News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Competition: Hacked home office devices
Competition: Hacked home office devices

The Zero Day Initiative (ZDI) organized the hacking competition Pwn2Own, which quickly showed the danger that home devices, for example in the home office, pose for the security of companies. Trend Micro's ZDI uncovers vulnerabilities and helps mitigate them. Trend Micro announces the winners of its recent Pwn2Own hacking contest, held in Toronto late last week. During the event, the Japanese IT security provider's Zero Day Initiative (ZDI) awarded prize money worth almost one million euros for the discovery of 63 zero-day vulnerabilities. If these vulnerabilities were exploited in real-world cyberattacks, the potential damage would be...

Read more

HTTPS insecurity: Malware uses encrypted connections
HTTPS insecurity: Malware uses encrypted connections

WatchGuard analyzes commercial Adversary-in-the-Middle attacks, JavaScript-based exploit kits and Gothic Panda-related malware in the Internet Security Report Q3 (ISR). The biggest threats were only sent over HTTPS encrypted connections. Just before the end of the year, WatchGuard Technologies published its latest Internet Security Report (ISR). In this, the most important malware trends as well as currently relevant attack methods on networks and endpoints are described in detail in the usual way. WatchGuard Threat Lab researchers' findings show that the top malware threat for the third quarter of 2022 was sent exclusively over encrypted connections. Attackers exploit HTTPS Likewise…

Read more

Defense against container-based zero-day attacks
Defense against container-based zero-day attacks

A new cloud-native security solution can stop zero-day attacks and shield critical production vulnerabilities until a patch can be applied. Aqua Security introduces the eBPF Lightning Enforcer. Powered by new eBPF technology, Lightning Enforcer provides full visibility into running workloads, making it easy for security professionals to identify and stop even advanced attacks in real time. Shift Left is an important factor in preventing vulnerabilities, misconfigurations, and software supply chain threats from entering production environments. However, sometimes this security approach is not enough. This has led to a…

Read more

24 billion threats via SSL encryption
24 billion threats via SSL encryption

24 billion threats ran over encrypted channels using SSL such as HTTPS. The attack usually comes from malware that is transported via e-mail or infected websites. In Germany, this type of attack increased by 2021 percent compared to 352. The annual State of Encrypted Attacks report shows the trends of HTTPS-based attacks based on the analysis of more than 24 billion threats from October 2021 to September 2022. The research is based on insights from more than 300 trillion daily signals and 270 billion daily Transactions in the Zscaler…

Read more

Forget Cyber ​​Security on the way to the Metaverse 
Forget Cyber ​​Security on the way to the Metaverse

Companies are increasingly venturing into the metaverse to grow there, but sometimes ignore important security warning signs. Just under half of the companies surveyed see themselves in a position to contain the threats posed by the Metaverse. The “Measure Twice, Cut Once: Meta-curious Organizations Relay Security Concerns Even as They Plunge Into Virtual Worlds” study surveyed 1.500 IT, cybersecurity, and DevOps professionals. The study examines how organizations are addressing the opportunities and challenges associated with building, securing and participating within the Metaverse, while also providing insights into the risks...

Read more

2022: Hackers discover over 65.000 software vulnerabilities
2022: Hackers discover over 65.000 software vulnerabilities

New Hacker-Powered Security Report from HackerOne: Digital transformation and cloud migration are fueling the rise in security vulnerabilities. Ethical hackers uncovered over 2022 software vulnerabilities in 65.000, a 21 percent increase from the previous year. HackerOne, the security platform for Attack Resistance Management, today released its 2022 Hacker-Powered Security Report. The report shows that the HackerOne community of ethical hackers uncovered over 2022 software vulnerabilities in 65.000, a 21 percent increase from the previous year. 65.000 vulnerabilities fewer reports of vulnerabilities emerging during digital transformation projects recorded…

Read more

Messages, video and phone with end-to-end encryption
Messages, video and phone with end-to-end encryption

Ring Central wants to offer more communication security and fewer compliance risks with end-to-end encryption (E2EE) in its products. E2EE was already integrated in video communication. Now also for message and telephone to be GDPR compliant. RingCentral introduces End-to-End Encryption (E2EE) support to RingCentral MVP, which in the future will include not only video but also message and phone. E2EE technology prevents unauthorized third parties from gaining access to users' communication content. For security-conscious companies, the solution offers an even higher level of security and data protection for confidential communication as well as protection against...

Read more

Hardware & Software as a Service for OT Security
Hardware & Software as a Service for OT Security

Nozomi Networks has once again evolved the options to acquire industrial and ICS cybersecurity solutions. With OnePass™, the industry's first fully integrated hardware and software-as-a-service model for OT and IoT security, customers can tailor their solution choice to today's needs with the flexibility to adapt to tomorrow's requirements at any time . “Visibility is critical to defending facilities and assets against today's cybersecurity challenges. Security teams can't wait through lengthy investment assessments to gain the insight they need to protect operations," said Sid Snitkin, Advisory Group...

Read more

Log4j: 72 percent of companies at risk
Log4j: 72 percent of companies at risk

According to a study gleaned from over 500 million tests, 72 percent of organizations remain at risk from the Log4j vulnerability. The data highlights the problems in fixing security vulnerabilities. When Log4Shell was discovered in December 2021, companies around the world tried to determine their risk. In the weeks after the vulnerability became known, companies reallocated their resources and invested tens of thousands of hours identifying and remediating the problem. One state's federal cabinet reported that its security team spent 33.000 hours just fixing the...

Read more

Also in 2023: IT security with challenges
Also in 2023: IT security with challenges

IT security is and will remain one of the top issues in business and society - also in 2023. CyberArk looks at the most important threats and challenges in the coming year - and also sees new opportunities for defenders. The public's awareness of data protection has grown, but even if many consumers are more aware of their personal data, they often find it difficult to protect it reliably. The desire for greater transparency in the handling of personal data and more control over its use will continue to increase in 2023. Web3 promises more data protection and…

Read more