News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​attacks: Cities and municipalities increasingly targeted
Barracuda News

Attacks on municipalities, healthcare and education have doubled since August 2022. This is what the Barracuda ransomware report reports. Barracuda has released the results of its fifth annual ransomware report. As the basis for the report, the cloud security specialist identified and analyzed 175 publicly reported attacks from the last 12 months. A worrying finding of the report is that successful ransomware attacks in the three social sectors of municipalities, education and healthcare have more than quadrupled since 2021. Attacks on finance are declining. Attacks on cities and municipalities increased between August 2022 and July...

Read more

Generative AI powers cloud security
Generative AI powers cloud security

Built specifically for cloud security, the Sysdig Sage AI generative assistant goes beyond typical AI chatbots. It uncovers hidden risks and attack paths by combining runtime insights with an AI architecture, while enabling user interactions via LLMs. Sysdig Sage is a generative AI assistant built on a unique AI architecture. It uses multi-level reasoning and cross-domain correlations to quickly identify, prioritize, and remediate cloud-specific risks. Additionally, Sage leverages the power of Sysdig's Runtime Insights to uncover hidden links between risk and security events that would otherwise go undetected...

Read more

Connect IoT devices securely
Connect IoT devices securely

As the number of IoT devices increases, so does the risk of attack from known and unknown threats. The 2023 IoT Security Benchmark Report shows how organizations are using advanced IoT security to protect connected devices. The number of connected IoT devices will continue to grow in the coming years, reaching an average of over 2025 devices per company by 9.000. Unfortunately, most existing IoT security solutions do not have any built-in prevention or enforcement measures. They often use legacy, signature-based detection methods that focus on known devices. Inadequate IoT security has been a factor in several spectacular security incidents in the...

Read more

How AI helps defend against cyber attacks
How AI helps defend against cyber attacks

AI-supported product simulates cyber attacks. This helps companies prepare for attacks more effectively and resolve them faster. Coping with cyberattacks poses an enormous challenge for security teams. They must make quick decisions based on up to hundreds of changing and uncertain data points and factors. In a recent ransomware incident (1), it would have taken analysts around 60 hours in total to fully understand the scope and various details. Yet the attack unfolded in just 10 hours. More Sophisticated Cyber ​​Attacks Through Generative AI Tool The pressure and complexity with which…

Read more

Authorization controls for identities strengthen cyber security
Authorization controls for identities strengthen cyber security

As the number of identities in organizations continues to grow, so do identity-related attacks. Companies are faced with a dynamic growth of identities: both machines and people. There are currently 45 machine identities for every human identity. In 2023, the total number of identities is expected to at least double. Parallel to this development, the number of identity-related attacks – for example using ransomware or phishing – is also increasing dramatically. Security concepts for digital identities How can a company get this complex situation under control? The answer is: with a…

Read more

Special phishing tool breaks through MFA protection for accounts
Special phishing tool breaks MFA protection for accounts - image by Franz Bachinger from Pixabay

Cyber ​​criminals are increasingly using multi-factor authentication (MFA) to hijack executive accounts. That's what IT security experts from Proofpoint found out. They saw an increase of over 100 percent over the past six months in incidents where cybercriminals were able to gain access to the cloud accounts of high-level executives at major companies. More than 100 companies worldwide with a total of over 1,5 million employees are affected. The criminals used EvilProxy for their attacks. This is a phishing tool with a reverse proxy architecture that allows attackers to steal MFA-protected credentials and session cookies. Avoid attackers...

Read more

Adaptive DDoS protection fends off dynamic DDoS attacks
Adaptive DDoS protection fends off dynamic DDoS attacks - Image by Gerd Altmann from Pixabay

DDoS specialist NETSCOUT has released the latest version of Arbor Edge Defense (AED), which includes a new ML-based Adaptive DDoS Protection. This secures companies, reduces risks and costly network downtime. According to NETSCOUT's latest DDoS Threat Intelligence Report, a new breed of dynamic DDoS attacks that leverage multiple vectors and techniques to launch botnet-based, direct-path, state-exhaustion, and application-layer attacks, and designed to bypass conventional static network and cloud-based DDoS mitigation increased significantly. DDoS Attacks Increasingly Dynamic Any company today is seriously at risk if there is no effective DDoS solution in front of…

Read more

When hackers exploit unsecured video conferences 
When hackers exploit unsecured video conferences - Image by Alexandra_Koch on Pixabay

German companies and municipalities risk enormous damage from cyber attacks in the near future. Highly secure video conferences, certified by the BSI, are one aspect that can ward off hacker attacks. Many video platforms have security gaps and make companies vulnerable. The economy currently lacks more than 100.000 specialists for cybersecurity - a need that cannot be met in the foreseeable future. The good news is that companies cannot only increase the security of their IT infrastructure by hiring cybersecurity experts. When securing your own video conferences, for example, it already helps to switch to highly secure software to make life difficult for criminals.

Read more

IoT: Prepared for post-quantum security
IoT: Prepared for Post-Quantum Security - Image by Pete Linforth from Pixabay

Many companies are unprepared for the transition to post-quantum cryptography. Keyfactor aims to use PKI and cryptographic management to guide companies through the transition to post-quantum security, particularly in securing emerging IoT devices. Keyfactor today announced the release of two product updates: EJBCA 8.0 and SignServer 6.0. The updates bring significant advances in IoT (Internet-of-Things) security and lay the foundations for post-quantum readiness, as many organizations see greater security needs and protection against cyberattacks in relation to recent developments in these areas. New Features of EJBCA 8.0 Preparing for Post-Quantum Support of…

Read more

BYOD: security and privacy when working remotely
BYOD: security and privacy when working remotely - Image by Mircea - All in collections on Pixabay

With the unprecedented rise of mobile devices, Bring Your Own Device (BYOD) has become a convenient way of everyday work to access email and other digital data outside of the office. But what about security and privacy? Even those who do not have a business cell phone are often willing to use their private cell phone or tablet to be productive outside of the office. Of course, BYOD also brings new security risks. Even before the pandemic, companies were struggling with the trade-off between employees wanting to work remotely and…

Read more