News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

The right questions about managed security services
The right questions about managed security services

Before companies choose an IT security solution, they should ask the provider of managed security services four critical questions. This is the only way you can be sure of finding a reliable partner to protect your company. The cybersecurity threat landscape is incredibly volatile. Cyber ​​criminals are becoming more and more professional, specializing and even competing with other groups. As a result, companies are exposed to attacks not just once but repeatedly within months, weeks or days - sometimes even simultaneously. Labor shortages demand solutions The global cybersecurity labor shortage…

Read more

Risk-based patch management for vulnerabilities
Risk-based patch management for vulnerabilities

Cybercriminals don't wait for companies to patch a vulnerability. The attack usually succeeds quickly and is then expected. Risk-based patch management is recommended so that the time factor loses some of its weight. From the moment a vulnerability is published, it takes an average of just 22 days to develop a working exploit. On the company side, however, it takes between 100 and 120 days on average until an available patch is implemented. One reason for this discrepancy is certainly that companies have long been powerless against the sheer number of new vulnerabilities. Vulnerabilities: In 22 days…

Read more

Quantum Titan: AI-powered cloud network security
Quantum Titan: AI-powered cloud network security

Check Point Quantum Titan, the new version of Check Point's cybersecurity platform, brings new aspects to IoT security and threat prevention. Release R81.20 brings faster, AI-powered network security and advanced threat prevention for on-premises, cloud, and IoT. Check Point Quantum Titan uses innovative artificial intelligence and deep learning technology to protect against the most sophisticated attacks, including zero-day phishing and domain name system exploits. The Quantum Titan security console introduces three new software blades that leverage artificial intelligence (AI) and deep learning to deliver advanced threat defenses against equally advanced...

Read more

Breach Analytics for Google Cloud Chronicle
Breach Analytics for Google Cloud Chronicle

Mandiant announces Mandiant Breach Analytics offering for Google Cloud Chronicle. Mandiant Breach Analytics combines Mandiant's industry-leading threat intelligence with the power of Google Cloud's Chronicle Security Operations suite. The offering is SaaS-based and leverages threat intelligence gathered from Mandiant's "cyberfront" incident response operations. Customers can use it to quickly identify indicators of compromise (IOCs) and reduce the impact of an attack. Attackers average 21 days in victim's network Attackers are becoming increasingly sophisticated and aggressive in their tactics, targeting businesses…

Read more

Report Q3 2022: Phishing emails with DHL, Microsoft, LinkedIn

Check Point security researchers release their alert list to remind all users that cyber criminals like to impersonate big brands for fraudulent purposes. Fake emails from DHL, Microsoft and LinkedIn also end up in companies a lot. Check Point Research, the research division of Check Point Software, has published the Brand Phishing Report for Q3 2022. The report highlights the brands most commonly impersonated by criminals to steal personal data or payment information during the months of July, August and September. Phishing emails: Also targeting LinkedIn While LinkedIn both in the first and…

Read more

What traces cyber attacks leave on employees
What traces cyber attacks leave on employees

A study shows that the psychological consequences of a serious cyber attack, such as ransomware, are serious, long-lasting and run through the entire company. Companies and employees have to learn how to deal with the pressure. Information security specialist Northwave has conducted academic research into the psychological impact of large-scale ransomware attacks on businesses. The results show the deep scars such a crisis leaves on all those affected. At the same time, they make it clear that even after the attack itself has been overcome, it can still be a long time before the IT and security teams return to normal...

Read more

Continental Hack: Also VW and Mercedes documents at LockBit   
Continental Hack: Also VW and Mercedes documents at LockBit

The ransomware attack on Continental also stole over 40.000 gigabytes of data. Because Continental didn't pay any data ransom. The data probably includes confidential documents from VW, BMW and Mercedes. In addition, the FBI is now also involved with Continental. The manufacturer Continental has still not published a statement on the ransomware attack and the theft of over 40.000 gigabytes of data. Unlike LockBit: some of the data is available on their leak page. An overview of all existing data should be found in a packed directory. According to various media,…

Read more

Cyber ​​security: low priority despite many attacks
Cyber ​​security: low priority despite many attacks

Although 51 percent of large and medium-sized companies were affected by a cyber attack in the past 12 months, 13 percent attach less importance to cyber security. Also bad: Only half of the companies have backups. 59 percent of large and 26 percent of medium-sized companies in Germany were increasingly confronted with cyber attacks in the past twelve months. At the same time, 22 percent of SMBs gave cybersecurity a lower priority, as did a tenth (9,7 percent) of large companies. These results come from a current Kaspersky study that was presented at the itsa in Nuremberg...

Read more

Data protection: data protection without configuration
Data protection: data protection without configuration

Data protection innovations reduce security risks with faster deployment cycles and simplified operations. Zscaler improves enterprise data protection with industry-leading no-configuration data protection. Zscaler, Inc. announces data protection innovations that build on a long history of securing data in motion and at rest in cloud applications and BYOD resources. The new developments bring the greatest accuracy and scalability to data protection projects and reduce time-to-market to hours with zero-configuration functionality for Data Loss Prevention (DLP). By standardizing data protection across all channels and simplifying operations using the…

Read more

Is 5G a security risk for OT?
Is 5G a security risk for OT?

5G: Until recently, OT (Operational Technology) infrastructures were designed as isolated, shielded environments, disconnected from the corporate network - with the result that cybersecurity has not received much attention. With the advancement of an ever more networked factory, the Industrial Internet of Things (IIoT) and the latest 5G mobile communications standard, companies can no longer avoid implementing security concepts for their production facilities that are equivalent to those they already do in the classic IT environment. In principle, the integration of new technologies always entails potential security risks. Private 5G is safe - isn't it?...

Read more