News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransom Cartel ransomware-as-a-service comes from REvil?
B2B Cyber ​​Security ShortNews

IT security provider Palo Alto Networks and its malware analysis team Unit42 report new findings on "Ransom Cartel" - a ransomware as a service (RaaS) provider that first surfaced in mid-December 2021. Technically, there is overlap with the REvil ransomware. This group of criminals perform dual ransomware attacks and share several similarities and technical overlaps with REvil ransomware. REvil ransomware disappeared just months before the ransomware cartel emerged and just a month after 14 of its suspected members were arrested in Russia. When Ransom Cartel first emerged, it was unclear if it...

Read more

Cyber ​​attacks: 3 out of 4 doctors feel poorly protected
B2B Cyber ​​Security ShortNews

Cyber ​​attacks are a major concern for medical professionals, be it in clinics or practices. As a Bitkom study shows, three quarters (74 percent) of doctors in German hospitals do not feel adequately protected against cyber attacks. These concerns from the Bitkom study are also confirmed by a current worldwide study by the enterprise mobility management expert SOTI. According to this, nine out of ten IT professionals in healthcare facilities in Germany are concerned that patient data could be disclosed, lost, accessed in an insecure manner or stolen, and that devices could be inadequately secured. Top concerns of IT professionals Theft of patient data through a cyber attack or hacking…

Read more

Dangerous vulnerabilities in dozens of Lenovo models 
B2B Cyber ​​Security ShortNews

Lenovo again has problems with vulnerabilities in dozens of notebook models. ESETResearch has discovered vulnerabilities that can be used to bypass the secure UEFI Secure Boot. Lenovo reacted immediately and is providing patches. The vulnerabilities have a severity of High! ESETResearch has discovered 3 vulnerabilities in the UEFI firmware of several Lenovo notebooks and reported them to the manufacturer. The vulnerabilities allow disabling UEFI Secure Boot or restoring factory default Secure Boot databases easily from an operating system. As early as April of this year and again in September, Lenovo had to identify vulnerabilities...

Read more

Hacker: LockBit 3.0 offers Continental file list for download
B2B Cyber ​​Security ShortNews

According to the chat log of the LockBit leak site, the hacker group claims to have stolen a total of 40 TB of data from Continental. Since the requested 50 million dollars were probably not paid, there is now a file list of more than 400 MB for free download on the Darknet. LockBit probably wants to make the stolen Continental data palatable to buyers. Therefore, the group offers a packed file list on its website that is over 400 MB in size. It probably contains an overview of all files, their names and the names of the project directories. Initially, 50 million...

Read more

Thales: Weapon manufacturer data published by LockBit
B2B Cyber ​​Security ShortNews

If you believe the screenshots and the ZIP files provided, then LockBit has published the data captured from the weapons manufacturer Thales - or at least parts of it. Thales has not yet released an official statement on the hack. On the Lockbit leak page, the hackers show several screenshots that are said to come from the captured data from the weapons manufacturer Thales. Site plans of military installations can be seen, as well as the structure and equipment of a building with radar, radio towers and offices - right down to the mobile toilet. The other images also show diagrams or lists. On…

Read more

Russian hacker gang Killnet: further IT attacks against the USA 
Checkpoint News

Killnet, which attacked many targets in the USA via DDoS, wanted to stop the attacks against the USA a few weeks ago. The aim was to improve the relationship between Russia and the USA. However, the group's statements are probably of little value: the attacks in the context of the Ukraine war continue. Check Point Software Technologies experts continued to monitor the APT group Killnet. Actually, the group wanted to let the attacks against the United States rest so that Russian-American relations improved. But the attacks continue. A comment by Sergey Shykevich, Threat Intelligence…

Read more

Hacker group Polonium uses cloud services for attacks
Eset_News

The hacker group POLONIUM (APT) has attacked targets in Israel with previously unknown backdoors and cyber espionage tools. The group mostly uses cloud services for the attacks. The ESET researchers have dubbed the malware "Creepy". The group is said to be working with Iran. According to the analysis by the researchers of the European IT security manufacturer, the hackers have attacked more than a dozen organizations since at least September 2021. The group's most recent action took place in September 2022. Target industries of this group include engineering, information technology, legal, communications, branding and marketing, media, insurance and social services. Hacker group probably with Iran connections according to...

Read more

Webinar November 16, 2022: Bulletproof Recovery

Veam and FAST LTA invite you to the joint free webinar on November 16, 2022 from 10:00 a.m. on the topic of "Bulletproof Recovery". Because without a functioning recovery, the best backup isn't worth a damn. Backup is a fine concept in which the crucial component is unfortunately all too often neglected: without a functioning recovery, a backup is of no use at all. That's why companies and authorities have to regularly test the function and reliability of their backup and recovery strategy under real conditions. Everything is nothing without recovery: make your Veeam backups immutable! The actions that lead to a XNUMX% bulletproof recovery strategy…

Read more

Splunk rolls out 12 security patches - 9 are 'High'
B2B Cyber ​​Security ShortNews

Manufacturer Splunk has to fill a lot of gaps with security patches in its planned 3-month updates. Of the 12 updates listed, Splunk 9 rates itself as Highly Dangerous. In addition, there are 2 third-party updates that are also classified as Highly Dangerous. The list of security patches for Splunk Enterprise products is long. In addition to the vulnerabilities published months ago, there are another 12 vulnerabilities and an additional 2 vulnerabilities from third parties in the planned, quarterly patch list. Right now, administrators and CISOs should pay attention to the published list that 9 of the 12 vulnerabilities are...

Read more

LockBit wants to release 40 TB of data from Continental
B2B Cyber ​​Security ShortNews

There is still no official confirmation of a LockBit hacking attack on Continental. If the chat log on the LockBit leak page is genuine, then the transfer of 40 TB of data was negotiated. According to the hacker, the pure file list of the data alone should have a volume of 8 GB. A chat log was recently found on the LockBit page. At some point, whoever was chatting with the LockBit hackers simply stopped responding. First, however, there was a conversation in which the hacker talked about the data...

Read more