News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Protection for MacOS Monterey: Security packages tested
AV TEST News

Unfortunately, the invulnerability of MacOS to malware such as ransomware, Trojans and the like is and will remain just a rumor. The AV-TEST laboratory tested 4 security packages for companies and 10 protection packages for individual workstations in the laboratory against new and dangerous malware. Time and time again we read in the headlines that new malware is also causing considerable damage to Macs. Attackers then slip through the browser, for example, find a way through an application update or end up in the Mac via email. After all, the statistics platform AV-ATLAS.org already knows almost 1 million different attackers for the…

Read more

Hacking competition uncovers 25 zero-day vulnerabilities 
Trend Micro News

Trend Micro's Pwn2Own brings well-known technology manufacturers together and promotes vulnerability research. The hacking competition thus increases security for around 1 billion end users. Participating as partners: Microsoft, Tesla, Zoom and VMware. There was also 1 million in prize money. Trend Micro, one of the world's leading providers of cyber security solutions, is once again positioning itself as a technology innovator with the hacking event Pwn2Own. On the occasion of the 15th anniversary of the event, 25 zero-day vulnerabilities were uncovered at software providers. These include the partners Microsoft, Tesla, Zoom and VMware. Participants were recognized for their efforts with prize money of more than...

Read more

BSI: IT security label for Lancom routers
B2B Cyber ​​Security ShortNews

For more protection for consumers and companies: BSI President Schönbohm presents the first "IT security label" for routers to LANCOM. With the IT Security Act 2.0 (IT-SiG 2.0), the BSI was commissioned in 2021 to introduce a voluntary IT security label. The German network infrastructure and security supplier LANCOM Systems was the first manufacturer to have twenty of its broadband routers awarded the BSI's "IT security label". With the IT Security Act 2.0 (IT-SiG 2.0), the BSI was commissioned in 2021 to introduce a voluntary IT security label in order to create transparency for consumers: the label makes the basic security properties of digital products recognizable at a glance. That…

Read more

BSI phone number misused for spoofing
B2B Cyber ​​Security ShortNews

The Federal Office for Information Security (BSI) receives reports that an increasing number of calls are being made using the BSI's phone number (spoofing) and a two-digit extension number. For example, the numbers +49 228 9582 44 or 0228 9582 44 are used. This is not a call from the BSI. The callers pretend to be employees of the BSI. The BSI urgently warns against giving the caller personal data or complying with requests! It is of course to be assumed that the calls have a legal abusive background! Consumers who receive such calls should...

Read more

State hackers: disinformation campaigns against Ukraine 

Research by Mandiant provides a comprehensive analysis of the various disinformation campaigns that have been observed since the Russian invasion of Ukraine began. New insights into those responsible for the attacks point to hacking groups supported by the Russian, Chinese and Iranian governments. The report reveals new disinformation campaigns that have not previously been reported, makes new attributions to Chinese and Iranian hacker groups that have simultaneously launched their own disinformation campaigns, and illustrates that the various cyber attacks have been accompanied by disruptive and destructive military attacks on Ukraine. Disinformation campaigns against Ukraine One of the lead authors…

Read more

Follina zero-day vulnerability in MS Office
SophosNews

A new zero-day remote code execution bug in Microsoft Office is causing a stir. More specifically, it is likely a code execution vulnerability that can be exploited through Office files. Based on what is known so far, there may be other ways to trigger or abuse this vulnerability. Security researcher Kevin Beaumont has named the vulnerability "Follina," which is proving to be a useful search term on the topic until an official CVE number is assigned. In addition, Microsoft has now published an official workaround. Sophos expert Paul Ducklin gives…

Read more

Fake Vanity URLs on Zoom and Google
B2B Cyber ​​Security ShortNews

URL spoofing enables targeted social engineering attacks. Varonis warns against fake vanity URLs on Zoom and Google. Varonis Threat Labs have discovered vulnerabilities in Zoom, Box and Google Docs that allow cybercriminals to easily forge invite URLs. As a result, phishing links appear trustworthy even for trained employees, which significantly increases the likelihood of a successful attack: If they click on the link of their supposed employer, customer or partner, they will be taken to a phishing page that looks authentic and where they can be found should reveal sensitive data such as passwords and personal information. Depending on the social engineering technique, this information appears to users...

Read more

Security solutions for companies in the laboratory test 
AV TEST News

Over a period of two months, the AV-TEST laboratory examined 20 enterprise security solutions for Windows 10 and 18 packages for individual PCs for Windows 10. In the test period of March and April 2022, the products were assessed and awarded the AV-TEST certificate if they met the test standard. In March and April 2022, the AV-TEST Institute tested a total of 38 security solutions - and thus almost all important programs on the market - for private users and companies under Windows 10. The detailed results show how well the products perform in the areas of 'Protection',…

Read more

Webinar June 08, 2022: Making your endpoint secure
B2B Cyber ​​Security ShortNews

Security provider Trellix invites you to a free webinar on June 08, 2022 from 10:00 a.m. on "Endpoint Security Best Practices 2 - Exploit Prevention, Access Protection, DAC and ATP, how do I make my endpoint more secure." In the course of home office, cloud applications and zero trust approaches, the endpoint plays a central role in security considerations. Hackers are constantly finding new ways to gain access to corporate resources, steal data, or compromise systems. Often an employee's client system is the entry point - the "patient zero". Therefore, it is important to base the endpoint security solution on...

Read more

Blacklist check: Sensor takes over monitoring 
B2B Cyber ​​Security ShortNews

Whether an IP, domain or e-mail address is on a blacklist is usually only noticed when e-mails no longer arrive or a website can no longer be accessed. The new Server-Eye and Network Box sensor informs system houses and customers immediately if an IP or domain ends up on a blacklist. "The e-mail could not be delivered." The reason: the IP is on a blacklist. More and more companies are struggling with their email addresses, IPs or domains being blacklisted. Until this is noticed and a blacklist scan is triggered, it takes...

Read more