmetric keys when establishing secure TLS connections. Is this step necessary even though practical use of quantum computers is not yet foreseeable in the near future? Yes, says Nils Gerhardt, CTO at Utimaco. Preparing for the future “In fact, we cannot yet say when practical use of quantum computers can be expected or when criminals will have access to them. But…

Read more