News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Whaling: AI-supported attacks on the big fish!
Whaling: AI-supported attacks on the big fish! - Image by istvangyal on Pixabay

The attackers try to catch the big fish in the company: In cybersecurity, this is called “whaling”. AI-powered whaling attacks threaten CEOs, lawmakers and the military. “Harpoon Whaling” is the refined method with VIP service. “Whaling” is about catching big fish. The targets of cybercriminals are executives of successful companies, high-ranking officials and military personnel. It's about stealing information or siphoning off large sums of money. The Harpoon Whaling in particular - a subspecies of Whaling - is perfidious because the attackers automatically collect extensive information about their victims and organize it using nested…

Read more

Eliminate threats with EDR and AI
Eliminate threats with EDR and AI

Endpoint detection and response (EDR) and AI-driven tools can be used to close vulnerabilities and reduce threat response times. Malwarebytes launches EDR Extra Strength. The new solution is based on Malwarebytes' decades of experience in threat detection and prevention and provides a simple, step-by-step interface to eliminate threats. Multiple data breaches at 83% of all companies in 2022 Successful cyberattacks remain widespread despite widespread use of standard endpoint security solutions: 83 percent of all companies had data breaches last year, according to Verizon's 2022 Data Breach Investigations Report...

Read more

The unhackable data vault
The Unhackable Data Vault - Image by Gerd Altmann on Pixabay

Well-known and reliable: tape libraries are still one of the safest solutions for protecting and restoring data. Ransomware in particular cannot access this data because it cannot be physically accessed: an unhackable data vault. “Tape libraries have been experiencing a renaissance for some time now. Once relegated to obsolescence, tape now offers very high and, above all, cost-effective capacity for cold or archival data. What is less known is that tape is also one of the most secure storage solutions for backing up and restoring data. Because tape basically has the advantage over other storage media, such as...

Read more

Email Fraud: How Top Companies Put Others at Risk
Email fraud: Danger from leading German companies

The majority of leading German companies lack basic email security precautions. This poses a danger for customers, partners and employees, as they could quickly become victims. Proofpoint, Inc. today published a new study on the topic of email security for German companies. It shows that 65 percent of the 40 largest German companies do not actively protect their employees, customers and partners from email fraud. This is the result of an analysis of the level of implementation of Domain-based Message Authentication, Reporting and Conformance (DMARC) among DAX40 companies. Lack of protection through DMARC sender authentication DMARC is...

Read more

IT problem solvers with AI: AI Assistant for Observability
IT problem solvers with AI: AI Assistant for Observability - Image by Faisal Mehmood on Pixabay

Elastic Announces Launch of AI Assistant for Observability and General Availability of Universal Profiling. Transforming the observability of complex cloud-native environments: centralized and limitless end-to-end visibility for site reliability engineers (SREs). Elastic, the company behind Elasticsearch®, announces the launch of the Elastic AI Assistant for Observability and the general availability of Universal Profiling™. This provides Site Reliability Engineers (SREs), regardless of their level of experience, with context-specific, relevant and actionable operational insights into their respective IT environment. Today's IT operations teams face ever-changing system challenges and issues specific to their particular IT environment...

Read more

Data security & backup – more than a parachute for companies
Backup as a parachute for companies

Companies need a solution for backup, disaster recovery, archiving and also for their cold data. Six questions, six answers from Hannes Heckel, Head of Marketing at FAST LTA, about solutions and how managed storage can help, especially in terms of capacity, performance, function and long-term costs. B2B-CS: Mr. Heckel, do you have anything against tape when it comes to backup and recovery? Hannes Heckel, FAST LTA: No, in principle not at all, because the sensitive issue must be considered on a case-by-case basis. With tape it's like this: Many of our customers still rely on tape simply because...

Read more

85 billion threats blocked – an increase of 30 percent
85 billion threats blocked – an increase of 30 percent - Photo by FLY:D on Unsplash

Over 85 billion threats were blocked by Trend Micro in the first half of 2023 - around a third more than in the same period last year. The new trend of cybercriminals using generative artificial intelligence (AI) and ransomware to increase their reach and efficiency is increasing. This is also shown by the Trend Micro 2023 Midyear Cybersecurity Threat Report. Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes its security situation report in the middle of the year. According to this, generative artificial intelligence (AI) is becoming more and more of a threat. Not only companies, but also cyber criminals are increasingly relying on...

Read more

Kaspersky is involved in the INTERPOL operation
Kaspersky participated in the INTERPOL operation in Africa

As part of Operation Africa Cyber ​​Surge II, Kaspersky supported INTERPOL by providing threat intelligence data. This allowed investigators to identify compromised infrastructure and apprehend suspected cybercriminals in Africa. As a result of this operation, 14 perpetrators were arrested and network infrastructure was discovered that was linked to financial losses of more than $40 million. Operation covered 25 African countries The aim of Operation Africa Cyber ​​Surge is to combat cybercrime and protect the population in the region. In the first phase of Operation Africa Cyber ​​Surge,…

Read more

Microsoft: 38 TB of data accidentally exposed
Microsoft: 38 TB of data accidentally exposed - Image by Mudassar Iqbal on Pixabay

The security provider Wiz found 38 TB of data including 30.000 internal Teams messages while browsing Microsoft's AI GitHub repository. According to Wiz, a SAS token misconfigured by the AI ​​research team triggered the issue. According to the Wiz Research Team, Microsoft's AI research team made a few glaring mistakes when publishing open source training data on GitHub. Apparently, when publishing data, a total of 38 terabytes of data was accidentally marked for publication and then published. Among them: private data, a hard drive backup of two employees' workstations. 38 TBytes of data including tokens, passwords and…

Read more

Protect data from Double Extortion Ransomware
Protect data from Double Extortion Ransomware

Double-extortion attacks are increasing: The attack not only encrypts the data and extorts a ransom, but also steals data that will be published if payment is not made. These attacks pose challenges for companies and pose major financial risks. More than half (57 percent) of the companies surveyed in Germany paid a ransom for encrypted data after a ransomware attack, according to figures from the latest Zero Labs Report. Only 24 percent of them were able to recover all data using the attackers' decryption tools after payment. Even more annoying: collecting a ransom once is enough for…

Read more