News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Threatened blockchain security
Threatened blockchain security

The exponential rise of blockchain technology and cryptocurrencies has redefined finance and digital transactions. But with great potential comes great risks. According to a report by CNBC, over 2021 billion euros worth of cryptocurrencies were stolen by hackers in 13. This alarming statistic highlights the urgent need to increase the security of blockchain ecosystems. In order to prevent further disasters of this kind, it is therefore worth drawing lessons from the existing cases for future crypto security strategies. Terra Luna and Wormhole One of the significant events that shaped the cryptocurrency…

Read more

Secure access to cloud workloads
Secure access to cloud workloads

A leading identity security company announces new capabilities to secure access to cloud services and workloads, powered by the company's risk-based intelligent authorization controls. This includes enhancements to the CyberArk Secure Cloud Access solution, which enables secure, just-in-time access with zero standing privileges to cloud management consoles and services in multi-cloud environments. Research shows that 85 percent of organizations will use three or more public cloud providers in the next 12 months, but only 9 percent are taking an agile, holistic approach to securing identities across all environments. This makes them…

Read more

Cybersecurity incidents are underreported
Cybersecurity incidents are underreported

Many companies have been affected by cybersecurity incidents, but only half of them have reported them to external authorities. This is now proven by the new study “Cybersecurity Disasters: Incident Reporting & Disclosure”. Keeper Security’s “Cybersecurity Disasters: Incident Reporting & Disclosure” study shows that despite the growing threat of cyberattacks, there is a lack of guidelines for reporting cyber incidents. 74 percent of respondents said they are worried that their company could be affected by a cybersecurity disaster. 40 percent of respondents said their company had experienced a cyber disaster...

Read more

44.000 DDoS attacks daily in the first half of 2023
44.000 DDoS attacks daily in the first half of 2023

DDoS attacks have increased rapidly. The reason for this is both world events such as the Ukraine war and the expansion of mobile phone networks. The DDoS Threat Intelligence Report for H1 2023 does not show good development. Cybercriminals launched around 2023 million distributed denial of service (DDoS) attacks in the first half of 7,9, a 31% increase compared to the previous year. This is what the “DDoS Threat Intelligence Report” for the first half of 2023 from NETSCOUT revealed. DDoS attacks on Sweden and Finland after NATO bid Global events such as the Russia-Ukraine war and NATO accession negotiations have accelerated the growth of…

Read more

Malware on German ICS computers
Malware on German ICS computers

One in six ICS computers in Germany was infected with malware in the first half of 2023. One in three ICS computers worldwide. Building automation in particular was the most frequently attacked industry with industrial computers during the study period. In the first half of 2023, malicious objects were discovered and blocked on around 16 percent of ICS computers (computers for industrial control systems) in Germany, as current analyzes by Kaspersky ICS CERT show. One in three ICS computers worldwide (34 percent) was affected. In the second quarter of this year, Kaspersky experts also registered the highest quarterly threat level since...

Read more

Identity and Access Management (IAM) alone is not enough
Identity and Access Management (IAM) alone is not enough - Image by Gerd Altmann on Pixabay

Although the zero trust strategy usually includes comprehensive Identity and Access Management (IAM), the Swiss security specialist Exeon Analytics warns against relying predominantly on IAM. Zero Trust is all too often based primarily on constant verification of user identities, which is ineffective in cases of stolen identities, says Exeon. Zero Trust is an overarching security strategy that aims to continuously audit and verify access to resources both internally and externally. It is based on the principle that network devices and users must constantly prove their identity because...

Read more

Passwordless security barrier
Passwordless security barrier

A provider of security keys for hardware authentication, announces the initial availability of FIDO Pre-reg, an industry-first feature that enables organizations to securely and seamlessly passwordless onboarding and account recovery/reset at scale. Available exclusively as part of the YubiEnterprise Subscription, FIDO Pre-reg simplifies enterprise adoption of modern, phishing-resistant multi-factor authentication (MFA) with a smooth and easy user experience. “Enterprises have been challenged to drive user adoption of phishing-resistant MFA and FIDO keying solutions like YubiKeys quickly and at scale,” said Jeff Wallace, senior vice president, Product...

Read more

Mobile phishing attacks are on the rise
Mobile phishing attacks are on the rise

According to the report “The Global State of Mobile Phishing”, more than half of mobile work devices were the target of a mobile phishing attack in 2022. This led to high costs for companies. While remote employment has already become a new reality for companies around the world, many of them are still struggling to reliably secure the new mobile environments. 2022 highest number of mobile phishing attacks According to the report “The Global State of Mobile Phishing” published by Lookout, the…

Read more

Necessary DevOps automation
Necessary DevOps automation

Investing in DevOps automation brings significant benefits to organizations – including improving software quality by more than 60 percent, reducing deployment errors by 57 percent, and significantly reducing IT costs by 55 percent. These are the results of an independent global study by Dynatrace, the leading provider of unified observability and security. For the analysis, 450 IT professionals in large companies were surveyed, including 150 in Europe. However, the report also shows that automation processes in companies are still in their infancy. It also proves that data-driven and...

Read more

Cyber ​​forensics: Convenience plays into the hands of cybercriminals
Cyber ​​forensics: Convenience plays into the hands of cybercriminals - Image by Mohamed Hassan on Pixabay

Cyber ​​Forensics: The latest Active Adversary Report from Sophos uncovers an interesting turnaround that addresses a common problem in IT security: convenience. Hard-working attackers exploit this mercilessly. In previous case data from the report, which analyzes actual cyberattacks, exploiting vulnerabilities was the leading cause of attacks, closely followed by compromised credentials. In the first half of 2023, this picture reverses significantly, and for the first time, compromised access data was the top cause at 50%. The exploitation of a vulnerability was 23%. Stolen login credentials…

Read more