News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Europol Report 2023 on Crime-as-a-Service

Europol has investigated many areas of cybercrime and produced an interesting report, which, however, only highlights individual areas. The so-called Spotlight Report will be presented as part of IOCTA 2023 – Internet Organized Crime Threat Assessmen. The Spotlight report, “Cyberattacks: the pinnacle of crime-as-a-service,” examines developments in cyberattacks and discusses new methods and threats observed by Europol’s operational analysts. It also explains the types of criminal structures behind cyberattacks and how these increasingly professionalized groups are exploiting changes in geopolitics as part of their methods. This…

Read more

Serious vulnerability: shared passwords
Vulnerability: Shared passwords

Shared workspaces are becoming established in companies. If the passwords are also shared, they can be a gateway for hackers. This is proven by the 2023 Verizon Data Breach Investigations Report. But it is also much easier and more secure with passwordless authentication. Cost savings and increases in productivity are the decisive arguments for shared workspaces for employees. Indeed, shared workspaces have become widespread in many industries. Nevertheless, companies have to deal with the security risks. This starts with ensuring that only the right users have access to shared devices. Common passwords are…

Read more

DDoS: Protection against cyberattacks with automated real-time analysis
DDoS: Protection against cyberattacks with automated real-time analysis

NETSCOUT has introduced its Adaptive DDoS Protection for its Arbor® Threat Mitigation System (TMS). The system improves the detection of distributed attacks that dynamically change vectors and target numerous IP addresses simultaneously, including carpet bombing. NETSCOUT ASERT, the company's expert security research and DDoS attack defense team, has documented a significant increase in dynamic distributed denial of service (DDoS) attacks that utilize multiple vectors and techniques to attack botnet-based, direct-to-consumer attacks. To launch path, state exhaustion and application layer attacks. These are designed to bypass traditional static network and cloud-based DDoS defenses. Carpet bombing attacks have increased by more than 110%...

Read more

After Cyberattack: Accelerating Recovery for VMware
After a cyber attack: Accelerating recovery for VMware - Image by Hans on Pixabay

Rubrik introduces new generative AI capabilities for VMware with Rubrik AI-Powered Cyber ​​Recovery. Using generative AI and large language models (LLMs), the new solution helps administrators make difficult decisions after cyberattacks to minimize data loss and reduce downtime. Additionally, the features enable backup administrators to deploy recommended task lists and guided workflows to ensure efficient data recovery and maintain cyber resilience. Cyberattacks pose one of the greatest threats to enterprise virtual machines. Maintaining cyber resilience in the face of cyberattacks requires the ability to protect critical data such as virtual…

Read more

Cyber ​​attacks: RaaS and MaaS frontrunners
Cyber ​​attacks: RaaS and MaaS frontrunners

Ransomware-as-a-Service (RaaS) and Malware-as-a-Service (MaaS) attacks were the most frequently identified and prevented in the first half of 2023. A self-learning AI is the key to defense. Darktrace's security experts present important cyber threats to companies in the first half of 2023 in a comprehensive report. They take an unusual approach to detecting cyber attacks: Instead of examining the patterns of previous attacks, Darktrace's self-learning AI understands the normal activity patterns of each customer. This allows it to quickly identify anomalies that indicate known and unknown threats. Many malware strains use components from...

Read more

Machine learning supports malware and botnet defense
Machine learning supports malware and botnet defense

ExtraHop's machine learning dataset helps detect and mitigate malware and botnet operations faster. The data set with 16 million rows will soon be available as open source. ExtraHop, a leader in cloud-native Network Detection and Response (NDR), today announced that it is open sourcing its massive 16 million-row data set - one of the most robust on the market - to support algorithmic mitigation generated domains (DGAs). This is intended to improve the level of competition for defense attorneys and help companies...

Read more

Companies: Protection against fake accounts
Protection against fake accounts

Fake accounts massively damage the reputation of companies. Last year there were over 500 million hits on fake social media pages. Companies should definitely take an insight into their digital footprint. The latest version of Kaspersky Digital Footprint Intelligence gives companies even stronger protection against reputation-damaging, fake accounts on social networks as well as fake apps in the AppStore and GooglePlay. Kaspersky Digital Footprint Intelligence is part of the Kaspersky Threat Intelligence portfolio. Cybercriminals imitate well-known companies Kaspersky experts identified over half a billion attempts to access fake websites last year. Therefor…

Read more

Chinese malware on the rise
Chinese malware on the rise

Since the beginning of 2023, an increase in suspected Chinese cybercrime activities involving malware being distributed via email has been observed. Among other things, the Sainbox Remote Access Trojan (RAT) was used - a variant of the commodity Trojan Gh0stRAT. The newly identified ValleyRAT malware was also distributed as part of the activity. The campaigns observed were generally small in scope and mostly addressed global companies with branches in China. Email subject lines and content were commonly written in Chinese and were related to invoices, payments, and new products. The users who…

Read more

AI innovation at the control level for machine identities
AI innovation at the control level for machine identities - Image by Jorge Franganillo on Pixabay

Venafi Athena enables the use of generative AI and machine learning to deliver the industry's first intelligent machine identity management capabilities. This makes machine identity management easier and faster for IT security teams. Venafi, pioneer of machine identity management, presents Venafi Athena at the 5th edition of the Machine Identity Summit. As an AI technology for the Venafi Control Plane, Venafi Athena combines the strengths of machine learning, large language models and Venafi's industry-leading data capabilities. This makes machine identity management easier and faster for IT security and platform teams. Venafi Athena runs across the entire Venafi Control Plane. The integrated network offers three core functions for…

Read more

Malware: These are the current leaders
Malware: These are the current leaders

In the Global Threat Index for August 2023, Formbook was the most widespread malware in Germany, followed by CloudEyE and Qbot. Across the Atlantic, the FBI announced a significant victory in its global operation against the Qbot (also known as Qakbot) in August. In “Operation Duck Hunt,” the FBI took control of the botnet, removed the malware from infected devices, and identified a significant number of affected devices Qbot declines significantly Qbot evolved into a malware delivery service responsible for various cybercriminal activities, including ransomware -attacks, used...

Read more