News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Endpoint solutions in Advanced Threat Protection Test 2022
B2B Cyber ​​Security ShortNews

11 endpoint solutions in the Advanced Threat Protection Test at AV-Comparatives. Some of the IT security solutions for endpoints performed well in the test against targeted attacks, exploits and fileless threats, while others did not do quite as well. The Advanced Threat Protection (ATP) test examines how well the tested products protect against very specific targeted attack methods. It does not take into account the overall security that each program provides or how well it protects the system from malware downloaded from the Internet or injected via USB devices and shared network drives. Many products with problems Focused on ATP test…

Read more

Every second employee expects good IT security from their employer
G Data News

As a study shows, poor IT security in companies is a major problem for 45 percent of employees. Respondents say they want to work in companies that take IT security seriously. GData comments on the survey. Anyone who is too relaxed about the topic of IT security risks not only IT security incidents and fines for data protection violations, but also the loss of employees. This is shown by the current study "Cyber ​​Security in Figures" by G DATA CyberDefense in cooperation with Statista and brand eins. For almost half of Germans, it is important to work in a company that...

Read more

Cyber ​​attack via power supply and electromagnetic wave
B2B Cyber ​​Security ShortNews

It's still a cyber attack in the laboratory: Israeli researchers installed malware on a PC and then used the electromagnetic waves generated by a PC power supply to transfer some data to a remote smartphone behind a wall. Israeli researchers have studied a new attack method called the COVID-Bit. It uses the electromagnetic waves of a device, such as a PC, to transmit data from devices that are isolated from the Internet (air-gap systems) over a distance of at least two meters. There they can be captured by a receiver with a smartphone – even behind a wall. How…

Read more

Firewall Xstream power for SMEs and Enterprise
SophosNews

More protection for SMBs and Enterprises with the Xstream architecture. The new Sophos Firewall comes with performance improvements, dynamic traffic routing and SD-WAN capabilities, and integrations with Microsoft Azure Active Directory. Sophos introduces the new capabilities of the Sophos Firewall. The latest version is optimized for the complex and demanding requirements of distributed enterprise edge computing while also providing practical extensions for SMBs. These include, in particular, performance improvements when checking encrypted data traffic, dynamic traffic routing for the Internet Protocol Version 6 (IPv6), additional reliability with software-defined wide area network (SD-WAN) load balancing...

Read more

Thyssenkrupp is the victim of a hacker attack 
B2B Cyber ​​Security ShortNews

According to various media, the steel company Thyssenkrupp from Essen is now also a victim of a hacker attack. Apparently, a crisis team has already been set up to coordinate all further processes. The attack is said to be still ongoing. Now it has also caught the Essen-based steel group Thyssenkrupp. The hacker attack is said to have taken place on December 20.12.2022th, 16.000 and only affects part of the group. The materials trading division (Materials Services) with around XNUMX employees worldwide is probably affected. The extent to which the individual parts of the group are networked and perhaps affected has not yet been revealed. Hacker attack...

Read more

Mastodon as a Twitter alternative?
B2B Cyber ​​Security ShortNews

Mastodon has quickly become the go-to place for many in recent weeks who have decided to leave Twitter. The open-source decentralized platform has many benefits, and the growing popularity will hopefully lead to additional features and functionality as the open-source platform continues to mature. Still, those who join Mastodon should not consider the platform as an equivalent replacement for Twitter and should be aware of the special characteristics of the Fediverse. Each instance is managed by an administrator who has control over the infrastructure and the software running on the servers. That…

Read more

FBI own KRITIS contact platform hacked and data copied
B2B Cyber ​​Security ShortNews

The FBI's highly secured information exchange network "InfraGard" was hacked, the member data copied and now offered for sale on the dark web. The FBI's own KRITIS contact platform is intended to securely network 80.000 members for the exchange of information. With InfraGard, the FBI maintains a program to build partnerships to share information about cyber and physical threats. However, this week suddenly more than 80.000 contact details of members of the InfraGard platform were for sale in a forum on the dark web. This is reported in an article on the krebsonsecurity.com platform. The curious thing: the hacker had set up an account on InfraGard with…

Read more

Cyber ​​attack on logistics company Meyer & Meyer
B2B Cyber ​​Security ShortNews

Cyber ​​attack: The list of well-known German companies that were victims of an attack has grown: the Osnabrück logistics company Meyer & Meyer with 1.800 employees and a turnover of 200 million. A lot of things have to be done manually at the moment. Already on December 6th there was a successful cyber attack on the systems of the well-known textile logistics company Meyer & Meyer. The company can still be reached, but various processes had to be converted to good old manual work. Meyer & Meyer openly communicated the attack on its systems, but did not provide any further information on...

Read more

Lazarus Group Unleashes Backdoor DTrack on Businesses
Kaspersky_news

Notorious APT actor Lazarus is expanding its attacks and is now targeting companies in Europe, including Germany and Switzerland. The Kaspersky experts were able to identify attacks with the backdoor DTrack on two German chemical processing and manufacturing companies and one on a Swiss chemical processing company. Lazarus has been active since at least 2009 and has been blamed for cyber espionage, cyber sabotage and ransomware attacks. Initially, the group was focused on implementing what appeared to be a geopolitical agenda centered primarily on South Korea….

Read more

Hackers raid diamond wholesalers and steal nothing
Eset_News

For some hackers, the destruction of digital data is more important than theft or blackmail. APT group Agrius has carried out a series of cyberattacks using the Fantasy wiper malware, according to ESET experts. For diamond wholesalers, theft, fraud and ransom demands are part of their daily business threats. However, the fact that cybercriminals are only out to destroy digital information and do not want to make any financial profit surprised the affected gem dealers in Israel as well as the security experts from ESET. They were able to prove that the APT group Agrius had carried out a series of cyber attacks with the "Fantasy" malware, which also…

Read more